Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.634059] ==================================================================
[   19.634218] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.634281] Write of size 121 at addr fff00000c7897b00 by task kunit_try_catch/285
[   19.634336] 
[   19.634369] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.634456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.634485] Hardware name: linux,dummy-virt (DT)
[   19.634641] Call trace:
[   19.634689]  show_stack+0x20/0x38 (C)
[   19.634760]  dump_stack_lvl+0x8c/0xd0
[   19.634814]  print_report+0x118/0x5d0
[   19.635082]  kasan_report+0xdc/0x128
[   19.635154]  kasan_check_range+0x100/0x1a8
[   19.635252]  __kasan_check_write+0x20/0x30
[   19.635312]  copy_user_test_oob+0x35c/0xec8
[   19.635362]  kunit_try_run_case+0x170/0x3f0
[   19.635426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.635481]  kthread+0x328/0x630
[   19.635802]  ret_from_fork+0x10/0x20
[   19.635891] 
[   19.635922] Allocated by task 285:
[   19.635967]  kasan_save_stack+0x3c/0x68
[   19.636020]  kasan_save_track+0x20/0x40
[   19.636061]  kasan_save_alloc_info+0x40/0x58
[   19.636103]  __kasan_kmalloc+0xd4/0xd8
[   19.636150]  __kmalloc_noprof+0x198/0x4c8
[   19.636203]  kunit_kmalloc_array+0x34/0x88
[   19.636244]  copy_user_test_oob+0xac/0xec8
[   19.636285]  kunit_try_run_case+0x170/0x3f0
[   19.636324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.636565]  kthread+0x328/0x630
[   19.636763]  ret_from_fork+0x10/0x20
[   19.636983] 
[   19.637060] The buggy address belongs to the object at fff00000c7897b00
[   19.637060]  which belongs to the cache kmalloc-128 of size 128
[   19.637238] The buggy address is located 0 bytes inside of
[   19.637238]  allocated 120-byte region [fff00000c7897b00, fff00000c7897b78)
[   19.637362] 
[   19.637465] The buggy address belongs to the physical page:
[   19.637570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.637627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.637677] page_type: f5(slab)
[   19.637757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.637916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.637979] page dumped because: kasan: bad access detected
[   19.638111] 
[   19.638191] Memory state around the buggy address:
[   19.638244]  fff00000c7897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.638335]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.638593] >fff00000c7897b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.638700]                                                                 ^
[   19.639007]  fff00000c7897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.639113]  fff00000c7897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.639157] ==================================================================
[   19.644498] ==================================================================
[   19.644553] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.644602] Write of size 121 at addr fff00000c7897b00 by task kunit_try_catch/285
[   19.644821] 
[   19.644888] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.644976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.645026] Hardware name: linux,dummy-virt (DT)
[   19.645086] Call trace:
[   19.645109]  show_stack+0x20/0x38 (C)
[   19.645160]  dump_stack_lvl+0x8c/0xd0
[   19.645217]  print_report+0x118/0x5d0
[   19.645359]  kasan_report+0xdc/0x128
[   19.645571]  kasan_check_range+0x100/0x1a8
[   19.645665]  __kasan_check_write+0x20/0x30
[   19.645714]  copy_user_test_oob+0x434/0xec8
[   19.645856]  kunit_try_run_case+0x170/0x3f0
[   19.645986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.646051]  kthread+0x328/0x630
[   19.646095]  ret_from_fork+0x10/0x20
[   19.646369] 
[   19.646431] Allocated by task 285:
[   19.646466]  kasan_save_stack+0x3c/0x68
[   19.646552]  kasan_save_track+0x20/0x40
[   19.646621]  kasan_save_alloc_info+0x40/0x58
[   19.646695]  __kasan_kmalloc+0xd4/0xd8
[   19.646860]  __kmalloc_noprof+0x198/0x4c8
[   19.646905]  kunit_kmalloc_array+0x34/0x88
[   19.646944]  copy_user_test_oob+0xac/0xec8
[   19.647060]  kunit_try_run_case+0x170/0x3f0
[   19.647106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.647249]  kthread+0x328/0x630
[   19.647348]  ret_from_fork+0x10/0x20
[   19.647431] 
[   19.647499] The buggy address belongs to the object at fff00000c7897b00
[   19.647499]  which belongs to the cache kmalloc-128 of size 128
[   19.647644] The buggy address is located 0 bytes inside of
[   19.647644]  allocated 120-byte region [fff00000c7897b00, fff00000c7897b78)
[   19.647785] 
[   19.647836] The buggy address belongs to the physical page:
[   19.647871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.647929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.647979] page_type: f5(slab)
[   19.648298] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.648505] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.648613] page dumped because: kasan: bad access detected
[   19.648668] 
[   19.648688] Memory state around the buggy address:
[   19.648723]  fff00000c7897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.648976]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.649084] >fff00000c7897b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.649253]                                                                 ^
[   19.649339]  fff00000c7897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.649499]  fff00000c7897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.649629] ==================================================================
[   19.624524] ==================================================================
[   19.624585] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.624663] Read of size 121 at addr fff00000c7897b00 by task kunit_try_catch/285
[   19.624720] 
[   19.624771] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.624859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.624999] Hardware name: linux,dummy-virt (DT)
[   19.625121] Call trace:
[   19.625169]  show_stack+0x20/0x38 (C)
[   19.625238]  dump_stack_lvl+0x8c/0xd0
[   19.625332]  print_report+0x118/0x5d0
[   19.625406]  kasan_report+0xdc/0x128
[   19.625537]  kasan_check_range+0x100/0x1a8
[   19.625697]  __kasan_check_read+0x20/0x30
[   19.625754]  copy_user_test_oob+0x728/0xec8
[   19.625805]  kunit_try_run_case+0x170/0x3f0
[   19.625853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.625906]  kthread+0x328/0x630
[   19.625953]  ret_from_fork+0x10/0x20
[   19.626000] 
[   19.626019] Allocated by task 285:
[   19.626051]  kasan_save_stack+0x3c/0x68
[   19.626094]  kasan_save_track+0x20/0x40
[   19.626318]  kasan_save_alloc_info+0x40/0x58
[   19.626398]  __kasan_kmalloc+0xd4/0xd8
[   19.626449]  __kmalloc_noprof+0x198/0x4c8
[   19.626491]  kunit_kmalloc_array+0x34/0x88
[   19.626550]  copy_user_test_oob+0xac/0xec8
[   19.626591]  kunit_try_run_case+0x170/0x3f0
[   19.626640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.626687]  kthread+0x328/0x630
[   19.626720]  ret_from_fork+0x10/0x20
[   19.626758] 
[   19.626780] The buggy address belongs to the object at fff00000c7897b00
[   19.626780]  which belongs to the cache kmalloc-128 of size 128
[   19.626850] The buggy address is located 0 bytes inside of
[   19.626850]  allocated 120-byte region [fff00000c7897b00, fff00000c7897b78)
[   19.626916] 
[   19.626937] The buggy address belongs to the physical page:
[   19.626969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.627025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.627083] page_type: f5(slab)
[   19.627131] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.627377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.627676] page dumped because: kasan: bad access detected
[   19.627763] 
[   19.627830] Memory state around the buggy address:
[   19.627869]  fff00000c7897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.627917]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.627963] >fff00000c7897b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.628005]                                                                 ^
[   19.628050]  fff00000c7897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628096]  fff00000c7897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628138] ==================================================================
[   19.650124] ==================================================================
[   19.650189] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   19.650238] Read of size 121 at addr fff00000c7897b00 by task kunit_try_catch/285
[   19.650291] 
[   19.650454] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.650713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.650750] Hardware name: linux,dummy-virt (DT)
[   19.650808] Call trace:
[   19.650899]  show_stack+0x20/0x38 (C)
[   19.651097]  dump_stack_lvl+0x8c/0xd0
[   19.651183]  print_report+0x118/0x5d0
[   19.651322]  kasan_report+0xdc/0x128
[   19.651418]  kasan_check_range+0x100/0x1a8
[   19.651469]  __kasan_check_read+0x20/0x30
[   19.651534]  copy_user_test_oob+0x4a0/0xec8
[   19.651584]  kunit_try_run_case+0x170/0x3f0
[   19.651748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.651813]  kthread+0x328/0x630
[   19.651892]  ret_from_fork+0x10/0x20
[   19.652042] 
[   19.652109] Allocated by task 285:
[   19.652238]  kasan_save_stack+0x3c/0x68
[   19.652321]  kasan_save_track+0x20/0x40
[   19.652558]  kasan_save_alloc_info+0x40/0x58
[   19.652680]  __kasan_kmalloc+0xd4/0xd8
[   19.652797]  __kmalloc_noprof+0x198/0x4c8
[   19.652944]  kunit_kmalloc_array+0x34/0x88
[   19.653071]  copy_user_test_oob+0xac/0xec8
[   19.653214]  kunit_try_run_case+0x170/0x3f0
[   19.653256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.653311]  kthread+0x328/0x630
[   19.653347]  ret_from_fork+0x10/0x20
[   19.653385] 
[   19.653417] The buggy address belongs to the object at fff00000c7897b00
[   19.653417]  which belongs to the cache kmalloc-128 of size 128
[   19.653479] The buggy address is located 0 bytes inside of
[   19.653479]  allocated 120-byte region [fff00000c7897b00, fff00000c7897b78)
[   19.653581] 
[   19.653613] The buggy address belongs to the physical page:
[   19.653660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.653717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.653778] page_type: f5(slab)
[   19.653833] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.653896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.653953] page dumped because: kasan: bad access detected
[   19.653995] 
[   19.654016] Memory state around the buggy address:
[   19.654051]  fff00000c7897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.654097]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.654142] >fff00000c7897b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.654668]                                                                 ^
[   19.654850]  fff00000c7897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.655023]  fff00000c7897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.655133] ==================================================================
[   19.640013] ==================================================================
[   19.640067] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.640511] Read of size 121 at addr fff00000c7897b00 by task kunit_try_catch/285
[   19.640591] 
[   19.640625] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.640830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.640937] Hardware name: linux,dummy-virt (DT)
[   19.640972] Call trace:
[   19.640996]  show_stack+0x20/0x38 (C)
[   19.641046]  dump_stack_lvl+0x8c/0xd0
[   19.641094]  print_report+0x118/0x5d0
[   19.641154]  kasan_report+0xdc/0x128
[   19.641213]  kasan_check_range+0x100/0x1a8
[   19.641264]  __kasan_check_read+0x20/0x30
[   19.641308]  copy_user_test_oob+0x3c8/0xec8
[   19.641358]  kunit_try_run_case+0x170/0x3f0
[   19.641406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.641459]  kthread+0x328/0x630
[   19.641503]  ret_from_fork+0x10/0x20
[   19.641551] 
[   19.641571] Allocated by task 285:
[   19.641601]  kasan_save_stack+0x3c/0x68
[   19.641642]  kasan_save_track+0x20/0x40
[   19.641681]  kasan_save_alloc_info+0x40/0x58
[   19.641735]  __kasan_kmalloc+0xd4/0xd8
[   19.641776]  __kmalloc_noprof+0x198/0x4c8
[   19.641815]  kunit_kmalloc_array+0x34/0x88
[   19.641871]  copy_user_test_oob+0xac/0xec8
[   19.641912]  kunit_try_run_case+0x170/0x3f0
[   19.641956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.642282]  kthread+0x328/0x630
[   19.642320]  ret_from_fork+0x10/0x20
[   19.642574] 
[   19.642664] The buggy address belongs to the object at fff00000c7897b00
[   19.642664]  which belongs to the cache kmalloc-128 of size 128
[   19.642772] The buggy address is located 0 bytes inside of
[   19.642772]  allocated 120-byte region [fff00000c7897b00, fff00000c7897b78)
[   19.642887] 
[   19.642937] The buggy address belongs to the physical page:
[   19.642976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.643040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.643121] page_type: f5(slab)
[   19.643198] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.643260] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.643304] page dumped because: kasan: bad access detected
[   19.643358] 
[   19.643452] Memory state around the buggy address:
[   19.643488]  fff00000c7897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.643577]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.643624] >fff00000c7897b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.643665]                                                                 ^
[   19.643710]  fff00000c7897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.643755]  fff00000c7897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.643933] ==================================================================
[   19.615091] ==================================================================
[   19.615262] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.615383] Write of size 121 at addr fff00000c7897b00 by task kunit_try_catch/285
[   19.615440] 
[   19.615505] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.615639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.615670] Hardware name: linux,dummy-virt (DT)
[   19.615864] Call trace:
[   19.615897]  show_stack+0x20/0x38 (C)
[   19.616057]  dump_stack_lvl+0x8c/0xd0
[   19.616210]  print_report+0x118/0x5d0
[   19.616281]  kasan_report+0xdc/0x128
[   19.616360]  kasan_check_range+0x100/0x1a8
[   19.616458]  __kasan_check_write+0x20/0x30
[   19.616633]  copy_user_test_oob+0x234/0xec8
[   19.616704]  kunit_try_run_case+0x170/0x3f0
[   19.616757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.616812]  kthread+0x328/0x630
[   19.616855]  ret_from_fork+0x10/0x20
[   19.616906] 
[   19.617145] Allocated by task 285:
[   19.617198]  kasan_save_stack+0x3c/0x68
[   19.617277]  kasan_save_track+0x20/0x40
[   19.617317]  kasan_save_alloc_info+0x40/0x58
[   19.617361]  __kasan_kmalloc+0xd4/0xd8
[   19.617399]  __kmalloc_noprof+0x198/0x4c8
[   19.617462]  kunit_kmalloc_array+0x34/0x88
[   19.617628]  copy_user_test_oob+0xac/0xec8
[   19.617697]  kunit_try_run_case+0x170/0x3f0
[   19.617800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.617959]  kthread+0x328/0x630
[   19.618100]  ret_from_fork+0x10/0x20
[   19.618203] 
[   19.618235] The buggy address belongs to the object at fff00000c7897b00
[   19.618235]  which belongs to the cache kmalloc-128 of size 128
[   19.618308] The buggy address is located 0 bytes inside of
[   19.618308]  allocated 120-byte region [fff00000c7897b00, fff00000c7897b78)
[   19.618405] 
[   19.618448] The buggy address belongs to the physical page:
[   19.618484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.618573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.618791] page_type: f5(slab)
[   19.618889] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.618944] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.619005] page dumped because: kasan: bad access detected
[   19.619040] 
[   19.619060] Memory state around the buggy address:
[   19.619315]  fff00000c7897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.619406]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619493] >fff00000c7897b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.619543]                                                                 ^
[   19.619598]  fff00000c7897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619672]  fff00000c7897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619769] ==================================================================

[   16.869527] ==================================================================
[   16.869874] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.870207] Read of size 121 at addr ffff888103a67500 by task kunit_try_catch/302
[   16.870890] 
[   16.871001] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.871045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.871058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.871080] Call Trace:
[   16.871096]  <TASK>
[   16.871111]  dump_stack_lvl+0x73/0xb0
[   16.871140]  print_report+0xd1/0x610
[   16.871163]  ? __virt_addr_valid+0x1db/0x2d0
[   16.871187]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.871212]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.871237]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.871276]  kasan_report+0x141/0x180
[   16.871300]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.871329]  kasan_check_range+0x10c/0x1c0
[   16.871354]  __kasan_check_read+0x15/0x20
[   16.871375]  copy_user_test_oob+0x4aa/0x10f0
[   16.871402]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.871427]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.871459]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.871488]  kunit_try_run_case+0x1a5/0x480
[   16.871513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.871538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.871563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.871588]  ? __kthread_parkme+0x82/0x180
[   16.871609]  ? preempt_count_sub+0x50/0x80
[   16.871646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.871672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.871710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.871737]  kthread+0x337/0x6f0
[   16.871758]  ? trace_preempt_on+0x20/0xc0
[   16.871782]  ? __pfx_kthread+0x10/0x10
[   16.871804]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.871827]  ? calculate_sigpending+0x7b/0xa0
[   16.871853]  ? __pfx_kthread+0x10/0x10
[   16.871876]  ret_from_fork+0x116/0x1d0
[   16.871896]  ? __pfx_kthread+0x10/0x10
[   16.871918]  ret_from_fork_asm+0x1a/0x30
[   16.871950]  </TASK>
[   16.871960] 
[   16.878747] Allocated by task 302:
[   16.878917]  kasan_save_stack+0x45/0x70
[   16.879135]  kasan_save_track+0x18/0x40
[   16.879338]  kasan_save_alloc_info+0x3b/0x50
[   16.879522]  __kasan_kmalloc+0xb7/0xc0
[   16.879657]  __kmalloc_noprof+0x1c9/0x500
[   16.879801]  kunit_kmalloc_array+0x25/0x60
[   16.879986]  copy_user_test_oob+0xab/0x10f0
[   16.880209]  kunit_try_run_case+0x1a5/0x480
[   16.880427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.880679]  kthread+0x337/0x6f0
[   16.880846]  ret_from_fork+0x116/0x1d0
[   16.881008]  ret_from_fork_asm+0x1a/0x30
[   16.881149] 
[   16.881239] The buggy address belongs to the object at ffff888103a67500
[   16.881239]  which belongs to the cache kmalloc-128 of size 128
[   16.881815] The buggy address is located 0 bytes inside of
[   16.881815]  allocated 120-byte region [ffff888103a67500, ffff888103a67578)
[   16.882330] 
[   16.882429] The buggy address belongs to the physical page:
[   16.882648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a67
[   16.882997] flags: 0x200000000000000(node=0|zone=2)
[   16.883224] page_type: f5(slab)
[   16.883353] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.883587] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.883815] page dumped because: kasan: bad access detected
[   16.884089] 
[   16.884183] Memory state around the buggy address:
[   16.884412]  ffff888103a67400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.884731]  ffff888103a67480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.885053] >ffff888103a67500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.885354]                                                                 ^
[   16.885578]  ffff888103a67580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.885794]  ffff888103a67600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.886031] ==================================================================
[   16.886946] ==================================================================
[   16.887471] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.887815] Write of size 121 at addr ffff888103a67500 by task kunit_try_catch/302
[   16.888189] 
[   16.888311] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.888354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.888367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.888388] Call Trace:
[   16.888403]  <TASK>
[   16.888417]  dump_stack_lvl+0x73/0xb0
[   16.888445]  print_report+0xd1/0x610
[   16.888468]  ? __virt_addr_valid+0x1db/0x2d0
[   16.888493]  ? copy_user_test_oob+0x557/0x10f0
[   16.888518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.888543]  ? copy_user_test_oob+0x557/0x10f0
[   16.888567]  kasan_report+0x141/0x180
[   16.888591]  ? copy_user_test_oob+0x557/0x10f0
[   16.888632]  kasan_check_range+0x10c/0x1c0
[   16.888657]  __kasan_check_write+0x18/0x20
[   16.888689]  copy_user_test_oob+0x557/0x10f0
[   16.888717]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.888742]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.888773]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.888803]  kunit_try_run_case+0x1a5/0x480
[   16.888828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.888853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.888878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.888904]  ? __kthread_parkme+0x82/0x180
[   16.888925]  ? preempt_count_sub+0x50/0x80
[   16.888950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.888976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.889002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.889030]  kthread+0x337/0x6f0
[   16.889049]  ? trace_preempt_on+0x20/0xc0
[   16.889074]  ? __pfx_kthread+0x10/0x10
[   16.889106]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.889130]  ? calculate_sigpending+0x7b/0xa0
[   16.889156]  ? __pfx_kthread+0x10/0x10
[   16.889189]  ret_from_fork+0x116/0x1d0
[   16.889209]  ? __pfx_kthread+0x10/0x10
[   16.889231]  ret_from_fork_asm+0x1a/0x30
[   16.889282]  </TASK>
[   16.889292] 
[   16.896125] Allocated by task 302:
[   16.896320]  kasan_save_stack+0x45/0x70
[   16.896510]  kasan_save_track+0x18/0x40
[   16.896707]  kasan_save_alloc_info+0x3b/0x50
[   16.896892]  __kasan_kmalloc+0xb7/0xc0
[   16.897089]  __kmalloc_noprof+0x1c9/0x500
[   16.897231]  kunit_kmalloc_array+0x25/0x60
[   16.897387]  copy_user_test_oob+0xab/0x10f0
[   16.897615]  kunit_try_run_case+0x1a5/0x480
[   16.897824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.898078]  kthread+0x337/0x6f0
[   16.898237]  ret_from_fork+0x116/0x1d0
[   16.898380]  ret_from_fork_asm+0x1a/0x30
[   16.898570] 
[   16.898664] The buggy address belongs to the object at ffff888103a67500
[   16.898664]  which belongs to the cache kmalloc-128 of size 128
[   16.899211] The buggy address is located 0 bytes inside of
[   16.899211]  allocated 120-byte region [ffff888103a67500, ffff888103a67578)
[   16.899728] 
[   16.899814] The buggy address belongs to the physical page:
[   16.900059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a67
[   16.900401] flags: 0x200000000000000(node=0|zone=2)
[   16.900642] page_type: f5(slab)
[   16.900805] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.901134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.901460] page dumped because: kasan: bad access detected
[   16.901695] 
[   16.901766] Memory state around the buggy address:
[   16.901923]  ffff888103a67400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.902139]  ffff888103a67480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.902410] >ffff888103a67500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.902752]                                                                 ^
[   16.903066]  ffff888103a67580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.903387]  ffff888103a67600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.903698] ==================================================================
[   16.904122] ==================================================================
[   16.904477] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.904915] Read of size 121 at addr ffff888103a67500 by task kunit_try_catch/302
[   16.905360] 
[   16.905494] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.905546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.905559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.905581] Call Trace:
[   16.905594]  <TASK>
[   16.905608]  dump_stack_lvl+0x73/0xb0
[   16.905649]  print_report+0xd1/0x610
[   16.905671]  ? __virt_addr_valid+0x1db/0x2d0
[   16.905695]  ? copy_user_test_oob+0x604/0x10f0
[   16.905720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.905745]  ? copy_user_test_oob+0x604/0x10f0
[   16.905770]  kasan_report+0x141/0x180
[   16.905793]  ? copy_user_test_oob+0x604/0x10f0
[   16.905823]  kasan_check_range+0x10c/0x1c0
[   16.905847]  __kasan_check_read+0x15/0x20
[   16.905868]  copy_user_test_oob+0x604/0x10f0
[   16.905905]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.905929]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.905971]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.906001]  kunit_try_run_case+0x1a5/0x480
[   16.906026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.906051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.906075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.906101]  ? __kthread_parkme+0x82/0x180
[   16.906123]  ? preempt_count_sub+0x50/0x80
[   16.906147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.906173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.906199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.906226]  kthread+0x337/0x6f0
[   16.906247]  ? trace_preempt_on+0x20/0xc0
[   16.906290]  ? __pfx_kthread+0x10/0x10
[   16.906313]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.906337]  ? calculate_sigpending+0x7b/0xa0
[   16.906373]  ? __pfx_kthread+0x10/0x10
[   16.906396]  ret_from_fork+0x116/0x1d0
[   16.906416]  ? __pfx_kthread+0x10/0x10
[   16.906438]  ret_from_fork_asm+0x1a/0x30
[   16.906478]  </TASK>
[   16.906488] 
[   16.913074] Allocated by task 302:
[   16.913254]  kasan_save_stack+0x45/0x70
[   16.913494]  kasan_save_track+0x18/0x40
[   16.913686]  kasan_save_alloc_info+0x3b/0x50
[   16.913917]  __kasan_kmalloc+0xb7/0xc0
[   16.914114]  __kmalloc_noprof+0x1c9/0x500
[   16.914311]  kunit_kmalloc_array+0x25/0x60
[   16.914516]  copy_user_test_oob+0xab/0x10f0
[   16.914710]  kunit_try_run_case+0x1a5/0x480
[   16.914859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.915037]  kthread+0x337/0x6f0
[   16.915158]  ret_from_fork+0x116/0x1d0
[   16.915312]  ret_from_fork_asm+0x1a/0x30
[   16.915509] 
[   16.915628] The buggy address belongs to the object at ffff888103a67500
[   16.915628]  which belongs to the cache kmalloc-128 of size 128
[   16.916254] The buggy address is located 0 bytes inside of
[   16.916254]  allocated 120-byte region [ffff888103a67500, ffff888103a67578)
[   16.916773] 
[   16.916845] The buggy address belongs to the physical page:
[   16.917018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a67
[   16.917416] flags: 0x200000000000000(node=0|zone=2)
[   16.917648] page_type: f5(slab)
[   16.917828] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.918156] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.918486] page dumped because: kasan: bad access detected
[   16.918723] 
[   16.918840] Memory state around the buggy address:
[   16.919044]  ffff888103a67400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.919355]  ffff888103a67480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.919645] >ffff888103a67500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.919986]                                                                 ^
[   16.920288]  ffff888103a67580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.920553]  ffff888103a67600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.920779] ==================================================================
[   16.852297] ==================================================================
[   16.852617] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.852954] Write of size 121 at addr ffff888103a67500 by task kunit_try_catch/302
[   16.853344] 
[   16.853484] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.853529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.853542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.853563] Call Trace:
[   16.853576]  <TASK>
[   16.853591]  dump_stack_lvl+0x73/0xb0
[   16.853632]  print_report+0xd1/0x610
[   16.853655]  ? __virt_addr_valid+0x1db/0x2d0
[   16.853679]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.853715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.853740]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.853766]  kasan_report+0x141/0x180
[   16.853789]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.853818]  kasan_check_range+0x10c/0x1c0
[   16.853843]  __kasan_check_write+0x18/0x20
[   16.853874]  copy_user_test_oob+0x3fd/0x10f0
[   16.853901]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.853925]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.853971]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.854001]  kunit_try_run_case+0x1a5/0x480
[   16.854037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.854061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.854087]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.854112]  ? __kthread_parkme+0x82/0x180
[   16.854134]  ? preempt_count_sub+0x50/0x80
[   16.854159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.854185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.854212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.854239]  kthread+0x337/0x6f0
[   16.854259]  ? trace_preempt_on+0x20/0xc0
[   16.854293]  ? __pfx_kthread+0x10/0x10
[   16.854316]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.854339]  ? calculate_sigpending+0x7b/0xa0
[   16.854365]  ? __pfx_kthread+0x10/0x10
[   16.854388]  ret_from_fork+0x116/0x1d0
[   16.854408]  ? __pfx_kthread+0x10/0x10
[   16.854431]  ret_from_fork_asm+0x1a/0x30
[   16.854463]  </TASK>
[   16.854474] 
[   16.861296] Allocated by task 302:
[   16.861506]  kasan_save_stack+0x45/0x70
[   16.861709]  kasan_save_track+0x18/0x40
[   16.861894]  kasan_save_alloc_info+0x3b/0x50
[   16.862090]  __kasan_kmalloc+0xb7/0xc0
[   16.862293]  __kmalloc_noprof+0x1c9/0x500
[   16.862496]  kunit_kmalloc_array+0x25/0x60
[   16.862676]  copy_user_test_oob+0xab/0x10f0
[   16.862905]  kunit_try_run_case+0x1a5/0x480
[   16.863126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.863380]  kthread+0x337/0x6f0
[   16.863547]  ret_from_fork+0x116/0x1d0
[   16.863747]  ret_from_fork_asm+0x1a/0x30
[   16.863921] 
[   16.864028] The buggy address belongs to the object at ffff888103a67500
[   16.864028]  which belongs to the cache kmalloc-128 of size 128
[   16.864533] The buggy address is located 0 bytes inside of
[   16.864533]  allocated 120-byte region [ffff888103a67500, ffff888103a67578)
[   16.864989] 
[   16.865064] The buggy address belongs to the physical page:
[   16.865237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a67
[   16.865530] flags: 0x200000000000000(node=0|zone=2)
[   16.865772] page_type: f5(slab)
[   16.865950] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.866298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.866627] page dumped because: kasan: bad access detected
[   16.866804] 
[   16.866872] Memory state around the buggy address:
[   16.867028]  ffff888103a67400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.867299]  ffff888103a67480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.867632] >ffff888103a67500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.867989]                                                                 ^
[   16.868338]  ffff888103a67580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868664]  ffff888103a67600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868961] ==================================================================