Hay
Date
May 29, 2025, 7:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.080959] ==================================================================
[   26.081145] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   26.081304] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.081463] 
[   26.081552] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.082059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.082135] Hardware name: linux,dummy-virt (DT)
[   26.082502] Call trace:
[   26.082678]  show_stack+0x20/0x38 (C)
[   26.082854]  dump_stack_lvl+0x8c/0xd0
[   26.083160]  print_report+0x118/0x608
[   26.083483]  kasan_report+0xdc/0x128
[   26.083692]  kasan_check_range+0x100/0x1a8
[   26.083968]  __kasan_check_write+0x20/0x30
[   26.084192]  copy_user_test_oob+0x434/0xec8
[   26.084532]  kunit_try_run_case+0x170/0x3f0
[   26.084728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.084829]  kthread+0x328/0x630
[   26.084927]  ret_from_fork+0x10/0x20
[   26.085102] 
[   26.085191] Allocated by task 285:
[   26.085283]  kasan_save_stack+0x3c/0x68
[   26.085387]  kasan_save_track+0x20/0x40
[   26.085500]  kasan_save_alloc_info+0x40/0x58
[   26.085634]  __kasan_kmalloc+0xd4/0xd8
[   26.085729]  __kmalloc_noprof+0x190/0x4d0
[   26.085844]  kunit_kmalloc_array+0x34/0x88
[   26.085941]  copy_user_test_oob+0xac/0xec8
[   26.086053]  kunit_try_run_case+0x170/0x3f0
[   26.086146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.086290]  kthread+0x328/0x630
[   26.086915]  ret_from_fork+0x10/0x20
[   26.087602] 
[   26.087719] The buggy address belongs to the object at fff00000c7883300
[   26.087719]  which belongs to the cache kmalloc-128 of size 128
[   26.087910] The buggy address is located 0 bytes inside of
[   26.087910]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.088054] 
[   26.088101] The buggy address belongs to the physical page:
[   26.088326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.088490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.088617] page_type: f5(slab)
[   26.088721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.089946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.090108] page dumped because: kasan: bad access detected
[   26.090199] 
[   26.090250] Memory state around the buggy address:
[   26.090374]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.090503]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091022] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.091189]                                                                 ^
[   26.091309]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091476]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091770] ==================================================================
[   26.093652] ==================================================================
[   26.093856] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   26.094041] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.094235] 
[   26.094326] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.094547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.095084] Hardware name: linux,dummy-virt (DT)
[   26.095189] Call trace:
[   26.095480]  show_stack+0x20/0x38 (C)
[   26.095719]  dump_stack_lvl+0x8c/0xd0
[   26.096019]  print_report+0x118/0x608
[   26.096204]  kasan_report+0xdc/0x128
[   26.096338]  kasan_check_range+0x100/0x1a8
[   26.096530]  __kasan_check_read+0x20/0x30
[   26.096710]  copy_user_test_oob+0x4a0/0xec8
[   26.096844]  kunit_try_run_case+0x170/0x3f0
[   26.096980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.097165]  kthread+0x328/0x630
[   26.097321]  ret_from_fork+0x10/0x20
[   26.097455] 
[   26.097506] Allocated by task 285:
[   26.097615]  kasan_save_stack+0x3c/0x68
[   26.097738]  kasan_save_track+0x20/0x40
[   26.097985]  kasan_save_alloc_info+0x40/0x58
[   26.098231]  __kasan_kmalloc+0xd4/0xd8
[   26.098492]  __kmalloc_noprof+0x190/0x4d0
[   26.098918]  kunit_kmalloc_array+0x34/0x88
[   26.099120]  copy_user_test_oob+0xac/0xec8
[   26.099282]  kunit_try_run_case+0x170/0x3f0
[   26.099376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.099493]  kthread+0x328/0x630
[   26.099607]  ret_from_fork+0x10/0x20
[   26.099699] 
[   26.099755] The buggy address belongs to the object at fff00000c7883300
[   26.099755]  which belongs to the cache kmalloc-128 of size 128
[   26.099902] The buggy address is located 0 bytes inside of
[   26.099902]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.100362] 
[   26.100468] The buggy address belongs to the physical page:
[   26.100575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.100765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.101107] page_type: f5(slab)
[   26.101220] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.101357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.101477] page dumped because: kasan: bad access detected
[   26.101587] 
[   26.101638] Memory state around the buggy address:
[   26.101722]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.101839]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.102126] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.102290]                                                                 ^
[   26.102489]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.102613]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.102983] ==================================================================
[   26.013878] ==================================================================
[   26.014057] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   26.014220] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.014349] 
[   26.015072] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.015375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.015475] Hardware name: linux,dummy-virt (DT)
[   26.015558] Call trace:
[   26.015669]  show_stack+0x20/0x38 (C)
[   26.015951]  dump_stack_lvl+0x8c/0xd0
[   26.016183]  print_report+0x118/0x608
[   26.016701]  kasan_report+0xdc/0x128
[   26.016960]  kasan_check_range+0x100/0x1a8
[   26.017285]  __kasan_check_read+0x20/0x30
[   26.017725]  copy_user_test_oob+0x728/0xec8
[   26.017948]  kunit_try_run_case+0x170/0x3f0
[   26.018138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.018554]  kthread+0x328/0x630
[   26.018723]  ret_from_fork+0x10/0x20
[   26.019002] 
[   26.019067] Allocated by task 285:
[   26.019152]  kasan_save_stack+0x3c/0x68
[   26.019250]  kasan_save_track+0x20/0x40
[   26.019340]  kasan_save_alloc_info+0x40/0x58
[   26.019769]  __kasan_kmalloc+0xd4/0xd8
[   26.019997]  __kmalloc_noprof+0x190/0x4d0
[   26.020120]  kunit_kmalloc_array+0x34/0x88
[   26.020491]  copy_user_test_oob+0xac/0xec8
[   26.020583]  kunit_try_run_case+0x170/0x3f0
[   26.020682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.021040]  kthread+0x328/0x630
[   26.021252]  ret_from_fork+0x10/0x20
[   26.021580] 
[   26.021642] The buggy address belongs to the object at fff00000c7883300
[   26.021642]  which belongs to the cache kmalloc-128 of size 128
[   26.021810] The buggy address is located 0 bytes inside of
[   26.021810]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.021973] 
[   26.022034] The buggy address belongs to the physical page:
[   26.022295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.022468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.022667] page_type: f5(slab)
[   26.022932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.023065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.023419] page dumped because: kasan: bad access detected
[   26.023520] 
[   26.023583] Memory state around the buggy address:
[   26.023804]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.023934]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.024271] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.024374]                                                                 ^
[   26.024569]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.024809]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.024944] ==================================================================
[   26.064869] ==================================================================
[   26.064998] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   26.065120] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.065250] 
[   26.065340] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.066389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.066545] Hardware name: linux,dummy-virt (DT)
[   26.066682] Call trace:
[   26.066775]  show_stack+0x20/0x38 (C)
[   26.067024]  dump_stack_lvl+0x8c/0xd0
[   26.067505]  print_report+0x118/0x608
[   26.067977]  kasan_report+0xdc/0x128
[   26.068236]  kasan_check_range+0x100/0x1a8
[   26.068513]  __kasan_check_read+0x20/0x30
[   26.068879]  copy_user_test_oob+0x3c8/0xec8
[   26.069187]  kunit_try_run_case+0x170/0x3f0
[   26.069389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.069519]  kthread+0x328/0x630
[   26.069907]  ret_from_fork+0x10/0x20
[   26.070209] 
[   26.070332] Allocated by task 285:
[   26.070690]  kasan_save_stack+0x3c/0x68
[   26.070851]  kasan_save_track+0x20/0x40
[   26.070946]  kasan_save_alloc_info+0x40/0x58
[   26.071036]  __kasan_kmalloc+0xd4/0xd8
[   26.071269]  __kmalloc_noprof+0x190/0x4d0
[   26.071507]  kunit_kmalloc_array+0x34/0x88
[   26.072078]  copy_user_test_oob+0xac/0xec8
[   26.072350]  kunit_try_run_case+0x170/0x3f0
[   26.072582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.072697]  kthread+0x328/0x630
[   26.072780]  ret_from_fork+0x10/0x20
[   26.072874] 
[   26.073601] The buggy address belongs to the object at fff00000c7883300
[   26.073601]  which belongs to the cache kmalloc-128 of size 128
[   26.073843] The buggy address is located 0 bytes inside of
[   26.073843]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.074554] 
[   26.074637] The buggy address belongs to the physical page:
[   26.074958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.075436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.075553] page_type: f5(slab)
[   26.075638] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.075761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.075862] page dumped because: kasan: bad access detected
[   26.076656] 
[   26.076789] Memory state around the buggy address:
[   26.076979]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.077264]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.077394] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.077668]                                                                 ^
[   26.078103]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.078365]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.078482] ==================================================================
[   25.977699] ==================================================================
[   25.977954] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   25.978138] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   25.978270] 
[   25.978376] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.978635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.978722] Hardware name: linux,dummy-virt (DT)
[   25.979231] Call trace:
[   25.979424]  show_stack+0x20/0x38 (C)
[   25.979593]  dump_stack_lvl+0x8c/0xd0
[   25.979874]  print_report+0x118/0x608
[   25.980102]  kasan_report+0xdc/0x128
[   25.980657]  kasan_check_range+0x100/0x1a8
[   25.980847]  __kasan_check_write+0x20/0x30
[   25.981063]  copy_user_test_oob+0x234/0xec8
[   25.981219]  kunit_try_run_case+0x170/0x3f0
[   25.981346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.981922]  kthread+0x328/0x630
[   25.982167]  ret_from_fork+0x10/0x20
[   25.982537] 
[   25.982595] Allocated by task 285:
[   25.982667]  kasan_save_stack+0x3c/0x68
[   25.982760]  kasan_save_track+0x20/0x40
[   25.982872]  kasan_save_alloc_info+0x40/0x58
[   25.983266]  __kasan_kmalloc+0xd4/0xd8
[   25.983883]  __kmalloc_noprof+0x190/0x4d0
[   25.984112]  kunit_kmalloc_array+0x34/0x88
[   25.984432]  copy_user_test_oob+0xac/0xec8
[   25.984508]  kunit_try_run_case+0x170/0x3f0
[   25.984557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.984614]  kthread+0x328/0x630
[   25.984686]  ret_from_fork+0x10/0x20
[   25.984817] 
[   25.984885] The buggy address belongs to the object at fff00000c7883300
[   25.984885]  which belongs to the cache kmalloc-128 of size 128
[   25.985037] The buggy address is located 0 bytes inside of
[   25.985037]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   25.985205] 
[   25.985292] The buggy address belongs to the physical page:
[   25.985436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   25.985644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.985778] page_type: f5(slab)
[   25.985885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.986013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.986124] page dumped because: kasan: bad access detected
[   25.986214] 
[   25.986273] Memory state around the buggy address:
[   25.986425]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.986539]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.986701] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.986947]                                                                 ^
[   25.987273]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.987517]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.987610] ==================================================================
[   26.049309] ==================================================================
[   26.050657] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   26.050940] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.051154] 
[   26.051460] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.051861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.052448] Hardware name: linux,dummy-virt (DT)
[   26.052679] Call trace:
[   26.052780]  show_stack+0x20/0x38 (C)
[   26.052995]  dump_stack_lvl+0x8c/0xd0
[   26.053223]  print_report+0x118/0x608
[   26.053461]  kasan_report+0xdc/0x128
[   26.053657]  kasan_check_range+0x100/0x1a8
[   26.054201]  __kasan_check_write+0x20/0x30
[   26.054456]  copy_user_test_oob+0x35c/0xec8
[   26.054802]  kunit_try_run_case+0x170/0x3f0
[   26.055002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.055220]  kthread+0x328/0x630
[   26.055448]  ret_from_fork+0x10/0x20
[   26.055648] 
[   26.055708] Allocated by task 285:
[   26.055898]  kasan_save_stack+0x3c/0x68
[   26.056189]  kasan_save_track+0x20/0x40
[   26.056683]  kasan_save_alloc_info+0x40/0x58
[   26.056893]  __kasan_kmalloc+0xd4/0xd8
[   26.057071]  __kmalloc_noprof+0x190/0x4d0
[   26.057173]  kunit_kmalloc_array+0x34/0x88
[   26.057576]  copy_user_test_oob+0xac/0xec8
[   26.057779]  kunit_try_run_case+0x170/0x3f0
[   26.058291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.058491]  kthread+0x328/0x630
[   26.058578]  ret_from_fork+0x10/0x20
[   26.058662] 
[   26.058707] The buggy address belongs to the object at fff00000c7883300
[   26.058707]  which belongs to the cache kmalloc-128 of size 128
[   26.058872] The buggy address is located 0 bytes inside of
[   26.058872]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.059040] 
[   26.059097] The buggy address belongs to the physical page:
[   26.059192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.059327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.059477] page_type: f5(slab)
[   26.059582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.060335] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.060464] page dumped because: kasan: bad access detected
[   26.060636] 
[   26.060793] Memory state around the buggy address:
[   26.061016]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.061503]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062040] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.062279]                                                                 ^
[   26.062506]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062619]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062705] ==================================================================


[   14.928343] ==================================================================
[   14.929190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   14.929508] Write of size 121 at addr ffff888102f96900 by task kunit_try_catch/302
[   14.929987] 
[   14.930084] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.930278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.930296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.930321] Call Trace:
[   14.930337]  <TASK>
[   14.930354]  dump_stack_lvl+0x73/0xb0
[   14.930382]  print_report+0xd1/0x650
[   14.930406]  ? __virt_addr_valid+0x1db/0x2d0
[   14.930429]  ? copy_user_test_oob+0x557/0x10f0
[   14.930450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.930475]  ? copy_user_test_oob+0x557/0x10f0
[   14.930496]  kasan_report+0x141/0x180
[   14.930520]  ? copy_user_test_oob+0x557/0x10f0
[   14.930552]  kasan_check_range+0x10c/0x1c0
[   14.930577]  __kasan_check_write+0x18/0x20
[   14.930599]  copy_user_test_oob+0x557/0x10f0
[   14.930634]  ? __pfx_copy_user_test_oob+0x10/0x10
[   14.930654]  ? finish_task_switch.isra.0+0x153/0x700
[   14.930678]  ? __switch_to+0x47/0xf50
[   14.930703]  ? __schedule+0x10cc/0x2b60
[   14.930727]  ? __pfx_read_tsc+0x10/0x10
[   14.930749]  ? ktime_get_ts64+0x86/0x230
[   14.930774]  kunit_try_run_case+0x1a5/0x480
[   14.930797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.930818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.930844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.930871]  ? __kthread_parkme+0x82/0x180
[   14.930891]  ? preempt_count_sub+0x50/0x80
[   14.930916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.930939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.930965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.930993]  kthread+0x337/0x6f0
[   14.931014]  ? trace_preempt_on+0x20/0xc0
[   14.931036]  ? __pfx_kthread+0x10/0x10
[   14.931059]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.931082]  ? calculate_sigpending+0x7b/0xa0
[   14.931107]  ? __pfx_kthread+0x10/0x10
[   14.931131]  ret_from_fork+0x116/0x1d0
[   14.931150]  ? __pfx_kthread+0x10/0x10
[   14.931173]  ret_from_fork_asm+0x1a/0x30
[   14.931204]  </TASK>
[   14.931216] 
[   14.940930] Allocated by task 302:
[   14.941176]  kasan_save_stack+0x45/0x70
[   14.941489]  kasan_save_track+0x18/0x40
[   14.941785]  kasan_save_alloc_info+0x3b/0x50
[   14.941989]  __kasan_kmalloc+0xb7/0xc0
[   14.942172]  __kmalloc_noprof+0x1c9/0x500
[   14.942371]  kunit_kmalloc_array+0x25/0x60
[   14.942583]  copy_user_test_oob+0xab/0x10f0
[   14.942766]  kunit_try_run_case+0x1a5/0x480
[   14.943404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.943653]  kthread+0x337/0x6f0
[   14.943822]  ret_from_fork+0x116/0x1d0
[   14.944164]  ret_from_fork_asm+0x1a/0x30
[   14.944435] 
[   14.944529] The buggy address belongs to the object at ffff888102f96900
[   14.944529]  which belongs to the cache kmalloc-128 of size 128
[   14.945214] The buggy address is located 0 bytes inside of
[   14.945214]  allocated 120-byte region [ffff888102f96900, ffff888102f96978)
[   14.945875] 
[   14.946049] The buggy address belongs to the physical page:
[   14.946394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f96
[   14.946829] flags: 0x200000000000000(node=0|zone=2)
[   14.947140] page_type: f5(slab)
[   14.947300] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.947653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.948108] page dumped because: kasan: bad access detected
[   14.948427] 
[   14.948507] Memory state around the buggy address:
[   14.948751]  ffff888102f96800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.949225]  ffff888102f96880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.949547] >ffff888102f96900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.950036]                                                                 ^
[   14.950347]  ffff888102f96980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.950734]  ffff888102f96a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.951161] ==================================================================
[   14.905258] ==================================================================
[   14.905798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   14.906222] Read of size 121 at addr ffff888102f96900 by task kunit_try_catch/302
[   14.906630] 
[   14.906754] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.906871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.906888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.906966] Call Trace:
[   14.906984]  <TASK>
[   14.907000]  dump_stack_lvl+0x73/0xb0
[   14.907029]  print_report+0xd1/0x650
[   14.907053]  ? __virt_addr_valid+0x1db/0x2d0
[   14.907077]  ? copy_user_test_oob+0x4aa/0x10f0
[   14.907099]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.907123]  ? copy_user_test_oob+0x4aa/0x10f0
[   14.907145]  kasan_report+0x141/0x180
[   14.907168]  ? copy_user_test_oob+0x4aa/0x10f0
[   14.907195]  kasan_check_range+0x10c/0x1c0
[   14.907220]  __kasan_check_read+0x15/0x20
[   14.907242]  copy_user_test_oob+0x4aa/0x10f0
[   14.907365]  ? __pfx_copy_user_test_oob+0x10/0x10
[   14.907387]  ? finish_task_switch.isra.0+0x153/0x700
[   14.907412]  ? __switch_to+0x47/0xf50
[   14.907438]  ? __schedule+0x10cc/0x2b60
[   14.907462]  ? __pfx_read_tsc+0x10/0x10
[   14.907484]  ? ktime_get_ts64+0x86/0x230
[   14.907510]  kunit_try_run_case+0x1a5/0x480
[   14.907532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.907553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.907578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.907604]  ? __kthread_parkme+0x82/0x180
[   14.907637]  ? preempt_count_sub+0x50/0x80
[   14.907661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.907683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.907708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.907735]  kthread+0x337/0x6f0
[   14.907755]  ? trace_preempt_on+0x20/0xc0
[   14.907792]  ? __pfx_kthread+0x10/0x10
[   14.907814]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.907837]  ? calculate_sigpending+0x7b/0xa0
[   14.907862]  ? __pfx_kthread+0x10/0x10
[   14.907884]  ret_from_fork+0x116/0x1d0
[   14.907905]  ? __pfx_kthread+0x10/0x10
[   14.907927]  ret_from_fork_asm+0x1a/0x30
[   14.907957]  </TASK>
[   14.907969] 
[   14.917558] Allocated by task 302:
[   14.917885]  kasan_save_stack+0x45/0x70
[   14.918089]  kasan_save_track+0x18/0x40
[   14.918272]  kasan_save_alloc_info+0x3b/0x50
[   14.918482]  __kasan_kmalloc+0xb7/0xc0
[   14.918682]  __kmalloc_noprof+0x1c9/0x500
[   14.919110]  kunit_kmalloc_array+0x25/0x60
[   14.919295]  copy_user_test_oob+0xab/0x10f0
[   14.919507]  kunit_try_run_case+0x1a5/0x480
[   14.919880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.920193]  kthread+0x337/0x6f0
[   14.920413]  ret_from_fork+0x116/0x1d0
[   14.920680]  ret_from_fork_asm+0x1a/0x30
[   14.920849] 
[   14.920958] The buggy address belongs to the object at ffff888102f96900
[   14.920958]  which belongs to the cache kmalloc-128 of size 128
[   14.921679] The buggy address is located 0 bytes inside of
[   14.921679]  allocated 120-byte region [ffff888102f96900, ffff888102f96978)
[   14.922269] 
[   14.922362] The buggy address belongs to the physical page:
[   14.922604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f96
[   14.923158] flags: 0x200000000000000(node=0|zone=2)
[   14.923455] page_type: f5(slab)
[   14.923711] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.924158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.924545] page dumped because: kasan: bad access detected
[   14.924875] 
[   14.924982] Memory state around the buggy address:
[   14.925311]  ffff888102f96800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.925679]  ffff888102f96880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.926044] >ffff888102f96900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.926346]                                                                 ^
[   14.926665]  ffff888102f96980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.927242]  ffff888102f96a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.927629] ==================================================================
[   14.951681] ==================================================================
[   14.952056] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   14.952928] Read of size 121 at addr ffff888102f96900 by task kunit_try_catch/302
[   14.953372] 
[   14.953489] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.953670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.953686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.953709] Call Trace:
[   14.953726]  <TASK>
[   14.953743]  dump_stack_lvl+0x73/0xb0
[   14.953782]  print_report+0xd1/0x650
[   14.953806]  ? __virt_addr_valid+0x1db/0x2d0
[   14.953830]  ? copy_user_test_oob+0x604/0x10f0
[   14.953851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.953875]  ? copy_user_test_oob+0x604/0x10f0
[   14.953897]  kasan_report+0x141/0x180
[   14.953922]  ? copy_user_test_oob+0x604/0x10f0
[   14.953949]  kasan_check_range+0x10c/0x1c0
[   14.953974]  __kasan_check_read+0x15/0x20
[   14.953996]  copy_user_test_oob+0x604/0x10f0
[   14.954019]  ? __pfx_copy_user_test_oob+0x10/0x10
[   14.954040]  ? finish_task_switch.isra.0+0x153/0x700
[   14.954063]  ? __switch_to+0x47/0xf50
[   14.954089]  ? __schedule+0x10cc/0x2b60
[   14.954114]  ? __pfx_read_tsc+0x10/0x10
[   14.954136]  ? ktime_get_ts64+0x86/0x230
[   14.954162]  kunit_try_run_case+0x1a5/0x480
[   14.954184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.954206]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.954231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.954257]  ? __kthread_parkme+0x82/0x180
[   14.954279]  ? preempt_count_sub+0x50/0x80
[   14.954302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.954325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.954351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.954377]  kthread+0x337/0x6f0
[   14.954397]  ? trace_preempt_on+0x20/0xc0
[   14.954421]  ? __pfx_kthread+0x10/0x10
[   14.954443]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.954467]  ? calculate_sigpending+0x7b/0xa0
[   14.954492]  ? __pfx_kthread+0x10/0x10
[   14.954515]  ret_from_fork+0x116/0x1d0
[   14.954540]  ? __pfx_kthread+0x10/0x10
[   14.954563]  ret_from_fork_asm+0x1a/0x30
[   14.954596]  </TASK>
[   14.954630] 
[   14.964736] Allocated by task 302:
[   14.965037]  kasan_save_stack+0x45/0x70
[   14.965238]  kasan_save_track+0x18/0x40
[   14.965428]  kasan_save_alloc_info+0x3b/0x50
[   14.965644]  __kasan_kmalloc+0xb7/0xc0
[   14.965839]  __kmalloc_noprof+0x1c9/0x500
[   14.966330]  kunit_kmalloc_array+0x25/0x60
[   14.966503]  copy_user_test_oob+0xab/0x10f0
[   14.966825]  kunit_try_run_case+0x1a5/0x480
[   14.967161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.967443]  kthread+0x337/0x6f0
[   14.967685]  ret_from_fork+0x116/0x1d0
[   14.967986]  ret_from_fork_asm+0x1a/0x30
[   14.968143] 
[   14.968247] The buggy address belongs to the object at ffff888102f96900
[   14.968247]  which belongs to the cache kmalloc-128 of size 128
[   14.969017] The buggy address is located 0 bytes inside of
[   14.969017]  allocated 120-byte region [ffff888102f96900, ffff888102f96978)
[   14.969583] 
[   14.969696] The buggy address belongs to the physical page:
[   14.970116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f96
[   14.970554] flags: 0x200000000000000(node=0|zone=2)
[   14.970795] page_type: f5(slab)
[   14.971105] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.971441] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.971931] page dumped because: kasan: bad access detected
[   14.972162] 
[   14.972376] Memory state around the buggy address:
[   14.972566]  ffff888102f96800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.973106]  ffff888102f96880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.973488] >ffff888102f96900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.973884]                                                                 ^
[   14.974176]  ffff888102f96980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.974490]  ffff888102f96a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.974809] ==================================================================
[   14.882012] ==================================================================
[   14.882357] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   14.882877] Write of size 121 at addr ffff888102f96900 by task kunit_try_catch/302
[   14.883457] 
[   14.883563] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.883625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.883641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.883664] Call Trace:
[   14.883679]  <TASK>
[   14.883696]  dump_stack_lvl+0x73/0xb0
[   14.883724]  print_report+0xd1/0x650
[   14.883747]  ? __virt_addr_valid+0x1db/0x2d0
[   14.883771]  ? copy_user_test_oob+0x3fd/0x10f0
[   14.883914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.883939]  ? copy_user_test_oob+0x3fd/0x10f0
[   14.883961]  kasan_report+0x141/0x180
[   14.883985]  ? copy_user_test_oob+0x3fd/0x10f0
[   14.884010]  kasan_check_range+0x10c/0x1c0
[   14.884036]  __kasan_check_write+0x18/0x20
[   14.884058]  copy_user_test_oob+0x3fd/0x10f0
[   14.884082]  ? __pfx_copy_user_test_oob+0x10/0x10
[   14.884101]  ? finish_task_switch.isra.0+0x153/0x700
[   14.884125]  ? __switch_to+0x47/0xf50
[   14.884151]  ? __schedule+0x10cc/0x2b60
[   14.884175]  ? __pfx_read_tsc+0x10/0x10
[   14.884196]  ? ktime_get_ts64+0x86/0x230
[   14.884223]  kunit_try_run_case+0x1a5/0x480
[   14.884245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.884266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.884291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.884317]  ? __kthread_parkme+0x82/0x180
[   14.884338]  ? preempt_count_sub+0x50/0x80
[   14.884362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.884384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.884409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.884435]  kthread+0x337/0x6f0
[   14.884456]  ? trace_preempt_on+0x20/0xc0
[   14.884479]  ? __pfx_kthread+0x10/0x10
[   14.884500]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.884524]  ? calculate_sigpending+0x7b/0xa0
[   14.884549]  ? __pfx_kthread+0x10/0x10
[   14.884571]  ret_from_fork+0x116/0x1d0
[   14.884591]  ? __pfx_kthread+0x10/0x10
[   14.884626]  ret_from_fork_asm+0x1a/0x30
[   14.884657]  </TASK>
[   14.884669] 
[   14.894164] Allocated by task 302:
[   14.894359]  kasan_save_stack+0x45/0x70
[   14.894557]  kasan_save_track+0x18/0x40
[   14.894774]  kasan_save_alloc_info+0x3b/0x50
[   14.895279]  __kasan_kmalloc+0xb7/0xc0
[   14.895544]  __kmalloc_noprof+0x1c9/0x500
[   14.895721]  kunit_kmalloc_array+0x25/0x60
[   14.896101]  copy_user_test_oob+0xab/0x10f0
[   14.896272]  kunit_try_run_case+0x1a5/0x480
[   14.896604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896975]  kthread+0x337/0x6f0
[   14.897157]  ret_from_fork+0x116/0x1d0
[   14.897332]  ret_from_fork_asm+0x1a/0x30
[   14.897516] 
[   14.897606] The buggy address belongs to the object at ffff888102f96900
[   14.897606]  which belongs to the cache kmalloc-128 of size 128
[   14.898419] The buggy address is located 0 bytes inside of
[   14.898419]  allocated 120-byte region [ffff888102f96900, ffff888102f96978)
[   14.899116] 
[   14.899346] The buggy address belongs to the physical page:
[   14.899632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f96
[   14.900066] flags: 0x200000000000000(node=0|zone=2)
[   14.900398] page_type: f5(slab)
[   14.900579] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.901058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.901440] page dumped because: kasan: bad access detected
[   14.901692] 
[   14.901777] Memory state around the buggy address:
[   14.902109]  ffff888102f96800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.902421]  ffff888102f96880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.902735] >ffff888102f96900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.903287]                                                                 ^
[   14.903659]  ffff888102f96980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.904114]  ffff888102f96a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.904469] ==================================================================