Hay
Date
July 6, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.302031] ==================================================================
[   21.302165] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.302660] Write of size 121 at addr fff00000c5709400 by task kunit_try_catch/285
[   21.303086] 
[   21.303269] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.304112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.304297] Hardware name: linux,dummy-virt (DT)
[   21.304348] Call trace:
[   21.304948]  show_stack+0x20/0x38 (C)
[   21.305366]  dump_stack_lvl+0x8c/0xd0
[   21.305608]  print_report+0x118/0x608
[   21.305845]  kasan_report+0xdc/0x128
[   21.305977]  kasan_check_range+0x100/0x1a8
[   21.306066]  __kasan_check_write+0x20/0x30
[   21.306384]  copy_user_test_oob+0x234/0xec8
[   21.306936]  kunit_try_run_case+0x170/0x3f0
[   21.307065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.307328]  kthread+0x328/0x630
[   21.307422]  ret_from_fork+0x10/0x20
[   21.307788] 
[   21.307817] Allocated by task 285:
[   21.308484]  kasan_save_stack+0x3c/0x68
[   21.308621]  kasan_save_track+0x20/0x40
[   21.308786]  kasan_save_alloc_info+0x40/0x58
[   21.308971]  __kasan_kmalloc+0xd4/0xd8
[   21.309245]  __kmalloc_noprof+0x198/0x4c8
[   21.309623]  kunit_kmalloc_array+0x34/0x88
[   21.309883]  copy_user_test_oob+0xac/0xec8
[   21.310014]  kunit_try_run_case+0x170/0x3f0
[   21.310334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.310549]  kthread+0x328/0x630
[   21.310604]  ret_from_fork+0x10/0x20
[   21.310770] 
[   21.310955] The buggy address belongs to the object at fff00000c5709400
[   21.310955]  which belongs to the cache kmalloc-128 of size 128
[   21.311211] The buggy address is located 0 bytes inside of
[   21.311211]  allocated 120-byte region [fff00000c5709400, fff00000c5709478)
[   21.311463] 
[   21.311753] The buggy address belongs to the physical page:
[   21.311817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105709
[   21.312255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.313103] page_type: f5(slab)
[   21.313295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.313393] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.313502] page dumped because: kasan: bad access detected
[   21.313707] 
[   21.313779] Memory state around the buggy address:
[   21.313975]  fff00000c5709300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.314036]  fff00000c5709380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314091] >fff00000c5709400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.314132]                                                                 ^
[   21.314608]  fff00000c5709480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314761]  fff00000c5709500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314877] ==================================================================
[   21.356453] ==================================================================
[   21.356521] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.356641] Read of size 121 at addr fff00000c5709400 by task kunit_try_catch/285
[   21.356698] 
[   21.356731] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.356819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.356847] Hardware name: linux,dummy-virt (DT)
[   21.357113] Call trace:
[   21.357153]  show_stack+0x20/0x38 (C)
[   21.357216]  dump_stack_lvl+0x8c/0xd0
[   21.357265]  print_report+0x118/0x608
[   21.357314]  kasan_report+0xdc/0x128
[   21.357437]  kasan_check_range+0x100/0x1a8
[   21.358327]  __kasan_check_read+0x20/0x30
[   21.358467]  copy_user_test_oob+0x3c8/0xec8
[   21.358543]  kunit_try_run_case+0x170/0x3f0
[   21.359183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.359389]  kthread+0x328/0x630
[   21.359508]  ret_from_fork+0x10/0x20
[   21.359681] 
[   21.359780] Allocated by task 285:
[   21.359864]  kasan_save_stack+0x3c/0x68
[   21.360221]  kasan_save_track+0x20/0x40
[   21.360529]  kasan_save_alloc_info+0x40/0x58
[   21.361070]  __kasan_kmalloc+0xd4/0xd8
[   21.361248]  __kmalloc_noprof+0x198/0x4c8
[   21.361370]  kunit_kmalloc_array+0x34/0x88
[   21.361475]  copy_user_test_oob+0xac/0xec8
[   21.361689]  kunit_try_run_case+0x170/0x3f0
[   21.361765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.362069]  kthread+0x328/0x630
[   21.362446]  ret_from_fork+0x10/0x20
[   21.362570] 
[   21.362598] The buggy address belongs to the object at fff00000c5709400
[   21.362598]  which belongs to the cache kmalloc-128 of size 128
[   21.363246] The buggy address is located 0 bytes inside of
[   21.363246]  allocated 120-byte region [fff00000c5709400, fff00000c5709478)
[   21.363352] 
[   21.363442] The buggy address belongs to the physical page:
[   21.363560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105709
[   21.363621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.363670] page_type: f5(slab)
[   21.363709] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.363762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.363805] page dumped because: kasan: bad access detected
[   21.363849] 
[   21.363880] Memory state around the buggy address:
[   21.363915]  fff00000c5709300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.363967]  fff00000c5709380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364011] >fff00000c5709400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.364059]                                                                 ^
[   21.364111]  fff00000c5709480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364157]  fff00000c5709500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364218] ==================================================================
[   21.346990] ==================================================================
[   21.347061] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.347119] Write of size 121 at addr fff00000c5709400 by task kunit_try_catch/285
[   21.347627] 
[   21.347683] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.348109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.348176] Hardware name: linux,dummy-virt (DT)
[   21.348298] Call trace:
[   21.348325]  show_stack+0x20/0x38 (C)
[   21.348379]  dump_stack_lvl+0x8c/0xd0
[   21.348476]  print_report+0x118/0x608
[   21.348530]  kasan_report+0xdc/0x128
[   21.348860]  kasan_check_range+0x100/0x1a8
[   21.348989]  __kasan_check_write+0x20/0x30
[   21.349042]  copy_user_test_oob+0x35c/0xec8
[   21.349089]  kunit_try_run_case+0x170/0x3f0
[   21.349181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.349251]  kthread+0x328/0x630
[   21.349305]  ret_from_fork+0x10/0x20
[   21.349355] 
[   21.349378] Allocated by task 285:
[   21.349417]  kasan_save_stack+0x3c/0x68
[   21.349471]  kasan_save_track+0x20/0x40
[   21.350322]  kasan_save_alloc_info+0x40/0x58
[   21.350539]  __kasan_kmalloc+0xd4/0xd8
[   21.350597]  __kmalloc_noprof+0x198/0x4c8
[   21.350662]  kunit_kmalloc_array+0x34/0x88
[   21.351009]  copy_user_test_oob+0xac/0xec8
[   21.351127]  kunit_try_run_case+0x170/0x3f0
[   21.351280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.351419]  kthread+0x328/0x630
[   21.351468]  ret_from_fork+0x10/0x20
[   21.351772] 
[   21.351830] The buggy address belongs to the object at fff00000c5709400
[   21.351830]  which belongs to the cache kmalloc-128 of size 128
[   21.351989] The buggy address is located 0 bytes inside of
[   21.351989]  allocated 120-byte region [fff00000c5709400, fff00000c5709478)
[   21.352150] 
[   21.352308] The buggy address belongs to the physical page:
[   21.352358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105709
[   21.352439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.352780] page_type: f5(slab)
[   21.352858] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.353154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.353293] page dumped because: kasan: bad access detected
[   21.353511] 
[   21.353561] Memory state around the buggy address:
[   21.353618]  fff00000c5709300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.353684]  fff00000c5709380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.354065] >fff00000c5709400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.354362]                                                                 ^
[   21.354437]  fff00000c5709480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.354496]  fff00000c5709500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.354537] ==================================================================
[   21.379586] ==================================================================
[   21.379653] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.379720] Read of size 121 at addr fff00000c5709400 by task kunit_try_catch/285
[   21.380233] 
[   21.380276] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.380505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.380703] Hardware name: linux,dummy-virt (DT)
[   21.380940] Call trace:
[   21.381426]  show_stack+0x20/0x38 (C)
[   21.381543]  dump_stack_lvl+0x8c/0xd0
[   21.381595]  print_report+0x118/0x608
[   21.381643]  kasan_report+0xdc/0x128
[   21.381692]  kasan_check_range+0x100/0x1a8
[   21.381741]  __kasan_check_read+0x20/0x30
[   21.382214]  copy_user_test_oob+0x4a0/0xec8
[   21.382275]  kunit_try_run_case+0x170/0x3f0
[   21.382326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.382379]  kthread+0x328/0x630
[   21.382430]  ret_from_fork+0x10/0x20
[   21.382480] 
[   21.382502] Allocated by task 285:
[   21.382531]  kasan_save_stack+0x3c/0x68
[   21.382574]  kasan_save_track+0x20/0x40
[   21.382612]  kasan_save_alloc_info+0x40/0x58
[   21.382655]  __kasan_kmalloc+0xd4/0xd8
[   21.382692]  __kmalloc_noprof+0x198/0x4c8
[   21.382733]  kunit_kmalloc_array+0x34/0x88
[   21.382770]  copy_user_test_oob+0xac/0xec8
[   21.382810]  kunit_try_run_case+0x170/0x3f0
[   21.382850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.382895]  kthread+0x328/0x630
[   21.382928]  ret_from_fork+0x10/0x20
[   21.382964] 
[   21.382986] The buggy address belongs to the object at fff00000c5709400
[   21.382986]  which belongs to the cache kmalloc-128 of size 128
[   21.383043] The buggy address is located 0 bytes inside of
[   21.383043]  allocated 120-byte region [fff00000c5709400, fff00000c5709478)
[   21.383105] 
[   21.383127] The buggy address belongs to the physical page:
[   21.383160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105709
[   21.383220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.383269] page_type: f5(slab)
[   21.383306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.383359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.383401] page dumped because: kasan: bad access detected
[   21.383434] 
[   21.383455] Memory state around the buggy address:
[   21.383490]  fff00000c5709300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.383539]  fff00000c5709380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383583] >fff00000c5709400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.383624]                                                                 ^
[   21.383668]  fff00000c5709480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383712]  fff00000c5709500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383753] ==================================================================
[   21.321094] ==================================================================
[   21.321152] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.321969] Read of size 121 at addr fff00000c5709400 by task kunit_try_catch/285
[   21.322048] 
[   21.322633] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.322928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.323009] Hardware name: linux,dummy-virt (DT)
[   21.323360] Call trace:
[   21.323426]  show_stack+0x20/0x38 (C)
[   21.323579]  dump_stack_lvl+0x8c/0xd0
[   21.323940]  print_report+0x118/0x608
[   21.324048]  kasan_report+0xdc/0x128
[   21.324226]  kasan_check_range+0x100/0x1a8
[   21.324414]  __kasan_check_read+0x20/0x30
[   21.324602]  copy_user_test_oob+0x728/0xec8
[   21.324991]  kunit_try_run_case+0x170/0x3f0
[   21.325084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.325332]  kthread+0x328/0x630
[   21.325498]  ret_from_fork+0x10/0x20
[   21.325554] 
[   21.325971] Allocated by task 285:
[   21.326162]  kasan_save_stack+0x3c/0x68
[   21.326363]  kasan_save_track+0x20/0x40
[   21.326794]  kasan_save_alloc_info+0x40/0x58
[   21.326940]  __kasan_kmalloc+0xd4/0xd8
[   21.327231]  __kmalloc_noprof+0x198/0x4c8
[   21.327409]  kunit_kmalloc_array+0x34/0x88
[   21.327725]  copy_user_test_oob+0xac/0xec8
[   21.328183]  kunit_try_run_case+0x170/0x3f0
[   21.328502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.328581]  kthread+0x328/0x630
[   21.329388]  ret_from_fork+0x10/0x20
[   21.329953] 
[   21.330059] The buggy address belongs to the object at fff00000c5709400
[   21.330059]  which belongs to the cache kmalloc-128 of size 128
[   21.330310] The buggy address is located 0 bytes inside of
[   21.330310]  allocated 120-byte region [fff00000c5709400, fff00000c5709478)
[   21.330506] 
[   21.330612] The buggy address belongs to the physical page:
[   21.330654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105709
[   21.331216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.331278] page_type: f5(slab)
[   21.331827] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.331889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.332217] page dumped because: kasan: bad access detected
[   21.332514] 
[   21.332654] Memory state around the buggy address:
[   21.332721]  fff00000c5709300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.333334]  fff00000c5709380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.333511] >fff00000c5709400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.333745]                                                                 ^
[   21.334057]  fff00000c5709480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334227]  fff00000c5709500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334398] ==================================================================
[   21.367460] ==================================================================
[   21.367523] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.367650] Write of size 121 at addr fff00000c5709400 by task kunit_try_catch/285
[   21.367710] 
[   21.367741] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.368009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.368043] Hardware name: linux,dummy-virt (DT)
[   21.368273] Call trace:
[   21.368458]  show_stack+0x20/0x38 (C)
[   21.368574]  dump_stack_lvl+0x8c/0xd0
[   21.369083]  print_report+0x118/0x608
[   21.369273]  kasan_report+0xdc/0x128
[   21.369612]  kasan_check_range+0x100/0x1a8
[   21.369699]  __kasan_check_write+0x20/0x30
[   21.369874]  copy_user_test_oob+0x434/0xec8
[   21.370058]  kunit_try_run_case+0x170/0x3f0
[   21.370115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.370345]  kthread+0x328/0x630
[   21.370508]  ret_from_fork+0x10/0x20
[   21.370956] 
[   21.371153] Allocated by task 285:
[   21.371245]  kasan_save_stack+0x3c/0x68
[   21.371296]  kasan_save_track+0x20/0x40
[   21.371881]  kasan_save_alloc_info+0x40/0x58
[   21.372129]  __kasan_kmalloc+0xd4/0xd8
[   21.372217]  __kmalloc_noprof+0x198/0x4c8
[   21.372443]  kunit_kmalloc_array+0x34/0x88
[   21.372502]  copy_user_test_oob+0xac/0xec8
[   21.372543]  kunit_try_run_case+0x170/0x3f0
[   21.372905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.373113]  kthread+0x328/0x630
[   21.373234]  ret_from_fork+0x10/0x20
[   21.373384] 
[   21.373411] The buggy address belongs to the object at fff00000c5709400
[   21.373411]  which belongs to the cache kmalloc-128 of size 128
[   21.373869] The buggy address is located 0 bytes inside of
[   21.373869]  allocated 120-byte region [fff00000c5709400, fff00000c5709478)
[   21.373948] 
[   21.374078] The buggy address belongs to the physical page:
[   21.374114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105709
[   21.374792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.374862] page_type: f5(slab)
[   21.375384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.375530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.375789] page dumped because: kasan: bad access detected
[   21.375862] 
[   21.375918] Memory state around the buggy address:
[   21.375980]  fff00000c5709300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.376291]  fff00000c5709380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.376366] >fff00000c5709400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.376409]                                                                 ^
[   21.376453]  fff00000c5709480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.376497]  fff00000c5709500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.376707] ==================================================================

[   15.682684] ==================================================================
[   15.683080] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.683361] Read of size 121 at addr ffff888103a21000 by task kunit_try_catch/302
[   15.683746] 
[   15.683867] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.683919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.683932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.683971] Call Trace:
[   15.683986]  <TASK>
[   15.684002]  dump_stack_lvl+0x73/0xb0
[   15.684033]  print_report+0xd1/0x650
[   15.684056]  ? __virt_addr_valid+0x1db/0x2d0
[   15.684091]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.684124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.684149]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.684174]  kasan_report+0x141/0x180
[   15.684209]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.684238]  kasan_check_range+0x10c/0x1c0
[   15.684264]  __kasan_check_read+0x15/0x20
[   15.684284]  copy_user_test_oob+0x4aa/0x10f0
[   15.684311]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.684335]  ? finish_task_switch.isra.0+0x153/0x700
[   15.684357]  ? __switch_to+0x47/0xf50
[   15.684393]  ? __schedule+0x10cc/0x2b60
[   15.684417]  ? __pfx_read_tsc+0x10/0x10
[   15.684438]  ? ktime_get_ts64+0x86/0x230
[   15.684474]  kunit_try_run_case+0x1a5/0x480
[   15.684500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.684548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.684572]  ? __kthread_parkme+0x82/0x180
[   15.684593]  ? preempt_count_sub+0x50/0x80
[   15.684617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.684666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.684690]  kthread+0x337/0x6f0
[   15.684711]  ? trace_preempt_on+0x20/0xc0
[   15.684736]  ? __pfx_kthread+0x10/0x10
[   15.684757]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.684779]  ? calculate_sigpending+0x7b/0xa0
[   15.684804]  ? __pfx_kthread+0x10/0x10
[   15.684827]  ret_from_fork+0x116/0x1d0
[   15.684846]  ? __pfx_kthread+0x10/0x10
[   15.684868]  ret_from_fork_asm+0x1a/0x30
[   15.684900]  </TASK>
[   15.684913] 
[   15.692379] Allocated by task 302:
[   15.692512]  kasan_save_stack+0x45/0x70
[   15.692661]  kasan_save_track+0x18/0x40
[   15.692802]  kasan_save_alloc_info+0x3b/0x50
[   15.693261]  __kasan_kmalloc+0xb7/0xc0
[   15.693457]  __kmalloc_noprof+0x1c9/0x500
[   15.693683]  kunit_kmalloc_array+0x25/0x60
[   15.693897]  copy_user_test_oob+0xab/0x10f0
[   15.694097]  kunit_try_run_case+0x1a5/0x480
[   15.694330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.694520]  kthread+0x337/0x6f0
[   15.694645]  ret_from_fork+0x116/0x1d0
[   15.694821]  ret_from_fork_asm+0x1a/0x30
[   15.694991] 
[   15.695157] The buggy address belongs to the object at ffff888103a21000
[   15.695157]  which belongs to the cache kmalloc-128 of size 128
[   15.695637] The buggy address is located 0 bytes inside of
[   15.695637]  allocated 120-byte region [ffff888103a21000, ffff888103a21078)
[   15.696189] 
[   15.696287] The buggy address belongs to the physical page:
[   15.696537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a21
[   15.696884] flags: 0x200000000000000(node=0|zone=2)
[   15.697151] page_type: f5(slab)
[   15.697316] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.697622] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.697952] page dumped because: kasan: bad access detected
[   15.698229] 
[   15.698316] Memory state around the buggy address:
[   15.698537]  ffff888103a20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698794]  ffff888103a20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.699020] >ffff888103a21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.699242]                                                                 ^
[   15.699566]  ffff888103a21080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.699922]  ffff888103a21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.700443] ==================================================================
[   15.657756] ==================================================================
[   15.658125] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.658754] Write of size 121 at addr ffff888103a21000 by task kunit_try_catch/302
[   15.659254] 
[   15.659418] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.659478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.659492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.659517] Call Trace:
[   15.659531]  <TASK>
[   15.659550]  dump_stack_lvl+0x73/0xb0
[   15.659579]  print_report+0xd1/0x650
[   15.659603]  ? __virt_addr_valid+0x1db/0x2d0
[   15.659636]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.659661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.659685]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.659721]  kasan_report+0x141/0x180
[   15.659745]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.659774]  kasan_check_range+0x10c/0x1c0
[   15.659810]  __kasan_check_write+0x18/0x20
[   15.659830]  copy_user_test_oob+0x3fd/0x10f0
[   15.659857]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.659881]  ? finish_task_switch.isra.0+0x153/0x700
[   15.659905]  ? __switch_to+0x47/0xf50
[   15.659931]  ? __schedule+0x10cc/0x2b60
[   15.659964]  ? __pfx_read_tsc+0x10/0x10
[   15.659986]  ? ktime_get_ts64+0x86/0x230
[   15.660012]  kunit_try_run_case+0x1a5/0x480
[   15.660039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.660064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.660107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.660131]  ? __kthread_parkme+0x82/0x180
[   15.660152]  ? preempt_count_sub+0x50/0x80
[   15.660176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.660201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.660225]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.660250]  kthread+0x337/0x6f0
[   15.660271]  ? trace_preempt_on+0x20/0xc0
[   15.660295]  ? __pfx_kthread+0x10/0x10
[   15.660318]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.660340]  ? calculate_sigpending+0x7b/0xa0
[   15.660365]  ? __pfx_kthread+0x10/0x10
[   15.660388]  ret_from_fork+0x116/0x1d0
[   15.660408]  ? __pfx_kthread+0x10/0x10
[   15.660430]  ret_from_fork_asm+0x1a/0x30
[   15.660461]  </TASK>
[   15.660474] 
[   15.673430] Allocated by task 302:
[   15.673642]  kasan_save_stack+0x45/0x70
[   15.674024]  kasan_save_track+0x18/0x40
[   15.674275]  kasan_save_alloc_info+0x3b/0x50
[   15.674676]  __kasan_kmalloc+0xb7/0xc0
[   15.674897]  __kmalloc_noprof+0x1c9/0x500
[   15.675271]  kunit_kmalloc_array+0x25/0x60
[   15.675554]  copy_user_test_oob+0xab/0x10f0
[   15.675706]  kunit_try_run_case+0x1a5/0x480
[   15.675854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.676041]  kthread+0x337/0x6f0
[   15.676181]  ret_from_fork+0x116/0x1d0
[   15.676351]  ret_from_fork_asm+0x1a/0x30
[   15.676577] 
[   15.676677] The buggy address belongs to the object at ffff888103a21000
[   15.676677]  which belongs to the cache kmalloc-128 of size 128
[   15.677213] The buggy address is located 0 bytes inside of
[   15.677213]  allocated 120-byte region [ffff888103a21000, ffff888103a21078)
[   15.677692] 
[   15.677795] The buggy address belongs to the physical page:
[   15.678023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a21
[   15.678429] flags: 0x200000000000000(node=0|zone=2)
[   15.678619] page_type: f5(slab)
[   15.678744] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.679158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.679484] page dumped because: kasan: bad access detected
[   15.679659] 
[   15.679732] Memory state around the buggy address:
[   15.679970]  ffff888103a20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.680403]  ffff888103a20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.680675] >ffff888103a21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.680980]                                                                 ^
[   15.681268]  ffff888103a21080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681684]  ffff888103a21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681986] ==================================================================
[   15.701028] ==================================================================
[   15.701262] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.701836] Write of size 121 at addr ffff888103a21000 by task kunit_try_catch/302
[   15.702251] 
[   15.702357] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.702399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.702425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.702446] Call Trace:
[   15.702464]  <TASK>
[   15.702482]  dump_stack_lvl+0x73/0xb0
[   15.702515]  print_report+0xd1/0x650
[   15.702539]  ? __virt_addr_valid+0x1db/0x2d0
[   15.702562]  ? copy_user_test_oob+0x557/0x10f0
[   15.702586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.702610]  ? copy_user_test_oob+0x557/0x10f0
[   15.702635]  kasan_report+0x141/0x180
[   15.702658]  ? copy_user_test_oob+0x557/0x10f0
[   15.702687]  kasan_check_range+0x10c/0x1c0
[   15.702711]  __kasan_check_write+0x18/0x20
[   15.702732]  copy_user_test_oob+0x557/0x10f0
[   15.702758]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.702783]  ? finish_task_switch.isra.0+0x153/0x700
[   15.702805]  ? __switch_to+0x47/0xf50
[   15.702831]  ? __schedule+0x10cc/0x2b60
[   15.702854]  ? __pfx_read_tsc+0x10/0x10
[   15.702875]  ? ktime_get_ts64+0x86/0x230
[   15.702899]  kunit_try_run_case+0x1a5/0x480
[   15.702926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.702984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.703008]  ? __kthread_parkme+0x82/0x180
[   15.703030]  ? preempt_count_sub+0x50/0x80
[   15.703053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.703079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.703103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.703133]  kthread+0x337/0x6f0
[   15.703154]  ? trace_preempt_on+0x20/0xc0
[   15.703179]  ? __pfx_kthread+0x10/0x10
[   15.703201]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.703223]  ? calculate_sigpending+0x7b/0xa0
[   15.703248]  ? __pfx_kthread+0x10/0x10
[   15.703271]  ret_from_fork+0x116/0x1d0
[   15.703291]  ? __pfx_kthread+0x10/0x10
[   15.703313]  ret_from_fork_asm+0x1a/0x30
[   15.703344]  </TASK>
[   15.703357] 
[   15.711048] Allocated by task 302:
[   15.711247]  kasan_save_stack+0x45/0x70
[   15.711434]  kasan_save_track+0x18/0x40
[   15.711574]  kasan_save_alloc_info+0x3b/0x50
[   15.711762]  __kasan_kmalloc+0xb7/0xc0
[   15.711982]  __kmalloc_noprof+0x1c9/0x500
[   15.712245]  kunit_kmalloc_array+0x25/0x60
[   15.712482]  copy_user_test_oob+0xab/0x10f0
[   15.712719]  kunit_try_run_case+0x1a5/0x480
[   15.712922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.713224]  kthread+0x337/0x6f0
[   15.713368]  ret_from_fork+0x116/0x1d0
[   15.713561]  ret_from_fork_asm+0x1a/0x30
[   15.713795] 
[   15.713873] The buggy address belongs to the object at ffff888103a21000
[   15.713873]  which belongs to the cache kmalloc-128 of size 128
[   15.714345] The buggy address is located 0 bytes inside of
[   15.714345]  allocated 120-byte region [ffff888103a21000, ffff888103a21078)
[   15.714872] 
[   15.714956] The buggy address belongs to the physical page:
[   15.715341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a21
[   15.715688] flags: 0x200000000000000(node=0|zone=2)
[   15.715879] page_type: f5(slab)
[   15.716012] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.716460] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.716687] page dumped because: kasan: bad access detected
[   15.717018] 
[   15.717168] Memory state around the buggy address:
[   15.717425]  ffff888103a20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.717731]  ffff888103a20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.717959] >ffff888103a21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.718174]                                                                 ^
[   15.718389]  ffff888103a21080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.718740]  ffff888103a21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.719066] ==================================================================
[   15.719605] ==================================================================
[   15.720204] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.720491] Read of size 121 at addr ffff888103a21000 by task kunit_try_catch/302
[   15.720828] 
[   15.720916] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.720983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.720996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.721019] Call Trace:
[   15.721046]  <TASK>
[   15.721062]  dump_stack_lvl+0x73/0xb0
[   15.721101]  print_report+0xd1/0x650
[   15.721125]  ? __virt_addr_valid+0x1db/0x2d0
[   15.721147]  ? copy_user_test_oob+0x604/0x10f0
[   15.721172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.721196]  ? copy_user_test_oob+0x604/0x10f0
[   15.721220]  kasan_report+0x141/0x180
[   15.721244]  ? copy_user_test_oob+0x604/0x10f0
[   15.721273]  kasan_check_range+0x10c/0x1c0
[   15.721298]  __kasan_check_read+0x15/0x20
[   15.721319]  copy_user_test_oob+0x604/0x10f0
[   15.721345]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.721369]  ? finish_task_switch.isra.0+0x153/0x700
[   15.721391]  ? __switch_to+0x47/0xf50
[   15.721417]  ? __schedule+0x10cc/0x2b60
[   15.721440]  ? __pfx_read_tsc+0x10/0x10
[   15.721462]  ? ktime_get_ts64+0x86/0x230
[   15.721487]  kunit_try_run_case+0x1a5/0x480
[   15.721512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.721536]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.721560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.721584]  ? __kthread_parkme+0x82/0x180
[   15.721605]  ? preempt_count_sub+0x50/0x80
[   15.721630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.721654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.721678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.721703]  kthread+0x337/0x6f0
[   15.721724]  ? trace_preempt_on+0x20/0xc0
[   15.721748]  ? __pfx_kthread+0x10/0x10
[   15.721770]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.721791]  ? calculate_sigpending+0x7b/0xa0
[   15.721817]  ? __pfx_kthread+0x10/0x10
[   15.721840]  ret_from_fork+0x116/0x1d0
[   15.721860]  ? __pfx_kthread+0x10/0x10
[   15.721882]  ret_from_fork_asm+0x1a/0x30
[   15.721921]  </TASK>
[   15.721934] 
[   15.729272] Allocated by task 302:
[   15.729463]  kasan_save_stack+0x45/0x70
[   15.729670]  kasan_save_track+0x18/0x40
[   15.729881]  kasan_save_alloc_info+0x3b/0x50
[   15.730220]  __kasan_kmalloc+0xb7/0xc0
[   15.730417]  __kmalloc_noprof+0x1c9/0x500
[   15.730625]  kunit_kmalloc_array+0x25/0x60
[   15.730819]  copy_user_test_oob+0xab/0x10f0
[   15.731048]  kunit_try_run_case+0x1a5/0x480
[   15.731229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.731407]  kthread+0x337/0x6f0
[   15.731529]  ret_from_fork+0x116/0x1d0
[   15.731691]  ret_from_fork_asm+0x1a/0x30
[   15.731889] 
[   15.731995] The buggy address belongs to the object at ffff888103a21000
[   15.731995]  which belongs to the cache kmalloc-128 of size 128
[   15.732989] The buggy address is located 0 bytes inside of
[   15.732989]  allocated 120-byte region [ffff888103a21000, ffff888103a21078)
[   15.733531] 
[   15.733654] The buggy address belongs to the physical page:
[   15.733896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a21
[   15.734247] flags: 0x200000000000000(node=0|zone=2)
[   15.734487] page_type: f5(slab)
[   15.734656] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.734909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.735737] page dumped because: kasan: bad access detected
[   15.736367] 
[   15.736537] Memory state around the buggy address:
[   15.737015]  ffff888103a20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.737760]  ffff888103a20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738236] >ffff888103a21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.738779]                                                                 ^
[   15.739350]  ffff888103a21080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.739816]  ffff888103a21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740329] ==================================================================