Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.372817] ==================================================================
[   20.372884] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.372940] Write of size 121 at addr fff00000c6fc5700 by task kunit_try_catch/287
[   20.372997] 
[   20.373031] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.373133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.373184] Hardware name: linux,dummy-virt (DT)
[   20.373224] Call trace:
[   20.373251]  show_stack+0x20/0x38 (C)
[   20.373324]  dump_stack_lvl+0x8c/0xd0
[   20.373379]  print_report+0x118/0x5d0
[   20.373439]  kasan_report+0xdc/0x128
[   20.373487]  kasan_check_range+0x100/0x1a8
[   20.373543]  __kasan_check_write+0x20/0x30
[   20.373596]  copy_user_test_oob+0x35c/0xec8
[   20.373645]  kunit_try_run_case+0x170/0x3f0
[   20.373696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.373759]  kthread+0x328/0x630
[   20.373806]  ret_from_fork+0x10/0x20
[   20.373867] 
[   20.373891] Allocated by task 287:
[   20.373929]  kasan_save_stack+0x3c/0x68
[   20.373982]  kasan_save_track+0x20/0x40
[   20.374031]  kasan_save_alloc_info+0x40/0x58
[   20.374074]  __kasan_kmalloc+0xd4/0xd8
[   20.374117]  __kmalloc_noprof+0x198/0x4c8
[   20.374160]  kunit_kmalloc_array+0x34/0x88
[   20.374201]  copy_user_test_oob+0xac/0xec8
[   20.374241]  kunit_try_run_case+0x170/0x3f0
[   20.374292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.375423]  kthread+0x328/0x630
[   20.375649]  ret_from_fork+0x10/0x20
[   20.375700] 
[   20.375749] The buggy address belongs to the object at fff00000c6fc5700
[   20.375749]  which belongs to the cache kmalloc-128 of size 128
[   20.376091] The buggy address is located 0 bytes inside of
[   20.376091]  allocated 120-byte region [fff00000c6fc5700, fff00000c6fc5778)
[   20.376407] 
[   20.376662] The buggy address belongs to the physical page:
[   20.376739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.376896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.377092] page_type: f5(slab)
[   20.377200] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.377582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.378349] page dumped because: kasan: bad access detected
[   20.378425] 
[   20.378465] Memory state around the buggy address:
[   20.378764]  fff00000c6fc5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.378831]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.379100] >fff00000c6fc5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.379475]                                                                 ^
[   20.380255]  fff00000c6fc5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.380467]  fff00000c6fc5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.380696] ==================================================================
[   20.335887] ==================================================================
[   20.336591] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.336968] Write of size 121 at addr fff00000c6fc5700 by task kunit_try_catch/287
[   20.337040] 
[   20.337090] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.337823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.337881] Hardware name: linux,dummy-virt (DT)
[   20.337926] Call trace:
[   20.338023]  show_stack+0x20/0x38 (C)
[   20.338353]  dump_stack_lvl+0x8c/0xd0
[   20.338503]  print_report+0x118/0x5d0
[   20.338597]  kasan_report+0xdc/0x128
[   20.338741]  kasan_check_range+0x100/0x1a8
[   20.338798]  __kasan_check_write+0x20/0x30
[   20.339041]  copy_user_test_oob+0x234/0xec8
[   20.339204]  kunit_try_run_case+0x170/0x3f0
[   20.339362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.339497]  kthread+0x328/0x630
[   20.339592]  ret_from_fork+0x10/0x20
[   20.339946] 
[   20.339996] Allocated by task 287:
[   20.340074]  kasan_save_stack+0x3c/0x68
[   20.340171]  kasan_save_track+0x20/0x40
[   20.340343]  kasan_save_alloc_info+0x40/0x58
[   20.340425]  __kasan_kmalloc+0xd4/0xd8
[   20.340464]  __kmalloc_noprof+0x198/0x4c8
[   20.340822]  kunit_kmalloc_array+0x34/0x88
[   20.341240]  copy_user_test_oob+0xac/0xec8
[   20.341598]  kunit_try_run_case+0x170/0x3f0
[   20.341724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.341905]  kthread+0x328/0x630
[   20.342067]  ret_from_fork+0x10/0x20
[   20.342168] 
[   20.342239] The buggy address belongs to the object at fff00000c6fc5700
[   20.342239]  which belongs to the cache kmalloc-128 of size 128
[   20.342402] The buggy address is located 0 bytes inside of
[   20.342402]  allocated 120-byte region [fff00000c6fc5700, fff00000c6fc5778)
[   20.342773] 
[   20.342877] The buggy address belongs to the physical page:
[   20.342966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.343124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.343214] page_type: f5(slab)
[   20.343266] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.343327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.343370] page dumped because: kasan: bad access detected
[   20.343405] 
[   20.343798] Memory state around the buggy address:
[   20.343855]  fff00000c6fc5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.344055]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344301] >fff00000c6fc5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.344371]                                                                 ^
[   20.344548]  fff00000c6fc5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344709]  fff00000c6fc5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344753] ==================================================================
[   20.352244] ==================================================================
[   20.352323] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.352377] Read of size 121 at addr fff00000c6fc5700 by task kunit_try_catch/287
[   20.352433] 
[   20.352468] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.352569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.352603] Hardware name: linux,dummy-virt (DT)
[   20.352643] Call trace:
[   20.352692]  show_stack+0x20/0x38 (C)
[   20.352753]  dump_stack_lvl+0x8c/0xd0
[   20.352806]  print_report+0x118/0x5d0
[   20.352864]  kasan_report+0xdc/0x128
[   20.352911]  kasan_check_range+0x100/0x1a8
[   20.352968]  __kasan_check_read+0x20/0x30
[   20.353021]  copy_user_test_oob+0x728/0xec8
[   20.353070]  kunit_try_run_case+0x170/0x3f0
[   20.353122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.353176]  kthread+0x328/0x630
[   20.353223]  ret_from_fork+0x10/0x20
[   20.354869] 
[   20.354975] Allocated by task 287:
[   20.355087]  kasan_save_stack+0x3c/0x68
[   20.355184]  kasan_save_track+0x20/0x40
[   20.355295]  kasan_save_alloc_info+0x40/0x58
[   20.355382]  __kasan_kmalloc+0xd4/0xd8
[   20.355729]  __kmalloc_noprof+0x198/0x4c8
[   20.355831]  kunit_kmalloc_array+0x34/0x88
[   20.355928]  copy_user_test_oob+0xac/0xec8
[   20.356031]  kunit_try_run_case+0x170/0x3f0
[   20.356118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.356213]  kthread+0x328/0x630
[   20.356526]  ret_from_fork+0x10/0x20
[   20.356636] 
[   20.356703] The buggy address belongs to the object at fff00000c6fc5700
[   20.356703]  which belongs to the cache kmalloc-128 of size 128
[   20.356816] The buggy address is located 0 bytes inside of
[   20.356816]  allocated 120-byte region [fff00000c6fc5700, fff00000c6fc5778)
[   20.357243] 
[   20.357510] The buggy address belongs to the physical page:
[   20.357551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.357648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.358022] page_type: f5(slab)
[   20.358359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.358542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.359027] page dumped because: kasan: bad access detected
[   20.359356] 
[   20.359490] Memory state around the buggy address:
[   20.359622]  fff00000c6fc5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.359699]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.360018] >fff00000c6fc5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.360246]                                                                 ^
[   20.360318]  fff00000c6fc5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.361000]  fff00000c6fc5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.361152] ==================================================================
[   20.396250] ==================================================================
[   20.396325] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.396381] Write of size 121 at addr fff00000c6fc5700 by task kunit_try_catch/287
[   20.396455] 
[   20.396491] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.396605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.396647] Hardware name: linux,dummy-virt (DT)
[   20.396684] Call trace:
[   20.396708]  show_stack+0x20/0x38 (C)
[   20.396760]  dump_stack_lvl+0x8c/0xd0
[   20.396828]  print_report+0x118/0x5d0
[   20.396877]  kasan_report+0xdc/0x128
[   20.396926]  kasan_check_range+0x100/0x1a8
[   20.396982]  __kasan_check_write+0x20/0x30
[   20.397033]  copy_user_test_oob+0x434/0xec8
[   20.397082]  kunit_try_run_case+0x170/0x3f0
[   20.397133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.397189]  kthread+0x328/0x630
[   20.397242]  ret_from_fork+0x10/0x20
[   20.397303] 
[   20.397741] Allocated by task 287:
[   20.397788]  kasan_save_stack+0x3c/0x68
[   20.397869]  kasan_save_track+0x20/0x40
[   20.397912]  kasan_save_alloc_info+0x40/0x58
[   20.398381]  __kasan_kmalloc+0xd4/0xd8
[   20.398441]  __kmalloc_noprof+0x198/0x4c8
[   20.398484]  kunit_kmalloc_array+0x34/0x88
[   20.398773]  copy_user_test_oob+0xac/0xec8
[   20.398848]  kunit_try_run_case+0x170/0x3f0
[   20.399205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.399586]  kthread+0x328/0x630
[   20.399881]  ret_from_fork+0x10/0x20
[   20.399989] 
[   20.400147] The buggy address belongs to the object at fff00000c6fc5700
[   20.400147]  which belongs to the cache kmalloc-128 of size 128
[   20.400432] The buggy address is located 0 bytes inside of
[   20.400432]  allocated 120-byte region [fff00000c6fc5700, fff00000c6fc5778)
[   20.400762] 
[   20.400808] The buggy address belongs to the physical page:
[   20.400934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.401117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.401175] page_type: f5(slab)
[   20.401468] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.401643] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.401852] page dumped because: kasan: bad access detected
[   20.402008] 
[   20.402037] Memory state around the buggy address:
[   20.402245]  fff00000c6fc5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.402424]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.402751] >fff00000c6fc5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.402821]                                                                 ^
[   20.402870]  fff00000c6fc5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.402919]  fff00000c6fc5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.402962] ==================================================================
[   20.404713] ==================================================================
[   20.404775] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.404827] Read of size 121 at addr fff00000c6fc5700 by task kunit_try_catch/287
[   20.404884] 
[   20.404919] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.405021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.405425] Hardware name: linux,dummy-virt (DT)
[   20.405728] Call trace:
[   20.405888]  show_stack+0x20/0x38 (C)
[   20.405986]  dump_stack_lvl+0x8c/0xd0
[   20.406047]  print_report+0x118/0x5d0
[   20.406505]  kasan_report+0xdc/0x128
[   20.406667]  kasan_check_range+0x100/0x1a8
[   20.406902]  __kasan_check_read+0x20/0x30
[   20.407149]  copy_user_test_oob+0x4a0/0xec8
[   20.407722]  kunit_try_run_case+0x170/0x3f0
[   20.407966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.408177]  kthread+0x328/0x630
[   20.408369]  ret_from_fork+0x10/0x20
[   20.408705] 
[   20.408928] Allocated by task 287:
[   20.409015]  kasan_save_stack+0x3c/0x68
[   20.409212]  kasan_save_track+0x20/0x40
[   20.409310]  kasan_save_alloc_info+0x40/0x58
[   20.409355]  __kasan_kmalloc+0xd4/0xd8
[   20.409404]  __kmalloc_noprof+0x198/0x4c8
[   20.409785]  kunit_kmalloc_array+0x34/0x88
[   20.410056]  copy_user_test_oob+0xac/0xec8
[   20.410247]  kunit_try_run_case+0x170/0x3f0
[   20.410404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.410525]  kthread+0x328/0x630
[   20.410568]  ret_from_fork+0x10/0x20
[   20.410622] 
[   20.411056] The buggy address belongs to the object at fff00000c6fc5700
[   20.411056]  which belongs to the cache kmalloc-128 of size 128
[   20.411490] The buggy address is located 0 bytes inside of
[   20.411490]  allocated 120-byte region [fff00000c6fc5700, fff00000c6fc5778)
[   20.411666] 
[   20.411726] The buggy address belongs to the physical page:
[   20.411770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.411849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.411908] page_type: f5(slab)
[   20.412168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.412549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.412769] page dumped because: kasan: bad access detected
[   20.412820] 
[   20.413188] Memory state around the buggy address:
[   20.413311]  fff00000c6fc5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.413543]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.413597] >fff00000c6fc5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.414029]                                                                 ^
[   20.414408]  fff00000c6fc5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.414469]  fff00000c6fc5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.414791] ==================================================================
[   20.382249] ==================================================================
[   20.382316] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.382809] Read of size 121 at addr fff00000c6fc5700 by task kunit_try_catch/287
[   20.382930] 
[   20.382977] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.383476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.383788] Hardware name: linux,dummy-virt (DT)
[   20.383843] Call trace:
[   20.384114]  show_stack+0x20/0x38 (C)
[   20.384501]  dump_stack_lvl+0x8c/0xd0
[   20.384615]  print_report+0x118/0x5d0
[   20.384710]  kasan_report+0xdc/0x128
[   20.385092]  kasan_check_range+0x100/0x1a8
[   20.385187]  __kasan_check_read+0x20/0x30
[   20.385428]  copy_user_test_oob+0x3c8/0xec8
[   20.385506]  kunit_try_run_case+0x170/0x3f0
[   20.385716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.385977]  kthread+0x328/0x630
[   20.386289]  ret_from_fork+0x10/0x20
[   20.387210] 
[   20.387268] Allocated by task 287:
[   20.387420]  kasan_save_stack+0x3c/0x68
[   20.387646]  kasan_save_track+0x20/0x40
[   20.387858]  kasan_save_alloc_info+0x40/0x58
[   20.387950]  __kasan_kmalloc+0xd4/0xd8
[   20.388065]  __kmalloc_noprof+0x198/0x4c8
[   20.388212]  kunit_kmalloc_array+0x34/0x88
[   20.388346]  copy_user_test_oob+0xac/0xec8
[   20.388391]  kunit_try_run_case+0x170/0x3f0
[   20.388472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.388863]  kthread+0x328/0x630
[   20.389488]  ret_from_fork+0x10/0x20
[   20.389592] 
[   20.389636] The buggy address belongs to the object at fff00000c6fc5700
[   20.389636]  which belongs to the cache kmalloc-128 of size 128
[   20.389859] The buggy address is located 0 bytes inside of
[   20.389859]  allocated 120-byte region [fff00000c6fc5700, fff00000c6fc5778)
[   20.390083] 
[   20.390139] The buggy address belongs to the physical page:
[   20.390185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.390455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.390765] page_type: f5(slab)
[   20.390837] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.391260] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.391582] page dumped because: kasan: bad access detected
[   20.391768] 
[   20.391849] Memory state around the buggy address:
[   20.391889]  fff00000c6fc5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.391965]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.392234] >fff00000c6fc5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.392421]                                                                 ^
[   20.392669]  fff00000c6fc5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.392805]  fff00000c6fc5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.393020] ==================================================================

[   15.150617] ==================================================================
[   15.151000] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.151325] Read of size 121 at addr ffff888103cfcc00 by task kunit_try_catch/305
[   15.151611] 
[   15.151735] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   15.151780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.151792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.151813] Call Trace:
[   15.151829]  <TASK>
[   15.151847]  dump_stack_lvl+0x73/0xb0
[   15.151884]  print_report+0xd1/0x610
[   15.151907]  ? __virt_addr_valid+0x1db/0x2d0
[   15.151930]  ? copy_user_test_oob+0x604/0x10f0
[   15.151961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.151984]  ? copy_user_test_oob+0x604/0x10f0
[   15.152005]  kasan_report+0x141/0x180
[   15.152028]  ? copy_user_test_oob+0x604/0x10f0
[   15.152054]  kasan_check_range+0x10c/0x1c0
[   15.152075]  __kasan_check_read+0x15/0x20
[   15.152096]  copy_user_test_oob+0x604/0x10f0
[   15.152118]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.152138]  ? finish_task_switch.isra.0+0x153/0x700
[   15.152163]  ? __switch_to+0x5d9/0xf60
[   15.152183]  ? dequeue_task_fair+0x166/0x4e0
[   15.152208]  ? __schedule+0x10c6/0x2b60
[   15.152242]  ? __pfx_read_tsc+0x10/0x10
[   15.152272]  ? ktime_get_ts64+0x86/0x230
[   15.152298]  kunit_try_run_case+0x1a5/0x480
[   15.152320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.152377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.152398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.152434]  ? __kthread_parkme+0x82/0x180
[   15.152456]  ? preempt_count_sub+0x50/0x80
[   15.152481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.152502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.152527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.152551]  kthread+0x337/0x6f0
[   15.152568]  ? trace_preempt_on+0x20/0xc0
[   15.152600]  ? __pfx_kthread+0x10/0x10
[   15.152619]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.152641]  ? calculate_sigpending+0x7b/0xa0
[   15.152673]  ? __pfx_kthread+0x10/0x10
[   15.152692]  ret_from_fork+0x41/0x80
[   15.152713]  ? __pfx_kthread+0x10/0x10
[   15.152731]  ret_from_fork_asm+0x1a/0x30
[   15.152772]  </TASK>
[   15.152783] 
[   15.160290] Allocated by task 305:
[   15.160495]  kasan_save_stack+0x45/0x70
[   15.160699]  kasan_save_track+0x18/0x40
[   15.160880]  kasan_save_alloc_info+0x3b/0x50
[   15.161094]  __kasan_kmalloc+0xb7/0xc0
[   15.161247]  __kmalloc_noprof+0x1c9/0x500
[   15.161413]  kunit_kmalloc_array+0x25/0x60
[   15.161626]  copy_user_test_oob+0xab/0x10f0
[   15.161830]  kunit_try_run_case+0x1a5/0x480
[   15.162031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.162295]  kthread+0x337/0x6f0
[   15.162467]  ret_from_fork+0x41/0x80
[   15.162608]  ret_from_fork_asm+0x1a/0x30
[   15.162803] 
[   15.162898] The buggy address belongs to the object at ffff888103cfcc00
[   15.162898]  which belongs to the cache kmalloc-128 of size 128
[   15.163443] The buggy address is located 0 bytes inside of
[   15.163443]  allocated 120-byte region [ffff888103cfcc00, ffff888103cfcc78)
[   15.163933] 
[   15.164006] The buggy address belongs to the physical page:
[   15.164179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cfc
[   15.164455] flags: 0x200000000000000(node=0|zone=2)
[   15.164618] page_type: f5(slab)
[   15.164741] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.165112] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.165484] page dumped because: kasan: bad access detected
[   15.165736] 
[   15.165830] Memory state around the buggy address:
[   15.166083]  ffff888103cfcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.166436]  ffff888103cfcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.166766] >ffff888103cfcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.166995]                                                                 ^
[   15.167208]  ffff888103cfcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167457]  ffff888103cfcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167778] ==================================================================
[   15.113597] ==================================================================
[   15.113988] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.114297] Read of size 121 at addr ffff888103cfcc00 by task kunit_try_catch/305
[   15.114611] 
[   15.114698] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   15.114740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.114752] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.114774] Call Trace:
[   15.114789]  <TASK>
[   15.114803]  dump_stack_lvl+0x73/0xb0
[   15.114829]  print_report+0xd1/0x610
[   15.114852]  ? __virt_addr_valid+0x1db/0x2d0
[   15.114875]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.114895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.114919]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.114951]  kasan_report+0x141/0x180
[   15.114975]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.115011]  kasan_check_range+0x10c/0x1c0
[   15.115032]  __kasan_check_read+0x15/0x20
[   15.115053]  copy_user_test_oob+0x4aa/0x10f0
[   15.115076]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.115096]  ? finish_task_switch.isra.0+0x153/0x700
[   15.115120]  ? __switch_to+0x5d9/0xf60
[   15.115142]  ? dequeue_task_fair+0x166/0x4e0
[   15.115167]  ? __schedule+0x10c6/0x2b60
[   15.115192]  ? __pfx_read_tsc+0x10/0x10
[   15.115213]  ? ktime_get_ts64+0x86/0x230
[   15.115248]  kunit_try_run_case+0x1a5/0x480
[   15.115270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.115290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.115311]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.115336]  ? __kthread_parkme+0x82/0x180
[   15.115377]  ? preempt_count_sub+0x50/0x80
[   15.115402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.115423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.115447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.115471]  kthread+0x337/0x6f0
[   15.115489]  ? trace_preempt_on+0x20/0xc0
[   15.115513]  ? __pfx_kthread+0x10/0x10
[   15.115531]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.115554]  ? calculate_sigpending+0x7b/0xa0
[   15.115575]  ? __pfx_kthread+0x10/0x10
[   15.115604]  ret_from_fork+0x41/0x80
[   15.115625]  ? __pfx_kthread+0x10/0x10
[   15.115643]  ret_from_fork_asm+0x1a/0x30
[   15.115692]  </TASK>
[   15.115704] 
[   15.123271] Allocated by task 305:
[   15.123424]  kasan_save_stack+0x45/0x70
[   15.123613]  kasan_save_track+0x18/0x40
[   15.123816]  kasan_save_alloc_info+0x3b/0x50
[   15.123990]  __kasan_kmalloc+0xb7/0xc0
[   15.124153]  __kmalloc_noprof+0x1c9/0x500
[   15.124406]  kunit_kmalloc_array+0x25/0x60
[   15.124578]  copy_user_test_oob+0xab/0x10f0
[   15.124780]  kunit_try_run_case+0x1a5/0x480
[   15.124958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.125208]  kthread+0x337/0x6f0
[   15.125337]  ret_from_fork+0x41/0x80
[   15.125489]  ret_from_fork_asm+0x1a/0x30
[   15.125628] 
[   15.125697] The buggy address belongs to the object at ffff888103cfcc00
[   15.125697]  which belongs to the cache kmalloc-128 of size 128
[   15.126051] The buggy address is located 0 bytes inside of
[   15.126051]  allocated 120-byte region [ffff888103cfcc00, ffff888103cfcc78)
[   15.126580] 
[   15.126690] The buggy address belongs to the physical page:
[   15.126986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cfc
[   15.127424] flags: 0x200000000000000(node=0|zone=2)
[   15.127693] page_type: f5(slab)
[   15.127845] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.128078] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.128313] page dumped because: kasan: bad access detected
[   15.128508] 
[   15.128603] Memory state around the buggy address:
[   15.128829]  ffff888103cfcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.129173]  ffff888103cfcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.129527] >ffff888103cfcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.129861]                                                                 ^
[   15.130178]  ffff888103cfcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.130510]  ffff888103cfcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.130828] ==================================================================
[   15.131337] ==================================================================
[   15.131612] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.131942] Write of size 121 at addr ffff888103cfcc00 by task kunit_try_catch/305
[   15.132181] 
[   15.132307] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   15.132369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.132382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.132406] Call Trace:
[   15.132422]  <TASK>
[   15.132437]  dump_stack_lvl+0x73/0xb0
[   15.132463]  print_report+0xd1/0x610
[   15.132486]  ? __virt_addr_valid+0x1db/0x2d0
[   15.132509]  ? copy_user_test_oob+0x557/0x10f0
[   15.132528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.132552]  ? copy_user_test_oob+0x557/0x10f0
[   15.132573]  kasan_report+0x141/0x180
[   15.132596]  ? copy_user_test_oob+0x557/0x10f0
[   15.132622]  kasan_check_range+0x10c/0x1c0
[   15.132643]  __kasan_check_write+0x18/0x20
[   15.132663]  copy_user_test_oob+0x557/0x10f0
[   15.132686]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.132706]  ? finish_task_switch.isra.0+0x153/0x700
[   15.132731]  ? __switch_to+0x5d9/0xf60
[   15.132753]  ? dequeue_task_fair+0x166/0x4e0
[   15.132778]  ? __schedule+0x10c6/0x2b60
[   15.132802]  ? __pfx_read_tsc+0x10/0x10
[   15.132823]  ? ktime_get_ts64+0x86/0x230
[   15.132850]  kunit_try_run_case+0x1a5/0x480
[   15.132872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.132903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.132929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.132954]  ? __kthread_parkme+0x82/0x180
[   15.132989]  ? preempt_count_sub+0x50/0x80
[   15.133014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.133035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.133060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.133084]  kthread+0x337/0x6f0
[   15.133101]  ? trace_preempt_on+0x20/0xc0
[   15.133126]  ? __pfx_kthread+0x10/0x10
[   15.133144]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.133166]  ? calculate_sigpending+0x7b/0xa0
[   15.133188]  ? __pfx_kthread+0x10/0x10
[   15.133207]  ret_from_fork+0x41/0x80
[   15.133236]  ? __pfx_kthread+0x10/0x10
[   15.133255]  ret_from_fork_asm+0x1a/0x30
[   15.133286]  </TASK>
[   15.133298] 
[   15.140719] Allocated by task 305:
[   15.140845]  kasan_save_stack+0x45/0x70
[   15.140995]  kasan_save_track+0x18/0x40
[   15.141187]  kasan_save_alloc_info+0x3b/0x50
[   15.141448]  __kasan_kmalloc+0xb7/0xc0
[   15.141635]  __kmalloc_noprof+0x1c9/0x500
[   15.141832]  kunit_kmalloc_array+0x25/0x60
[   15.142029]  copy_user_test_oob+0xab/0x10f0
[   15.142253]  kunit_try_run_case+0x1a5/0x480
[   15.142481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.142732]  kthread+0x337/0x6f0
[   15.142883]  ret_from_fork+0x41/0x80
[   15.143014]  ret_from_fork_asm+0x1a/0x30
[   15.143153] 
[   15.143917] The buggy address belongs to the object at ffff888103cfcc00
[   15.143917]  which belongs to the cache kmalloc-128 of size 128
[   15.144562] The buggy address is located 0 bytes inside of
[   15.144562]  allocated 120-byte region [ffff888103cfcc00, ffff888103cfcc78)
[   15.145100] 
[   15.145196] The buggy address belongs to the physical page:
[   15.146174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cfc
[   15.146532] flags: 0x200000000000000(node=0|zone=2)
[   15.146758] page_type: f5(slab)
[   15.146919] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.147249] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.147505] page dumped because: kasan: bad access detected
[   15.147740] 
[   15.147858] Memory state around the buggy address:
[   15.148118]  ffff888103cfcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.148513]  ffff888103cfcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.148835] >ffff888103cfcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.149132]                                                                 ^
[   15.149455]  ffff888103cfcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.149763]  ffff888103cfcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.150030] ==================================================================
[   15.094729] ==================================================================
[   15.095420] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.096080] Write of size 121 at addr ffff888103cfcc00 by task kunit_try_catch/305
[   15.096765] 
[   15.096962] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   15.097018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.097030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.097052] Call Trace:
[   15.097067]  <TASK>
[   15.097095]  dump_stack_lvl+0x73/0xb0
[   15.097122]  print_report+0xd1/0x610
[   15.097146]  ? __virt_addr_valid+0x1db/0x2d0
[   15.097169]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.097189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.097213]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.097242]  kasan_report+0x141/0x180
[   15.097266]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.097300]  kasan_check_range+0x10c/0x1c0
[   15.097322]  __kasan_check_write+0x18/0x20
[   15.097368]  copy_user_test_oob+0x3fd/0x10f0
[   15.097391]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.097411]  ? finish_task_switch.isra.0+0x153/0x700
[   15.097437]  ? __switch_to+0x5d9/0xf60
[   15.097459]  ? dequeue_task_fair+0x166/0x4e0
[   15.097484]  ? __schedule+0x10c6/0x2b60
[   15.097509]  ? __pfx_read_tsc+0x10/0x10
[   15.097529]  ? ktime_get_ts64+0x86/0x230
[   15.097556]  kunit_try_run_case+0x1a5/0x480
[   15.097578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.097597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.097620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.097645]  ? __kthread_parkme+0x82/0x180
[   15.097667]  ? preempt_count_sub+0x50/0x80
[   15.097692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.097714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.097739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.097763]  kthread+0x337/0x6f0
[   15.097780]  ? trace_preempt_on+0x20/0xc0
[   15.097805]  ? __pfx_kthread+0x10/0x10
[   15.097825]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.097849]  ? calculate_sigpending+0x7b/0xa0
[   15.097872]  ? __pfx_kthread+0x10/0x10
[   15.097890]  ret_from_fork+0x41/0x80
[   15.097912]  ? __pfx_kthread+0x10/0x10
[   15.097930]  ret_from_fork_asm+0x1a/0x30
[   15.097962]  </TASK>
[   15.097973] 
[   15.105174] Allocated by task 305:
[   15.105388]  kasan_save_stack+0x45/0x70
[   15.105603]  kasan_save_track+0x18/0x40
[   15.105794]  kasan_save_alloc_info+0x3b/0x50
[   15.105999]  __kasan_kmalloc+0xb7/0xc0
[   15.106185]  __kmalloc_noprof+0x1c9/0x500
[   15.106417]  kunit_kmalloc_array+0x25/0x60
[   15.106644]  copy_user_test_oob+0xab/0x10f0
[   15.106827]  kunit_try_run_case+0x1a5/0x480
[   15.106971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107183]  kthread+0x337/0x6f0
[   15.107383]  ret_from_fork+0x41/0x80
[   15.107594]  ret_from_fork_asm+0x1a/0x30
[   15.107792] 
[   15.107885] The buggy address belongs to the object at ffff888103cfcc00
[   15.107885]  which belongs to the cache kmalloc-128 of size 128
[   15.108439] The buggy address is located 0 bytes inside of
[   15.108439]  allocated 120-byte region [ffff888103cfcc00, ffff888103cfcc78)
[   15.108930] 
[   15.109043] The buggy address belongs to the physical page:
[   15.109269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cfc
[   15.109641] flags: 0x200000000000000(node=0|zone=2)
[   15.109854] page_type: f5(slab)
[   15.110049] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.110399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.110724] page dumped because: kasan: bad access detected
[   15.110946] 
[   15.111063] Memory state around the buggy address:
[   15.111245]  ffff888103cfcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.111595]  ffff888103cfcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111908] >ffff888103cfcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.112125]                                                                 ^
[   15.112431]  ffff888103cfcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112772]  ffff888103cfcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.113090] ==================================================================