Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.670174] ==================================================================
[   20.670267] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.670585] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.670729] 
[   20.670810] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.670930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.671005] Hardware name: linux,dummy-virt (DT)
[   20.671061] Call trace:
[   20.671087]  show_stack+0x20/0x38 (C)
[   20.671142]  dump_stack_lvl+0x8c/0xd0
[   20.671194]  print_report+0x118/0x608
[   20.671311]  kasan_report+0xdc/0x128
[   20.671373]  kasan_check_range+0x100/0x1a8
[   20.671440]  __kasan_check_write+0x20/0x30
[   20.671492]  copy_user_test_oob+0x234/0xec8
[   20.671777]  kunit_try_run_case+0x170/0x3f0
[   20.671888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.671985]  kthread+0x328/0x630
[   20.672102]  ret_from_fork+0x10/0x20
[   20.672154] 
[   20.672204] Allocated by task 287:
[   20.672249]  kasan_save_stack+0x3c/0x68
[   20.672311]  kasan_save_track+0x20/0x40
[   20.672397]  kasan_save_alloc_info+0x40/0x58
[   20.672544]  __kasan_kmalloc+0xd4/0xd8
[   20.672612]  __kmalloc_noprof+0x198/0x4c8
[   20.672654]  kunit_kmalloc_array+0x34/0x88
[   20.672694]  copy_user_test_oob+0xac/0xec8
[   20.672733]  kunit_try_run_case+0x170/0x3f0
[   20.672773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.673060]  kthread+0x328/0x630
[   20.673178]  ret_from_fork+0x10/0x20
[   20.673265] 
[   20.673405] The buggy address belongs to the object at fff00000c6e6ca00
[   20.673405]  which belongs to the cache kmalloc-128 of size 128
[   20.673489] The buggy address is located 0 bytes inside of
[   20.673489]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.673555] 
[   20.673600] The buggy address belongs to the physical page:
[   20.673644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.673711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.673771] page_type: f5(slab)
[   20.673822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.673874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.673917] page dumped because: kasan: bad access detected
[   20.673950] 
[   20.673974] Memory state around the buggy address:
[   20.674009]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.674054]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674115] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.674156]                                                                 ^
[   20.674209]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674268]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674315] ==================================================================
[   20.701634] ==================================================================
[   20.701783] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.701836] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.701889] 
[   20.701955] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.702171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.702201] Hardware name: linux,dummy-virt (DT)
[   20.702307] Call trace:
[   20.702374]  show_stack+0x20/0x38 (C)
[   20.702428]  dump_stack_lvl+0x8c/0xd0
[   20.702477]  print_report+0x118/0x608
[   20.702525]  kasan_report+0xdc/0x128
[   20.702862]  kasan_check_range+0x100/0x1a8
[   20.702952]  __kasan_check_write+0x20/0x30
[   20.703005]  copy_user_test_oob+0x434/0xec8
[   20.703076]  kunit_try_run_case+0x170/0x3f0
[   20.703162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.703225]  kthread+0x328/0x630
[   20.703280]  ret_from_fork+0x10/0x20
[   20.703374] 
[   20.703542] Allocated by task 287:
[   20.703576]  kasan_save_stack+0x3c/0x68
[   20.703747]  kasan_save_track+0x20/0x40
[   20.703813]  kasan_save_alloc_info+0x40/0x58
[   20.703866]  __kasan_kmalloc+0xd4/0xd8
[   20.703904]  __kmalloc_noprof+0x198/0x4c8
[   20.703950]  kunit_kmalloc_array+0x34/0x88
[   20.703990]  copy_user_test_oob+0xac/0xec8
[   20.704029]  kunit_try_run_case+0x170/0x3f0
[   20.704069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.704116]  kthread+0x328/0x630
[   20.704155]  ret_from_fork+0x10/0x20
[   20.704206] 
[   20.704239] The buggy address belongs to the object at fff00000c6e6ca00
[   20.704239]  which belongs to the cache kmalloc-128 of size 128
[   20.704299] The buggy address is located 0 bytes inside of
[   20.704299]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.704372] 
[   20.704634] The buggy address belongs to the physical page:
[   20.704693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.704782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.704835] page_type: f5(slab)
[   20.704876] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.705035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.705117] page dumped because: kasan: bad access detected
[   20.705232] 
[   20.705310] Memory state around the buggy address:
[   20.705387]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.705514]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.705579] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.705684]                                                                 ^
[   20.705821]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.705902]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.705980] ==================================================================
[   20.678884] ==================================================================
[   20.679170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.679286] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.679405] 
[   20.679446] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.679548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.679580] Hardware name: linux,dummy-virt (DT)
[   20.679612] Call trace:
[   20.679637]  show_stack+0x20/0x38 (C)
[   20.679932]  dump_stack_lvl+0x8c/0xd0
[   20.680017]  print_report+0x118/0x608
[   20.680083]  kasan_report+0xdc/0x128
[   20.680146]  kasan_check_range+0x100/0x1a8
[   20.680219]  __kasan_check_read+0x20/0x30
[   20.680499]  copy_user_test_oob+0x728/0xec8
[   20.680568]  kunit_try_run_case+0x170/0x3f0
[   20.680665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.680797]  kthread+0x328/0x630
[   20.680892]  ret_from_fork+0x10/0x20
[   20.680995] 
[   20.681108] Allocated by task 287:
[   20.681186]  kasan_save_stack+0x3c/0x68
[   20.681275]  kasan_save_track+0x20/0x40
[   20.681626]  kasan_save_alloc_info+0x40/0x58
[   20.681727]  __kasan_kmalloc+0xd4/0xd8
[   20.681830]  __kmalloc_noprof+0x198/0x4c8
[   20.681969]  kunit_kmalloc_array+0x34/0x88
[   20.682055]  copy_user_test_oob+0xac/0xec8
[   20.682118]  kunit_try_run_case+0x170/0x3f0
[   20.682171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.682217]  kthread+0x328/0x630
[   20.682257]  ret_from_fork+0x10/0x20
[   20.682294] 
[   20.682574] The buggy address belongs to the object at fff00000c6e6ca00
[   20.682574]  which belongs to the cache kmalloc-128 of size 128
[   20.682752] The buggy address is located 0 bytes inside of
[   20.682752]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.682870] 
[   20.682913] The buggy address belongs to the physical page:
[   20.683029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.683093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.683170] page_type: f5(slab)
[   20.683243] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.683636] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.683751] page dumped because: kasan: bad access detected
[   20.683899] 
[   20.683959] Memory state around the buggy address:
[   20.684016]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.684090]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.684145] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.684186]                                                                 ^
[   20.684237]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.684283]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.684324] ==================================================================
[   20.706517] ==================================================================
[   20.706599] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.706650] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.706734] 
[   20.706794] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.706916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.706963] Hardware name: linux,dummy-virt (DT)
[   20.707001] Call trace:
[   20.707025]  show_stack+0x20/0x38 (C)
[   20.707082]  dump_stack_lvl+0x8c/0xd0
[   20.707446]  print_report+0x118/0x608
[   20.707507]  kasan_report+0xdc/0x128
[   20.707555]  kasan_check_range+0x100/0x1a8
[   20.707613]  __kasan_check_read+0x20/0x30
[   20.707664]  copy_user_test_oob+0x4a0/0xec8
[   20.707713]  kunit_try_run_case+0x170/0x3f0
[   20.707766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.707830]  kthread+0x328/0x630
[   20.707879]  ret_from_fork+0x10/0x20
[   20.707927] 
[   20.707949] Allocated by task 287:
[   20.707979]  kasan_save_stack+0x3c/0x68
[   20.708022]  kasan_save_track+0x20/0x40
[   20.708060]  kasan_save_alloc_info+0x40/0x58
[   20.708102]  __kasan_kmalloc+0xd4/0xd8
[   20.708138]  __kmalloc_noprof+0x198/0x4c8
[   20.708178]  kunit_kmalloc_array+0x34/0x88
[   20.708224]  copy_user_test_oob+0xac/0xec8
[   20.708265]  kunit_try_run_case+0x170/0x3f0
[   20.708307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.708364]  kthread+0x328/0x630
[   20.708403]  ret_from_fork+0x10/0x20
[   20.708440] 
[   20.708461] The buggy address belongs to the object at fff00000c6e6ca00
[   20.708461]  which belongs to the cache kmalloc-128 of size 128
[   20.708758] The buggy address is located 0 bytes inside of
[   20.708758]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.708925] 
[   20.709003] The buggy address belongs to the physical page:
[   20.709135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.709190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.709239] page_type: f5(slab)
[   20.709279] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.709344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.709388] page dumped because: kasan: bad access detected
[   20.709422] 
[   20.709469] Memory state around the buggy address:
[   20.709503]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.709648]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.709746] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.709893]                                                                 ^
[   20.709961]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.710063]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.710368] ==================================================================
[   20.695589] ==================================================================
[   20.695652] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.695704] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.695780] 
[   20.695934] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.696094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.696126] Hardware name: linux,dummy-virt (DT)
[   20.696187] Call trace:
[   20.696294]  show_stack+0x20/0x38 (C)
[   20.696404]  dump_stack_lvl+0x8c/0xd0
[   20.696528]  print_report+0x118/0x608
[   20.696613]  kasan_report+0xdc/0x128
[   20.696672]  kasan_check_range+0x100/0x1a8
[   20.696721]  __kasan_check_read+0x20/0x30
[   20.696768]  copy_user_test_oob+0x3c8/0xec8
[   20.696928]  kunit_try_run_case+0x170/0x3f0
[   20.697060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.697161]  kthread+0x328/0x630
[   20.697289]  ret_from_fork+0x10/0x20
[   20.697483] 
[   20.697542] Allocated by task 287:
[   20.697602]  kasan_save_stack+0x3c/0x68
[   20.697645]  kasan_save_track+0x20/0x40
[   20.697696]  kasan_save_alloc_info+0x40/0x58
[   20.697771]  __kasan_kmalloc+0xd4/0xd8
[   20.698099]  __kmalloc_noprof+0x198/0x4c8
[   20.698188]  kunit_kmalloc_array+0x34/0x88
[   20.698260]  copy_user_test_oob+0xac/0xec8
[   20.698432]  kunit_try_run_case+0x170/0x3f0
[   20.698504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.698666]  kthread+0x328/0x630
[   20.698753]  ret_from_fork+0x10/0x20
[   20.698827] 
[   20.698958] The buggy address belongs to the object at fff00000c6e6ca00
[   20.698958]  which belongs to the cache kmalloc-128 of size 128
[   20.699019] The buggy address is located 0 bytes inside of
[   20.699019]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.699082] 
[   20.699104] The buggy address belongs to the physical page:
[   20.699138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.699451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.699562] page_type: f5(slab)
[   20.699641] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.699789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.699866] page dumped because: kasan: bad access detected
[   20.699928] 
[   20.699979] Memory state around the buggy address:
[   20.700223]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.700388]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.700475] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.700619]                                                                 ^
[   20.700688]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.700769]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.700836] ==================================================================
[   20.689760] ==================================================================
[   20.689875] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.689929] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.689999] 
[   20.690032] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.690505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.690549] Hardware name: linux,dummy-virt (DT)
[   20.690688] Call trace:
[   20.690737]  show_stack+0x20/0x38 (C)
[   20.690801]  dump_stack_lvl+0x8c/0xd0
[   20.690891]  print_report+0x118/0x608
[   20.690956]  kasan_report+0xdc/0x128
[   20.691022]  kasan_check_range+0x100/0x1a8
[   20.691073]  __kasan_check_write+0x20/0x30
[   20.691128]  copy_user_test_oob+0x35c/0xec8
[   20.691210]  kunit_try_run_case+0x170/0x3f0
[   20.691267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.691361]  kthread+0x328/0x630
[   20.691412]  ret_from_fork+0x10/0x20
[   20.691660] 
[   20.691711] Allocated by task 287:
[   20.691760]  kasan_save_stack+0x3c/0x68
[   20.691804]  kasan_save_track+0x20/0x40
[   20.691861]  kasan_save_alloc_info+0x40/0x58
[   20.691924]  __kasan_kmalloc+0xd4/0xd8
[   20.692008]  __kmalloc_noprof+0x198/0x4c8
[   20.692065]  kunit_kmalloc_array+0x34/0x88
[   20.692109]  copy_user_test_oob+0xac/0xec8
[   20.692146]  kunit_try_run_case+0x170/0x3f0
[   20.692188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.692360]  kthread+0x328/0x630
[   20.692419]  ret_from_fork+0x10/0x20
[   20.692458] 
[   20.692480] The buggy address belongs to the object at fff00000c6e6ca00
[   20.692480]  which belongs to the cache kmalloc-128 of size 128
[   20.692539] The buggy address is located 0 bytes inside of
[   20.692539]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.692602] 
[   20.692967] The buggy address belongs to the physical page:
[   20.693044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.693193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.693287] page_type: f5(slab)
[   20.693645] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.693741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.693810] page dumped because: kasan: bad access detected
[   20.693872] 
[   20.693969] Memory state around the buggy address:
[   20.694025]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.694090]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.694157] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.694276]                                                                 ^
[   20.694349]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.694420]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.694462] ==================================================================

[   15.490365] ==================================================================
[   15.490782] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.491125] Write of size 121 at addr ffff888103606900 by task kunit_try_catch/305
[   15.491449] 
[   15.491546] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.491612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.491626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.491649] Call Trace:
[   15.491664]  <TASK>
[   15.491681]  dump_stack_lvl+0x73/0xb0
[   15.491706]  print_report+0xd1/0x650
[   15.491730]  ? __virt_addr_valid+0x1db/0x2d0
[   15.491752]  ? copy_user_test_oob+0x557/0x10f0
[   15.491774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.491800]  ? copy_user_test_oob+0x557/0x10f0
[   15.491822]  kasan_report+0x141/0x180
[   15.491846]  ? copy_user_test_oob+0x557/0x10f0
[   15.491885]  kasan_check_range+0x10c/0x1c0
[   15.491907]  __kasan_check_write+0x18/0x20
[   15.491929]  copy_user_test_oob+0x557/0x10f0
[   15.491953]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.491974]  ? finish_task_switch.isra.0+0x153/0x700
[   15.491999]  ? __switch_to+0x5d9/0xf60
[   15.492020]  ? dequeue_task_fair+0x156/0x4e0
[   15.492046]  ? __schedule+0x10cc/0x2b60
[   15.492070]  ? __pfx_read_tsc+0x10/0x10
[   15.492093]  ? ktime_get_ts64+0x86/0x230
[   15.492122]  kunit_try_run_case+0x1a5/0x480
[   15.492147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.492169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.492194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.492220]  ? __kthread_parkme+0x82/0x180
[   15.492244]  ? preempt_count_sub+0x50/0x80
[   15.492269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.492292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.492317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.492343]  kthread+0x337/0x6f0
[   15.492362]  ? trace_preempt_on+0x20/0xc0
[   15.492386]  ? __pfx_kthread+0x10/0x10
[   15.492406]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.492429]  ? calculate_sigpending+0x7b/0xa0
[   15.492451]  ? __pfx_kthread+0x10/0x10
[   15.492471]  ret_from_fork+0x41/0x80
[   15.492492]  ? __pfx_kthread+0x10/0x10
[   15.492512]  ret_from_fork_asm+0x1a/0x30
[   15.492555]  </TASK>
[   15.492567] 
[   15.499794] Allocated by task 305:
[   15.499960]  kasan_save_stack+0x45/0x70
[   15.500109]  kasan_save_track+0x18/0x40
[   15.500247]  kasan_save_alloc_info+0x3b/0x50
[   15.500395]  __kasan_kmalloc+0xb7/0xc0
[   15.500588]  __kmalloc_noprof+0x1c9/0x500
[   15.500899]  kunit_kmalloc_array+0x25/0x60
[   15.501349]  copy_user_test_oob+0xab/0x10f0
[   15.501529]  kunit_try_run_case+0x1a5/0x480
[   15.501677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.501855]  kthread+0x337/0x6f0
[   15.502727]  ret_from_fork+0x41/0x80
[   15.502932]  ret_from_fork_asm+0x1a/0x30
[   15.503132] 
[   15.503232] The buggy address belongs to the object at ffff888103606900
[   15.503232]  which belongs to the cache kmalloc-128 of size 128
[   15.504271] The buggy address is located 0 bytes inside of
[   15.504271]  allocated 120-byte region [ffff888103606900, ffff888103606978)
[   15.504996] 
[   15.505096] The buggy address belongs to the physical page:
[   15.505329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103606
[   15.506053] flags: 0x200000000000000(node=0|zone=2)
[   15.506311] page_type: f5(slab)
[   15.506597] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.507201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.507909] page dumped because: kasan: bad access detected
[   15.508150] 
[   15.508243] Memory state around the buggy address:
[   15.508450]  ffff888103606800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.509024]  ffff888103606880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.509528] >ffff888103606900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.509963]                                                                 ^
[   15.510267]  ffff888103606980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510848]  ffff888103606a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.511312] ==================================================================
[   15.512565] ==================================================================
[   15.512934] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.513360] Read of size 121 at addr ffff888103606900 by task kunit_try_catch/305
[   15.514024] 
[   15.514334] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.514394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.514409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.514433] Call Trace:
[   15.514450]  <TASK>
[   15.514467]  dump_stack_lvl+0x73/0xb0
[   15.514531]  print_report+0xd1/0x650
[   15.514556]  ? __virt_addr_valid+0x1db/0x2d0
[   15.514580]  ? copy_user_test_oob+0x604/0x10f0
[   15.514602]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.514626]  ? copy_user_test_oob+0x604/0x10f0
[   15.514648]  kasan_report+0x141/0x180
[   15.514673]  ? copy_user_test_oob+0x604/0x10f0
[   15.514700]  kasan_check_range+0x10c/0x1c0
[   15.514723]  __kasan_check_read+0x15/0x20
[   15.514745]  copy_user_test_oob+0x604/0x10f0
[   15.514769]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.514790]  ? finish_task_switch.isra.0+0x153/0x700
[   15.514816]  ? __switch_to+0x5d9/0xf60
[   15.514838]  ? dequeue_task_fair+0x156/0x4e0
[   15.514864]  ? __schedule+0x10cc/0x2b60
[   15.514899]  ? __pfx_read_tsc+0x10/0x10
[   15.514921]  ? ktime_get_ts64+0x86/0x230
[   15.514947]  kunit_try_run_case+0x1a5/0x480
[   15.514970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.514991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.515017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.515042]  ? __kthread_parkme+0x82/0x180
[   15.515065]  ? preempt_count_sub+0x50/0x80
[   15.515091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.515114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.515140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.515167]  kthread+0x337/0x6f0
[   15.515185]  ? trace_preempt_on+0x20/0xc0
[   15.515209]  ? __pfx_kthread+0x10/0x10
[   15.515229]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.515252]  ? calculate_sigpending+0x7b/0xa0
[   15.515274]  ? __pfx_kthread+0x10/0x10
[   15.515295]  ret_from_fork+0x41/0x80
[   15.515317]  ? __pfx_kthread+0x10/0x10
[   15.515337]  ret_from_fork_asm+0x1a/0x30
[   15.515368]  </TASK>
[   15.515381] 
[   15.526683] Allocated by task 305:
[   15.526868]  kasan_save_stack+0x45/0x70
[   15.527071]  kasan_save_track+0x18/0x40
[   15.527257]  kasan_save_alloc_info+0x3b/0x50
[   15.527460]  __kasan_kmalloc+0xb7/0xc0
[   15.527945]  __kmalloc_noprof+0x1c9/0x500
[   15.528277]  kunit_kmalloc_array+0x25/0x60
[   15.528707]  copy_user_test_oob+0xab/0x10f0
[   15.529135]  kunit_try_run_case+0x1a5/0x480
[   15.529410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.529840]  kthread+0x337/0x6f0
[   15.530029]  ret_from_fork+0x41/0x80
[   15.530205]  ret_from_fork_asm+0x1a/0x30
[   15.530396] 
[   15.530495] The buggy address belongs to the object at ffff888103606900
[   15.530495]  which belongs to the cache kmalloc-128 of size 128
[   15.531014] The buggy address is located 0 bytes inside of
[   15.531014]  allocated 120-byte region [ffff888103606900, ffff888103606978)
[   15.531906] 
[   15.532019] The buggy address belongs to the physical page:
[   15.532445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103606
[   15.533178] flags: 0x200000000000000(node=0|zone=2)
[   15.533738] page_type: f5(slab)
[   15.534043] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.534555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.535175] page dumped because: kasan: bad access detected
[   15.535485] 
[   15.535728] Memory state around the buggy address:
[   15.535973]  ffff888103606800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.536269]  ffff888103606880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.536847] >ffff888103606900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.537307]                                                                 ^
[   15.537863]  ffff888103606980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.538489]  ffff888103606a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.538833] ==================================================================
[   15.441449] ==================================================================
[   15.441798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.442160] Write of size 121 at addr ffff888103606900 by task kunit_try_catch/305
[   15.442502] 
[   15.442630] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.442677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.442713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.442736] Call Trace:
[   15.442752]  <TASK>
[   15.442769]  dump_stack_lvl+0x73/0xb0
[   15.442797]  print_report+0xd1/0x650
[   15.442823]  ? __virt_addr_valid+0x1db/0x2d0
[   15.442848]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.442905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.442932]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.442954]  kasan_report+0x141/0x180
[   15.442979]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.443006]  kasan_check_range+0x10c/0x1c0
[   15.443029]  __kasan_check_write+0x18/0x20
[   15.443051]  copy_user_test_oob+0x3fd/0x10f0
[   15.443075]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.443096]  ? finish_task_switch.isra.0+0x153/0x700
[   15.443123]  ? __switch_to+0x5d9/0xf60
[   15.443144]  ? dequeue_task_fair+0x156/0x4e0
[   15.443170]  ? __schedule+0x10cc/0x2b60
[   15.443196]  ? __pfx_read_tsc+0x10/0x10
[   15.443217]  ? ktime_get_ts64+0x86/0x230
[   15.443263]  kunit_try_run_case+0x1a5/0x480
[   15.443286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.443307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.443333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.443361]  ? __kthread_parkme+0x82/0x180
[   15.443384]  ? preempt_count_sub+0x50/0x80
[   15.443410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.443452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.443478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.443504]  kthread+0x337/0x6f0
[   15.443522]  ? trace_preempt_on+0x20/0xc0
[   15.443547]  ? __pfx_kthread+0x10/0x10
[   15.443567]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.443597]  ? calculate_sigpending+0x7b/0xa0
[   15.443621]  ? __pfx_kthread+0x10/0x10
[   15.443640]  ret_from_fork+0x41/0x80
[   15.443662]  ? __pfx_kthread+0x10/0x10
[   15.443682]  ret_from_fork_asm+0x1a/0x30
[   15.443716]  </TASK>
[   15.443728] 
[   15.451428] Allocated by task 305:
[   15.451613]  kasan_save_stack+0x45/0x70
[   15.451825]  kasan_save_track+0x18/0x40
[   15.451993]  kasan_save_alloc_info+0x3b/0x50
[   15.452226]  __kasan_kmalloc+0xb7/0xc0
[   15.452426]  __kmalloc_noprof+0x1c9/0x500
[   15.452654]  kunit_kmalloc_array+0x25/0x60
[   15.452857]  copy_user_test_oob+0xab/0x10f0
[   15.453015]  kunit_try_run_case+0x1a5/0x480
[   15.453162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453421]  kthread+0x337/0x6f0
[   15.453676]  ret_from_fork+0x41/0x80
[   15.453920]  ret_from_fork_asm+0x1a/0x30
[   15.454137] 
[   15.454213] The buggy address belongs to the object at ffff888103606900
[   15.454213]  which belongs to the cache kmalloc-128 of size 128
[   15.454856] The buggy address is located 0 bytes inside of
[   15.454856]  allocated 120-byte region [ffff888103606900, ffff888103606978)
[   15.455398] 
[   15.455530] The buggy address belongs to the physical page:
[   15.455752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103606
[   15.456101] flags: 0x200000000000000(node=0|zone=2)
[   15.456343] page_type: f5(slab)
[   15.456468] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.456704] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.456958] page dumped because: kasan: bad access detected
[   15.457134] 
[   15.458008] Memory state around the buggy address:
[   15.458291]  ffff888103606800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.458626]  ffff888103606880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.459693] >ffff888103606900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.459939]                                                                 ^
[   15.461035]  ffff888103606980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.461304]  ffff888103606a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.461537] ==================================================================
[   15.462003] ==================================================================
[   15.463682] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.464240] Read of size 121 at addr ffff888103606900 by task kunit_try_catch/305
[   15.464476] 
[   15.465044] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.465097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.465112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.465145] Call Trace:
[   15.465162]  <TASK>
[   15.465178]  dump_stack_lvl+0x73/0xb0
[   15.465206]  print_report+0xd1/0x650
[   15.465231]  ? __virt_addr_valid+0x1db/0x2d0
[   15.465255]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.465277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.465302]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.465324]  kasan_report+0x141/0x180
[   15.465349]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.465375]  kasan_check_range+0x10c/0x1c0
[   15.465399]  __kasan_check_read+0x15/0x20
[   15.465420]  copy_user_test_oob+0x4aa/0x10f0
[   15.465445]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.465466]  ? finish_task_switch.isra.0+0x153/0x700
[   15.465491]  ? __switch_to+0x5d9/0xf60
[   15.465662]  ? dequeue_task_fair+0x156/0x4e0
[   15.465691]  ? __schedule+0x10cc/0x2b60
[   15.465718]  ? __pfx_read_tsc+0x10/0x10
[   15.465740]  ? ktime_get_ts64+0x86/0x230
[   15.465801]  kunit_try_run_case+0x1a5/0x480
[   15.465828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.465850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.465890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.465927]  ? __kthread_parkme+0x82/0x180
[   15.465951]  ? preempt_count_sub+0x50/0x80
[   15.465988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.466011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.466036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.466062]  kthread+0x337/0x6f0
[   15.466081]  ? trace_preempt_on+0x20/0xc0
[   15.466106]  ? __pfx_kthread+0x10/0x10
[   15.466126]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.466150]  ? calculate_sigpending+0x7b/0xa0
[   15.466173]  ? __pfx_kthread+0x10/0x10
[   15.466193]  ret_from_fork+0x41/0x80
[   15.466214]  ? __pfx_kthread+0x10/0x10
[   15.466234]  ret_from_fork_asm+0x1a/0x30
[   15.466265]  </TASK>
[   15.466278] 
[   15.479022] Allocated by task 305:
[   15.479390]  kasan_save_stack+0x45/0x70
[   15.479735]  kasan_save_track+0x18/0x40
[   15.479950]  kasan_save_alloc_info+0x3b/0x50
[   15.480361]  __kasan_kmalloc+0xb7/0xc0
[   15.480543]  __kmalloc_noprof+0x1c9/0x500
[   15.480985]  kunit_kmalloc_array+0x25/0x60
[   15.481173]  copy_user_test_oob+0xab/0x10f0
[   15.481476]  kunit_try_run_case+0x1a5/0x480
[   15.481958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.482389]  kthread+0x337/0x6f0
[   15.482591]  ret_from_fork+0x41/0x80
[   15.482961]  ret_from_fork_asm+0x1a/0x30
[   15.483102] 
[   15.483176] The buggy address belongs to the object at ffff888103606900
[   15.483176]  which belongs to the cache kmalloc-128 of size 128
[   15.483531] The buggy address is located 0 bytes inside of
[   15.483531]  allocated 120-byte region [ffff888103606900, ffff888103606978)
[   15.484621] 
[   15.484794] The buggy address belongs to the physical page:
[   15.485300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103606
[   15.486017] flags: 0x200000000000000(node=0|zone=2)
[   15.486476] page_type: f5(slab)
[   15.486844] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.487483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.487727] page dumped because: kasan: bad access detected
[   15.487909] 
[   15.487979] Memory state around the buggy address:
[   15.488130]  ffff888103606800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.488340]  ffff888103606880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.488563] >ffff888103606900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.488777]                                                                 ^
[   15.489103]  ffff888103606980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.489369]  ffff888103606a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.489844] ==================================================================