Hay
Date
June 3, 2025, 7:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.574346] ==================================================================
[   21.574734] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.574891] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.574977] 
[   21.575013] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.575180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.575209] Hardware name: linux,dummy-virt (DT)
[   21.575250] Call trace:
[   21.575442]  show_stack+0x20/0x38 (C)
[   21.575762]  dump_stack_lvl+0x8c/0xd0
[   21.575885]  print_report+0x118/0x608
[   21.576005]  kasan_report+0xdc/0x128
[   21.576054]  kasan_check_range+0x100/0x1a8
[   21.576119]  __kasan_check_write+0x20/0x30
[   21.576168]  copy_user_test_oob+0x35c/0xec8
[   21.576217]  kunit_try_run_case+0x170/0x3f0
[   21.576576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.576730]  kthread+0x328/0x630
[   21.576840]  ret_from_fork+0x10/0x20
[   21.577295] 
[   21.577414] Allocated by task 285:
[   21.577561]  kasan_save_stack+0x3c/0x68
[   21.577717]  kasan_save_track+0x20/0x40
[   21.577763]  kasan_save_alloc_info+0x40/0x58
[   21.577836]  __kasan_kmalloc+0xd4/0xd8
[   21.578103]  __kmalloc_noprof+0x198/0x4c8
[   21.578356]  kunit_kmalloc_array+0x34/0x88
[   21.578435]  copy_user_test_oob+0xac/0xec8
[   21.578488]  kunit_try_run_case+0x170/0x3f0
[   21.578527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.578573]  kthread+0x328/0x630
[   21.578607]  ret_from_fork+0x10/0x20
[   21.578656] 
[   21.578688] The buggy address belongs to the object at fff00000c58a9600
[   21.578688]  which belongs to the cache kmalloc-128 of size 128
[   21.578763] The buggy address is located 0 bytes inside of
[   21.578763]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.578850] 
[   21.578892] The buggy address belongs to the physical page:
[   21.578942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.579005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.579067] page_type: f5(slab)
[   21.579110] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.579163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.579206] page dumped because: kasan: bad access detected
[   21.579239] 
[   21.579280] Memory state around the buggy address:
[   21.579330]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.579688]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.579850] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.579898]                                                                 ^
[   21.579943]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.579988]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.580259] ==================================================================
[   21.533992] ==================================================================
[   21.534170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.534267] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.534323] 
[   21.534382] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.535577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.535669] Hardware name: linux,dummy-virt (DT)
[   21.535740] Call trace:
[   21.535865]  show_stack+0x20/0x38 (C)
[   21.535951]  dump_stack_lvl+0x8c/0xd0
[   21.536397]  print_report+0x118/0x608
[   21.536617]  kasan_report+0xdc/0x128
[   21.536762]  kasan_check_range+0x100/0x1a8
[   21.536858]  __kasan_check_write+0x20/0x30
[   21.537009]  copy_user_test_oob+0x234/0xec8
[   21.537079]  kunit_try_run_case+0x170/0x3f0
[   21.537746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.537819]  kthread+0x328/0x630
[   21.538558]  ret_from_fork+0x10/0x20
[   21.538619] 
[   21.538886] Allocated by task 285:
[   21.539096]  kasan_save_stack+0x3c/0x68
[   21.539186]  kasan_save_track+0x20/0x40
[   21.539329]  kasan_save_alloc_info+0x40/0x58
[   21.539431]  __kasan_kmalloc+0xd4/0xd8
[   21.539575]  __kmalloc_noprof+0x198/0x4c8
[   21.539623]  kunit_kmalloc_array+0x34/0x88
[   21.539662]  copy_user_test_oob+0xac/0xec8
[   21.539937]  kunit_try_run_case+0x170/0x3f0
[   21.540056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.540165]  kthread+0x328/0x630
[   21.540243]  ret_from_fork+0x10/0x20
[   21.540376] 
[   21.540456] The buggy address belongs to the object at fff00000c58a9600
[   21.540456]  which belongs to the cache kmalloc-128 of size 128
[   21.540861] The buggy address is located 0 bytes inside of
[   21.540861]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.541017] 
[   21.541074] The buggy address belongs to the physical page:
[   21.541206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.541345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.541511] page_type: f5(slab)
[   21.541573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.542018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.542113] page dumped because: kasan: bad access detected
[   21.542178] 
[   21.542388] Memory state around the buggy address:
[   21.542601]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.542739]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.542883] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.542974]                                                                 ^
[   21.543350]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.543525]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.543591] ==================================================================
[   21.592707] ==================================================================
[   21.592807] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.592880] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.592935] 
[   21.593145] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.593340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.593380] Hardware name: linux,dummy-virt (DT)
[   21.593414] Call trace:
[   21.593449]  show_stack+0x20/0x38 (C)
[   21.594058]  dump_stack_lvl+0x8c/0xd0
[   21.594156]  print_report+0x118/0x608
[   21.594393]  kasan_report+0xdc/0x128
[   21.594496]  kasan_check_range+0x100/0x1a8
[   21.594558]  __kasan_check_write+0x20/0x30
[   21.594674]  copy_user_test_oob+0x434/0xec8
[   21.594748]  kunit_try_run_case+0x170/0x3f0
[   21.595064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.595275]  kthread+0x328/0x630
[   21.595328]  ret_from_fork+0x10/0x20
[   21.595677] 
[   21.595745] Allocated by task 285:
[   21.595861]  kasan_save_stack+0x3c/0x68
[   21.595951]  kasan_save_track+0x20/0x40
[   21.596199]  kasan_save_alloc_info+0x40/0x58
[   21.596256]  __kasan_kmalloc+0xd4/0xd8
[   21.596597]  __kmalloc_noprof+0x198/0x4c8
[   21.597022]  kunit_kmalloc_array+0x34/0x88
[   21.597149]  copy_user_test_oob+0xac/0xec8
[   21.597247]  kunit_try_run_case+0x170/0x3f0
[   21.597404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.597500]  kthread+0x328/0x630
[   21.597810]  ret_from_fork+0x10/0x20
[   21.597961] 
[   21.597984] The buggy address belongs to the object at fff00000c58a9600
[   21.597984]  which belongs to the cache kmalloc-128 of size 128
[   21.598106] The buggy address is located 0 bytes inside of
[   21.598106]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.598177] 
[   21.598225] The buggy address belongs to the physical page:
[   21.598272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.598332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.598403] page_type: f5(slab)
[   21.598476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.598529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.598581] page dumped because: kasan: bad access detected
[   21.598616] 
[   21.598638] Memory state around the buggy address:
[   21.598672]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.598717]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598769] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.598818]                                                                 ^
[   21.598865]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598915]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598961] ==================================================================
[   21.554901] ==================================================================
[   21.554990] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.555055] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.555109] 
[   21.556967] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.557311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.557344] Hardware name: linux,dummy-virt (DT)
[   21.558133] Call trace:
[   21.558242]  show_stack+0x20/0x38 (C)
[   21.558632]  dump_stack_lvl+0x8c/0xd0
[   21.558795]  print_report+0x118/0x608
[   21.559186]  kasan_report+0xdc/0x128
[   21.559340]  kasan_check_range+0x100/0x1a8
[   21.559698]  __kasan_check_read+0x20/0x30
[   21.559841]  copy_user_test_oob+0x728/0xec8
[   21.559931]  kunit_try_run_case+0x170/0x3f0
[   21.560250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.560389]  kthread+0x328/0x630
[   21.560497]  ret_from_fork+0x10/0x20
[   21.560624] 
[   21.560645] Allocated by task 285:
[   21.560712]  kasan_save_stack+0x3c/0x68
[   21.561029]  kasan_save_track+0x20/0x40
[   21.561170]  kasan_save_alloc_info+0x40/0x58
[   21.561215]  __kasan_kmalloc+0xd4/0xd8
[   21.561534]  __kmalloc_noprof+0x198/0x4c8
[   21.561623]  kunit_kmalloc_array+0x34/0x88
[   21.561681]  copy_user_test_oob+0xac/0xec8
[   21.561720]  kunit_try_run_case+0x170/0x3f0
[   21.561761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.561828]  kthread+0x328/0x630
[   21.561869]  ret_from_fork+0x10/0x20
[   21.561913] 
[   21.561937] The buggy address belongs to the object at fff00000c58a9600
[   21.561937]  which belongs to the cache kmalloc-128 of size 128
[   21.562017] The buggy address is located 0 bytes inside of
[   21.562017]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.562081] 
[   21.562104] The buggy address belongs to the physical page:
[   21.562150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.562206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.562261] page_type: f5(slab)
[   21.562306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.562359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.562401] page dumped because: kasan: bad access detected
[   21.562461] 
[   21.562490] Memory state around the buggy address:
[   21.562527]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.562572]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.562626] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.562695]                                                                 ^
[   21.562761]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.562813]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.562855] ==================================================================
[   21.599198] ==================================================================
[   21.599243] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.599313] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.599365] 
[   21.600012] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.600295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.600386] Hardware name: linux,dummy-virt (DT)
[   21.600917] Call trace:
[   21.601023]  show_stack+0x20/0x38 (C)
[   21.601296]  dump_stack_lvl+0x8c/0xd0
[   21.601716]  print_report+0x118/0x608
[   21.601910]  kasan_report+0xdc/0x128
[   21.602080]  kasan_check_range+0x100/0x1a8
[   21.602136]  __kasan_check_read+0x20/0x30
[   21.602183]  copy_user_test_oob+0x4a0/0xec8
[   21.602407]  kunit_try_run_case+0x170/0x3f0
[   21.602654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.603040]  kthread+0x328/0x630
[   21.603213]  ret_from_fork+0x10/0x20
[   21.603499] 
[   21.603539] Allocated by task 285:
[   21.603573]  kasan_save_stack+0x3c/0x68
[   21.603750]  kasan_save_track+0x20/0x40
[   21.603940]  kasan_save_alloc_info+0x40/0x58
[   21.604041]  __kasan_kmalloc+0xd4/0xd8
[   21.604235]  __kmalloc_noprof+0x198/0x4c8
[   21.604522]  kunit_kmalloc_array+0x34/0x88
[   21.604673]  copy_user_test_oob+0xac/0xec8
[   21.604774]  kunit_try_run_case+0x170/0x3f0
[   21.604827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.605063]  kthread+0x328/0x630
[   21.605660]  ret_from_fork+0x10/0x20
[   21.605799] 
[   21.605879] The buggy address belongs to the object at fff00000c58a9600
[   21.605879]  which belongs to the cache kmalloc-128 of size 128
[   21.606054] The buggy address is located 0 bytes inside of
[   21.606054]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.606138] 
[   21.606169] The buggy address belongs to the physical page:
[   21.606343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.606495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.606860] page_type: f5(slab)
[   21.607017] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.607492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.607777] page dumped because: kasan: bad access detected
[   21.608034] 
[   21.608214] Memory state around the buggy address:
[   21.608464]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.608702]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.608952] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.609065]                                                                 ^
[   21.609503]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.609603]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.609647] ==================================================================
[   21.581806] ==================================================================
[   21.582290] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.582626] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.582715] 
[   21.582749] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.582835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.583107] Hardware name: linux,dummy-virt (DT)
[   21.583157] Call trace:
[   21.583448]  show_stack+0x20/0x38 (C)
[   21.583729]  dump_stack_lvl+0x8c/0xd0
[   21.583868]  print_report+0x118/0x608
[   21.583979]  kasan_report+0xdc/0x128
[   21.584029]  kasan_check_range+0x100/0x1a8
[   21.584080]  __kasan_check_read+0x20/0x30
[   21.584127]  copy_user_test_oob+0x3c8/0xec8
[   21.584757]  kunit_try_run_case+0x170/0x3f0
[   21.584950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.585124]  kthread+0x328/0x630
[   21.585320]  ret_from_fork+0x10/0x20
[   21.585401] 
[   21.585717] Allocated by task 285:
[   21.585837]  kasan_save_stack+0x3c/0x68
[   21.586125]  kasan_save_track+0x20/0x40
[   21.586621]  kasan_save_alloc_info+0x40/0x58
[   21.586790]  __kasan_kmalloc+0xd4/0xd8
[   21.587330]  __kmalloc_noprof+0x198/0x4c8
[   21.587415]  kunit_kmalloc_array+0x34/0x88
[   21.587580]  copy_user_test_oob+0xac/0xec8
[   21.587660]  kunit_try_run_case+0x170/0x3f0
[   21.587702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.587749]  kthread+0x328/0x630
[   21.587783]  ret_from_fork+0x10/0x20
[   21.587822] 
[   21.587844] The buggy address belongs to the object at fff00000c58a9600
[   21.587844]  which belongs to the cache kmalloc-128 of size 128
[   21.588617] The buggy address is located 0 bytes inside of
[   21.588617]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.588805] 
[   21.588927] The buggy address belongs to the physical page:
[   21.589205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.589269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.589539] page_type: f5(slab)
[   21.589601] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.589967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.590284] page dumped because: kasan: bad access detected
[   21.590516] 
[   21.590647] Memory state around the buggy address:
[   21.590845]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.590907]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.590952] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.590993]                                                                 ^
[   21.591059]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.591103]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.591146] ==================================================================


[   19.896782] ==================================================================
[   19.897205] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   19.897388] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.897564] 
[   19.897817] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.897885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.897903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.897929] Call Trace:
[   19.897952]  <TASK>
[   19.897972]  dump_stack_lvl+0x73/0xb0
[   19.898003]  print_report+0xd1/0x650
[   19.898031]  ? __virt_addr_valid+0x1db/0x2d0
[   19.898059]  ? copy_user_test_oob+0x604/0x10f0
[   19.898084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.898109]  ? copy_user_test_oob+0x604/0x10f0
[   19.898135]  kasan_report+0x141/0x180
[   19.898159]  ? copy_user_test_oob+0x604/0x10f0
[   19.898190]  kasan_check_range+0x10c/0x1c0
[   19.898230]  __kasan_check_read+0x15/0x20
[   19.898256]  copy_user_test_oob+0x604/0x10f0
[   19.898286]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.898311]  ? finish_task_switch.isra.0+0x153/0x700
[   19.898337]  ? __switch_to+0x47/0xf50
[   19.898366]  ? __schedule+0x10cc/0x2b60
[   19.898392]  ? __pfx_read_tsc+0x10/0x10
[   19.898415]  ? ktime_get_ts64+0x86/0x230
[   19.898443]  kunit_try_run_case+0x1a5/0x480
[   19.898480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.898506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.898531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.898557]  ? __kthread_parkme+0x82/0x180
[   19.898579]  ? preempt_count_sub+0x50/0x80
[   19.898603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.898625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.898650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.898676]  kthread+0x337/0x6f0
[   19.898696]  ? trace_preempt_on+0x20/0xc0
[   19.898720]  ? __pfx_kthread+0x10/0x10
[   19.898741]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.898764]  ? calculate_sigpending+0x7b/0xa0
[   19.898789]  ? __pfx_kthread+0x10/0x10
[   19.898812]  ret_from_fork+0x116/0x1d0
[   19.898831]  ? __pfx_kthread+0x10/0x10
[   19.898852]  ret_from_fork_asm+0x1a/0x30
[   19.898885]  </TASK>
[   19.898899] 
[   19.908156] Allocated by task 302:
[   19.908547]  kasan_save_stack+0x45/0x70
[   19.908893]  kasan_save_track+0x18/0x40
[   19.909193]  kasan_save_alloc_info+0x3b/0x50
[   19.909733]  __kasan_kmalloc+0xb7/0xc0
[   19.909949]  __kmalloc_noprof+0x1c9/0x500
[   19.910156]  kunit_kmalloc_array+0x25/0x60
[   19.910728]  copy_user_test_oob+0xab/0x10f0
[   19.911148]  kunit_try_run_case+0x1a5/0x480
[   19.911271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.911842]  kthread+0x337/0x6f0
[   19.912179]  ret_from_fork+0x116/0x1d0
[   19.912299]  ret_from_fork_asm+0x1a/0x30
[   19.912420] 
[   19.912853] The buggy address belongs to the object at ffff888103341c00
[   19.912853]  which belongs to the cache kmalloc-128 of size 128
[   19.913694] The buggy address is located 0 bytes inside of
[   19.913694]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.914211] 
[   19.914286] The buggy address belongs to the physical page:
[   19.914844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.915225] flags: 0x200000000000000(node=0|zone=2)
[   19.915479] page_type: f5(slab)
[   19.915695] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.916026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.916984] page dumped because: kasan: bad access detected
[   19.917651] 
[   19.917771] Memory state around the buggy address:
[   19.917904]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.918207]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.918615] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.918773]                                                                 ^
[   19.919260]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.919529]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.920053] ==================================================================
[   19.877627] ==================================================================
[   19.878378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   19.878688] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.878995] 
[   19.879085] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.879140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.879167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.879194] Call Trace:
[   19.879248]  <TASK>
[   19.879273]  dump_stack_lvl+0x73/0xb0
[   19.879305]  print_report+0xd1/0x650
[   19.879345]  ? __virt_addr_valid+0x1db/0x2d0
[   19.879381]  ? copy_user_test_oob+0x557/0x10f0
[   19.879421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.879451]  ? copy_user_test_oob+0x557/0x10f0
[   19.879491]  kasan_report+0x141/0x180
[   19.879531]  ? copy_user_test_oob+0x557/0x10f0
[   19.879564]  kasan_check_range+0x10c/0x1c0
[   19.879603]  __kasan_check_write+0x18/0x20
[   19.879628]  copy_user_test_oob+0x557/0x10f0
[   19.879666]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.879696]  ? finish_task_switch.isra.0+0x153/0x700
[   19.879724]  ? __switch_to+0x47/0xf50
[   19.879766]  ? __schedule+0x10cc/0x2b60
[   19.879794]  ? __pfx_read_tsc+0x10/0x10
[   19.879830]  ? ktime_get_ts64+0x86/0x230
[   19.879859]  kunit_try_run_case+0x1a5/0x480
[   19.879899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.879924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.879951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.879991]  ? __kthread_parkme+0x82/0x180
[   19.880015]  ? preempt_count_sub+0x50/0x80
[   19.880053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.880079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.880107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.880134]  kthread+0x337/0x6f0
[   19.880157]  ? trace_preempt_on+0x20/0xc0
[   19.880184]  ? __pfx_kthread+0x10/0x10
[   19.880207]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.880232]  ? calculate_sigpending+0x7b/0xa0
[   19.880260]  ? __pfx_kthread+0x10/0x10
[   19.880285]  ret_from_fork+0x116/0x1d0
[   19.880307]  ? __pfx_kthread+0x10/0x10
[   19.880330]  ret_from_fork_asm+0x1a/0x30
[   19.880364]  </TASK>
[   19.880380] 
[   19.887537] Allocated by task 302:
[   19.887814]  kasan_save_stack+0x45/0x70
[   19.888030]  kasan_save_track+0x18/0x40
[   19.888142]  kasan_save_alloc_info+0x3b/0x50
[   19.888256]  __kasan_kmalloc+0xb7/0xc0
[   19.888358]  __kmalloc_noprof+0x1c9/0x500
[   19.888477]  kunit_kmalloc_array+0x25/0x60
[   19.888851]  copy_user_test_oob+0xab/0x10f0
[   19.889188]  kunit_try_run_case+0x1a5/0x480
[   19.889563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.889968]  kthread+0x337/0x6f0
[   19.890080]  ret_from_fork+0x116/0x1d0
[   19.890318]  ret_from_fork_asm+0x1a/0x30
[   19.890568] 
[   19.890697] The buggy address belongs to the object at ffff888103341c00
[   19.890697]  which belongs to the cache kmalloc-128 of size 128
[   19.891152] The buggy address is located 0 bytes inside of
[   19.891152]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.891684] 
[   19.891751] The buggy address belongs to the physical page:
[   19.891883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.892059] flags: 0x200000000000000(node=0|zone=2)
[   19.892541] page_type: f5(slab)
[   19.892795] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.893275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.893608] page dumped because: kasan: bad access detected
[   19.893727] 
[   19.893786] Memory state around the buggy address:
[   19.894136]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.894609]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894761] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.894901]                                                                 ^
[   19.895040]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.895184]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.895826] ==================================================================
[   19.858238] ==================================================================
[   19.858613] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   19.859065] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.859514] 
[   19.859645] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.859700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.859737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.859767] Call Trace:
[   19.859789]  <TASK>
[   19.859819]  dump_stack_lvl+0x73/0xb0
[   19.859854]  print_report+0xd1/0x650
[   19.859880]  ? __virt_addr_valid+0x1db/0x2d0
[   19.859908]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.859934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.859960]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.859986]  kasan_report+0x141/0x180
[   19.860012]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.860042]  kasan_check_range+0x10c/0x1c0
[   19.860068]  __kasan_check_read+0x15/0x20
[   19.860091]  copy_user_test_oob+0x4aa/0x10f0
[   19.860118]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.860158]  ? finish_task_switch.isra.0+0x153/0x700
[   19.860185]  ? __switch_to+0x47/0xf50
[   19.860228]  ? __schedule+0x10cc/0x2b60
[   19.860256]  ? __pfx_read_tsc+0x10/0x10
[   19.860280]  ? ktime_get_ts64+0x86/0x230
[   19.860310]  kunit_try_run_case+0x1a5/0x480
[   19.860335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.860357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.860397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.860426]  ? __kthread_parkme+0x82/0x180
[   19.860451]  ? preempt_count_sub+0x50/0x80
[   19.860495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.860519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.860547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.860575]  kthread+0x337/0x6f0
[   19.860597]  ? trace_preempt_on+0x20/0xc0
[   19.860625]  ? __pfx_kthread+0x10/0x10
[   19.860649]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.860673]  ? calculate_sigpending+0x7b/0xa0
[   19.860713]  ? __pfx_kthread+0x10/0x10
[   19.860740]  ret_from_fork+0x116/0x1d0
[   19.860763]  ? __pfx_kthread+0x10/0x10
[   19.860801]  ret_from_fork_asm+0x1a/0x30
[   19.860836]  </TASK>
[   19.860861] 
[   19.868423] Allocated by task 302:
[   19.868614]  kasan_save_stack+0x45/0x70
[   19.868735]  kasan_save_track+0x18/0x40
[   19.868843]  kasan_save_alloc_info+0x3b/0x50
[   19.868959]  __kasan_kmalloc+0xb7/0xc0
[   19.869062]  __kmalloc_noprof+0x1c9/0x500
[   19.869171]  kunit_kmalloc_array+0x25/0x60
[   19.869277]  copy_user_test_oob+0xab/0x10f0
[   19.869389]  kunit_try_run_case+0x1a5/0x480
[   19.869508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.869640]  kthread+0x337/0x6f0
[   19.869892]  ret_from_fork+0x116/0x1d0
[   19.870180]  ret_from_fork_asm+0x1a/0x30
[   19.870576] 
[   19.870733] The buggy address belongs to the object at ffff888103341c00
[   19.870733]  which belongs to the cache kmalloc-128 of size 128
[   19.871796] The buggy address is located 0 bytes inside of
[   19.871796]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.872148] 
[   19.872238] The buggy address belongs to the physical page:
[   19.872660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.872921] flags: 0x200000000000000(node=0|zone=2)
[   19.873053] page_type: f5(slab)
[   19.873346] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.873814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.874171] page dumped because: kasan: bad access detected
[   19.874439] 
[   19.874591] Memory state around the buggy address:
[   19.874815]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.875136]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.875481] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.875818]                                                                 ^
[   19.876123]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.876746]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.876967] ==================================================================
[   19.839187] ==================================================================
[   19.839620] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   19.839910] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.840190] 
[   19.840391] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.840470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.840489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.840517] Call Trace:
[   19.840555]  <TASK>
[   19.840584]  dump_stack_lvl+0x73/0xb0
[   19.840629]  print_report+0xd1/0x650
[   19.840662]  ? __virt_addr_valid+0x1db/0x2d0
[   19.840701]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.840733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.840760]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.840789]  kasan_report+0x141/0x180
[   19.840814]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.840846]  kasan_check_range+0x10c/0x1c0
[   19.840873]  __kasan_check_write+0x18/0x20
[   19.840894]  copy_user_test_oob+0x3fd/0x10f0
[   19.840923]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.840959]  ? finish_task_switch.isra.0+0x153/0x700
[   19.840988]  ? __switch_to+0x47/0xf50
[   19.841027]  ? __schedule+0x10cc/0x2b60
[   19.841058]  ? __pfx_read_tsc+0x10/0x10
[   19.841083]  ? ktime_get_ts64+0x86/0x230
[   19.841123]  kunit_try_run_case+0x1a5/0x480
[   19.841151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.841175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.841244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.841273]  ? __kthread_parkme+0x82/0x180
[   19.841298]  ? preempt_count_sub+0x50/0x80
[   19.841324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.841348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.841376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.841401]  kthread+0x337/0x6f0
[   19.841424]  ? trace_preempt_on+0x20/0xc0
[   19.841451]  ? __pfx_kthread+0x10/0x10
[   19.841495]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.841520]  ? calculate_sigpending+0x7b/0xa0
[   19.841547]  ? __pfx_kthread+0x10/0x10
[   19.841571]  ret_from_fork+0x116/0x1d0
[   19.841593]  ? __pfx_kthread+0x10/0x10
[   19.841616]  ret_from_fork_asm+0x1a/0x30
[   19.841651]  </TASK>
[   19.841667] 
[   19.848216] Allocated by task 302:
[   19.848322]  kasan_save_stack+0x45/0x70
[   19.848663]  kasan_save_track+0x18/0x40
[   19.848980]  kasan_save_alloc_info+0x3b/0x50
[   19.849387]  __kasan_kmalloc+0xb7/0xc0
[   19.849749]  __kmalloc_noprof+0x1c9/0x500
[   19.850020]  kunit_kmalloc_array+0x25/0x60
[   19.850196]  copy_user_test_oob+0xab/0x10f0
[   19.850497]  kunit_try_run_case+0x1a5/0x480
[   19.850617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.850756]  kthread+0x337/0x6f0
[   19.851028]  ret_from_fork+0x116/0x1d0
[   19.851439]  ret_from_fork_asm+0x1a/0x30
[   19.851796] 
[   19.851889] The buggy address belongs to the object at ffff888103341c00
[   19.851889]  which belongs to the cache kmalloc-128 of size 128
[   19.852225] The buggy address is located 0 bytes inside of
[   19.852225]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.852919] 
[   19.853093] The buggy address belongs to the physical page:
[   19.853386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.853665] flags: 0x200000000000000(node=0|zone=2)
[   19.853802] page_type: f5(slab)
[   19.853908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.854079] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.854326] page dumped because: kasan: bad access detected
[   19.854763] 
[   19.854918] Memory state around the buggy address:
[   19.855328]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.855778]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855936] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.856243]                                                                 ^
[   19.856775]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.857084]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.857478] ==================================================================