Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.851837] ==================================================================
[   20.851889] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.851955] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.852006] 
[   20.852037] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.852149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.852239] Hardware name: linux,dummy-virt (DT)
[   20.852371] Call trace:
[   20.852495]  show_stack+0x20/0x38 (C)
[   20.852547]  dump_stack_lvl+0x8c/0xd0
[   20.852593]  print_report+0x118/0x608
[   20.852651]  kasan_report+0xdc/0x128
[   20.852709]  kasan_check_range+0x100/0x1a8
[   20.853063]  __kasan_check_read+0x20/0x30
[   20.853121]  copy_user_test_oob+0x4a0/0xec8
[   20.853313]  kunit_try_run_case+0x170/0x3f0
[   20.853363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.853427]  kthread+0x328/0x630
[   20.853473]  ret_from_fork+0x10/0x20
[   20.853523] 
[   20.853544] Allocated by task 285:
[   20.853573]  kasan_save_stack+0x3c/0x68
[   20.853622]  kasan_save_track+0x20/0x40
[   20.854142]  kasan_save_alloc_info+0x40/0x58
[   20.854336]  __kasan_kmalloc+0xd4/0xd8
[   20.854376]  __kmalloc_noprof+0x190/0x4d0
[   20.854534]  kunit_kmalloc_array+0x34/0x88
[   20.854640]  copy_user_test_oob+0xac/0xec8
[   20.854682]  kunit_try_run_case+0x170/0x3f0
[   20.854721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.854769]  kthread+0x328/0x630
[   20.854808]  ret_from_fork+0x10/0x20
[   20.854846] 
[   20.854870] The buggy address belongs to the object at fff00000c1729a00
[   20.854870]  which belongs to the cache kmalloc-128 of size 128
[   20.854930] The buggy address is located 0 bytes inside of
[   20.854930]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.855056] 
[   20.855086] The buggy address belongs to the physical page:
[   20.855118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.855180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.855229] page_type: f5(slab)
[   20.855311] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.855860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.855905] page dumped because: kasan: bad access detected
[   20.855990] 
[   20.856094] Memory state around the buggy address:
[   20.856185]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.856237]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.856279] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.856640]                                                                 ^
[   20.856680]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.856780]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.857141] ==================================================================
[   20.847347] ==================================================================
[   20.847415] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.847464] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.847516] 
[   20.847546] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.847633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.847671] Hardware name: linux,dummy-virt (DT)
[   20.847754] Call trace:
[   20.847779]  show_stack+0x20/0x38 (C)
[   20.847831]  dump_stack_lvl+0x8c/0xd0
[   20.847877]  print_report+0x118/0x608
[   20.847925]  kasan_report+0xdc/0x128
[   20.847982]  kasan_check_range+0x100/0x1a8
[   20.848043]  __kasan_check_write+0x20/0x30
[   20.848149]  copy_user_test_oob+0x434/0xec8
[   20.848215]  kunit_try_run_case+0x170/0x3f0
[   20.848449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.848505]  kthread+0x328/0x630
[   20.848551]  ret_from_fork+0x10/0x20
[   20.848606] 
[   20.848712] Allocated by task 285:
[   20.848829]  kasan_save_stack+0x3c/0x68
[   20.848870]  kasan_save_track+0x20/0x40
[   20.848972]  kasan_save_alloc_info+0x40/0x58
[   20.849021]  __kasan_kmalloc+0xd4/0xd8
[   20.849178]  __kmalloc_noprof+0x190/0x4d0
[   20.849218]  kunit_kmalloc_array+0x34/0x88
[   20.849255]  copy_user_test_oob+0xac/0xec8
[   20.849292]  kunit_try_run_case+0x170/0x3f0
[   20.849331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.849384]  kthread+0x328/0x630
[   20.849424]  ret_from_fork+0x10/0x20
[   20.849473] 
[   20.849495] The buggy address belongs to the object at fff00000c1729a00
[   20.849495]  which belongs to the cache kmalloc-128 of size 128
[   20.849554] The buggy address is located 0 bytes inside of
[   20.849554]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.849736] 
[   20.849760] The buggy address belongs to the physical page:
[   20.849936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.849988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.850039] page_type: f5(slab)
[   20.850084] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.850165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.850215] page dumped because: kasan: bad access detected
[   20.850293] 
[   20.850313] Memory state around the buggy address:
[   20.850346]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.850392]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850445] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.850495]                                                                 ^
[   20.850535]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850581]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850620] ==================================================================
[   20.835374] ==================================================================
[   20.835437] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.835489] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.835947] 
[   20.836093] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.836245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.836273] Hardware name: linux,dummy-virt (DT)
[   20.836308] Call trace:
[   20.836332]  show_stack+0x20/0x38 (C)
[   20.836934]  dump_stack_lvl+0x8c/0xd0
[   20.837234]  print_report+0x118/0x608
[   20.837340]  kasan_report+0xdc/0x128
[   20.837388]  kasan_check_range+0x100/0x1a8
[   20.837439]  __kasan_check_write+0x20/0x30
[   20.837489]  copy_user_test_oob+0x35c/0xec8
[   20.837538]  kunit_try_run_case+0x170/0x3f0
[   20.837585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.837638]  kthread+0x328/0x630
[   20.837687]  ret_from_fork+0x10/0x20
[   20.837985] 
[   20.838024] Allocated by task 285:
[   20.838070]  kasan_save_stack+0x3c/0x68
[   20.838114]  kasan_save_track+0x20/0x40
[   20.838154]  kasan_save_alloc_info+0x40/0x58
[   20.838207]  __kasan_kmalloc+0xd4/0xd8
[   20.838247]  __kmalloc_noprof+0x190/0x4d0
[   20.838285]  kunit_kmalloc_array+0x34/0x88
[   20.838323]  copy_user_test_oob+0xac/0xec8
[   20.838753]  kunit_try_run_case+0x170/0x3f0
[   20.838943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.839058]  kthread+0x328/0x630
[   20.839108]  ret_from_fork+0x10/0x20
[   20.839484] 
[   20.839560] The buggy address belongs to the object at fff00000c1729a00
[   20.839560]  which belongs to the cache kmalloc-128 of size 128
[   20.839656] The buggy address is located 0 bytes inside of
[   20.839656]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.839728] 
[   20.839751] The buggy address belongs to the physical page:
[   20.839785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.839979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.840290] page_type: f5(slab)
[   20.840402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.840531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.840589] page dumped because: kasan: bad access detected
[   20.840623] 
[   20.840645] Memory state around the buggy address:
[   20.840690]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.840777]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.840923] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.841258]                                                                 ^
[   20.841431]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.841479]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.841556] ==================================================================
[   20.820317] ==================================================================
[   20.820371] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.820423] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.820475] 
[   20.820507] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.821482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.821526] Hardware name: linux,dummy-virt (DT)
[   20.821785] Call trace:
[   20.821818]  show_stack+0x20/0x38 (C)
[   20.821876]  dump_stack_lvl+0x8c/0xd0
[   20.821923]  print_report+0x118/0x608
[   20.821971]  kasan_report+0xdc/0x128
[   20.822018]  kasan_check_range+0x100/0x1a8
[   20.822343]  __kasan_check_read+0x20/0x30
[   20.822640]  copy_user_test_oob+0x728/0xec8
[   20.822763]  kunit_try_run_case+0x170/0x3f0
[   20.822814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.822880]  kthread+0x328/0x630
[   20.822928]  ret_from_fork+0x10/0x20
[   20.823384] 
[   20.823510] Allocated by task 285:
[   20.823551]  kasan_save_stack+0x3c/0x68
[   20.823596]  kasan_save_track+0x20/0x40
[   20.823634]  kasan_save_alloc_info+0x40/0x58
[   20.823696]  __kasan_kmalloc+0xd4/0xd8
[   20.823887]  __kmalloc_noprof+0x190/0x4d0
[   20.823929]  kunit_kmalloc_array+0x34/0x88
[   20.823966]  copy_user_test_oob+0xac/0xec8
[   20.824007]  kunit_try_run_case+0x170/0x3f0
[   20.824188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.824284]  kthread+0x328/0x630
[   20.824366]  ret_from_fork+0x10/0x20
[   20.824404] 
[   20.824476] The buggy address belongs to the object at fff00000c1729a00
[   20.824476]  which belongs to the cache kmalloc-128 of size 128
[   20.824685] The buggy address is located 0 bytes inside of
[   20.824685]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.824750] 
[   20.824772] The buggy address belongs to the physical page:
[   20.824812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.825078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.825455] page_type: f5(slab)
[   20.825594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.825694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.825884] page dumped because: kasan: bad access detected
[   20.826179] 
[   20.826204] Memory state around the buggy address:
[   20.826300]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.826377]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.826423] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.826465]                                                                 ^
[   20.826704]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.826758]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827149] ==================================================================
[   20.806813] ==================================================================
[   20.807142] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.807652] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.807710] 
[   20.807761] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.807985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.808015] Hardware name: linux,dummy-virt (DT)
[   20.808055] Call trace:
[   20.808088]  show_stack+0x20/0x38 (C)
[   20.808143]  dump_stack_lvl+0x8c/0xd0
[   20.808208]  print_report+0x118/0x608
[   20.808255]  kasan_report+0xdc/0x128
[   20.808302]  kasan_check_range+0x100/0x1a8
[   20.808350]  __kasan_check_write+0x20/0x30
[   20.808400]  copy_user_test_oob+0x234/0xec8
[   20.808449]  kunit_try_run_case+0x170/0x3f0
[   20.808502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.808554]  kthread+0x328/0x630
[   20.808603]  ret_from_fork+0x10/0x20
[   20.808662] 
[   20.808761] Allocated by task 285:
[   20.808838]  kasan_save_stack+0x3c/0x68
[   20.808968]  kasan_save_track+0x20/0x40
[   20.809015]  kasan_save_alloc_info+0x40/0x58
[   20.809150]  __kasan_kmalloc+0xd4/0xd8
[   20.809431]  __kmalloc_noprof+0x190/0x4d0
[   20.809675]  kunit_kmalloc_array+0x34/0x88
[   20.809723]  copy_user_test_oob+0xac/0xec8
[   20.809766]  kunit_try_run_case+0x170/0x3f0
[   20.809880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.810003]  kthread+0x328/0x630
[   20.810351]  ret_from_fork+0x10/0x20
[   20.810515] 
[   20.810547] The buggy address belongs to the object at fff00000c1729a00
[   20.810547]  which belongs to the cache kmalloc-128 of size 128
[   20.810752] The buggy address is located 0 bytes inside of
[   20.810752]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.810829] 
[   20.810856] The buggy address belongs to the physical page:
[   20.810893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.810957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.811028] page_type: f5(slab)
[   20.811174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.811237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.811280] page dumped because: kasan: bad access detected
[   20.811316] 
[   20.811339] Memory state around the buggy address:
[   20.811374]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.811419]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.811463] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.811920]                                                                 ^
[   20.812024]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812226]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812293] ==================================================================
[   20.842740] ==================================================================
[   20.842798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.842864] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.842926] 
[   20.842979] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.843198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.843301] Hardware name: linux,dummy-virt (DT)
[   20.843333] Call trace:
[   20.843357]  show_stack+0x20/0x38 (C)
[   20.843409]  dump_stack_lvl+0x8c/0xd0
[   20.843455]  print_report+0x118/0x608
[   20.844004]  kasan_report+0xdc/0x128
[   20.844060]  kasan_check_range+0x100/0x1a8
[   20.844110]  __kasan_check_read+0x20/0x30
[   20.844179]  copy_user_test_oob+0x3c8/0xec8
[   20.844237]  kunit_try_run_case+0x170/0x3f0
[   20.844286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.844339]  kthread+0x328/0x630
[   20.844385]  ret_from_fork+0x10/0x20
[   20.844521] 
[   20.844622] Allocated by task 285:
[   20.844705]  kasan_save_stack+0x3c/0x68
[   20.844754]  kasan_save_track+0x20/0x40
[   20.844935]  kasan_save_alloc_info+0x40/0x58
[   20.844977]  __kasan_kmalloc+0xd4/0xd8
[   20.845020]  __kmalloc_noprof+0x190/0x4d0
[   20.845211]  kunit_kmalloc_array+0x34/0x88
[   20.845268]  copy_user_test_oob+0xac/0xec8
[   20.845320]  kunit_try_run_case+0x170/0x3f0
[   20.845468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.845512]  kthread+0x328/0x630
[   20.845550]  ret_from_fork+0x10/0x20
[   20.845593] 
[   20.845710] The buggy address belongs to the object at fff00000c1729a00
[   20.845710]  which belongs to the cache kmalloc-128 of size 128
[   20.846234] The buggy address is located 0 bytes inside of
[   20.846234]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.846300] 
[   20.846324] The buggy address belongs to the physical page:
[   20.846357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.846409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.846457] page_type: f5(slab)
[   20.846496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.846547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.846590] page dumped because: kasan: bad access detected
[   20.846637] 
[   20.846657] Memory state around the buggy address:
[   20.846690]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.846739]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.846784] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.846822]                                                                 ^
[   20.846862]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.847020]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.847084] ==================================================================


[   18.021593] ==================================================================
[   18.021844] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   18.022121] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.022624] 
[   18.022703] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.022756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.022770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.022792] Call Trace:
[   18.022812]  <TASK>
[   18.022833]  dump_stack_lvl+0x73/0xb0
[   18.022864]  print_report+0xd1/0x650
[   18.022888]  ? __virt_addr_valid+0x1db/0x2d0
[   18.022912]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.022937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.022961]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.022986]  kasan_report+0x141/0x180
[   18.023010]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.023040]  kasan_check_range+0x10c/0x1c0
[   18.023065]  __kasan_check_read+0x15/0x20
[   18.023087]  copy_user_test_oob+0x4aa/0x10f0
[   18.023114]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.023138]  ? finish_task_switch.isra.0+0x153/0x700
[   18.023161]  ? __switch_to+0x47/0xf50
[   18.023186]  ? __schedule+0x10cc/0x2b60
[   18.023210]  ? __pfx_read_tsc+0x10/0x10
[   18.023244]  ? ktime_get_ts64+0x86/0x230
[   18.023271]  kunit_try_run_case+0x1a5/0x480
[   18.023297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.023320]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.023344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.023369]  ? __kthread_parkme+0x82/0x180
[   18.023391]  ? preempt_count_sub+0x50/0x80
[   18.023415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.023439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.023463]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.023487]  kthread+0x337/0x6f0
[   18.023508]  ? trace_preempt_on+0x20/0xc0
[   18.023532]  ? __pfx_kthread+0x10/0x10
[   18.023554]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.023574]  ? calculate_sigpending+0x7b/0xa0
[   18.023599]  ? __pfx_kthread+0x10/0x10
[   18.023621]  ret_from_fork+0x116/0x1d0
[   18.023640]  ? __pfx_kthread+0x10/0x10
[   18.023662]  ret_from_fork_asm+0x1a/0x30
[   18.023694]  </TASK>
[   18.023706] 
[   18.030051] Allocated by task 303:
[   18.030234]  kasan_save_stack+0x45/0x70
[   18.030341]  kasan_save_track+0x18/0x40
[   18.030541]  kasan_save_alloc_info+0x3b/0x50
[   18.030669]  __kasan_kmalloc+0xb7/0xc0
[   18.030805]  __kmalloc_noprof+0x1c9/0x500
[   18.030900]  kunit_kmalloc_array+0x25/0x60
[   18.030993]  copy_user_test_oob+0xab/0x10f0
[   18.031255]  kunit_try_run_case+0x1a5/0x480
[   18.031480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.031683]  kthread+0x337/0x6f0
[   18.031767]  ret_from_fork+0x116/0x1d0
[   18.031851]  ret_from_fork_asm+0x1a/0x30
[   18.032093] 
[   18.032208] The buggy address belongs to the object at ffff888102b5b800
[   18.032208]  which belongs to the cache kmalloc-128 of size 128
[   18.032682] The buggy address is located 0 bytes inside of
[   18.032682]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.032982] 
[   18.033096] The buggy address belongs to the physical page:
[   18.033280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.033424] flags: 0x200000000000000(node=0|zone=2)
[   18.033529] page_type: f5(slab)
[   18.033617] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.033884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.034198] page dumped because: kasan: bad access detected
[   18.034478] 
[   18.034605] Memory state around the buggy address:
[   18.034866]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.034999]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.035131] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.035515]                                                                 ^
[   18.035896]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.036147]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.036324] ==================================================================
[   18.004793] ==================================================================
[   18.005128] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   18.005396] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.005806] 
[   18.005926] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.005985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.005999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.006022] Call Trace:
[   18.006040]  <TASK>
[   18.006060]  dump_stack_lvl+0x73/0xb0
[   18.006100]  print_report+0xd1/0x650
[   18.006127]  ? __virt_addr_valid+0x1db/0x2d0
[   18.006150]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.006176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.006199]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.006309]  kasan_report+0x141/0x180
[   18.006362]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.006396]  kasan_check_range+0x10c/0x1c0
[   18.006423]  __kasan_check_write+0x18/0x20
[   18.006447]  copy_user_test_oob+0x3fd/0x10f0
[   18.006475]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.006500]  ? finish_task_switch.isra.0+0x153/0x700
[   18.006526]  ? __switch_to+0x47/0xf50
[   18.006556]  ? __schedule+0x10cc/0x2b60
[   18.006581]  ? __pfx_read_tsc+0x10/0x10
[   18.006604]  ? ktime_get_ts64+0x86/0x230
[   18.006631]  kunit_try_run_case+0x1a5/0x480
[   18.006659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.006684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.006709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.006733]  ? __kthread_parkme+0x82/0x180
[   18.006756]  ? preempt_count_sub+0x50/0x80
[   18.006781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.006806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.006831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.006856]  kthread+0x337/0x6f0
[   18.006877]  ? trace_preempt_on+0x20/0xc0
[   18.006904]  ? __pfx_kthread+0x10/0x10
[   18.006926]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.006949]  ? calculate_sigpending+0x7b/0xa0
[   18.006976]  ? __pfx_kthread+0x10/0x10
[   18.006999]  ret_from_fork+0x116/0x1d0
[   18.007020]  ? __pfx_kthread+0x10/0x10
[   18.007042]  ret_from_fork_asm+0x1a/0x30
[   18.007076]  </TASK>
[   18.007090] 
[   18.012714] Allocated by task 303:
[   18.012960]  kasan_save_stack+0x45/0x70
[   18.013204]  kasan_save_track+0x18/0x40
[   18.014176]  kasan_save_alloc_info+0x3b/0x50
[   18.014635]  __kasan_kmalloc+0xb7/0xc0
[   18.014784]  __kmalloc_noprof+0x1c9/0x500
[   18.014999]  kunit_kmalloc_array+0x25/0x60
[   18.015170]  copy_user_test_oob+0xab/0x10f0
[   18.015352]  kunit_try_run_case+0x1a5/0x480
[   18.015448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.015735]  kthread+0x337/0x6f0
[   18.015931]  ret_from_fork+0x116/0x1d0
[   18.016148]  ret_from_fork_asm+0x1a/0x30
[   18.016296] 
[   18.016356] The buggy address belongs to the object at ffff888102b5b800
[   18.016356]  which belongs to the cache kmalloc-128 of size 128
[   18.016800] The buggy address is located 0 bytes inside of
[   18.016800]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.017274] 
[   18.017409] The buggy address belongs to the physical page:
[   18.017633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.017794] flags: 0x200000000000000(node=0|zone=2)
[   18.018070] page_type: f5(slab)
[   18.018262] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.018431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.018771] page dumped because: kasan: bad access detected
[   18.018879] 
[   18.018933] Memory state around the buggy address:
[   18.019042]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.019410]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.019820] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.020131]                                                                 ^
[   18.020369]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020578]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020854] ==================================================================
[   18.050406] ==================================================================
[   18.050572] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   18.050760] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.051061] 
[   18.051200] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.051259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.051273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.051295] Call Trace:
[   18.051311]  <TASK>
[   18.051327]  dump_stack_lvl+0x73/0xb0
[   18.051355]  print_report+0xd1/0x650
[   18.051378]  ? __virt_addr_valid+0x1db/0x2d0
[   18.051402]  ? copy_user_test_oob+0x604/0x10f0
[   18.051426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.051449]  ? copy_user_test_oob+0x604/0x10f0
[   18.051474]  kasan_report+0x141/0x180
[   18.051496]  ? copy_user_test_oob+0x604/0x10f0
[   18.051525]  kasan_check_range+0x10c/0x1c0
[   18.051550]  __kasan_check_read+0x15/0x20
[   18.051571]  copy_user_test_oob+0x604/0x10f0
[   18.051598]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.051620]  ? finish_task_switch.isra.0+0x153/0x700
[   18.051641]  ? __switch_to+0x47/0xf50
[   18.051667]  ? __schedule+0x10cc/0x2b60
[   18.051689]  ? __pfx_read_tsc+0x10/0x10
[   18.051709]  ? ktime_get_ts64+0x86/0x230
[   18.051733]  kunit_try_run_case+0x1a5/0x480
[   18.051757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.051779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.051801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.051824]  ? __kthread_parkme+0x82/0x180
[   18.051844]  ? preempt_count_sub+0x50/0x80
[   18.051867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.051891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.051913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.051937]  kthread+0x337/0x6f0
[   18.051957]  ? trace_preempt_on+0x20/0xc0
[   18.051981]  ? __pfx_kthread+0x10/0x10
[   18.052002]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.052023]  ? calculate_sigpending+0x7b/0xa0
[   18.052048]  ? __pfx_kthread+0x10/0x10
[   18.052071]  ret_from_fork+0x116/0x1d0
[   18.052091]  ? __pfx_kthread+0x10/0x10
[   18.052112]  ret_from_fork_asm+0x1a/0x30
[   18.052144]  </TASK>
[   18.052156] 
[   18.058683] Allocated by task 303:
[   18.058850]  kasan_save_stack+0x45/0x70
[   18.058997]  kasan_save_track+0x18/0x40
[   18.059154]  kasan_save_alloc_info+0x3b/0x50
[   18.059331]  __kasan_kmalloc+0xb7/0xc0
[   18.059520]  __kmalloc_noprof+0x1c9/0x500
[   18.059664]  kunit_kmalloc_array+0x25/0x60
[   18.059841]  copy_user_test_oob+0xab/0x10f0
[   18.060034]  kunit_try_run_case+0x1a5/0x480
[   18.060127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.060241]  kthread+0x337/0x6f0
[   18.060322]  ret_from_fork+0x116/0x1d0
[   18.060407]  ret_from_fork_asm+0x1a/0x30
[   18.060494] 
[   18.060546] The buggy address belongs to the object at ffff888102b5b800
[   18.060546]  which belongs to the cache kmalloc-128 of size 128
[   18.061171] The buggy address is located 0 bytes inside of
[   18.061171]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.061849] 
[   18.061906] The buggy address belongs to the physical page:
[   18.062009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.062148] flags: 0x200000000000000(node=0|zone=2)
[   18.062260] page_type: f5(slab)
[   18.062351] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.062759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.063069] page dumped because: kasan: bad access detected
[   18.063351] 
[   18.063447] Memory state around the buggy address:
[   18.063701]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.063880]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064031] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.064307]                                                                 ^
[   18.064550]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064676]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064846] ==================================================================
[   18.036827] ==================================================================
[   18.037101] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   18.037390] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.037665] 
[   18.037756] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.037809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.037823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.037845] Call Trace:
[   18.037863]  <TASK>
[   18.037882]  dump_stack_lvl+0x73/0xb0
[   18.037912]  print_report+0xd1/0x650
[   18.037938]  ? __virt_addr_valid+0x1db/0x2d0
[   18.037962]  ? copy_user_test_oob+0x557/0x10f0
[   18.037986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.038011]  ? copy_user_test_oob+0x557/0x10f0
[   18.038037]  kasan_report+0x141/0x180
[   18.038061]  ? copy_user_test_oob+0x557/0x10f0
[   18.038091]  kasan_check_range+0x10c/0x1c0
[   18.038117]  __kasan_check_write+0x18/0x20
[   18.038138]  copy_user_test_oob+0x557/0x10f0
[   18.038166]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.038191]  ? finish_task_switch.isra.0+0x153/0x700
[   18.038214]  ? __switch_to+0x47/0xf50
[   18.038253]  ? __schedule+0x10cc/0x2b60
[   18.038277]  ? __pfx_read_tsc+0x10/0x10
[   18.038298]  ? ktime_get_ts64+0x86/0x230
[   18.038322]  kunit_try_run_case+0x1a5/0x480
[   18.038359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.038387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.038412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.038436]  ? __kthread_parkme+0x82/0x180
[   18.038458]  ? preempt_count_sub+0x50/0x80
[   18.038484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.038509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.038531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.038555]  kthread+0x337/0x6f0
[   18.038577]  ? trace_preempt_on+0x20/0xc0
[   18.038601]  ? __pfx_kthread+0x10/0x10
[   18.038623]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.038645]  ? calculate_sigpending+0x7b/0xa0
[   18.038670]  ? __pfx_kthread+0x10/0x10
[   18.038693]  ret_from_fork+0x116/0x1d0
[   18.038712]  ? __pfx_kthread+0x10/0x10
[   18.038735]  ret_from_fork_asm+0x1a/0x30
[   18.038768]  </TASK>
[   18.038780] 
[   18.043968] Allocated by task 303:
[   18.044064]  kasan_save_stack+0x45/0x70
[   18.044160]  kasan_save_track+0x18/0x40
[   18.044346]  kasan_save_alloc_info+0x3b/0x50
[   18.044599]  __kasan_kmalloc+0xb7/0xc0
[   18.044771]  __kmalloc_noprof+0x1c9/0x500
[   18.044948]  kunit_kmalloc_array+0x25/0x60
[   18.045139]  copy_user_test_oob+0xab/0x10f0
[   18.045382]  kunit_try_run_case+0x1a5/0x480
[   18.045623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.045871]  kthread+0x337/0x6f0
[   18.046031]  ret_from_fork+0x116/0x1d0
[   18.046192]  ret_from_fork_asm+0x1a/0x30
[   18.046294] 
[   18.046358] The buggy address belongs to the object at ffff888102b5b800
[   18.046358]  which belongs to the cache kmalloc-128 of size 128
[   18.046879] The buggy address is located 0 bytes inside of
[   18.046879]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.047307] 
[   18.047369] The buggy address belongs to the physical page:
[   18.047476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.047911] flags: 0x200000000000000(node=0|zone=2)
[   18.048192] page_type: f5(slab)
[   18.048306] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.048446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.048594] page dumped because: kasan: bad access detected
[   18.048703] 
[   18.048810] Memory state around the buggy address:
[   18.049047]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.049317]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049547] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.049674]                                                                 ^
[   18.049800]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049924]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.050043] ==================================================================