Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.131520] ==================================================================
[   23.131811] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   23.131942] Read of size 121 at addr fff00000c56e5100 by task kunit_try_catch/286
[   23.132146] 
[   23.132227] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.132429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.132496] Hardware name: linux,dummy-virt (DT)
[   23.132573] Call trace:
[   23.132627]  show_stack+0x20/0x38 (C)
[   23.132739]  dump_stack_lvl+0x8c/0xd0
[   23.132857]  print_report+0x118/0x608
[   23.132964]  kasan_report+0xdc/0x128
[   23.133072]  kasan_check_range+0x100/0x1a8
[   23.133182]  __kasan_check_read+0x20/0x30
[   23.133288]  copy_user_test_oob+0x3c8/0xec8
[   23.133413]  kunit_try_run_case+0x170/0x3f0
[   23.133530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.133651]  kthread+0x328/0x630
[   23.133754]  ret_from_fork+0x10/0x20
[   23.133860] 
[   23.133909] Allocated by task 286:
[   23.133979]  kasan_save_stack+0x3c/0x68
[   23.135120]  kasan_save_track+0x20/0x40
[   23.135323]  kasan_save_alloc_info+0x40/0x58
[   23.135519]  __kasan_kmalloc+0xd4/0xd8
[   23.135837]  __kmalloc_noprof+0x198/0x4c8
[   23.135923]  kunit_kmalloc_array+0x34/0x88
[   23.136001]  copy_user_test_oob+0xac/0xec8
[   23.136085]  kunit_try_run_case+0x170/0x3f0
[   23.136179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.136411]  kthread+0x328/0x630
[   23.136674]  ret_from_fork+0x10/0x20
[   23.136811] 
[   23.136862] The buggy address belongs to the object at fff00000c56e5100
[   23.136862]  which belongs to the cache kmalloc-128 of size 128
[   23.136993] The buggy address is located 0 bytes inside of
[   23.136993]  allocated 120-byte region [fff00000c56e5100, fff00000c56e5178)
[   23.137139] 
[   23.137189] The buggy address belongs to the physical page:
[   23.137263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   23.137389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.137493] page_type: f5(slab)
[   23.137582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.137700] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.137799] page dumped because: kasan: bad access detected
[   23.137909] 
[   23.137959] Memory state around the buggy address:
[   23.138519]  fff00000c56e5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.139089]  fff00000c56e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.139206] >fff00000c56e5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.139286]                                                                 ^
[   23.139397]  fff00000c56e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.139493]  fff00000c56e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.139585] ==================================================================
[   23.121427] ==================================================================
[   23.121549] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   23.121671] Write of size 121 at addr fff00000c56e5100 by task kunit_try_catch/286
[   23.121789] 
[   23.121859] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.122048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.122103] Hardware name: linux,dummy-virt (DT)
[   23.122168] Call trace:
[   23.122598]  show_stack+0x20/0x38 (C)
[   23.122886]  dump_stack_lvl+0x8c/0xd0
[   23.123029]  print_report+0x118/0x608
[   23.123127]  kasan_report+0xdc/0x128
[   23.123377]  kasan_check_range+0x100/0x1a8
[   23.123475]  __kasan_check_write+0x20/0x30
[   23.123569]  copy_user_test_oob+0x35c/0xec8
[   23.123843]  kunit_try_run_case+0x170/0x3f0
[   23.124002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.124163]  kthread+0x328/0x630
[   23.124711]  ret_from_fork+0x10/0x20
[   23.124902] 
[   23.124982] Allocated by task 286:
[   23.125050]  kasan_save_stack+0x3c/0x68
[   23.125147]  kasan_save_track+0x20/0x40
[   23.125222]  kasan_save_alloc_info+0x40/0x58
[   23.125315]  __kasan_kmalloc+0xd4/0xd8
[   23.125423]  __kmalloc_noprof+0x198/0x4c8
[   23.125512]  kunit_kmalloc_array+0x34/0x88
[   23.125601]  copy_user_test_oob+0xac/0xec8
[   23.125687]  kunit_try_run_case+0x170/0x3f0
[   23.125776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.125876]  kthread+0x328/0x630
[   23.125957]  ret_from_fork+0x10/0x20
[   23.126402] 
[   23.126618] The buggy address belongs to the object at fff00000c56e5100
[   23.126618]  which belongs to the cache kmalloc-128 of size 128
[   23.127183] The buggy address is located 0 bytes inside of
[   23.127183]  allocated 120-byte region [fff00000c56e5100, fff00000c56e5178)
[   23.127768] 
[   23.127810] The buggy address belongs to the physical page:
[   23.127852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   23.127946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.128000] page_type: f5(slab)
[   23.128041] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.128094] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.128136] page dumped because: kasan: bad access detected
[   23.128171] 
[   23.128192] Memory state around the buggy address:
[   23.128228]  fff00000c56e5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.128272]  fff00000c56e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.128317] >fff00000c56e5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.128376]                                                                 ^
[   23.128467]  fff00000c56e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.128567]  fff00000c56e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.128806] ==================================================================
[   23.082513] ==================================================================
[   23.082748] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   23.082885] Write of size 121 at addr fff00000c56e5100 by task kunit_try_catch/286
[   23.082998] 
[   23.083106] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.083343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.083451] Hardware name: linux,dummy-virt (DT)
[   23.083559] Call trace:
[   23.083639]  show_stack+0x20/0x38 (C)
[   23.083802]  dump_stack_lvl+0x8c/0xd0
[   23.083960]  print_report+0x118/0x608
[   23.084090]  kasan_report+0xdc/0x128
[   23.084204]  kasan_check_range+0x100/0x1a8
[   23.084371]  __kasan_check_write+0x20/0x30
[   23.084465]  copy_user_test_oob+0x234/0xec8
[   23.084564]  kunit_try_run_case+0x170/0x3f0
[   23.085068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.085447]  kthread+0x328/0x630
[   23.085617]  ret_from_fork+0x10/0x20
[   23.085732] 
[   23.085778] Allocated by task 286:
[   23.085845]  kasan_save_stack+0x3c/0x68
[   23.085932]  kasan_save_track+0x20/0x40
[   23.086067]  kasan_save_alloc_info+0x40/0x58
[   23.086296]  __kasan_kmalloc+0xd4/0xd8
[   23.086649]  __kmalloc_noprof+0x198/0x4c8
[   23.086775]  kunit_kmalloc_array+0x34/0x88
[   23.086888]  copy_user_test_oob+0xac/0xec8
[   23.086993]  kunit_try_run_case+0x170/0x3f0
[   23.087105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.087219]  kthread+0x328/0x630
[   23.087327]  ret_from_fork+0x10/0x20
[   23.087438] 
[   23.087500] The buggy address belongs to the object at fff00000c56e5100
[   23.087500]  which belongs to the cache kmalloc-128 of size 128
[   23.087932] The buggy address is located 0 bytes inside of
[   23.087932]  allocated 120-byte region [fff00000c56e5100, fff00000c56e5178)
[   23.088078] 
[   23.088132] The buggy address belongs to the physical page:
[   23.088254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   23.088393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.088511] page_type: f5(slab)
[   23.088606] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.088721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.088819] page dumped because: kasan: bad access detected
[   23.088897] 
[   23.088940] Memory state around the buggy address:
[   23.089016]  fff00000c56e5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.089122]  fff00000c56e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.089224] >fff00000c56e5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.089315]                                                                 ^
[   23.089425]  fff00000c56e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.089611]  fff00000c56e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.089909] ==================================================================
[   23.100287] ==================================================================
[   23.100428] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   23.100551] Read of size 121 at addr fff00000c56e5100 by task kunit_try_catch/286
[   23.100671] 
[   23.100743] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.100936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.101001] Hardware name: linux,dummy-virt (DT)
[   23.101073] Call trace:
[   23.101125]  show_stack+0x20/0x38 (C)
[   23.101235]  dump_stack_lvl+0x8c/0xd0
[   23.101344]  print_report+0x118/0x608
[   23.101453]  kasan_report+0xdc/0x128
[   23.101562]  kasan_check_range+0x100/0x1a8
[   23.101676]  __kasan_check_read+0x20/0x30
[   23.101781]  copy_user_test_oob+0x728/0xec8
[   23.101886]  kunit_try_run_case+0x170/0x3f0
[   23.102336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.102730]  kthread+0x328/0x630
[   23.102901]  ret_from_fork+0x10/0x20
[   23.103057] 
[   23.103116] Allocated by task 286:
[   23.103410]  kasan_save_stack+0x3c/0x68
[   23.103611]  kasan_save_track+0x20/0x40
[   23.103695]  kasan_save_alloc_info+0x40/0x58
[   23.103783]  __kasan_kmalloc+0xd4/0xd8
[   23.103889]  __kmalloc_noprof+0x198/0x4c8
[   23.104020]  kunit_kmalloc_array+0x34/0x88
[   23.104127]  copy_user_test_oob+0xac/0xec8
[   23.104219]  kunit_try_run_case+0x170/0x3f0
[   23.104303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.104421]  kthread+0x328/0x630
[   23.104502]  ret_from_fork+0x10/0x20
[   23.104588] 
[   23.104646] The buggy address belongs to the object at fff00000c56e5100
[   23.104646]  which belongs to the cache kmalloc-128 of size 128
[   23.104766] The buggy address is located 0 bytes inside of
[   23.104766]  allocated 120-byte region [fff00000c56e5100, fff00000c56e5178)
[   23.105298] 
[   23.105501] The buggy address belongs to the physical page:
[   23.105582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   23.105707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.105813] page_type: f5(slab)
[   23.105904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.106060] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.106453] page dumped because: kasan: bad access detected
[   23.106567] 
[   23.106736] Memory state around the buggy address:
[   23.106816]  fff00000c56e5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.107018]  fff00000c56e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.107153] >fff00000c56e5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.107293]                                                                 ^
[   23.107457]  fff00000c56e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.107610]  fff00000c56e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.107752] ==================================================================
[   23.140500] ==================================================================
[   23.140633] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   23.140756] Write of size 121 at addr fff00000c56e5100 by task kunit_try_catch/286
[   23.140872] 
[   23.140944] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.141136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.141204] Hardware name: linux,dummy-virt (DT)
[   23.141276] Call trace:
[   23.141329]  show_stack+0x20/0x38 (C)
[   23.141461]  dump_stack_lvl+0x8c/0xd0
[   23.141577]  print_report+0x118/0x608
[   23.141687]  kasan_report+0xdc/0x128
[   23.141790]  kasan_check_range+0x100/0x1a8
[   23.141902]  __kasan_check_write+0x20/0x30
[   23.142017]  copy_user_test_oob+0x434/0xec8
[   23.142133]  kunit_try_run_case+0x170/0x3f0
[   23.142246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.144073]  kthread+0x328/0x630
[   23.144228]  ret_from_fork+0x10/0x20
[   23.144514] 
[   23.144629] Allocated by task 286:
[   23.144859]  kasan_save_stack+0x3c/0x68
[   23.145210]  kasan_save_track+0x20/0x40
[   23.145304]  kasan_save_alloc_info+0x40/0x58
[   23.145670]  __kasan_kmalloc+0xd4/0xd8
[   23.145923]  __kmalloc_noprof+0x198/0x4c8
[   23.146027]  kunit_kmalloc_array+0x34/0x88
[   23.146123]  copy_user_test_oob+0xac/0xec8
[   23.146408]  kunit_try_run_case+0x170/0x3f0
[   23.146639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.146766]  kthread+0x328/0x630
[   23.146873]  ret_from_fork+0x10/0x20
[   23.146976] 
[   23.147020] The buggy address belongs to the object at fff00000c56e5100
[   23.147020]  which belongs to the cache kmalloc-128 of size 128
[   23.147158] The buggy address is located 0 bytes inside of
[   23.147158]  allocated 120-byte region [fff00000c56e5100, fff00000c56e5178)
[   23.147298] 
[   23.147349] The buggy address belongs to the physical page:
[   23.147490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   23.147668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.147782] page_type: f5(slab)
[   23.147878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.148049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.148192] page dumped because: kasan: bad access detected
[   23.148304] 
[   23.148394] Memory state around the buggy address:
[   23.148475]  fff00000c56e5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.148577]  fff00000c56e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.148682] >fff00000c56e5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.148785]                                                                 ^
[   23.148931]  fff00000c56e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.149080]  fff00000c56e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.149214] ==================================================================
[   23.150524] ==================================================================
[   23.150665] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   23.150799] Read of size 121 at addr fff00000c56e5100 by task kunit_try_catch/286
[   23.150911] 
[   23.150983] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.151218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.151278] Hardware name: linux,dummy-virt (DT)
[   23.151347] Call trace:
[   23.151424]  show_stack+0x20/0x38 (C)
[   23.151543]  dump_stack_lvl+0x8c/0xd0
[   23.151707]  print_report+0x118/0x608
[   23.151831]  kasan_report+0xdc/0x128
[   23.151993]  kasan_check_range+0x100/0x1a8
[   23.152149]  __kasan_check_read+0x20/0x30
[   23.152303]  copy_user_test_oob+0x4a0/0xec8
[   23.152469]  kunit_try_run_case+0x170/0x3f0
[   23.152630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.152752]  kthread+0x328/0x630
[   23.152855]  ret_from_fork+0x10/0x20
[   23.152965] 
[   23.153014] Allocated by task 286:
[   23.153080]  kasan_save_stack+0x3c/0x68
[   23.153179]  kasan_save_track+0x20/0x40
[   23.153268]  kasan_save_alloc_info+0x40/0x58
[   23.153383]  __kasan_kmalloc+0xd4/0xd8
[   23.153514]  __kmalloc_noprof+0x198/0x4c8
[   23.153642]  kunit_kmalloc_array+0x34/0x88
[   23.153765]  copy_user_test_oob+0xac/0xec8
[   23.153895]  kunit_try_run_case+0x170/0x3f0
[   23.154053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.154151]  kthread+0x328/0x630
[   23.154255]  ret_from_fork+0x10/0x20
[   23.154368] 
[   23.154450] The buggy address belongs to the object at fff00000c56e5100
[   23.154450]  which belongs to the cache kmalloc-128 of size 128
[   23.154600] The buggy address is located 0 bytes inside of
[   23.154600]  allocated 120-byte region [fff00000c56e5100, fff00000c56e5178)
[   23.154783] 
[   23.154830] The buggy address belongs to the physical page:
[   23.154926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   23.155077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.155227] page_type: f5(slab)
[   23.155319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.155447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.155534] page dumped because: kasan: bad access detected
[   23.155606] 
[   23.155655] Memory state around the buggy address:
[   23.155778]  fff00000c56e5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.155884]  fff00000c56e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.155969] >fff00000c56e5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.156074]                                                                 ^
[   23.156178]  fff00000c56e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.156281]  fff00000c56e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.156436] ==================================================================

[   18.479016] ==================================================================
[   18.479435] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   18.479918] Write of size 121 at addr ffff888103332c00 by task kunit_try_catch/303
[   18.480326] 
[   18.480475] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.480532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.480550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.480579] Call Trace:
[   18.480603]  <TASK>
[   18.480626]  dump_stack_lvl+0x73/0xb0
[   18.480674]  print_report+0xd1/0x650
[   18.480702]  ? __virt_addr_valid+0x1db/0x2d0
[   18.480731]  ? copy_user_test_oob+0x557/0x10f0
[   18.480785]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.480816]  ? copy_user_test_oob+0x557/0x10f0
[   18.480846]  kasan_report+0x141/0x180
[   18.480874]  ? copy_user_test_oob+0x557/0x10f0
[   18.480910]  kasan_check_range+0x10c/0x1c0
[   18.480940]  __kasan_check_write+0x18/0x20
[   18.480965]  copy_user_test_oob+0x557/0x10f0
[   18.480998]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.481026]  ? finish_task_switch.isra.0+0x153/0x700
[   18.481054]  ? __switch_to+0x47/0xf50
[   18.481086]  ? __schedule+0x10cc/0x2b60
[   18.481114]  ? __pfx_read_tsc+0x10/0x10
[   18.481141]  ? ktime_get_ts64+0x86/0x230
[   18.481172]  kunit_try_run_case+0x1a5/0x480
[   18.481202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.481230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.481259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.481289]  ? __kthread_parkme+0x82/0x180
[   18.481315]  ? preempt_count_sub+0x50/0x80
[   18.481344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.481376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.481404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.481434]  kthread+0x337/0x6f0
[   18.481459]  ? trace_preempt_on+0x20/0xc0
[   18.481489]  ? __pfx_kthread+0x10/0x10
[   18.481520]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.481549]  ? calculate_sigpending+0x7b/0xa0
[   18.481581]  ? __pfx_kthread+0x10/0x10
[   18.481608]  ret_from_fork+0x116/0x1d0
[   18.481634]  ? __pfx_kthread+0x10/0x10
[   18.481672]  ret_from_fork_asm+0x1a/0x30
[   18.481713]  </TASK>
[   18.481728] 
[   18.494446] Allocated by task 303:
[   18.494704]  kasan_save_stack+0x45/0x70
[   18.495330]  kasan_save_track+0x18/0x40
[   18.495545]  kasan_save_alloc_info+0x3b/0x50
[   18.495952]  __kasan_kmalloc+0xb7/0xc0
[   18.496178]  __kmalloc_noprof+0x1c9/0x500
[   18.496418]  kunit_kmalloc_array+0x25/0x60
[   18.496898]  copy_user_test_oob+0xab/0x10f0
[   18.497382]  kunit_try_run_case+0x1a5/0x480
[   18.498019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.498451]  kthread+0x337/0x6f0
[   18.498608]  ret_from_fork+0x116/0x1d0
[   18.498796]  ret_from_fork_asm+0x1a/0x30
[   18.499401] 
[   18.499602] The buggy address belongs to the object at ffff888103332c00
[   18.499602]  which belongs to the cache kmalloc-128 of size 128
[   18.501235] The buggy address is located 0 bytes inside of
[   18.501235]  allocated 120-byte region [ffff888103332c00, ffff888103332c78)
[   18.502327] 
[   18.502539] The buggy address belongs to the physical page:
[   18.503124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   18.503453] flags: 0x200000000000000(node=0|zone=2)
[   18.503675] page_type: f5(slab)
[   18.503849] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.504404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.504779] page dumped because: kasan: bad access detected
[   18.505069] 
[   18.505187] Memory state around the buggy address:
[   18.505444]  ffff888103332b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.505871]  ffff888103332b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.506189] >ffff888103332c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.506565]                                                                 ^
[   18.506841]  ffff888103332c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.507326]  ffff888103332d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.507702] ==================================================================
[   18.457669] ==================================================================
[   18.458178] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   18.458469] Read of size 121 at addr ffff888103332c00 by task kunit_try_catch/303
[   18.458896] 
[   18.459421] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.459487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.459505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.459545] Call Trace:
[   18.459569]  <TASK>
[   18.459593]  dump_stack_lvl+0x73/0xb0
[   18.459630]  print_report+0xd1/0x650
[   18.459672]  ? __virt_addr_valid+0x1db/0x2d0
[   18.459702]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.459731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.459788]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.459819]  kasan_report+0x141/0x180
[   18.459848]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.459883]  kasan_check_range+0x10c/0x1c0
[   18.459913]  __kasan_check_read+0x15/0x20
[   18.459937]  copy_user_test_oob+0x4aa/0x10f0
[   18.459970]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.459998]  ? finish_task_switch.isra.0+0x153/0x700
[   18.460026]  ? __switch_to+0x47/0xf50
[   18.460057]  ? __schedule+0x10cc/0x2b60
[   18.460086]  ? __pfx_read_tsc+0x10/0x10
[   18.460112]  ? ktime_get_ts64+0x86/0x230
[   18.460144]  kunit_try_run_case+0x1a5/0x480
[   18.460175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.460203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.460232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.460261]  ? __kthread_parkme+0x82/0x180
[   18.460287]  ? preempt_count_sub+0x50/0x80
[   18.460316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.460348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.460380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.460408]  kthread+0x337/0x6f0
[   18.460433]  ? trace_preempt_on+0x20/0xc0
[   18.460464]  ? __pfx_kthread+0x10/0x10
[   18.460492]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.460518]  ? calculate_sigpending+0x7b/0xa0
[   18.460548]  ? __pfx_kthread+0x10/0x10
[   18.460575]  ret_from_fork+0x116/0x1d0
[   18.460599]  ? __pfx_kthread+0x10/0x10
[   18.460625]  ret_from_fork_asm+0x1a/0x30
[   18.460677]  </TASK>
[   18.460692] 
[   18.469127] Allocated by task 303:
[   18.469367]  kasan_save_stack+0x45/0x70
[   18.469621]  kasan_save_track+0x18/0x40
[   18.469888]  kasan_save_alloc_info+0x3b/0x50
[   18.470112]  __kasan_kmalloc+0xb7/0xc0
[   18.470336]  __kmalloc_noprof+0x1c9/0x500
[   18.470528]  kunit_kmalloc_array+0x25/0x60
[   18.470835]  copy_user_test_oob+0xab/0x10f0
[   18.471045]  kunit_try_run_case+0x1a5/0x480
[   18.471225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.471514]  kthread+0x337/0x6f0
[   18.471737]  ret_from_fork+0x116/0x1d0
[   18.472002]  ret_from_fork_asm+0x1a/0x30
[   18.472257] 
[   18.472375] The buggy address belongs to the object at ffff888103332c00
[   18.472375]  which belongs to the cache kmalloc-128 of size 128
[   18.472982] The buggy address is located 0 bytes inside of
[   18.472982]  allocated 120-byte region [ffff888103332c00, ffff888103332c78)
[   18.473484] 
[   18.473609] The buggy address belongs to the physical page:
[   18.473958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   18.474332] flags: 0x200000000000000(node=0|zone=2)
[   18.474607] page_type: f5(slab)
[   18.474848] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.475217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.475575] page dumped because: kasan: bad access detected
[   18.475859] 
[   18.475948] Memory state around the buggy address:
[   18.476141]  ffff888103332b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.476406]  ffff888103332b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.476830] >ffff888103332c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.477213]                                                                 ^
[   18.477677]  ffff888103332c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.478063]  ffff888103332d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.478352] ==================================================================
[   18.425955] ==================================================================
[   18.426380] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   18.426816] Write of size 121 at addr ffff888103332c00 by task kunit_try_catch/303
[   18.427208] 
[   18.427351] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.427413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.427430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.427460] Call Trace:
[   18.427480]  <TASK>
[   18.427505]  dump_stack_lvl+0x73/0xb0
[   18.427543]  print_report+0xd1/0x650
[   18.427573]  ? __virt_addr_valid+0x1db/0x2d0
[   18.427603]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.427633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.427674]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.427705]  kasan_report+0x141/0x180
[   18.427733]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.427793]  kasan_check_range+0x10c/0x1c0
[   18.427823]  __kasan_check_write+0x18/0x20
[   18.427849]  copy_user_test_oob+0x3fd/0x10f0
[   18.427881]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.427910]  ? finish_task_switch.isra.0+0x153/0x700
[   18.427939]  ? __switch_to+0x47/0xf50
[   18.427972]  ? __schedule+0x10cc/0x2b60
[   18.428001]  ? __pfx_read_tsc+0x10/0x10
[   18.428027]  ? ktime_get_ts64+0x86/0x230
[   18.428058]  kunit_try_run_case+0x1a5/0x480
[   18.428091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.428118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.428148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.428178]  ? __kthread_parkme+0x82/0x180
[   18.428204]  ? preempt_count_sub+0x50/0x80
[   18.428233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.428262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.428292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.428321]  kthread+0x337/0x6f0
[   18.428347]  ? trace_preempt_on+0x20/0xc0
[   18.428378]  ? __pfx_kthread+0x10/0x10
[   18.428404]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.428430]  ? calculate_sigpending+0x7b/0xa0
[   18.428460]  ? __pfx_kthread+0x10/0x10
[   18.428487]  ret_from_fork+0x116/0x1d0
[   18.428510]  ? __pfx_kthread+0x10/0x10
[   18.428535]  ret_from_fork_asm+0x1a/0x30
[   18.428575]  </TASK>
[   18.428591] 
[   18.442622] Allocated by task 303:
[   18.442914]  kasan_save_stack+0x45/0x70
[   18.443357]  kasan_save_track+0x18/0x40
[   18.443818]  kasan_save_alloc_info+0x3b/0x50
[   18.444270]  __kasan_kmalloc+0xb7/0xc0
[   18.444682]  __kmalloc_noprof+0x1c9/0x500
[   18.445022]  kunit_kmalloc_array+0x25/0x60
[   18.445205]  copy_user_test_oob+0xab/0x10f0
[   18.445384]  kunit_try_run_case+0x1a5/0x480
[   18.445561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.446066]  kthread+0x337/0x6f0
[   18.446429]  ret_from_fork+0x116/0x1d0
[   18.446870]  ret_from_fork_asm+0x1a/0x30
[   18.447302] 
[   18.447493] The buggy address belongs to the object at ffff888103332c00
[   18.447493]  which belongs to the cache kmalloc-128 of size 128
[   18.448747] The buggy address is located 0 bytes inside of
[   18.448747]  allocated 120-byte region [ffff888103332c00, ffff888103332c78)
[   18.449875] 
[   18.449968] The buggy address belongs to the physical page:
[   18.450183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   18.450479] flags: 0x200000000000000(node=0|zone=2)
[   18.450737] page_type: f5(slab)
[   18.451110] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.451910] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.452678] page dumped because: kasan: bad access detected
[   18.453267] 
[   18.453458] Memory state around the buggy address:
[   18.453988]  ffff888103332b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.454737]  ffff888103332b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.455484] >ffff888103332c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.456125]                                                                 ^
[   18.456388]  ffff888103332c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.456663]  ffff888103332d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.457004] ==================================================================
[   18.509716] ==================================================================
[   18.510699] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   18.511258] Read of size 121 at addr ffff888103332c00 by task kunit_try_catch/303
[   18.511957] 
[   18.512216] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.512280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.512298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.512328] Call Trace:
[   18.512454]  <TASK>
[   18.512483]  dump_stack_lvl+0x73/0xb0
[   18.512523]  print_report+0xd1/0x650
[   18.512552]  ? __virt_addr_valid+0x1db/0x2d0
[   18.512583]  ? copy_user_test_oob+0x604/0x10f0
[   18.512614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.512642]  ? copy_user_test_oob+0x604/0x10f0
[   18.512688]  kasan_report+0x141/0x180
[   18.512717]  ? copy_user_test_oob+0x604/0x10f0
[   18.512752]  kasan_check_range+0x10c/0x1c0
[   18.512782]  __kasan_check_read+0x15/0x20
[   18.512807]  copy_user_test_oob+0x604/0x10f0
[   18.512839]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.512867]  ? finish_task_switch.isra.0+0x153/0x700
[   18.512894]  ? __switch_to+0x47/0xf50
[   18.512926]  ? __schedule+0x10cc/0x2b60
[   18.512955]  ? __pfx_read_tsc+0x10/0x10
[   18.512982]  ? ktime_get_ts64+0x86/0x230
[   18.513012]  kunit_try_run_case+0x1a5/0x480
[   18.513043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.513071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.513101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.513131]  ? __kthread_parkme+0x82/0x180
[   18.513157]  ? preempt_count_sub+0x50/0x80
[   18.513186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.513216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.513245]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.513274]  kthread+0x337/0x6f0
[   18.513299]  ? trace_preempt_on+0x20/0xc0
[   18.513329]  ? __pfx_kthread+0x10/0x10
[   18.513355]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.513382]  ? calculate_sigpending+0x7b/0xa0
[   18.513412]  ? __pfx_kthread+0x10/0x10
[   18.513439]  ret_from_fork+0x116/0x1d0
[   18.513463]  ? __pfx_kthread+0x10/0x10
[   18.513489]  ret_from_fork_asm+0x1a/0x30
[   18.513528]  </TASK>
[   18.513543] 
[   18.524794] Allocated by task 303:
[   18.524963]  kasan_save_stack+0x45/0x70
[   18.525259]  kasan_save_track+0x18/0x40
[   18.525494]  kasan_save_alloc_info+0x3b/0x50
[   18.525790]  __kasan_kmalloc+0xb7/0xc0
[   18.525967]  __kmalloc_noprof+0x1c9/0x500
[   18.526181]  kunit_kmalloc_array+0x25/0x60
[   18.526441]  copy_user_test_oob+0xab/0x10f0
[   18.526689]  kunit_try_run_case+0x1a5/0x480
[   18.527109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.527414]  kthread+0x337/0x6f0
[   18.527617]  ret_from_fork+0x116/0x1d0
[   18.527880]  ret_from_fork_asm+0x1a/0x30
[   18.528091] 
[   18.528178] The buggy address belongs to the object at ffff888103332c00
[   18.528178]  which belongs to the cache kmalloc-128 of size 128
[   18.528623] The buggy address is located 0 bytes inside of
[   18.528623]  allocated 120-byte region [ffff888103332c00, ffff888103332c78)
[   18.529539] 
[   18.529699] The buggy address belongs to the physical page:
[   18.530318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   18.531494] flags: 0x200000000000000(node=0|zone=2)
[   18.531762] page_type: f5(slab)
[   18.532108] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.532629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.533069] page dumped because: kasan: bad access detected
[   18.533336] 
[   18.533425] Memory state around the buggy address:
[   18.533735]  ffff888103332b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.534130]  ffff888103332b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.534450] >ffff888103332c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.534844]                                                                 ^
[   18.535401]  ffff888103332c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.535664]  ffff888103332d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.536283] ==================================================================