Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.301953] ==================================================================
[   21.302086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.302198] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.302312] 
[   21.302392] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.302576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.302631] Hardware name: linux,dummy-virt (DT)
[   21.302704] Call trace:
[   21.302755]  show_stack+0x20/0x38 (C)
[   21.303649]  dump_stack_lvl+0x8c/0xd0
[   21.303919]  print_report+0x118/0x608
[   21.304488]  kasan_report+0xdc/0x128
[   21.304616]  kasan_check_range+0x100/0x1a8
[   21.304855]  __kasan_check_write+0x20/0x30
[   21.305233]  copy_user_test_oob+0x434/0xec8
[   21.305355]  kunit_try_run_case+0x170/0x3f0
[   21.305471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.305581]  kthread+0x328/0x630
[   21.305964]  ret_from_fork+0x10/0x20
[   21.306171] 
[   21.306602] Allocated by task 285:
[   21.306689]  kasan_save_stack+0x3c/0x68
[   21.306995]  kasan_save_track+0x20/0x40
[   21.307122]  kasan_save_alloc_info+0x40/0x58
[   21.307553]  __kasan_kmalloc+0xd4/0xd8
[   21.307735]  __kmalloc_noprof+0x190/0x4d0
[   21.308033]  kunit_kmalloc_array+0x34/0x88
[   21.308209]  copy_user_test_oob+0xac/0xec8
[   21.308284]  kunit_try_run_case+0x170/0x3f0
[   21.308368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.308474]  kthread+0x328/0x630
[   21.309295]  ret_from_fork+0x10/0x20
[   21.309396] 
[   21.309444] The buggy address belongs to the object at fff00000c7893300
[   21.309444]  which belongs to the cache kmalloc-128 of size 128
[   21.309587] The buggy address is located 0 bytes inside of
[   21.309587]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.309740] 
[   21.309793] The buggy address belongs to the physical page:
[   21.310346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.310537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.310649] page_type: f5(slab)
[   21.310738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.310895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.310998] page dumped because: kasan: bad access detected
[   21.311213] 
[   21.311378] Memory state around the buggy address:
[   21.311595]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.311697]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.311887] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.312175]                                                                 ^
[   21.312282]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.312393]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.312625] ==================================================================
[   21.285138] ==================================================================
[   21.285562] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.285707] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.285838] 
[   21.285931] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.286148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.286217] Hardware name: linux,dummy-virt (DT)
[   21.286297] Call trace:
[   21.286356]  show_stack+0x20/0x38 (C)
[   21.286465]  dump_stack_lvl+0x8c/0xd0
[   21.286573]  print_report+0x118/0x608
[   21.286681]  kasan_report+0xdc/0x128
[   21.286793]  kasan_check_range+0x100/0x1a8
[   21.286909]  __kasan_check_write+0x20/0x30
[   21.287010]  copy_user_test_oob+0x35c/0xec8
[   21.287120]  kunit_try_run_case+0x170/0x3f0
[   21.287234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.287366]  kthread+0x328/0x630
[   21.287464]  ret_from_fork+0x10/0x20
[   21.287573] 
[   21.287618] Allocated by task 285:
[   21.287681]  kasan_save_stack+0x3c/0x68
[   21.287773]  kasan_save_track+0x20/0x40
[   21.287855]  kasan_save_alloc_info+0x40/0x58
[   21.287944]  __kasan_kmalloc+0xd4/0xd8
[   21.288023]  __kmalloc_noprof+0x190/0x4d0
[   21.288115]  kunit_kmalloc_array+0x34/0x88
[   21.289455]  copy_user_test_oob+0xac/0xec8
[   21.289613]  kunit_try_run_case+0x170/0x3f0
[   21.289690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.289772]  kthread+0x328/0x630
[   21.289842]  ret_from_fork+0x10/0x20
[   21.289938] 
[   21.290068] The buggy address belongs to the object at fff00000c7893300
[   21.290068]  which belongs to the cache kmalloc-128 of size 128
[   21.290200] The buggy address is located 0 bytes inside of
[   21.290200]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.290348] 
[   21.290489] The buggy address belongs to the physical page:
[   21.290579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.290696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.290809] page_type: f5(slab)
[   21.290893] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.290996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.291265] page dumped because: kasan: bad access detected
[   21.291468] 
[   21.291768] Memory state around the buggy address:
[   21.291881]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.292163]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.292284] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.292598]                                                                 ^
[   21.292905]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.293012]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.293311] ==================================================================
[   21.249936] ==================================================================
[   21.250594] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.251174] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.251696] 
[   21.251814] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.252016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.252524] Hardware name: linux,dummy-virt (DT)
[   21.252944] Call trace:
[   21.253089]  show_stack+0x20/0x38 (C)
[   21.253386]  dump_stack_lvl+0x8c/0xd0
[   21.253957]  print_report+0x118/0x608
[   21.254129]  kasan_report+0xdc/0x128
[   21.254229]  kasan_check_range+0x100/0x1a8
[   21.254342]  __kasan_check_write+0x20/0x30
[   21.254459]  copy_user_test_oob+0x234/0xec8
[   21.254564]  kunit_try_run_case+0x170/0x3f0
[   21.254675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.255063]  kthread+0x328/0x630
[   21.255179]  ret_from_fork+0x10/0x20
[   21.255238] 
[   21.255261] Allocated by task 285:
[   21.255299]  kasan_save_stack+0x3c/0x68
[   21.255432]  kasan_save_track+0x20/0x40
[   21.255537]  kasan_save_alloc_info+0x40/0x58
[   21.255652]  __kasan_kmalloc+0xd4/0xd8
[   21.255740]  __kmalloc_noprof+0x190/0x4d0
[   21.255835]  kunit_kmalloc_array+0x34/0x88
[   21.255956]  copy_user_test_oob+0xac/0xec8
[   21.256029]  kunit_try_run_case+0x170/0x3f0
[   21.256100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.256207]  kthread+0x328/0x630
[   21.256278]  ret_from_fork+0x10/0x20
[   21.256371] 
[   21.256420] The buggy address belongs to the object at fff00000c7893300
[   21.256420]  which belongs to the cache kmalloc-128 of size 128
[   21.256640] The buggy address is located 0 bytes inside of
[   21.256640]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.256803] 
[   21.256857] The buggy address belongs to the physical page:
[   21.256986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.257184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.257364] page_type: f5(slab)
[   21.257476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.257593] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.257690] page dumped because: kasan: bad access detected
[   21.257794] 
[   21.257853] Memory state around the buggy address:
[   21.257948]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.258105]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258211] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.258304]                                                                 ^
[   21.258407]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258528]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258655] ==================================================================
[   21.314428] ==================================================================
[   21.314542] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.314649] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.314764] 
[   21.315437] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.315707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315993] Hardware name: linux,dummy-virt (DT)
[   21.316114] Call trace:
[   21.316164]  show_stack+0x20/0x38 (C)
[   21.316275]  dump_stack_lvl+0x8c/0xd0
[   21.316413]  print_report+0x118/0x608
[   21.316603]  kasan_report+0xdc/0x128
[   21.316918]  kasan_check_range+0x100/0x1a8
[   21.317025]  __kasan_check_read+0x20/0x30
[   21.317135]  copy_user_test_oob+0x4a0/0xec8
[   21.317298]  kunit_try_run_case+0x170/0x3f0
[   21.317491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.317628]  kthread+0x328/0x630
[   21.317721]  ret_from_fork+0x10/0x20
[   21.317826] 
[   21.317872] Allocated by task 285:
[   21.317940]  kasan_save_stack+0x3c/0x68
[   21.318028]  kasan_save_track+0x20/0x40
[   21.318125]  kasan_save_alloc_info+0x40/0x58
[   21.318212]  __kasan_kmalloc+0xd4/0xd8
[   21.318291]  __kmalloc_noprof+0x190/0x4d0
[   21.318703]  kunit_kmalloc_array+0x34/0x88
[   21.318865]  copy_user_test_oob+0xac/0xec8
[   21.319011]  kunit_try_run_case+0x170/0x3f0
[   21.319136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.319279]  kthread+0x328/0x630
[   21.319377]  ret_from_fork+0x10/0x20
[   21.319446] 
[   21.319484] The buggy address belongs to the object at fff00000c7893300
[   21.319484]  which belongs to the cache kmalloc-128 of size 128
[   21.319626] The buggy address is located 0 bytes inside of
[   21.319626]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.319913] 
[   21.319957] The buggy address belongs to the physical page:
[   21.320024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.320142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.320271] page_type: f5(slab)
[   21.320390] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.320561] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.320693] page dumped because: kasan: bad access detected
[   21.320817] 
[   21.320863] Memory state around the buggy address:
[   21.320934]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.321306]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.321416] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.321505]                                                                 ^
[   21.321621]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.321731]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.321823] ==================================================================
[   21.294752] ==================================================================
[   21.294897] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.294962] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.295014] 
[   21.295051] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.295137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.295167] Hardware name: linux,dummy-virt (DT)
[   21.295201] Call trace:
[   21.295226]  show_stack+0x20/0x38 (C)
[   21.295276]  dump_stack_lvl+0x8c/0xd0
[   21.295345]  print_report+0x118/0x608
[   21.295399]  kasan_report+0xdc/0x128
[   21.295444]  kasan_check_range+0x100/0x1a8
[   21.295492]  __kasan_check_read+0x20/0x30
[   21.295538]  copy_user_test_oob+0x3c8/0xec8
[   21.295583]  kunit_try_run_case+0x170/0x3f0
[   21.295631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.295683]  kthread+0x328/0x630
[   21.295723]  ret_from_fork+0x10/0x20
[   21.295771] 
[   21.295793] Allocated by task 285:
[   21.295822]  kasan_save_stack+0x3c/0x68
[   21.295866]  kasan_save_track+0x20/0x40
[   21.295906]  kasan_save_alloc_info+0x40/0x58
[   21.295948]  __kasan_kmalloc+0xd4/0xd8
[   21.295984]  __kmalloc_noprof+0x190/0x4d0
[   21.296026]  kunit_kmalloc_array+0x34/0x88
[   21.296064]  copy_user_test_oob+0xac/0xec8
[   21.296101]  kunit_try_run_case+0x170/0x3f0
[   21.296141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.296185]  kthread+0x328/0x630
[   21.296218]  ret_from_fork+0x10/0x20
[   21.296257] 
[   21.296278] The buggy address belongs to the object at fff00000c7893300
[   21.296278]  which belongs to the cache kmalloc-128 of size 128
[   21.296472] The buggy address is located 0 bytes inside of
[   21.296472]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.296813] 
[   21.296987] The buggy address belongs to the physical page:
[   21.297279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.297613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.297748] page_type: f5(slab)
[   21.297956] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.298099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.298346] page dumped because: kasan: bad access detected
[   21.298469] 
[   21.298783] Memory state around the buggy address:
[   21.298991]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.299243]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299412] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.299766]                                                                 ^
[   21.300038]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.300138]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.300464] ==================================================================
[   21.266652] ==================================================================
[   21.266843] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.266978] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.267107] 
[   21.267201] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.267418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267487] Hardware name: linux,dummy-virt (DT)
[   21.267746] Call trace:
[   21.267837]  show_stack+0x20/0x38 (C)
[   21.267949]  dump_stack_lvl+0x8c/0xd0
[   21.268043]  print_report+0x118/0x608
[   21.268153]  kasan_report+0xdc/0x128
[   21.268259]  kasan_check_range+0x100/0x1a8
[   21.268411]  __kasan_check_read+0x20/0x30
[   21.268620]  copy_user_test_oob+0x728/0xec8
[   21.268781]  kunit_try_run_case+0x170/0x3f0
[   21.269359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.269490]  kthread+0x328/0x630
[   21.269588]  ret_from_fork+0x10/0x20
[   21.269701] 
[   21.269751] Allocated by task 285:
[   21.269817]  kasan_save_stack+0x3c/0x68
[   21.269913]  kasan_save_track+0x20/0x40
[   21.270001]  kasan_save_alloc_info+0x40/0x58
[   21.270100]  __kasan_kmalloc+0xd4/0xd8
[   21.270186]  __kmalloc_noprof+0x190/0x4d0
[   21.270278]  kunit_kmalloc_array+0x34/0x88
[   21.270380]  copy_user_test_oob+0xac/0xec8
[   21.270468]  kunit_try_run_case+0x170/0x3f0
[   21.270600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.270712]  kthread+0x328/0x630
[   21.270810]  ret_from_fork+0x10/0x20
[   21.270945] 
[   21.271005] The buggy address belongs to the object at fff00000c7893300
[   21.271005]  which belongs to the cache kmalloc-128 of size 128
[   21.271146] The buggy address is located 0 bytes inside of
[   21.271146]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.271278] 
[   21.271331] The buggy address belongs to the physical page:
[   21.271404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.271526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.271669] page_type: f5(slab)
[   21.271757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.271903] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.272016] page dumped because: kasan: bad access detected
[   21.272090] 
[   21.272194] Memory state around the buggy address:
[   21.272377]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.272497]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.272709] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.272836]                                                                 ^
[   21.272968]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.273066]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.273148] ==================================================================


[   15.156318] ==================================================================
[   15.156798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.157387] Read of size 121 at addr ffff8881039b7800 by task kunit_try_catch/303
[   15.157869] 
[   15.158232] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   15.158285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.158298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.158322] Call Trace:
[   15.158338]  <TASK>
[   15.158356]  dump_stack_lvl+0x73/0xb0
[   15.158398]  print_report+0xd1/0x650
[   15.158422]  ? __virt_addr_valid+0x1db/0x2d0
[   15.158446]  ? copy_user_test_oob+0x604/0x10f0
[   15.158470]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.158494]  ? copy_user_test_oob+0x604/0x10f0
[   15.158519]  kasan_report+0x141/0x180
[   15.158542]  ? copy_user_test_oob+0x604/0x10f0
[   15.158572]  kasan_check_range+0x10c/0x1c0
[   15.158597]  __kasan_check_read+0x15/0x20
[   15.158618]  copy_user_test_oob+0x604/0x10f0
[   15.158644]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.158668]  ? finish_task_switch.isra.0+0x153/0x700
[   15.158691]  ? __switch_to+0x47/0xf50
[   15.158740]  ? __schedule+0x10cc/0x2b60
[   15.158765]  ? __pfx_read_tsc+0x10/0x10
[   15.158787]  ? ktime_get_ts64+0x86/0x230
[   15.158812]  kunit_try_run_case+0x1a5/0x480
[   15.158834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.158855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.158880]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.158905]  ? __kthread_parkme+0x82/0x180
[   15.158926]  ? preempt_count_sub+0x50/0x80
[   15.158950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.158972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.158997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.159023]  kthread+0x337/0x6f0
[   15.159043]  ? trace_preempt_on+0x20/0xc0
[   15.159067]  ? __pfx_kthread+0x10/0x10
[   15.159089]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.159112]  ? calculate_sigpending+0x7b/0xa0
[   15.159136]  ? __pfx_kthread+0x10/0x10
[   15.159159]  ret_from_fork+0x116/0x1d0
[   15.159178]  ? __pfx_kthread+0x10/0x10
[   15.159199]  ret_from_fork_asm+0x1a/0x30
[   15.159230]  </TASK>
[   15.159242] 
[   15.166575] Allocated by task 303:
[   15.166806]  kasan_save_stack+0x45/0x70
[   15.166953]  kasan_save_track+0x18/0x40
[   15.167092]  kasan_save_alloc_info+0x3b/0x50
[   15.167306]  __kasan_kmalloc+0xb7/0xc0
[   15.167531]  __kmalloc_noprof+0x1c9/0x500
[   15.167741]  kunit_kmalloc_array+0x25/0x60
[   15.167944]  copy_user_test_oob+0xab/0x10f0
[   15.168176]  kunit_try_run_case+0x1a5/0x480
[   15.168354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.168636]  kthread+0x337/0x6f0
[   15.168889]  ret_from_fork+0x116/0x1d0
[   15.169055]  ret_from_fork_asm+0x1a/0x30
[   15.169260] 
[   15.169358] The buggy address belongs to the object at ffff8881039b7800
[   15.169358]  which belongs to the cache kmalloc-128 of size 128
[   15.169879] The buggy address is located 0 bytes inside of
[   15.169879]  allocated 120-byte region [ffff8881039b7800, ffff8881039b7878)
[   15.170400] 
[   15.170474] The buggy address belongs to the physical page:
[   15.170650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b7
[   15.171180] flags: 0x200000000000000(node=0|zone=2)
[   15.171355] page_type: f5(slab)
[   15.171487] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.172138] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.172480] page dumped because: kasan: bad access detected
[   15.172701] 
[   15.172864] Memory state around the buggy address:
[   15.173021]  ffff8881039b7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.173261]  ffff8881039b7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.173587] >ffff8881039b7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.173899]                                                                 ^
[   15.174211]  ffff8881039b7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174553]  ffff8881039b7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174767] ==================================================================
[   15.107605] ==================================================================
[   15.108162] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.108631] Read of size 121 at addr ffff8881039b7800 by task kunit_try_catch/303
[   15.109283] 
[   15.109529] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   15.109609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.109625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.109647] Call Trace:
[   15.109666]  <TASK>
[   15.109684]  dump_stack_lvl+0x73/0xb0
[   15.109798]  print_report+0xd1/0x650
[   15.109826]  ? __virt_addr_valid+0x1db/0x2d0
[   15.109850]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.109875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.109900]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.109927]  kasan_report+0x141/0x180
[   15.109951]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.109981]  kasan_check_range+0x10c/0x1c0
[   15.110006]  __kasan_check_read+0x15/0x20
[   15.110033]  copy_user_test_oob+0x4aa/0x10f0
[   15.110060]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.110083]  ? finish_task_switch.isra.0+0x153/0x700
[   15.110107]  ? __switch_to+0x47/0xf50
[   15.110133]  ? __schedule+0x10cc/0x2b60
[   15.110159]  ? __pfx_read_tsc+0x10/0x10
[   15.110182]  ? ktime_get_ts64+0x86/0x230
[   15.110208]  kunit_try_run_case+0x1a5/0x480
[   15.110231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.110251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.110277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.110303]  ? __kthread_parkme+0x82/0x180
[   15.110325]  ? preempt_count_sub+0x50/0x80
[   15.110348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.110370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.110407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.110433]  kthread+0x337/0x6f0
[   15.110455]  ? trace_preempt_on+0x20/0xc0
[   15.110483]  ? __pfx_kthread+0x10/0x10
[   15.110505]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.110529]  ? calculate_sigpending+0x7b/0xa0
[   15.110555]  ? __pfx_kthread+0x10/0x10
[   15.110577]  ret_from_fork+0x116/0x1d0
[   15.110597]  ? __pfx_kthread+0x10/0x10
[   15.110618]  ret_from_fork_asm+0x1a/0x30
[   15.110650]  </TASK>
[   15.110660] 
[   15.121558] Allocated by task 303:
[   15.121925]  kasan_save_stack+0x45/0x70
[   15.122277]  kasan_save_track+0x18/0x40
[   15.122588]  kasan_save_alloc_info+0x3b/0x50
[   15.122892]  __kasan_kmalloc+0xb7/0xc0
[   15.123074]  __kmalloc_noprof+0x1c9/0x500
[   15.123253]  kunit_kmalloc_array+0x25/0x60
[   15.123456]  copy_user_test_oob+0xab/0x10f0
[   15.123663]  kunit_try_run_case+0x1a5/0x480
[   15.124284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.124542]  kthread+0x337/0x6f0
[   15.124885]  ret_from_fork+0x116/0x1d0
[   15.125171]  ret_from_fork_asm+0x1a/0x30
[   15.125494] 
[   15.125781] The buggy address belongs to the object at ffff8881039b7800
[   15.125781]  which belongs to the cache kmalloc-128 of size 128
[   15.126502] The buggy address is located 0 bytes inside of
[   15.126502]  allocated 120-byte region [ffff8881039b7800, ffff8881039b7878)
[   15.126977] 
[   15.127056] The buggy address belongs to the physical page:
[   15.127226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b7
[   15.127478] flags: 0x200000000000000(node=0|zone=2)
[   15.127638] page_type: f5(slab)
[   15.127757] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.127983] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.128203] page dumped because: kasan: bad access detected
[   15.128372] 
[   15.128457] Memory state around the buggy address:
[   15.129122]  ffff8881039b7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.129675]  ffff8881039b7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.130142] >ffff8881039b7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.130544]                                                                 ^
[   15.131128]  ffff8881039b7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.131479]  ffff8881039b7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.131766] ==================================================================
[   15.083575] ==================================================================
[   15.084245] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.084502] Write of size 121 at addr ffff8881039b7800 by task kunit_try_catch/303
[   15.084836] 
[   15.085045] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   15.085093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.085108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.085131] Call Trace:
[   15.085147]  <TASK>
[   15.085164]  dump_stack_lvl+0x73/0xb0
[   15.085191]  print_report+0xd1/0x650
[   15.085216]  ? __virt_addr_valid+0x1db/0x2d0
[   15.085250]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.085274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.085297]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.085333]  kasan_report+0x141/0x180
[   15.085357]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.085395]  kasan_check_range+0x10c/0x1c0
[   15.085420]  __kasan_check_write+0x18/0x20
[   15.085441]  copy_user_test_oob+0x3fd/0x10f0
[   15.085467]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.085491]  ? finish_task_switch.isra.0+0x153/0x700
[   15.085514]  ? __switch_to+0x47/0xf50
[   15.085549]  ? __schedule+0x10cc/0x2b60
[   15.085574]  ? __pfx_read_tsc+0x10/0x10
[   15.085595]  ? ktime_get_ts64+0x86/0x230
[   15.085630]  kunit_try_run_case+0x1a5/0x480
[   15.085653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.085674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.085708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.085756]  ? __kthread_parkme+0x82/0x180
[   15.085777]  ? preempt_count_sub+0x50/0x80
[   15.085812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.085835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.085859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.085884]  kthread+0x337/0x6f0
[   15.085905]  ? trace_preempt_on+0x20/0xc0
[   15.085929]  ? __pfx_kthread+0x10/0x10
[   15.085950]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.085973]  ? calculate_sigpending+0x7b/0xa0
[   15.085999]  ? __pfx_kthread+0x10/0x10
[   15.086021]  ret_from_fork+0x116/0x1d0
[   15.086051]  ? __pfx_kthread+0x10/0x10
[   15.086074]  ret_from_fork_asm+0x1a/0x30
[   15.086107]  </TASK>
[   15.086119] 
[   15.097213] Allocated by task 303:
[   15.097502]  kasan_save_stack+0x45/0x70
[   15.097699]  kasan_save_track+0x18/0x40
[   15.098036]  kasan_save_alloc_info+0x3b/0x50
[   15.098307]  __kasan_kmalloc+0xb7/0xc0
[   15.098466]  __kmalloc_noprof+0x1c9/0x500
[   15.098792]  kunit_kmalloc_array+0x25/0x60
[   15.099065]  copy_user_test_oob+0xab/0x10f0
[   15.099229]  kunit_try_run_case+0x1a5/0x480
[   15.099520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.099721]  kthread+0x337/0x6f0
[   15.099903]  ret_from_fork+0x116/0x1d0
[   15.100084]  ret_from_fork_asm+0x1a/0x30
[   15.100320] 
[   15.100408] The buggy address belongs to the object at ffff8881039b7800
[   15.100408]  which belongs to the cache kmalloc-128 of size 128
[   15.100949] The buggy address is located 0 bytes inside of
[   15.100949]  allocated 120-byte region [ffff8881039b7800, ffff8881039b7878)
[   15.101480] 
[   15.101572] The buggy address belongs to the physical page:
[   15.101871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b7
[   15.102343] flags: 0x200000000000000(node=0|zone=2)
[   15.102599] page_type: f5(slab)
[   15.102747] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.103100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.103500] page dumped because: kasan: bad access detected
[   15.103765] 
[   15.103849] Memory state around the buggy address:
[   15.104010]  ffff8881039b7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.104387]  ffff8881039b7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.104689] >ffff8881039b7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.105393]                                                                 ^
[   15.105897]  ffff8881039b7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.106297]  ffff8881039b7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.106742] ==================================================================
[   15.132201] ==================================================================
[   15.132738] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.133330] Write of size 121 at addr ffff8881039b7800 by task kunit_try_catch/303
[   15.133697] 
[   15.133821] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   15.133867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.133881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.133903] Call Trace:
[   15.133919]  <TASK>
[   15.133935]  dump_stack_lvl+0x73/0xb0
[   15.133963]  print_report+0xd1/0x650
[   15.133987]  ? __virt_addr_valid+0x1db/0x2d0
[   15.134011]  ? copy_user_test_oob+0x557/0x10f0
[   15.134039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.134062]  ? copy_user_test_oob+0x557/0x10f0
[   15.134087]  kasan_report+0x141/0x180
[   15.134110]  ? copy_user_test_oob+0x557/0x10f0
[   15.134139]  kasan_check_range+0x10c/0x1c0
[   15.134164]  __kasan_check_write+0x18/0x20
[   15.134185]  copy_user_test_oob+0x557/0x10f0
[   15.134211]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.134236]  ? finish_task_switch.isra.0+0x153/0x700
[   15.134260]  ? __switch_to+0x47/0xf50
[   15.134286]  ? __schedule+0x10cc/0x2b60
[   15.134311]  ? __pfx_read_tsc+0x10/0x10
[   15.134332]  ? ktime_get_ts64+0x86/0x230
[   15.134358]  kunit_try_run_case+0x1a5/0x480
[   15.134392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.134413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.134438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.134463]  ? __kthread_parkme+0x82/0x180
[   15.134484]  ? preempt_count_sub+0x50/0x80
[   15.134507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.134529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.134554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.134579]  kthread+0x337/0x6f0
[   15.134599]  ? trace_preempt_on+0x20/0xc0
[   15.134624]  ? __pfx_kthread+0x10/0x10
[   15.134645]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.134669]  ? calculate_sigpending+0x7b/0xa0
[   15.134693]  ? __pfx_kthread+0x10/0x10
[   15.134729]  ret_from_fork+0x116/0x1d0
[   15.134749]  ? __pfx_kthread+0x10/0x10
[   15.134770]  ret_from_fork_asm+0x1a/0x30
[   15.135317]  </TASK>
[   15.135332] 
[   15.144811] Allocated by task 303:
[   15.145139]  kasan_save_stack+0x45/0x70
[   15.145307]  kasan_save_track+0x18/0x40
[   15.145519]  kasan_save_alloc_info+0x3b/0x50
[   15.145722]  __kasan_kmalloc+0xb7/0xc0
[   15.146194]  __kmalloc_noprof+0x1c9/0x500
[   15.146351]  kunit_kmalloc_array+0x25/0x60
[   15.146693]  copy_user_test_oob+0xab/0x10f0
[   15.147043]  kunit_try_run_case+0x1a5/0x480
[   15.147281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.147687]  kthread+0x337/0x6f0
[   15.147967]  ret_from_fork+0x116/0x1d0
[   15.148197]  ret_from_fork_asm+0x1a/0x30
[   15.148371] 
[   15.148485] The buggy address belongs to the object at ffff8881039b7800
[   15.148485]  which belongs to the cache kmalloc-128 of size 128
[   15.149196] The buggy address is located 0 bytes inside of
[   15.149196]  allocated 120-byte region [ffff8881039b7800, ffff8881039b7878)
[   15.149821] 
[   15.150160] The buggy address belongs to the physical page:
[   15.150415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b7
[   15.150924] flags: 0x200000000000000(node=0|zone=2)
[   15.151231] page_type: f5(slab)
[   15.151503] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.151910] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.152288] page dumped because: kasan: bad access detected
[   15.152622] 
[   15.152714] Memory state around the buggy address:
[   15.153174]  ffff8881039b7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.153505]  ffff8881039b7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.153986] >ffff8881039b7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.154369]                                                                 ^
[   15.154786]  ffff8881039b7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.155134]  ffff8881039b7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.155502] ==================================================================