Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.290269] ==================================================================
[   21.290332] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.290386] Write of size 121 at addr fff00000c78d3b00 by task kunit_try_catch/285
[   21.290776] 
[   21.290828] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.291109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.291164] Hardware name: linux,dummy-virt (DT)
[   21.291231] Call trace:
[   21.291480]  show_stack+0x20/0x38 (C)
[   21.291553]  dump_stack_lvl+0x8c/0xd0
[   21.291779]  print_report+0x118/0x608
[   21.291950]  kasan_report+0xdc/0x128
[   21.292077]  kasan_check_range+0x100/0x1a8
[   21.292181]  __kasan_check_write+0x20/0x30
[   21.292476]  copy_user_test_oob+0x434/0xec8
[   21.292618]  kunit_try_run_case+0x170/0x3f0
[   21.292765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.292823]  kthread+0x328/0x630
[   21.293082]  ret_from_fork+0x10/0x20
[   21.293484] 
[   21.293512] Allocated by task 285:
[   21.293568]  kasan_save_stack+0x3c/0x68
[   21.293629]  kasan_save_track+0x20/0x40
[   21.293670]  kasan_save_alloc_info+0x40/0x58
[   21.293711]  __kasan_kmalloc+0xd4/0xd8
[   21.293750]  __kmalloc_noprof+0x198/0x4c8
[   21.293788]  kunit_kmalloc_array+0x34/0x88
[   21.293840]  copy_user_test_oob+0xac/0xec8
[   21.293878]  kunit_try_run_case+0x170/0x3f0
[   21.293920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.293965]  kthread+0x328/0x630
[   21.294011]  ret_from_fork+0x10/0x20
[   21.294049] 
[   21.294086] The buggy address belongs to the object at fff00000c78d3b00
[   21.294086]  which belongs to the cache kmalloc-128 of size 128
[   21.294143] The buggy address is located 0 bytes inside of
[   21.294143]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   21.294232] 
[   21.294267] The buggy address belongs to the physical page:
[   21.294321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   21.294384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.294431] page_type: f5(slab)
[   21.294471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.294522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.294565] page dumped because: kasan: bad access detected
[   21.294631] 
[   21.294660] Memory state around the buggy address:
[   21.294717]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.294764]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.294811] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.294856]                                                                 ^
[   21.294900]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.294944]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.294997] ==================================================================
[   21.272452] ==================================================================
[   21.272557] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.272952] Write of size 121 at addr fff00000c78d3b00 by task kunit_try_catch/285
[   21.273096] 
[   21.273191] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.273334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.273362] Hardware name: linux,dummy-virt (DT)
[   21.273407] Call trace:
[   21.273436]  show_stack+0x20/0x38 (C)
[   21.273504]  dump_stack_lvl+0x8c/0xd0
[   21.273639]  print_report+0x118/0x608
[   21.273724]  kasan_report+0xdc/0x128
[   21.274052]  kasan_check_range+0x100/0x1a8
[   21.274126]  __kasan_check_write+0x20/0x30
[   21.274240]  copy_user_test_oob+0x35c/0xec8
[   21.274327]  kunit_try_run_case+0x170/0x3f0
[   21.274457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.274517]  kthread+0x328/0x630
[   21.274783]  ret_from_fork+0x10/0x20
[   21.274889] 
[   21.274913] Allocated by task 285:
[   21.274954]  kasan_save_stack+0x3c/0x68
[   21.275253]  kasan_save_track+0x20/0x40
[   21.275322]  kasan_save_alloc_info+0x40/0x58
[   21.275368]  __kasan_kmalloc+0xd4/0xd8
[   21.275407]  __kmalloc_noprof+0x198/0x4c8
[   21.275446]  kunit_kmalloc_array+0x34/0x88
[   21.275488]  copy_user_test_oob+0xac/0xec8
[   21.275530]  kunit_try_run_case+0x170/0x3f0
[   21.275815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.275889]  kthread+0x328/0x630
[   21.276176]  ret_from_fork+0x10/0x20
[   21.276243] 
[   21.276482] The buggy address belongs to the object at fff00000c78d3b00
[   21.276482]  which belongs to the cache kmalloc-128 of size 128
[   21.276639] The buggy address is located 0 bytes inside of
[   21.276639]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   21.276876] 
[   21.276997] The buggy address belongs to the physical page:
[   21.277125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   21.277293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.277399] page_type: f5(slab)
[   21.277610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.277783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.277853] page dumped because: kasan: bad access detected
[   21.277952] 
[   21.278063] Memory state around the buggy address:
[   21.278517]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.278626]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279075] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.279174]                                                                 ^
[   21.279297]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279345]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279444] ==================================================================
[   21.253929] ==================================================================
[   21.253989] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.254041] Read of size 121 at addr fff00000c78d3b00 by task kunit_try_catch/285
[   21.254093] 
[   21.254124] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.254495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.254530] Hardware name: linux,dummy-virt (DT)
[   21.254574] Call trace:
[   21.254599]  show_stack+0x20/0x38 (C)
[   21.254652]  dump_stack_lvl+0x8c/0xd0
[   21.254699]  print_report+0x118/0x608
[   21.254807]  kasan_report+0xdc/0x128
[   21.254903]  kasan_check_range+0x100/0x1a8
[   21.255064]  __kasan_check_read+0x20/0x30
[   21.255215]  copy_user_test_oob+0x728/0xec8
[   21.255282]  kunit_try_run_case+0x170/0x3f0
[   21.255372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.255459]  kthread+0x328/0x630
[   21.255502]  ret_from_fork+0x10/0x20
[   21.255625] 
[   21.255651] Allocated by task 285:
[   21.255697]  kasan_save_stack+0x3c/0x68
[   21.255741]  kasan_save_track+0x20/0x40
[   21.256107]  kasan_save_alloc_info+0x40/0x58
[   21.256314]  __kasan_kmalloc+0xd4/0xd8
[   21.256628]  __kmalloc_noprof+0x198/0x4c8
[   21.256769]  kunit_kmalloc_array+0x34/0x88
[   21.256866]  copy_user_test_oob+0xac/0xec8
[   21.257005]  kunit_try_run_case+0x170/0x3f0
[   21.257233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.257300]  kthread+0x328/0x630
[   21.257337]  ret_from_fork+0x10/0x20
[   21.257381] 
[   21.257405] The buggy address belongs to the object at fff00000c78d3b00
[   21.257405]  which belongs to the cache kmalloc-128 of size 128
[   21.257576] The buggy address is located 0 bytes inside of
[   21.257576]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   21.257740] 
[   21.257862] The buggy address belongs to the physical page:
[   21.259543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   21.259676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.259731] page_type: f5(slab)
[   21.259771] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.259981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.260067] page dumped because: kasan: bad access detected
[   21.260178] 
[   21.260427] Memory state around the buggy address:
[   21.260634]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.260689]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.260933] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.261065]                                                                 ^
[   21.261439]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.261608]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.261654] ==================================================================
[   21.242285] ==================================================================
[   21.242603] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.242925] Write of size 121 at addr fff00000c78d3b00 by task kunit_try_catch/285
[   21.243024] 
[   21.243088] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.243213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.243275] Hardware name: linux,dummy-virt (DT)
[   21.243342] Call trace:
[   21.243376]  show_stack+0x20/0x38 (C)
[   21.243433]  dump_stack_lvl+0x8c/0xd0
[   21.243484]  print_report+0x118/0x608
[   21.243743]  kasan_report+0xdc/0x128
[   21.243896]  kasan_check_range+0x100/0x1a8
[   21.244006]  __kasan_check_write+0x20/0x30
[   21.244168]  copy_user_test_oob+0x234/0xec8
[   21.244293]  kunit_try_run_case+0x170/0x3f0
[   21.244413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.244601]  kthread+0x328/0x630
[   21.244658]  ret_from_fork+0x10/0x20
[   21.244707] 
[   21.244769] Allocated by task 285:
[   21.244803]  kasan_save_stack+0x3c/0x68
[   21.244912]  kasan_save_track+0x20/0x40
[   21.245004]  kasan_save_alloc_info+0x40/0x58
[   21.245093]  __kasan_kmalloc+0xd4/0xd8
[   21.245370]  __kmalloc_noprof+0x198/0x4c8
[   21.245482]  kunit_kmalloc_array+0x34/0x88
[   21.245582]  copy_user_test_oob+0xac/0xec8
[   21.245740]  kunit_try_run_case+0x170/0x3f0
[   21.245894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.245999]  kthread+0x328/0x630
[   21.246117]  ret_from_fork+0x10/0x20
[   21.246196] 
[   21.246219] The buggy address belongs to the object at fff00000c78d3b00
[   21.246219]  which belongs to the cache kmalloc-128 of size 128
[   21.246307] The buggy address is located 0 bytes inside of
[   21.246307]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   21.246371] 
[   21.246398] The buggy address belongs to the physical page:
[   21.246432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   21.246511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.246562] page_type: f5(slab)
[   21.246607] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.246656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.246698] page dumped because: kasan: bad access detected
[   21.246750] 
[   21.246782] Memory state around the buggy address:
[   21.246828]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.246873]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.246918] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.246959]                                                                 ^
[   21.247016]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.247071]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.247112] ==================================================================
[   21.280576] ==================================================================
[   21.280631] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.280683] Read of size 121 at addr fff00000c78d3b00 by task kunit_try_catch/285
[   21.280736] 
[   21.281299] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.281405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.281442] Hardware name: linux,dummy-virt (DT)
[   21.281607] Call trace:
[   21.281751]  show_stack+0x20/0x38 (C)
[   21.281838]  dump_stack_lvl+0x8c/0xd0
[   21.281889]  print_report+0x118/0x608
[   21.282166]  kasan_report+0xdc/0x128
[   21.282331]  kasan_check_range+0x100/0x1a8
[   21.282462]  __kasan_check_read+0x20/0x30
[   21.282513]  copy_user_test_oob+0x3c8/0xec8
[   21.282690]  kunit_try_run_case+0x170/0x3f0
[   21.282928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.283014]  kthread+0x328/0x630
[   21.283058]  ret_from_fork+0x10/0x20
[   21.283248] 
[   21.283295] Allocated by task 285:
[   21.283342]  kasan_save_stack+0x3c/0x68
[   21.283397]  kasan_save_track+0x20/0x40
[   21.283435]  kasan_save_alloc_info+0x40/0x58
[   21.283748]  __kasan_kmalloc+0xd4/0xd8
[   21.283818]  __kmalloc_noprof+0x198/0x4c8
[   21.283860]  kunit_kmalloc_array+0x34/0x88
[   21.284183]  copy_user_test_oob+0xac/0xec8
[   21.284393]  kunit_try_run_case+0x170/0x3f0
[   21.284520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.284722]  kthread+0x328/0x630
[   21.284763]  ret_from_fork+0x10/0x20
[   21.285112] 
[   21.285184] The buggy address belongs to the object at fff00000c78d3b00
[   21.285184]  which belongs to the cache kmalloc-128 of size 128
[   21.285559] The buggy address is located 0 bytes inside of
[   21.285559]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   21.285815] 
[   21.286009] The buggy address belongs to the physical page:
[   21.286099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   21.286232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.286654] page_type: f5(slab)
[   21.287162] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.287235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.287491] page dumped because: kasan: bad access detected
[   21.287609] 
[   21.288004] Memory state around the buggy address:
[   21.288077]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.288203]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.288249] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.288295]                                                                 ^
[   21.288338]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.288384]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.288426] ==================================================================
[   21.295306] ==================================================================
[   21.296096] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.296190] Read of size 121 at addr fff00000c78d3b00 by task kunit_try_catch/285
[   21.296272] 
[   21.296323] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.296598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.296858] Hardware name: linux,dummy-virt (DT)
[   21.296912] Call trace:
[   21.296956]  show_stack+0x20/0x38 (C)
[   21.297009]  dump_stack_lvl+0x8c/0xd0
[   21.297057]  print_report+0x118/0x608
[   21.297103]  kasan_report+0xdc/0x128
[   21.297159]  kasan_check_range+0x100/0x1a8
[   21.297208]  __kasan_check_read+0x20/0x30
[   21.297254]  copy_user_test_oob+0x4a0/0xec8
[   21.297301]  kunit_try_run_case+0x170/0x3f0
[   21.297347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.297405]  kthread+0x328/0x630
[   21.297452]  ret_from_fork+0x10/0x20
[   21.297499] 
[   21.297520] Allocated by task 285:
[   21.297551]  kasan_save_stack+0x3c/0x68
[   21.297594]  kasan_save_track+0x20/0x40
[   21.297632]  kasan_save_alloc_info+0x40/0x58
[   21.297673]  __kasan_kmalloc+0xd4/0xd8
[   21.297710]  __kmalloc_noprof+0x198/0x4c8
[   21.297749]  kunit_kmalloc_array+0x34/0x88
[   21.297787]  copy_user_test_oob+0xac/0xec8
[   21.297826]  kunit_try_run_case+0x170/0x3f0
[   21.297865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.297908]  kthread+0x328/0x630
[   21.298085]  ret_from_fork+0x10/0x20
[   21.298177] 
[   21.298643] The buggy address belongs to the object at fff00000c78d3b00
[   21.298643]  which belongs to the cache kmalloc-128 of size 128
[   21.298781] The buggy address is located 0 bytes inside of
[   21.298781]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   21.298944] 
[   21.298997] The buggy address belongs to the physical page:
[   21.299176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   21.299256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.299408] page_type: f5(slab)
[   21.299450] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.300205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.300261] page dumped because: kasan: bad access detected
[   21.300303] 
[   21.300640] Memory state around the buggy address:
[   21.300702]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.300784]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.300843] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.300911]                                                                 ^
[   21.301175]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.301255]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.301461] ==================================================================

[   18.204458] ==================================================================
[   18.205306] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   18.206031] Read of size 121 at addr ffff888103929700 by task kunit_try_catch/303
[   18.206498] 
[   18.206766] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.206840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.206859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.206888] Call Trace:
[   18.207032]  <TASK>
[   18.207057]  dump_stack_lvl+0x73/0xb0
[   18.207097]  print_report+0xd1/0x650
[   18.207125]  ? __virt_addr_valid+0x1db/0x2d0
[   18.207153]  ? copy_user_test_oob+0x604/0x10f0
[   18.207182]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.207209]  ? copy_user_test_oob+0x604/0x10f0
[   18.207238]  kasan_report+0x141/0x180
[   18.207265]  ? copy_user_test_oob+0x604/0x10f0
[   18.207299]  kasan_check_range+0x10c/0x1c0
[   18.207328]  __kasan_check_read+0x15/0x20
[   18.207351]  copy_user_test_oob+0x604/0x10f0
[   18.207382]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.207409]  ? finish_task_switch.isra.0+0x153/0x700
[   18.207438]  ? __switch_to+0x47/0xf50
[   18.207470]  ? __schedule+0x10cc/0x2b60
[   18.207497]  ? __pfx_read_tsc+0x10/0x10
[   18.207524]  ? ktime_get_ts64+0x86/0x230
[   18.207554]  kunit_try_run_case+0x1a5/0x480
[   18.207584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.207613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.207646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.207677]  ? __kthread_parkme+0x82/0x180
[   18.207703]  ? preempt_count_sub+0x50/0x80
[   18.207731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.207759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.207800]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.207828]  kthread+0x337/0x6f0
[   18.207852]  ? trace_preempt_on+0x20/0xc0
[   18.207881]  ? __pfx_kthread+0x10/0x10
[   18.207906]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.207932]  ? calculate_sigpending+0x7b/0xa0
[   18.207961]  ? __pfx_kthread+0x10/0x10
[   18.207988]  ret_from_fork+0x116/0x1d0
[   18.208012]  ? __pfx_kthread+0x10/0x10
[   18.208037]  ret_from_fork_asm+0x1a/0x30
[   18.208076]  </TASK>
[   18.208103] 
[   18.218736] Allocated by task 303:
[   18.219700]  kasan_save_stack+0x45/0x70
[   18.220522]  kasan_save_track+0x18/0x40
[   18.221869]  kasan_save_alloc_info+0x3b/0x50
[   18.222390]  __kasan_kmalloc+0xb7/0xc0
[   18.222921]  __kmalloc_noprof+0x1c9/0x500
[   18.223659]  kunit_kmalloc_array+0x25/0x60
[   18.223915]  copy_user_test_oob+0xab/0x10f0
[   18.224997]  kunit_try_run_case+0x1a5/0x480
[   18.225390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.225713]  kthread+0x337/0x6f0
[   18.225927]  ret_from_fork+0x116/0x1d0
[   18.226320]  ret_from_fork_asm+0x1a/0x30
[   18.226904] 
[   18.227119] The buggy address belongs to the object at ffff888103929700
[   18.227119]  which belongs to the cache kmalloc-128 of size 128
[   18.227603] The buggy address is located 0 bytes inside of
[   18.227603]  allocated 120-byte region [ffff888103929700, ffff888103929778)
[   18.228853] 
[   18.229077] The buggy address belongs to the physical page:
[   18.229548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103929
[   18.229966] flags: 0x200000000000000(node=0|zone=2)
[   18.230676] page_type: f5(slab)
[   18.230994] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.231674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.232369] page dumped because: kasan: bad access detected
[   18.232665] 
[   18.232775] Memory state around the buggy address:
[   18.233574]  ffff888103929600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.234262]  ffff888103929680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.234874] >ffff888103929700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.235623]                                                                 ^
[   18.236457]  ffff888103929780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236842]  ffff888103929800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.237598] ==================================================================
[   18.124775] ==================================================================
[   18.125213] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   18.125577] Write of size 121 at addr ffff888103929700 by task kunit_try_catch/303
[   18.125932] 
[   18.126079] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.126135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.126153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.126180] Call Trace:
[   18.126448]  <TASK>
[   18.126483]  dump_stack_lvl+0x73/0xb0
[   18.126523]  print_report+0xd1/0x650
[   18.126553]  ? __virt_addr_valid+0x1db/0x2d0
[   18.126584]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.126614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.126642]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.126671]  kasan_report+0x141/0x180
[   18.126699]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.126734]  kasan_check_range+0x10c/0x1c0
[   18.126763]  __kasan_check_write+0x18/0x20
[   18.126806]  copy_user_test_oob+0x3fd/0x10f0
[   18.126837]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.126865]  ? finish_task_switch.isra.0+0x153/0x700
[   18.126893]  ? __switch_to+0x47/0xf50
[   18.126925]  ? __schedule+0x10cc/0x2b60
[   18.126953]  ? __pfx_read_tsc+0x10/0x10
[   18.126980]  ? ktime_get_ts64+0x86/0x230
[   18.127010]  kunit_try_run_case+0x1a5/0x480
[   18.127041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.127069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.127222]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.127255]  ? __kthread_parkme+0x82/0x180
[   18.127282]  ? preempt_count_sub+0x50/0x80
[   18.127312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.127341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.127371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.127400]  kthread+0x337/0x6f0
[   18.127425]  ? trace_preempt_on+0x20/0xc0
[   18.127455]  ? __pfx_kthread+0x10/0x10
[   18.127481]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.127507]  ? calculate_sigpending+0x7b/0xa0
[   18.127537]  ? __pfx_kthread+0x10/0x10
[   18.127564]  ret_from_fork+0x116/0x1d0
[   18.127589]  ? __pfx_kthread+0x10/0x10
[   18.127615]  ret_from_fork_asm+0x1a/0x30
[   18.127653]  </TASK>
[   18.127669] 
[   18.138770] Allocated by task 303:
[   18.139210]  kasan_save_stack+0x45/0x70
[   18.139453]  kasan_save_track+0x18/0x40
[   18.139651]  kasan_save_alloc_info+0x3b/0x50
[   18.139894]  __kasan_kmalloc+0xb7/0xc0
[   18.140362]  __kmalloc_noprof+0x1c9/0x500
[   18.140582]  kunit_kmalloc_array+0x25/0x60
[   18.140775]  copy_user_test_oob+0xab/0x10f0
[   18.141167]  kunit_try_run_case+0x1a5/0x480
[   18.141511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.141879]  kthread+0x337/0x6f0
[   18.142154]  ret_from_fork+0x116/0x1d0
[   18.142383]  ret_from_fork_asm+0x1a/0x30
[   18.142589] 
[   18.142686] The buggy address belongs to the object at ffff888103929700
[   18.142686]  which belongs to the cache kmalloc-128 of size 128
[   18.143587] The buggy address is located 0 bytes inside of
[   18.143587]  allocated 120-byte region [ffff888103929700, ffff888103929778)
[   18.144191] 
[   18.144444] The buggy address belongs to the physical page:
[   18.144680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103929
[   18.145236] flags: 0x200000000000000(node=0|zone=2)
[   18.145599] page_type: f5(slab)
[   18.145784] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.146279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.146689] page dumped because: kasan: bad access detected
[   18.147037] 
[   18.147141] Memory state around the buggy address:
[   18.147564]  ffff888103929600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.147897]  ffff888103929680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.148441] >ffff888103929700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.148809]                                                                 ^
[   18.149230]  ffff888103929780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.149585]  ffff888103929800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.150055] ==================================================================
[   18.177815] ==================================================================
[   18.178456] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   18.178904] Write of size 121 at addr ffff888103929700 by task kunit_try_catch/303
[   18.179377] 
[   18.179648] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.179707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.179723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.179752] Call Trace:
[   18.179774]  <TASK>
[   18.179811]  dump_stack_lvl+0x73/0xb0
[   18.179850]  print_report+0xd1/0x650
[   18.179879]  ? __virt_addr_valid+0x1db/0x2d0
[   18.179908]  ? copy_user_test_oob+0x557/0x10f0
[   18.179938]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.179966]  ? copy_user_test_oob+0x557/0x10f0
[   18.179995]  kasan_report+0x141/0x180
[   18.180023]  ? copy_user_test_oob+0x557/0x10f0
[   18.180057]  kasan_check_range+0x10c/0x1c0
[   18.180215]  __kasan_check_write+0x18/0x20
[   18.180244]  copy_user_test_oob+0x557/0x10f0
[   18.180277]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.180305]  ? finish_task_switch.isra.0+0x153/0x700
[   18.180334]  ? __switch_to+0x47/0xf50
[   18.180365]  ? __schedule+0x10cc/0x2b60
[   18.180394]  ? __pfx_read_tsc+0x10/0x10
[   18.180421]  ? ktime_get_ts64+0x86/0x230
[   18.180450]  kunit_try_run_case+0x1a5/0x480
[   18.180481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.180508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.180537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.180567]  ? __kthread_parkme+0x82/0x180
[   18.180593]  ? preempt_count_sub+0x50/0x80
[   18.180621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.180651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.180678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.180707]  kthread+0x337/0x6f0
[   18.180731]  ? trace_preempt_on+0x20/0xc0
[   18.180761]  ? __pfx_kthread+0x10/0x10
[   18.180798]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.180825]  ? calculate_sigpending+0x7b/0xa0
[   18.180854]  ? __pfx_kthread+0x10/0x10
[   18.180881]  ret_from_fork+0x116/0x1d0
[   18.180905]  ? __pfx_kthread+0x10/0x10
[   18.180930]  ret_from_fork_asm+0x1a/0x30
[   18.180966]  </TASK>
[   18.180983] 
[   18.191929] Allocated by task 303:
[   18.192359]  kasan_save_stack+0x45/0x70
[   18.192702]  kasan_save_track+0x18/0x40
[   18.192935]  kasan_save_alloc_info+0x3b/0x50
[   18.193158]  __kasan_kmalloc+0xb7/0xc0
[   18.193364]  __kmalloc_noprof+0x1c9/0x500
[   18.193582]  kunit_kmalloc_array+0x25/0x60
[   18.193806]  copy_user_test_oob+0xab/0x10f0
[   18.194032]  kunit_try_run_case+0x1a5/0x480
[   18.194612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.195016]  kthread+0x337/0x6f0
[   18.195204]  ret_from_fork+0x116/0x1d0
[   18.195509]  ret_from_fork_asm+0x1a/0x30
[   18.195884] 
[   18.195997] The buggy address belongs to the object at ffff888103929700
[   18.195997]  which belongs to the cache kmalloc-128 of size 128
[   18.196781] The buggy address is located 0 bytes inside of
[   18.196781]  allocated 120-byte region [ffff888103929700, ffff888103929778)
[   18.197480] 
[   18.197735] The buggy address belongs to the physical page:
[   18.198002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103929
[   18.198564] flags: 0x200000000000000(node=0|zone=2)
[   18.198954] page_type: f5(slab)
[   18.199131] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.199804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.200172] page dumped because: kasan: bad access detected
[   18.200586] 
[   18.200707] Memory state around the buggy address:
[   18.201084]  ffff888103929600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.201532]  ffff888103929680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.201955] >ffff888103929700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.202402]                                                                 ^
[   18.202722]  ffff888103929780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203314]  ffff888103929800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203668] ==================================================================
[   18.150902] ==================================================================
[   18.151485] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   18.151872] Read of size 121 at addr ffff888103929700 by task kunit_try_catch/303
[   18.152473] 
[   18.152589] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.152838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.152916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.152947] Call Trace:
[   18.152972]  <TASK>
[   18.152994]  dump_stack_lvl+0x73/0xb0
[   18.153033]  print_report+0xd1/0x650
[   18.153062]  ? __virt_addr_valid+0x1db/0x2d0
[   18.153101]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.153130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.153157]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.153186]  kasan_report+0x141/0x180
[   18.153214]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.153248]  kasan_check_range+0x10c/0x1c0
[   18.153276]  __kasan_check_read+0x15/0x20
[   18.153300]  copy_user_test_oob+0x4aa/0x10f0
[   18.153331]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.153365]  ? finish_task_switch.isra.0+0x153/0x700
[   18.153391]  ? __switch_to+0x47/0xf50
[   18.153423]  ? __schedule+0x10cc/0x2b60
[   18.153450]  ? __pfx_read_tsc+0x10/0x10
[   18.153477]  ? ktime_get_ts64+0x86/0x230
[   18.153507]  kunit_try_run_case+0x1a5/0x480
[   18.153537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.153565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.153594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.153622]  ? __kthread_parkme+0x82/0x180
[   18.153648]  ? preempt_count_sub+0x50/0x80
[   18.153677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.153705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.153733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.153763]  kthread+0x337/0x6f0
[   18.153798]  ? trace_preempt_on+0x20/0xc0
[   18.153827]  ? __pfx_kthread+0x10/0x10
[   18.153853]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.153879]  ? calculate_sigpending+0x7b/0xa0
[   18.153908]  ? __pfx_kthread+0x10/0x10
[   18.153934]  ret_from_fork+0x116/0x1d0
[   18.153959]  ? __pfx_kthread+0x10/0x10
[   18.153983]  ret_from_fork_asm+0x1a/0x30
[   18.154020]  </TASK>
[   18.154035] 
[   18.165174] Allocated by task 303:
[   18.165571]  kasan_save_stack+0x45/0x70
[   18.165772]  kasan_save_track+0x18/0x40
[   18.166022]  kasan_save_alloc_info+0x3b/0x50
[   18.166432]  __kasan_kmalloc+0xb7/0xc0
[   18.166726]  __kmalloc_noprof+0x1c9/0x500
[   18.166947]  kunit_kmalloc_array+0x25/0x60
[   18.167342]  copy_user_test_oob+0xab/0x10f0
[   18.167566]  kunit_try_run_case+0x1a5/0x480
[   18.167926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.168381]  kthread+0x337/0x6f0
[   18.168568]  ret_from_fork+0x116/0x1d0
[   18.168906]  ret_from_fork_asm+0x1a/0x30
[   18.169138] 
[   18.169346] The buggy address belongs to the object at ffff888103929700
[   18.169346]  which belongs to the cache kmalloc-128 of size 128
[   18.169909] The buggy address is located 0 bytes inside of
[   18.169909]  allocated 120-byte region [ffff888103929700, ffff888103929778)
[   18.170680] 
[   18.170929] The buggy address belongs to the physical page:
[   18.171252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103929
[   18.171803] flags: 0x200000000000000(node=0|zone=2)
[   18.172159] page_type: f5(slab)
[   18.172318] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.172865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.173297] page dumped because: kasan: bad access detected
[   18.173691] 
[   18.173832] Memory state around the buggy address:
[   18.174088]  ffff888103929600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.174618]  ffff888103929680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.175103] >ffff888103929700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.175469]                                                                 ^
[   18.175840]  ffff888103929780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.176383]  ffff888103929800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.176802] ==================================================================