Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.610426] ==================================================================
[   23.610548] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   23.610671] Write of size 121 at addr fff00000c5942a00 by task kunit_try_catch/286
[   23.610867] 
[   23.610978] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.611266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.611365] Hardware name: linux,dummy-virt (DT)
[   23.611467] Call trace:
[   23.611540]  show_stack+0x20/0x38 (C)
[   23.611674]  dump_stack_lvl+0x8c/0xd0
[   23.611808]  print_report+0x118/0x608
[   23.611925]  kasan_report+0xdc/0x128
[   23.612020]  kasan_check_range+0x100/0x1a8
[   23.612175]  __kasan_check_write+0x20/0x30
[   23.612318]  copy_user_test_oob+0x434/0xec8
[   23.612748]  kunit_try_run_case+0x170/0x3f0
[   23.612893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.613317]  kthread+0x328/0x630
[   23.613602]  ret_from_fork+0x10/0x20
[   23.613864] 
[   23.613932] Allocated by task 286:
[   23.614038]  kasan_save_stack+0x3c/0x68
[   23.614171]  kasan_save_track+0x20/0x40
[   23.614295]  kasan_save_alloc_info+0x40/0x58
[   23.614400]  __kasan_kmalloc+0xd4/0xd8
[   23.614492]  __kmalloc_noprof+0x198/0x4c8
[   23.614581]  kunit_kmalloc_array+0x34/0x88
[   23.614675]  copy_user_test_oob+0xac/0xec8
[   23.614762]  kunit_try_run_case+0x170/0x3f0
[   23.614863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.614974]  kthread+0x328/0x630
[   23.615052]  ret_from_fork+0x10/0x20
[   23.615152] 
[   23.615220] The buggy address belongs to the object at fff00000c5942a00
[   23.615220]  which belongs to the cache kmalloc-128 of size 128
[   23.615417] The buggy address is located 0 bytes inside of
[   23.615417]  allocated 120-byte region [fff00000c5942a00, fff00000c5942a78)
[   23.615588] 
[   23.615661] The buggy address belongs to the physical page:
[   23.615758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.615877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.615971] page_type: f5(slab)
[   23.616055] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.616214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.616663] page dumped because: kasan: bad access detected
[   23.616753] 
[   23.616792] Memory state around the buggy address:
[   23.616880]  fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.616990]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.617101] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.617188]                                                                 ^
[   23.617324]  fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.617435]  fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.617539] ==================================================================
[   23.598130] ==================================================================
[   23.598320] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   23.598453] Read of size 121 at addr fff00000c5942a00 by task kunit_try_catch/286
[   23.599024] 
[   23.599108] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.599378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.599654] Hardware name: linux,dummy-virt (DT)
[   23.599762] Call trace:
[   23.600077]  show_stack+0x20/0x38 (C)
[   23.600228]  dump_stack_lvl+0x8c/0xd0
[   23.600453]  print_report+0x118/0x608
[   23.600564]  kasan_report+0xdc/0x128
[   23.600959]  kasan_check_range+0x100/0x1a8
[   23.601308]  __kasan_check_read+0x20/0x30
[   23.601548]  copy_user_test_oob+0x3c8/0xec8
[   23.601918]  kunit_try_run_case+0x170/0x3f0
[   23.602065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.602191]  kthread+0x328/0x630
[   23.602271]  ret_from_fork+0x10/0x20
[   23.602715] 
[   23.602765] Allocated by task 286:
[   23.602860]  kasan_save_stack+0x3c/0x68
[   23.603298]  kasan_save_track+0x20/0x40
[   23.603387]  kasan_save_alloc_info+0x40/0x58
[   23.603679]  __kasan_kmalloc+0xd4/0xd8
[   23.603812]  __kmalloc_noprof+0x198/0x4c8
[   23.604135]  kunit_kmalloc_array+0x34/0x88
[   23.604577]  copy_user_test_oob+0xac/0xec8
[   23.604946]  kunit_try_run_case+0x170/0x3f0
[   23.605194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.605628]  kthread+0x328/0x630
[   23.605792]  ret_from_fork+0x10/0x20
[   23.605892] 
[   23.605934] The buggy address belongs to the object at fff00000c5942a00
[   23.605934]  which belongs to the cache kmalloc-128 of size 128
[   23.606079] The buggy address is located 0 bytes inside of
[   23.606079]  allocated 120-byte region [fff00000c5942a00, fff00000c5942a78)
[   23.606240] 
[   23.606298] The buggy address belongs to the physical page:
[   23.606377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.606850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.607151] page_type: f5(slab)
[   23.607312] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.607433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.607543] page dumped because: kasan: bad access detected
[   23.607622] 
[   23.607674] Memory state around the buggy address:
[   23.607748]  fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.607915]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.608047] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.608429]                                                                 ^
[   23.608554]  fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.608685]  fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.608929] ==================================================================
[   23.583915] ==================================================================
[   23.584039] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   23.584474] Write of size 121 at addr fff00000c5942a00 by task kunit_try_catch/286
[   23.584632] 
[   23.584722] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.584930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.584997] Hardware name: linux,dummy-virt (DT)
[   23.585152] Call trace:
[   23.585222]  show_stack+0x20/0x38 (C)
[   23.585803]  dump_stack_lvl+0x8c/0xd0
[   23.585969]  print_report+0x118/0x608
[   23.586093]  kasan_report+0xdc/0x128
[   23.586240]  kasan_check_range+0x100/0x1a8
[   23.586852]  __kasan_check_write+0x20/0x30
[   23.586991]  copy_user_test_oob+0x35c/0xec8
[   23.587117]  kunit_try_run_case+0x170/0x3f0
[   23.587250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.587456]  kthread+0x328/0x630
[   23.587566]  ret_from_fork+0x10/0x20
[   23.587690] 
[   23.587739] Allocated by task 286:
[   23.587805]  kasan_save_stack+0x3c/0x68
[   23.587911]  kasan_save_track+0x20/0x40
[   23.588001]  kasan_save_alloc_info+0x40/0x58
[   23.588099]  __kasan_kmalloc+0xd4/0xd8
[   23.588188]  __kmalloc_noprof+0x198/0x4c8
[   23.588274]  kunit_kmalloc_array+0x34/0x88
[   23.588362]  copy_user_test_oob+0xac/0xec8
[   23.588447]  kunit_try_run_case+0x170/0x3f0
[   23.588540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.588646]  kthread+0x328/0x630
[   23.588722]  ret_from_fork+0x10/0x20
[   23.588855] 
[   23.588904] The buggy address belongs to the object at fff00000c5942a00
[   23.588904]  which belongs to the cache kmalloc-128 of size 128
[   23.589043] The buggy address is located 0 bytes inside of
[   23.589043]  allocated 120-byte region [fff00000c5942a00, fff00000c5942a78)
[   23.589177] 
[   23.589226] The buggy address belongs to the physical page:
[   23.589300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.591036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.591438] page_type: f5(slab)
[   23.591578] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.591803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.592135] page dumped because: kasan: bad access detected
[   23.592236] 
[   23.592400] Memory state around the buggy address:
[   23.592495]  fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.592599]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.593222] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.593686]                                                                 ^
[   23.593892]  fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.593997]  fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.594081] ==================================================================
[   23.562415] ==================================================================
[   23.565172] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   23.565346] Read of size 121 at addr fff00000c5942a00 by task kunit_try_catch/286
[   23.565795] 
[   23.565988] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.566330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.566496] Hardware name: linux,dummy-virt (DT)
[   23.566604] Call trace:
[   23.566768]  show_stack+0x20/0x38 (C)
[   23.566927]  dump_stack_lvl+0x8c/0xd0
[   23.567038]  print_report+0x118/0x608
[   23.567155]  kasan_report+0xdc/0x128
[   23.567273]  kasan_check_range+0x100/0x1a8
[   23.567393]  __kasan_check_read+0x20/0x30
[   23.567503]  copy_user_test_oob+0x728/0xec8
[   23.567624]  kunit_try_run_case+0x170/0x3f0
[   23.568159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.568554]  kthread+0x328/0x630
[   23.568688]  ret_from_fork+0x10/0x20
[   23.568865] 
[   23.569079] Allocated by task 286:
[   23.569178]  kasan_save_stack+0x3c/0x68
[   23.569262]  kasan_save_track+0x20/0x40
[   23.569306]  kasan_save_alloc_info+0x40/0x58
[   23.569352]  __kasan_kmalloc+0xd4/0xd8
[   23.569399]  __kmalloc_noprof+0x198/0x4c8
[   23.569471]  kunit_kmalloc_array+0x34/0x88
[   23.569516]  copy_user_test_oob+0xac/0xec8
[   23.569556]  kunit_try_run_case+0x170/0x3f0
[   23.569598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.569642]  kthread+0x328/0x630
[   23.569679]  ret_from_fork+0x10/0x20
[   23.569719] 
[   23.569743] The buggy address belongs to the object at fff00000c5942a00
[   23.569743]  which belongs to the cache kmalloc-128 of size 128
[   23.569806] The buggy address is located 0 bytes inside of
[   23.569806]  allocated 120-byte region [fff00000c5942a00, fff00000c5942a78)
[   23.570007] 
[   23.570060] The buggy address belongs to the physical page:
[   23.570143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.570245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.570357] page_type: f5(slab)
[   23.570454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.570655] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.570773] page dumped because: kasan: bad access detected
[   23.570876] 
[   23.570924] Memory state around the buggy address:
[   23.571019]  fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.571170]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.571302] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.571402]                                                                 ^
[   23.571546]  fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.571708]  fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.571850] ==================================================================
[   23.536835] ==================================================================
[   23.537009] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   23.537170] Write of size 121 at addr fff00000c5942a00 by task kunit_try_catch/286
[   23.537288] 
[   23.537369] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.537542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.537599] Hardware name: linux,dummy-virt (DT)
[   23.537671] Call trace:
[   23.537730]  show_stack+0x20/0x38 (C)
[   23.537873]  dump_stack_lvl+0x8c/0xd0
[   23.537985]  print_report+0x118/0x608
[   23.538084]  kasan_report+0xdc/0x128
[   23.538189]  kasan_check_range+0x100/0x1a8
[   23.539807]  __kasan_check_write+0x20/0x30
[   23.540021]  copy_user_test_oob+0x234/0xec8
[   23.540119]  kunit_try_run_case+0x170/0x3f0
[   23.540221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.540341]  kthread+0x328/0x630
[   23.540452]  ret_from_fork+0x10/0x20
[   23.540569] 
[   23.540618] Allocated by task 286:
[   23.540693]  kasan_save_stack+0x3c/0x68
[   23.540797]  kasan_save_track+0x20/0x40
[   23.540900]  kasan_save_alloc_info+0x40/0x58
[   23.540987]  __kasan_kmalloc+0xd4/0xd8
[   23.541076]  __kmalloc_noprof+0x198/0x4c8
[   23.541239]  kunit_kmalloc_array+0x34/0x88
[   23.541328]  copy_user_test_oob+0xac/0xec8
[   23.541421]  kunit_try_run_case+0x170/0x3f0
[   23.541516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.541765]  kthread+0x328/0x630
[   23.541929]  ret_from_fork+0x10/0x20
[   23.542062] 
[   23.542110] The buggy address belongs to the object at fff00000c5942a00
[   23.542110]  which belongs to the cache kmalloc-128 of size 128
[   23.542615] The buggy address is located 0 bytes inside of
[   23.542615]  allocated 120-byte region [fff00000c5942a00, fff00000c5942a78)
[   23.542938] 
[   23.543157] The buggy address belongs to the physical page:
[   23.543448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.543660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.544068] page_type: f5(slab)
[   23.544190] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.544316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.544417] page dumped because: kasan: bad access detected
[   23.544502] 
[   23.544554] Memory state around the buggy address:
[   23.544635]  fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.544746]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.544866] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.544958]                                                                 ^
[   23.545060]  fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.545806]  fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.545973] ==================================================================
[   23.618890] ==================================================================
[   23.619005] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   23.619119] Read of size 121 at addr fff00000c5942a00 by task kunit_try_catch/286
[   23.619223] 
[   23.619281] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.619469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.619529] Hardware name: linux,dummy-virt (DT)
[   23.619603] Call trace:
[   23.619653]  show_stack+0x20/0x38 (C)
[   23.619763]  dump_stack_lvl+0x8c/0xd0
[   23.619880]  print_report+0x118/0x608
[   23.619983]  kasan_report+0xdc/0x128
[   23.620086]  kasan_check_range+0x100/0x1a8
[   23.620198]  __kasan_check_read+0x20/0x30
[   23.620302]  copy_user_test_oob+0x4a0/0xec8
[   23.620406]  kunit_try_run_case+0x170/0x3f0
[   23.620516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.620633]  kthread+0x328/0x630
[   23.620729]  ret_from_fork+0x10/0x20
[   23.620858] 
[   23.620898] Allocated by task 286:
[   23.620960]  kasan_save_stack+0x3c/0x68
[   23.621047]  kasan_save_track+0x20/0x40
[   23.621139]  kasan_save_alloc_info+0x40/0x58
[   23.621559]  __kasan_kmalloc+0xd4/0xd8
[   23.621691]  __kmalloc_noprof+0x198/0x4c8
[   23.621775]  kunit_kmalloc_array+0x34/0x88
[   23.621867]  copy_user_test_oob+0xac/0xec8
[   23.621939]  kunit_try_run_case+0x170/0x3f0
[   23.622051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.622172]  kthread+0x328/0x630
[   23.622248]  ret_from_fork+0x10/0x20
[   23.622329] 
[   23.622886] The buggy address belongs to the object at fff00000c5942a00
[   23.622886]  which belongs to the cache kmalloc-128 of size 128
[   23.623331] The buggy address is located 0 bytes inside of
[   23.623331]  allocated 120-byte region [fff00000c5942a00, fff00000c5942a78)
[   23.623625] 
[   23.623692] The buggy address belongs to the physical page:
[   23.623774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.623920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.624032] page_type: f5(slab)
[   23.624122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.624266] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.624372] page dumped because: kasan: bad access detected
[   23.624452] 
[   23.624503] Memory state around the buggy address:
[   23.624580]  fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.624691]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.624806] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.624924]                                                                 ^
[   23.625033]  fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.625154]  fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.625259] ==================================================================

[   16.887316] ==================================================================
[   16.888115] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.888410] Write of size 121 at addr ffff888103ad9000 by task kunit_try_catch/303
[   16.889035] 
[   16.889248] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.889391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.889427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.889508] Call Trace:
[   16.889525]  <TASK>
[   16.889541]  dump_stack_lvl+0x73/0xb0
[   16.889574]  print_report+0xd1/0x650
[   16.889599]  ? __virt_addr_valid+0x1db/0x2d0
[   16.889623]  ? copy_user_test_oob+0x557/0x10f0
[   16.889671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.889696]  ? copy_user_test_oob+0x557/0x10f0
[   16.889873]  kasan_report+0x141/0x180
[   16.889901]  ? copy_user_test_oob+0x557/0x10f0
[   16.889931]  kasan_check_range+0x10c/0x1c0
[   16.889956]  __kasan_check_write+0x18/0x20
[   16.889978]  copy_user_test_oob+0x557/0x10f0
[   16.890004]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.890029]  ? finish_task_switch.isra.0+0x153/0x700
[   16.890055]  ? __switch_to+0x47/0xf50
[   16.890083]  ? __schedule+0x10cc/0x2b60
[   16.890107]  ? __pfx_read_tsc+0x10/0x10
[   16.890130]  ? ktime_get_ts64+0x86/0x230
[   16.890155]  kunit_try_run_case+0x1a5/0x480
[   16.890181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.890206]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.890232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.890258]  ? __kthread_parkme+0x82/0x180
[   16.890280]  ? preempt_count_sub+0x50/0x80
[   16.890305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.890332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.890358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.890391]  kthread+0x337/0x6f0
[   16.890412]  ? trace_preempt_on+0x20/0xc0
[   16.890436]  ? __pfx_kthread+0x10/0x10
[   16.890457]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.890481]  ? calculate_sigpending+0x7b/0xa0
[   16.890507]  ? __pfx_kthread+0x10/0x10
[   16.890530]  ret_from_fork+0x116/0x1d0
[   16.890550]  ? __pfx_kthread+0x10/0x10
[   16.890572]  ret_from_fork_asm+0x1a/0x30
[   16.890603]  </TASK>
[   16.890614] 
[   16.900504] Allocated by task 303:
[   16.900687]  kasan_save_stack+0x45/0x70
[   16.900925]  kasan_save_track+0x18/0x40
[   16.901214]  kasan_save_alloc_info+0x3b/0x50
[   16.901423]  __kasan_kmalloc+0xb7/0xc0
[   16.901610]  __kmalloc_noprof+0x1c9/0x500
[   16.901853]  kunit_kmalloc_array+0x25/0x60
[   16.902158]  copy_user_test_oob+0xab/0x10f0
[   16.902366]  kunit_try_run_case+0x1a5/0x480
[   16.902592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.902845]  kthread+0x337/0x6f0
[   16.903032]  ret_from_fork+0x116/0x1d0
[   16.903223]  ret_from_fork_asm+0x1a/0x30
[   16.903441] 
[   16.903581] The buggy address belongs to the object at ffff888103ad9000
[   16.903581]  which belongs to the cache kmalloc-128 of size 128
[   16.904715] The buggy address is located 0 bytes inside of
[   16.904715]  allocated 120-byte region [ffff888103ad9000, ffff888103ad9078)
[   16.905120] 
[   16.905225] The buggy address belongs to the physical page:
[   16.905479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad9
[   16.906039] flags: 0x200000000000000(node=0|zone=2)
[   16.906262] page_type: f5(slab)
[   16.906388] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.906714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.906948] page dumped because: kasan: bad access detected
[   16.907119] 
[   16.907188] Memory state around the buggy address:
[   16.907340]  ffff888103ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.907552]  ffff888103ad8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.907776] >ffff888103ad9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.907986]                                                                 ^
[   16.908274]  ffff888103ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.908604]  ffff888103ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.908950] ==================================================================
[   16.846132] ==================================================================
[   16.846477] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.846763] Write of size 121 at addr ffff888103ad9000 by task kunit_try_catch/303
[   16.847178] 
[   16.847278] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.847322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.847335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.847356] Call Trace:
[   16.847371]  <TASK>
[   16.847388]  dump_stack_lvl+0x73/0xb0
[   16.847418]  print_report+0xd1/0x650
[   16.847442]  ? __virt_addr_valid+0x1db/0x2d0
[   16.847465]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.847491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.847516]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.847541]  kasan_report+0x141/0x180
[   16.847565]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.847594]  kasan_check_range+0x10c/0x1c0
[   16.847619]  __kasan_check_write+0x18/0x20
[   16.847640]  copy_user_test_oob+0x3fd/0x10f0
[   16.847667]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.847703]  ? finish_task_switch.isra.0+0x153/0x700
[   16.847728]  ? __switch_to+0x47/0xf50
[   16.847766]  ? __schedule+0x10cc/0x2b60
[   16.847789]  ? __pfx_read_tsc+0x10/0x10
[   16.847811]  ? ktime_get_ts64+0x86/0x230
[   16.847836]  kunit_try_run_case+0x1a5/0x480
[   16.847861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.847886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.847911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.847938]  ? __kthread_parkme+0x82/0x180
[   16.847960]  ? preempt_count_sub+0x50/0x80
[   16.847985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.848012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.848038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.848065]  kthread+0x337/0x6f0
[   16.848085]  ? trace_preempt_on+0x20/0xc0
[   16.848110]  ? __pfx_kthread+0x10/0x10
[   16.848132]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.848155]  ? calculate_sigpending+0x7b/0xa0
[   16.848181]  ? __pfx_kthread+0x10/0x10
[   16.848204]  ret_from_fork+0x116/0x1d0
[   16.848224]  ? __pfx_kthread+0x10/0x10
[   16.848246]  ret_from_fork_asm+0x1a/0x30
[   16.848277]  </TASK>
[   16.848289] 
[   16.855282] Allocated by task 303:
[   16.855454]  kasan_save_stack+0x45/0x70
[   16.855596]  kasan_save_track+0x18/0x40
[   16.855913]  kasan_save_alloc_info+0x3b/0x50
[   16.856125]  __kasan_kmalloc+0xb7/0xc0
[   16.856280]  __kmalloc_noprof+0x1c9/0x500
[   16.856421]  kunit_kmalloc_array+0x25/0x60
[   16.856576]  copy_user_test_oob+0xab/0x10f0
[   16.856916]  kunit_try_run_case+0x1a5/0x480
[   16.857131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.857388]  kthread+0x337/0x6f0
[   16.857560]  ret_from_fork+0x116/0x1d0
[   16.857760]  ret_from_fork_asm+0x1a/0x30
[   16.857953] 
[   16.858044] The buggy address belongs to the object at ffff888103ad9000
[   16.858044]  which belongs to the cache kmalloc-128 of size 128
[   16.858492] The buggy address is located 0 bytes inside of
[   16.858492]  allocated 120-byte region [ffff888103ad9000, ffff888103ad9078)
[   16.858966] 
[   16.859037] The buggy address belongs to the physical page:
[   16.859208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad9
[   16.859450] flags: 0x200000000000000(node=0|zone=2)
[   16.859665] page_type: f5(slab)
[   16.859844] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.860186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.860524] page dumped because: kasan: bad access detected
[   16.860700] 
[   16.860782] Memory state around the buggy address:
[   16.860938]  ffff888103ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861156]  ffff888103ad8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861657] >ffff888103ad9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.861991]                                                                 ^
[   16.862321]  ffff888103ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.862657]  ffff888103ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.863101] ==================================================================
[   16.909481] ==================================================================
[   16.909713] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.910175] Read of size 121 at addr ffff888103ad9000 by task kunit_try_catch/303
[   16.910766] 
[   16.910891] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.910937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.910950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.910972] Call Trace:
[   16.910985]  <TASK>
[   16.911000]  dump_stack_lvl+0x73/0xb0
[   16.911051]  print_report+0xd1/0x650
[   16.911076]  ? __virt_addr_valid+0x1db/0x2d0
[   16.911115]  ? copy_user_test_oob+0x604/0x10f0
[   16.911155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.911208]  ? copy_user_test_oob+0x604/0x10f0
[   16.911246]  kasan_report+0x141/0x180
[   16.911282]  ? copy_user_test_oob+0x604/0x10f0
[   16.911312]  kasan_check_range+0x10c/0x1c0
[   16.911350]  __kasan_check_read+0x15/0x20
[   16.911370]  copy_user_test_oob+0x604/0x10f0
[   16.911397]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.911421]  ? finish_task_switch.isra.0+0x153/0x700
[   16.911446]  ? __switch_to+0x47/0xf50
[   16.911472]  ? __schedule+0x10cc/0x2b60
[   16.911495]  ? __pfx_read_tsc+0x10/0x10
[   16.911517]  ? ktime_get_ts64+0x86/0x230
[   16.911541]  kunit_try_run_case+0x1a5/0x480
[   16.911567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.911591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.911616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.911642]  ? __kthread_parkme+0x82/0x180
[   16.911664]  ? preempt_count_sub+0x50/0x80
[   16.911723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.911759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.911786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.911812]  kthread+0x337/0x6f0
[   16.911833]  ? trace_preempt_on+0x20/0xc0
[   16.911858]  ? __pfx_kthread+0x10/0x10
[   16.911880]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.911903]  ? calculate_sigpending+0x7b/0xa0
[   16.911928]  ? __pfx_kthread+0x10/0x10
[   16.911952]  ret_from_fork+0x116/0x1d0
[   16.911971]  ? __pfx_kthread+0x10/0x10
[   16.911992]  ret_from_fork_asm+0x1a/0x30
[   16.912024]  </TASK>
[   16.912035] 
[   16.922237] Allocated by task 303:
[   16.922467]  kasan_save_stack+0x45/0x70
[   16.922630]  kasan_save_track+0x18/0x40
[   16.922780]  kasan_save_alloc_info+0x3b/0x50
[   16.922931]  __kasan_kmalloc+0xb7/0xc0
[   16.923119]  __kmalloc_noprof+0x1c9/0x500
[   16.923321]  kunit_kmalloc_array+0x25/0x60
[   16.923564]  copy_user_test_oob+0xab/0x10f0
[   16.923922]  kunit_try_run_case+0x1a5/0x480
[   16.924151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.924358]  kthread+0x337/0x6f0
[   16.924477]  ret_from_fork+0x116/0x1d0
[   16.924608]  ret_from_fork_asm+0x1a/0x30
[   16.924763] 
[   16.924834] The buggy address belongs to the object at ffff888103ad9000
[   16.924834]  which belongs to the cache kmalloc-128 of size 128
[   16.925182] The buggy address is located 0 bytes inside of
[   16.925182]  allocated 120-byte region [ffff888103ad9000, ffff888103ad9078)
[   16.925734] 
[   16.925865] The buggy address belongs to the physical page:
[   16.926163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad9
[   16.926570] flags: 0x200000000000000(node=0|zone=2)
[   16.926842] page_type: f5(slab)
[   16.927052] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.927398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.927743] page dumped because: kasan: bad access detected
[   16.928018] 
[   16.928109] Memory state around the buggy address:
[   16.928293]  ffff888103ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.928541]  ffff888103ad8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.928886] >ffff888103ad9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.929125]                                                                 ^
[   16.929422]  ffff888103ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.929695]  ffff888103ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.930019] ==================================================================
[   16.863728] ==================================================================
[   16.865199] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.865523] Read of size 121 at addr ffff888103ad9000 by task kunit_try_catch/303
[   16.866436] 
[   16.866766] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.866816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.866830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.866851] Call Trace:
[   16.866867]  <TASK>
[   16.866884]  dump_stack_lvl+0x73/0xb0
[   16.866924]  print_report+0xd1/0x650
[   16.866948]  ? __virt_addr_valid+0x1db/0x2d0
[   16.866972]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.866997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.867022]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.867047]  kasan_report+0x141/0x180
[   16.867071]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.867100]  kasan_check_range+0x10c/0x1c0
[   16.867125]  __kasan_check_read+0x15/0x20
[   16.867146]  copy_user_test_oob+0x4aa/0x10f0
[   16.867174]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.867200]  ? finish_task_switch.isra.0+0x153/0x700
[   16.867224]  ? __switch_to+0x47/0xf50
[   16.867251]  ? __schedule+0x10cc/0x2b60
[   16.867277]  ? __pfx_read_tsc+0x10/0x10
[   16.867301]  ? ktime_get_ts64+0x86/0x230
[   16.867326]  kunit_try_run_case+0x1a5/0x480
[   16.867352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.867377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.867404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.867429]  ? __kthread_parkme+0x82/0x180
[   16.867451]  ? preempt_count_sub+0x50/0x80
[   16.867476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.867503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.867529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.867556]  kthread+0x337/0x6f0
[   16.867577]  ? trace_preempt_on+0x20/0xc0
[   16.867602]  ? __pfx_kthread+0x10/0x10
[   16.867624]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.867647]  ? calculate_sigpending+0x7b/0xa0
[   16.867672]  ? __pfx_kthread+0x10/0x10
[   16.867695]  ret_from_fork+0x116/0x1d0
[   16.867715]  ? __pfx_kthread+0x10/0x10
[   16.867736]  ret_from_fork_asm+0x1a/0x30
[   16.867777]  </TASK>
[   16.867789] 
[   16.874979] Allocated by task 303:
[   16.875106]  kasan_save_stack+0x45/0x70
[   16.875283]  kasan_save_track+0x18/0x40
[   16.875496]  kasan_save_alloc_info+0x3b/0x50
[   16.875860]  __kasan_kmalloc+0xb7/0xc0
[   16.876303]  __kmalloc_noprof+0x1c9/0x500
[   16.876582]  kunit_kmalloc_array+0x25/0x60
[   16.877244]  copy_user_test_oob+0xab/0x10f0
[   16.878141]  kunit_try_run_case+0x1a5/0x480
[   16.878322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.878602]  kthread+0x337/0x6f0
[   16.878828]  ret_from_fork+0x116/0x1d0
[   16.879035]  ret_from_fork_asm+0x1a/0x30
[   16.879512] 
[   16.879589] The buggy address belongs to the object at ffff888103ad9000
[   16.879589]  which belongs to the cache kmalloc-128 of size 128
[   16.880492] The buggy address is located 0 bytes inside of
[   16.880492]  allocated 120-byte region [ffff888103ad9000, ffff888103ad9078)
[   16.881242] 
[   16.881324] The buggy address belongs to the physical page:
[   16.881581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad9
[   16.882135] flags: 0x200000000000000(node=0|zone=2)
[   16.882389] page_type: f5(slab)
[   16.882663] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.883126] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.883429] page dumped because: kasan: bad access detected
[   16.883863] 
[   16.883986] Memory state around the buggy address:
[   16.884315]  ffff888103ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.884614]  ffff888103ad8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.885057] >ffff888103ad9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.885437]                                                                 ^
[   16.885828]  ffff888103ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.886135]  ffff888103ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.886449] ==================================================================