Hay
Date
March 19, 2025, 10:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   39.832123] ==================================================================
[   39.832386] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   39.832971] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.833161] 
[   39.833257] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.833996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.834116] Hardware name: linux,dummy-virt (DT)
[   39.834998] Call trace:
[   39.835134]  show_stack+0x20/0x38 (C)
[   39.835668]  dump_stack_lvl+0x8c/0xd0
[   39.835847]  print_report+0x118/0x5f0
[   39.836479]  kasan_report+0xc8/0x118
[   39.836935]  kasan_check_range+0x100/0x1a8
[   39.837114]  __kasan_check_read+0x20/0x30
[   39.837276]  copy_user_test_oob+0x3c8/0xec0
[   39.837430]  kunit_try_run_case+0x14c/0x3d0
[   39.837582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.837752]  kthread+0x318/0x618
[   39.838384]  ret_from_fork+0x10/0x20
[   39.839592] 
[   39.839904] Allocated by task 287:
[   39.840198]  kasan_save_stack+0x3c/0x68
[   39.840587]  kasan_save_track+0x20/0x40
[   39.840881]  kasan_save_alloc_info+0x40/0x58
[   39.841638]  __kasan_kmalloc+0xd4/0xd8
[   39.841847]  __kmalloc_noprof+0x188/0x4c8
[   39.842018]  kunit_kmalloc_array+0x34/0x88
[   39.842173]  copy_user_test_oob+0xac/0xec0
[   39.842759]  kunit_try_run_case+0x14c/0x3d0
[   39.843449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.844011]  kthread+0x318/0x618
[   39.844743]  ret_from_fork+0x10/0x20
[   39.844885] 
[   39.845070] The buggy address belongs to the object at fff00000c5dbd000
[   39.845070]  which belongs to the cache kmalloc-128 of size 128
[   39.845383] The buggy address is located 0 bytes inside of
[   39.845383]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.846144] 
[   39.846532] The buggy address belongs to the physical page:
[   39.847125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.847310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.848037] page_type: f5(slab)
[   39.848208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.848391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.848542] page dumped because: kasan: bad access detected
[   39.848654] 
[   39.848714] Memory state around the buggy address:
[   39.849385]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.850208]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.851001] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.851196]                                                                 ^
[   39.851341]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.851497]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.851633] ==================================================================
[   39.780418] ==================================================================
[   39.780569] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   39.780775] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.780989] 
[   39.781155] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.781340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.781460] Hardware name: linux,dummy-virt (DT)
[   39.781571] Call trace:
[   39.781642]  show_stack+0x20/0x38 (C)
[   39.781902]  dump_stack_lvl+0x8c/0xd0
[   39.782079]  print_report+0x118/0x5f0
[   39.782370]  kasan_report+0xc8/0x118
[   39.782629]  kasan_check_range+0x100/0x1a8
[   39.782892]  __kasan_check_read+0x20/0x30
[   39.783172]  copy_user_test_oob+0x728/0xec0
[   39.783441]  kunit_try_run_case+0x14c/0x3d0
[   39.783697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.783977]  kthread+0x318/0x618
[   39.784143]  ret_from_fork+0x10/0x20
[   39.784440] 
[   39.784518] Allocated by task 287:
[   39.784629]  kasan_save_stack+0x3c/0x68
[   39.784765]  kasan_save_track+0x20/0x40
[   39.784918]  kasan_save_alloc_info+0x40/0x58
[   39.785077]  __kasan_kmalloc+0xd4/0xd8
[   39.785265]  __kmalloc_noprof+0x188/0x4c8
[   39.785430]  kunit_kmalloc_array+0x34/0x88
[   39.785575]  copy_user_test_oob+0xac/0xec0
[   39.785732]  kunit_try_run_case+0x14c/0x3d0
[   39.785924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.786134]  kthread+0x318/0x618
[   39.786287]  ret_from_fork+0x10/0x20
[   39.786444] 
[   39.786552] The buggy address belongs to the object at fff00000c5dbd000
[   39.786552]  which belongs to the cache kmalloc-128 of size 128
[   39.786753] The buggy address is located 0 bytes inside of
[   39.786753]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.786980] 
[   39.787076] The buggy address belongs to the physical page:
[   39.787741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.787924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.788116] page_type: f5(slab)
[   39.788255] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.788504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.788720] page dumped because: kasan: bad access detected
[   39.788881] 
[   39.789020] Memory state around the buggy address:
[   39.789241]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.789409]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.789579] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.789718]                                                                 ^
[   39.789855]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.790010]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.790295] ==================================================================
[   39.810571] ==================================================================
[   39.811151] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   39.811399] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.811694] 
[   39.811803] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.812618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.812816] Hardware name: linux,dummy-virt (DT)
[   39.812963] Call trace:
[   39.813192]  show_stack+0x20/0x38 (C)
[   39.813460]  dump_stack_lvl+0x8c/0xd0
[   39.813639]  print_report+0x118/0x5f0
[   39.814097]  kasan_report+0xc8/0x118
[   39.814550]  kasan_check_range+0x100/0x1a8
[   39.814758]  __kasan_check_write+0x20/0x30
[   39.814937]  copy_user_test_oob+0x35c/0xec0
[   39.815125]  kunit_try_run_case+0x14c/0x3d0
[   39.815286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.815568]  kthread+0x318/0x618
[   39.815826]  ret_from_fork+0x10/0x20
[   39.816664] 
[   39.816855] Allocated by task 287:
[   39.816982]  kasan_save_stack+0x3c/0x68
[   39.817138]  kasan_save_track+0x20/0x40
[   39.817266]  kasan_save_alloc_info+0x40/0x58
[   39.817396]  __kasan_kmalloc+0xd4/0xd8
[   39.817523]  __kmalloc_noprof+0x188/0x4c8
[   39.817636]  kunit_kmalloc_array+0x34/0x88
[   39.818214]  copy_user_test_oob+0xac/0xec0
[   39.818499]  kunit_try_run_case+0x14c/0x3d0
[   39.818664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.818824]  kthread+0x318/0x618
[   39.819579]  ret_from_fork+0x10/0x20
[   39.820293] 
[   39.820386] The buggy address belongs to the object at fff00000c5dbd000
[   39.820386]  which belongs to the cache kmalloc-128 of size 128
[   39.820851] The buggy address is located 0 bytes inside of
[   39.820851]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.821129] 
[   39.821203] The buggy address belongs to the physical page:
[   39.821313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.822762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.823356] page_type: f5(slab)
[   39.823701] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.824078] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.824230] page dumped because: kasan: bad access detected
[   39.825187] 
[   39.825589] Memory state around the buggy address:
[   39.826310]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.826561]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.826742] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.826883]                                                                 ^
[   39.827900]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.828077]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.828931] ==================================================================
[   39.855163] ==================================================================
[   39.855454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   39.855605] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.855775] 
[   39.855868] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.856178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.856270] Hardware name: linux,dummy-virt (DT)
[   39.856987] Call trace:
[   39.857389]  show_stack+0x20/0x38 (C)
[   39.857733]  dump_stack_lvl+0x8c/0xd0
[   39.857894]  print_report+0x118/0x5f0
[   39.858076]  kasan_report+0xc8/0x118
[   39.858264]  kasan_check_range+0x100/0x1a8
[   39.858444]  __kasan_check_write+0x20/0x30
[   39.858661]  copy_user_test_oob+0x434/0xec0
[   39.858827]  kunit_try_run_case+0x14c/0x3d0
[   39.859000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.859429]  kthread+0x318/0x618
[   39.859629]  ret_from_fork+0x10/0x20
[   39.859844] 
[   39.859940] Allocated by task 287:
[   39.860102]  kasan_save_stack+0x3c/0x68
[   39.860545]  kasan_save_track+0x20/0x40
[   39.860685]  kasan_save_alloc_info+0x40/0x58
[   39.860829]  __kasan_kmalloc+0xd4/0xd8
[   39.861001]  __kmalloc_noprof+0x188/0x4c8
[   39.861375]  kunit_kmalloc_array+0x34/0x88
[   39.862001]  copy_user_test_oob+0xac/0xec0
[   39.862357]  kunit_try_run_case+0x14c/0x3d0
[   39.862508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.862667]  kthread+0x318/0x618
[   39.862792]  ret_from_fork+0x10/0x20
[   39.862945] 
[   39.863080] The buggy address belongs to the object at fff00000c5dbd000
[   39.863080]  which belongs to the cache kmalloc-128 of size 128
[   39.863356] The buggy address is located 0 bytes inside of
[   39.863356]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.863602] 
[   39.863681] The buggy address belongs to the physical page:
[   39.863858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.864034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.864206] page_type: f5(slab)
[   39.864331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.864581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.864790] page dumped because: kasan: bad access detected
[   39.864967] 
[   39.865041] Memory state around the buggy address:
[   39.865177]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.865333]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.865510] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.865714]                                                                 ^
[   39.865869]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.866075]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.866209] ==================================================================
[   39.750745] ==================================================================
[   39.751074] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   39.751363] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.751592] 
[   39.751714] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.752088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.752227] Hardware name: linux,dummy-virt (DT)
[   39.752373] Call trace:
[   39.752553]  show_stack+0x20/0x38 (C)
[   39.752733]  dump_stack_lvl+0x8c/0xd0
[   39.753396]  print_report+0x118/0x5f0
[   39.753672]  kasan_report+0xc8/0x118
[   39.754229]  kasan_check_range+0x100/0x1a8
[   39.754549]  __kasan_check_write+0x20/0x30
[   39.755164]  copy_user_test_oob+0x234/0xec0
[   39.755754]  kunit_try_run_case+0x14c/0x3d0
[   39.756506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.756873]  kthread+0x318/0x618
[   39.757356]  ret_from_fork+0x10/0x20
[   39.757939] 
[   39.758019] Allocated by task 287:
[   39.758151]  kasan_save_stack+0x3c/0x68
[   39.758290]  kasan_save_track+0x20/0x40
[   39.758413]  kasan_save_alloc_info+0x40/0x58
[   39.758548]  __kasan_kmalloc+0xd4/0xd8
[   39.758667]  __kmalloc_noprof+0x188/0x4c8
[   39.758797]  kunit_kmalloc_array+0x34/0x88
[   39.758934]  copy_user_test_oob+0xac/0xec0
[   39.759089]  kunit_try_run_case+0x14c/0x3d0
[   39.759229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.759379]  kthread+0x318/0x618
[   39.759504]  ret_from_fork+0x10/0x20
[   39.759623] 
[   39.759695] The buggy address belongs to the object at fff00000c5dbd000
[   39.759695]  which belongs to the cache kmalloc-128 of size 128
[   39.759904] The buggy address is located 0 bytes inside of
[   39.759904]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.761022] 
[   39.761139] The buggy address belongs to the physical page:
[   39.761256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.761519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.761932] page_type: f5(slab)
[   39.762772] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.764036] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.764262] page dumped because: kasan: bad access detected
[   39.764384] 
[   39.764490] Memory state around the buggy address:
[   39.764772]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.765182]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.765698] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.765859]                                                                 ^
[   39.766237]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.766397]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.766531] ==================================================================
[   39.869221] ==================================================================
[   39.869498] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   39.869666] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.869829] 
[   39.869926] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.870225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.870323] Hardware name: linux,dummy-virt (DT)
[   39.870434] Call trace:
[   39.871351]  show_stack+0x20/0x38 (C)
[   39.871644]  dump_stack_lvl+0x8c/0xd0
[   39.871912]  print_report+0x118/0x5f0
[   39.872590]  kasan_report+0xc8/0x118
[   39.873205]  kasan_check_range+0x100/0x1a8
[   39.873394]  __kasan_check_read+0x20/0x30
[   39.873592]  copy_user_test_oob+0x4a0/0xec0
[   39.873768]  kunit_try_run_case+0x14c/0x3d0
[   39.873935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.874336]  kthread+0x318/0x618
[   39.875489]  ret_from_fork+0x10/0x20
[   39.875745] 
[   39.875921] Allocated by task 287:
[   39.876025]  kasan_save_stack+0x3c/0x68
[   39.876274]  kasan_save_track+0x20/0x40
[   39.876418]  kasan_save_alloc_info+0x40/0x58
[   39.876547]  __kasan_kmalloc+0xd4/0xd8
[   39.877169]  __kmalloc_noprof+0x188/0x4c8
[   39.877348]  kunit_kmalloc_array+0x34/0x88
[   39.878107]  copy_user_test_oob+0xac/0xec0
[   39.878271]  kunit_try_run_case+0x14c/0x3d0
[   39.878405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.879349]  kthread+0x318/0x618
[   39.879722]  ret_from_fork+0x10/0x20
[   39.879870] 
[   39.879939] The buggy address belongs to the object at fff00000c5dbd000
[   39.879939]  which belongs to the cache kmalloc-128 of size 128
[   39.880479] The buggy address is located 0 bytes inside of
[   39.880479]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.881377] 
[   39.881466] The buggy address belongs to the physical page:
[   39.881588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.881754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.881916] page_type: f5(slab)
[   39.883136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.883343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.883491] page dumped because: kasan: bad access detected
[   39.883609] 
[   39.883927] Memory state around the buggy address:
[   39.884618]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.885378]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.885849] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.886650]                                                                 ^
[   39.887499]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.888035]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.888200] ==================================================================

[   28.985041] ==================================================================
[   28.985754] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x1130
[   28.986347] Read of size 121 at addr ffff88810305ae00 by task kunit_try_catch/306
[   28.986756] 
[   28.986951] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.987082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.987144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.987202] Call Trace:
[   28.987236]  <TASK>
[   28.987272]  dump_stack_lvl+0x73/0xb0
[   28.987348]  print_report+0xd1/0x660
[   28.987417]  ? __virt_addr_valid+0x1db/0x2d0
[   28.987544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.987691]  kasan_report+0x104/0x140
[   28.987796]  ? copy_user_test_oob+0x4aa/0x1130
[   28.987877]  ? copy_user_test_oob+0x4aa/0x1130
[   28.987978]  kasan_check_range+0x10c/0x1c0
[   28.988054]  __kasan_check_read+0x15/0x20
[   28.988138]  copy_user_test_oob+0x4aa/0x1130
[   28.988223]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.988298]  ? finish_task_switch.isra.0+0x153/0x730
[   28.988365]  ? __switch_to+0x5d9/0xf70
[   28.988444]  ? __schedule+0xd46/0x29c0
[   28.988509]  ? __pfx_read_tsc+0x10/0x10
[   28.988571]  ? ktime_get_ts64+0x86/0x240
[   28.988644]  kunit_try_run_case+0x1b2/0x490
[   28.988720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.988819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.988883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.988953]  ? __kthread_parkme+0x82/0x160
[   28.989020]  ? preempt_count_sub+0x50/0x80
[   28.989094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.989194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.989264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.989335]  kthread+0x323/0x710
[   28.989399]  ? trace_preempt_on+0x20/0xc0
[   28.989468]  ? __pfx_kthread+0x10/0x10
[   28.989536]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.989598]  ? calculate_sigpending+0x7b/0xa0
[   28.989664]  ? __pfx_kthread+0x10/0x10
[   28.989758]  ret_from_fork+0x41/0x80
[   28.989853]  ? __pfx_kthread+0x10/0x10
[   28.989950]  ret_from_fork_asm+0x1a/0x30
[   28.990045]  </TASK>
[   28.990081] 
[   29.003313] Allocated by task 306:
[   29.003702]  kasan_save_stack+0x3d/0x60
[   29.004200]  kasan_save_track+0x18/0x40
[   29.004625]  kasan_save_alloc_info+0x3b/0x50
[   29.005098]  __kasan_kmalloc+0xb7/0xc0
[   29.005446]  __kmalloc_noprof+0x1c3/0x500
[   29.005733]  kunit_kmalloc_array+0x25/0x60
[   29.006229]  copy_user_test_oob+0xab/0x1130
[   29.006783]  kunit_try_run_case+0x1b2/0x490
[   29.007259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.007806]  kthread+0x323/0x710
[   29.008655]  ret_from_fork+0x41/0x80
[   29.010381]  ret_from_fork_asm+0x1a/0x30
[   29.012271] 
[   29.012444] The buggy address belongs to the object at ffff88810305ae00
[   29.012444]  which belongs to the cache kmalloc-128 of size 128
[   29.013075] The buggy address is located 0 bytes inside of
[   29.013075]  allocated 120-byte region [ffff88810305ae00, ffff88810305ae78)
[   29.014067] 
[   29.014294] The buggy address belongs to the physical page:
[   29.014585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a
[   29.015099] flags: 0x200000000000000(node=0|zone=2)
[   29.015444] page_type: f5(slab)
[   29.015719] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.016159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.017735] page dumped because: kasan: bad access detected
[   29.018281] 
[   29.020989] Memory state around the buggy address:
[   29.021339]  ffff88810305ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.021715]  ffff88810305ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.022077] >ffff88810305ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.022458]                                                                 ^
[   29.022848]  ffff88810305ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.023341]  ffff88810305af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.023752] ==================================================================
[   29.072686] ==================================================================
[   29.073380] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x1130
[   29.073804] Read of size 121 at addr ffff88810305ae00 by task kunit_try_catch/306
[   29.074487] 
[   29.074745] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   29.074881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.074917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.075504] Call Trace:
[   29.075561]  <TASK>
[   29.076027]  dump_stack_lvl+0x73/0xb0
[   29.076171]  print_report+0xd1/0x660
[   29.076260]  ? __virt_addr_valid+0x1db/0x2d0
[   29.076392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.076473]  kasan_report+0x104/0x140
[   29.076536]  ? copy_user_test_oob+0x604/0x1130
[   29.076580]  ? copy_user_test_oob+0x604/0x1130
[   29.076628]  kasan_check_range+0x10c/0x1c0
[   29.076668]  __kasan_check_read+0x15/0x20
[   29.076699]  copy_user_test_oob+0x604/0x1130
[   29.076785]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.076822]  ? finish_task_switch.isra.0+0x153/0x730
[   29.076858]  ? __switch_to+0x5d9/0xf70
[   29.076897]  ? __schedule+0xd46/0x29c0
[   29.076931]  ? __pfx_read_tsc+0x10/0x10
[   29.076963]  ? ktime_get_ts64+0x86/0x240
[   29.077001]  kunit_try_run_case+0x1b2/0x490
[   29.077038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.077073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.077106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.077164]  ? __kthread_parkme+0x82/0x160
[   29.077197]  ? preempt_count_sub+0x50/0x80
[   29.077235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.077271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.077307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.077343]  kthread+0x323/0x710
[   29.077375]  ? trace_preempt_on+0x20/0xc0
[   29.077410]  ? __pfx_kthread+0x10/0x10
[   29.077444]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.077475]  ? calculate_sigpending+0x7b/0xa0
[   29.077508]  ? __pfx_kthread+0x10/0x10
[   29.077542]  ret_from_fork+0x41/0x80
[   29.077575]  ? __pfx_kthread+0x10/0x10
[   29.077608]  ret_from_fork_asm+0x1a/0x30
[   29.077657]  </TASK>
[   29.077675] 
[   29.097386] Allocated by task 306:
[   29.098130]  kasan_save_stack+0x3d/0x60
[   29.098544]  kasan_save_track+0x18/0x40
[   29.099344]  kasan_save_alloc_info+0x3b/0x50
[   29.099996]  __kasan_kmalloc+0xb7/0xc0
[   29.100416]  __kmalloc_noprof+0x1c3/0x500
[   29.101304]  kunit_kmalloc_array+0x25/0x60
[   29.101841]  copy_user_test_oob+0xab/0x1130
[   29.102485]  kunit_try_run_case+0x1b2/0x490
[   29.103291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.103752]  kthread+0x323/0x710
[   29.104252]  ret_from_fork+0x41/0x80
[   29.104660]  ret_from_fork_asm+0x1a/0x30
[   29.105457] 
[   29.105843] The buggy address belongs to the object at ffff88810305ae00
[   29.105843]  which belongs to the cache kmalloc-128 of size 128
[   29.106804] The buggy address is located 0 bytes inside of
[   29.106804]  allocated 120-byte region [ffff88810305ae00, ffff88810305ae78)
[   29.108014] 
[   29.108525] The buggy address belongs to the physical page:
[   29.109037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a
[   29.110155] flags: 0x200000000000000(node=0|zone=2)
[   29.110676] page_type: f5(slab)
[   29.111628] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.112240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.112790] page dumped because: kasan: bad access detected
[   29.113651] 
[   29.114240] Memory state around the buggy address:
[   29.114505]  ffff88810305ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.115171]  ffff88810305ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.116003] >ffff88810305ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.117183]                                                                 ^
[   29.118103]  ffff88810305ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.118756]  ffff88810305af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.119885] ==================================================================
[   29.024556] ==================================================================
[   29.025238] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x1130
[   29.026163] Write of size 121 at addr ffff88810305ae00 by task kunit_try_catch/306
[   29.026705] 
[   29.026920] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   29.028554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.028606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.028668] Call Trace:
[   29.028707]  <TASK>
[   29.028746]  dump_stack_lvl+0x73/0xb0
[   29.028830]  print_report+0xd1/0x660
[   29.028899]  ? __virt_addr_valid+0x1db/0x2d0
[   29.029027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.029519]  kasan_report+0x104/0x140
[   29.029621]  ? copy_user_test_oob+0x557/0x1130
[   29.029700]  ? copy_user_test_oob+0x557/0x1130
[   29.029810]  kasan_check_range+0x10c/0x1c0
[   29.029935]  __kasan_check_write+0x18/0x20
[   29.030013]  copy_user_test_oob+0x557/0x1130
[   29.030095]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.030190]  ? finish_task_switch.isra.0+0x153/0x730
[   29.030259]  ? __switch_to+0x5d9/0xf70
[   29.030337]  ? __schedule+0xd46/0x29c0
[   29.030401]  ? __pfx_read_tsc+0x10/0x10
[   29.030463]  ? ktime_get_ts64+0x86/0x240
[   29.030536]  kunit_try_run_case+0x1b2/0x490
[   29.030610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.030677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.030771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.030845]  ? __kthread_parkme+0x82/0x160
[   29.030915]  ? preempt_count_sub+0x50/0x80
[   29.030986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.031058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.031167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.031249]  kthread+0x323/0x710
[   29.031314]  ? trace_preempt_on+0x20/0xc0
[   29.031387]  ? __pfx_kthread+0x10/0x10
[   29.031454]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.031517]  ? calculate_sigpending+0x7b/0xa0
[   29.031595]  ? __pfx_kthread+0x10/0x10
[   29.031683]  ret_from_fork+0x41/0x80
[   29.031826]  ? __pfx_kthread+0x10/0x10
[   29.031900]  ret_from_fork_asm+0x1a/0x30
[   29.032002]  </TASK>
[   29.032039] 
[   29.045234] Allocated by task 306:
[   29.045537]  kasan_save_stack+0x3d/0x60
[   29.046001]  kasan_save_track+0x18/0x40
[   29.046310]  kasan_save_alloc_info+0x3b/0x50
[   29.046614]  __kasan_kmalloc+0xb7/0xc0
[   29.046888]  __kmalloc_noprof+0x1c3/0x500
[   29.047359]  kunit_kmalloc_array+0x25/0x60
[   29.047971]  copy_user_test_oob+0xab/0x1130
[   29.048438]  kunit_try_run_case+0x1b2/0x490
[   29.048974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.049465]  kthread+0x323/0x710
[   29.049797]  ret_from_fork+0x41/0x80
[   29.050255]  ret_from_fork_asm+0x1a/0x30
[   29.050654] 
[   29.050945] The buggy address belongs to the object at ffff88810305ae00
[   29.050945]  which belongs to the cache kmalloc-128 of size 128
[   29.051939] The buggy address is located 0 bytes inside of
[   29.051939]  allocated 120-byte region [ffff88810305ae00, ffff88810305ae78)
[   29.052795] 
[   29.053018] The buggy address belongs to the physical page:
[   29.053531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a
[   29.053955] flags: 0x200000000000000(node=0|zone=2)
[   29.055545] page_type: f5(slab)
[   29.056639] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.059659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.060439] page dumped because: kasan: bad access detected
[   29.061262] 
[   29.061470] Memory state around the buggy address:
[   29.063303]  ffff88810305ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.063764]  ffff88810305ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.064444] >ffff88810305ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.065131]                                                                 ^
[   29.066086]  ffff88810305ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.068529]  ffff88810305af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.069216] ==================================================================
[   28.949903] ==================================================================
[   28.950436] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x1130
[   28.950950] Write of size 121 at addr ffff88810305ae00 by task kunit_try_catch/306
[   28.951674] 
[   28.952010] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.952165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.952205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.952279] Call Trace:
[   28.952316]  <TASK>
[   28.952378]  dump_stack_lvl+0x73/0xb0
[   28.952459]  print_report+0xd1/0x660
[   28.952522]  ? __virt_addr_valid+0x1db/0x2d0
[   28.952640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.952763]  kasan_report+0x104/0x140
[   28.952833]  ? copy_user_test_oob+0x3fd/0x1130
[   28.952935]  ? copy_user_test_oob+0x3fd/0x1130
[   28.953004]  kasan_check_range+0x10c/0x1c0
[   28.953045]  __kasan_check_write+0x18/0x20
[   28.953078]  copy_user_test_oob+0x3fd/0x1130
[   28.953152]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.953216]  ? finish_task_switch.isra.0+0x153/0x730
[   28.953284]  ? __switch_to+0x5d9/0xf70
[   28.953376]  ? __schedule+0xd46/0x29c0
[   28.953473]  ? __pfx_read_tsc+0x10/0x10
[   28.953536]  ? ktime_get_ts64+0x86/0x240
[   28.953604]  kunit_try_run_case+0x1b2/0x490
[   28.953676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.953756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.953871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.953948]  ? __kthread_parkme+0x82/0x160
[   28.954016]  ? preempt_count_sub+0x50/0x80
[   28.954074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.954139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.954180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.954216]  kthread+0x323/0x710
[   28.954249]  ? trace_preempt_on+0x20/0xc0
[   28.954285]  ? __pfx_kthread+0x10/0x10
[   28.954318]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.954350]  ? calculate_sigpending+0x7b/0xa0
[   28.954383]  ? __pfx_kthread+0x10/0x10
[   28.954417]  ret_from_fork+0x41/0x80
[   28.954449]  ? __pfx_kthread+0x10/0x10
[   28.954483]  ret_from_fork_asm+0x1a/0x30
[   28.954532]  </TASK>
[   28.954550] 
[   28.967880] Allocated by task 306:
[   28.968201]  kasan_save_stack+0x3d/0x60
[   28.968488]  kasan_save_track+0x18/0x40
[   28.968766]  kasan_save_alloc_info+0x3b/0x50
[   28.969280]  __kasan_kmalloc+0xb7/0xc0
[   28.969784]  __kmalloc_noprof+0x1c3/0x500
[   28.970436]  kunit_kmalloc_array+0x25/0x60
[   28.970893]  copy_user_test_oob+0xab/0x1130
[   28.971507]  kunit_try_run_case+0x1b2/0x490
[   28.971876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.972250]  kthread+0x323/0x710
[   28.972510]  ret_from_fork+0x41/0x80
[   28.972785]  ret_from_fork_asm+0x1a/0x30
[   28.973104] 
[   28.973368] The buggy address belongs to the object at ffff88810305ae00
[   28.973368]  which belongs to the cache kmalloc-128 of size 128
[   28.974387] The buggy address is located 0 bytes inside of
[   28.974387]  allocated 120-byte region [ffff88810305ae00, ffff88810305ae78)
[   28.975421] 
[   28.975679] The buggy address belongs to the physical page:
[   28.976261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a
[   28.976896] flags: 0x200000000000000(node=0|zone=2)
[   28.977304] page_type: f5(slab)
[   28.977545] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.977954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.978752] page dumped because: kasan: bad access detected
[   28.979410] 
[   28.979666] Memory state around the buggy address:
[   28.980148]  ffff88810305ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.980533]  ffff88810305ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.981041] >ffff88810305ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.981938]                                                                 ^
[   28.982655]  ffff88810305ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.983307]  ffff88810305af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.983792] ==================================================================