Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.324274] ==================================================================
[   22.324454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   22.324573] Write of size 121 at addr fff00000c63b9300 by task kunit_try_catch/285
[   22.324635] 
[   22.324669] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.324836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.324895] Hardware name: linux,dummy-virt (DT)
[   22.324933] Call trace:
[   22.324957]  show_stack+0x20/0x38 (C)
[   22.325014]  dump_stack_lvl+0x8c/0xd0
[   22.325064]  print_report+0x118/0x608
[   22.325114]  kasan_report+0xdc/0x128
[   22.325351]  kasan_check_range+0x100/0x1a8
[   22.325608]  __kasan_check_write+0x20/0x30
[   22.325672]  copy_user_test_oob+0x434/0xec8
[   22.325970]  kunit_try_run_case+0x170/0x3f0
[   22.326033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.326088]  kthread+0x328/0x630
[   22.326131]  ret_from_fork+0x10/0x20
[   22.326195] 
[   22.326274] Allocated by task 285:
[   22.326329]  kasan_save_stack+0x3c/0x68
[   22.326401]  kasan_save_track+0x20/0x40
[   22.326493]  kasan_save_alloc_info+0x40/0x58
[   22.326536]  __kasan_kmalloc+0xd4/0xd8
[   22.326576]  __kmalloc_noprof+0x198/0x4c8
[   22.326652]  kunit_kmalloc_array+0x34/0x88
[   22.326729]  copy_user_test_oob+0xac/0xec8
[   22.326795]  kunit_try_run_case+0x170/0x3f0
[   22.326837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.326894]  kthread+0x328/0x630
[   22.326928]  ret_from_fork+0x10/0x20
[   22.326967] 
[   22.326988] The buggy address belongs to the object at fff00000c63b9300
[   22.326988]  which belongs to the cache kmalloc-128 of size 128
[   22.327050] The buggy address is located 0 bytes inside of
[   22.327050]  allocated 120-byte region [fff00000c63b9300, fff00000c63b9378)
[   22.327115] 
[   22.327136] The buggy address belongs to the physical page:
[   22.327343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.327430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.327638] page_type: f5(slab)
[   22.327693] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.327749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.327793] page dumped because: kasan: bad access detected
[   22.327855] 
[   22.327891] Memory state around the buggy address:
[   22.327976]  fff00000c63b9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.328085]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328258] >fff00000c63b9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.328376]                                                                 ^
[   22.328493]  fff00000c63b9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328560]  fff00000c63b9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328628] ==================================================================
[   22.318434] ==================================================================
[   22.318548] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   22.318600] Read of size 121 at addr fff00000c63b9300 by task kunit_try_catch/285
[   22.318674] 
[   22.318944] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.319052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.319090] Hardware name: linux,dummy-virt (DT)
[   22.319138] Call trace:
[   22.319174]  show_stack+0x20/0x38 (C)
[   22.319225]  dump_stack_lvl+0x8c/0xd0
[   22.319278]  print_report+0x118/0x608
[   22.319445]  kasan_report+0xdc/0x128
[   22.319642]  kasan_check_range+0x100/0x1a8
[   22.319842]  __kasan_check_read+0x20/0x30
[   22.319925]  copy_user_test_oob+0x3c8/0xec8
[   22.320255]  kunit_try_run_case+0x170/0x3f0
[   22.320371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.320516]  kthread+0x328/0x630
[   22.320592]  ret_from_fork+0x10/0x20
[   22.320720] 
[   22.320799] Allocated by task 285:
[   22.320909]  kasan_save_stack+0x3c/0x68
[   22.320984]  kasan_save_track+0x20/0x40
[   22.321023]  kasan_save_alloc_info+0x40/0x58
[   22.321076]  __kasan_kmalloc+0xd4/0xd8
[   22.321115]  __kmalloc_noprof+0x198/0x4c8
[   22.321424]  kunit_kmalloc_array+0x34/0x88
[   22.321546]  copy_user_test_oob+0xac/0xec8
[   22.321601]  kunit_try_run_case+0x170/0x3f0
[   22.321654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.321931]  kthread+0x328/0x630
[   22.322083]  ret_from_fork+0x10/0x20
[   22.322184] 
[   22.322229] The buggy address belongs to the object at fff00000c63b9300
[   22.322229]  which belongs to the cache kmalloc-128 of size 128
[   22.322302] The buggy address is located 0 bytes inside of
[   22.322302]  allocated 120-byte region [fff00000c63b9300, fff00000c63b9378)
[   22.322370] 
[   22.322404] The buggy address belongs to the physical page:
[   22.322440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.322494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.322563] page_type: f5(slab)
[   22.322604] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.322666] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.322717] page dumped because: kasan: bad access detected
[   22.322761] 
[   22.322787] Memory state around the buggy address:
[   22.322832]  fff00000c63b9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.322899]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.322948] >fff00000c63b9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.322990]                                                                 ^
[   22.323035]  fff00000c63b9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.323093]  fff00000c63b9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.323136] ==================================================================
[   22.329211] ==================================================================
[   22.329264] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   22.329328] Read of size 121 at addr fff00000c63b9300 by task kunit_try_catch/285
[   22.329706] 
[   22.329799] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.329888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.329930] Hardware name: linux,dummy-virt (DT)
[   22.329964] Call trace:
[   22.329989]  show_stack+0x20/0x38 (C)
[   22.330338]  dump_stack_lvl+0x8c/0xd0
[   22.330422]  print_report+0x118/0x608
[   22.330472]  kasan_report+0xdc/0x128
[   22.330535]  kasan_check_range+0x100/0x1a8
[   22.330587]  __kasan_check_read+0x20/0x30
[   22.330654]  copy_user_test_oob+0x4a0/0xec8
[   22.330980]  kunit_try_run_case+0x170/0x3f0
[   22.331086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.331181]  kthread+0x328/0x630
[   22.331253]  ret_from_fork+0x10/0x20
[   22.331350] 
[   22.331373] Allocated by task 285:
[   22.331424]  kasan_save_stack+0x3c/0x68
[   22.331469]  kasan_save_track+0x20/0x40
[   22.331676]  kasan_save_alloc_info+0x40/0x58
[   22.331732]  __kasan_kmalloc+0xd4/0xd8
[   22.331770]  __kmalloc_noprof+0x198/0x4c8
[   22.331838]  kunit_kmalloc_array+0x34/0x88
[   22.331876]  copy_user_test_oob+0xac/0xec8
[   22.331916]  kunit_try_run_case+0x170/0x3f0
[   22.332265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.332408]  kthread+0x328/0x630
[   22.332464]  ret_from_fork+0x10/0x20
[   22.332502] 
[   22.332525] The buggy address belongs to the object at fff00000c63b9300
[   22.332525]  which belongs to the cache kmalloc-128 of size 128
[   22.332588] The buggy address is located 0 bytes inside of
[   22.332588]  allocated 120-byte region [fff00000c63b9300, fff00000c63b9378)
[   22.332663] 
[   22.332694] The buggy address belongs to the physical page:
[   22.332742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.332819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.332877] page_type: f5(slab)
[   22.332919] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.332989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.333039] page dumped because: kasan: bad access detected
[   22.333074] 
[   22.333103] Memory state around the buggy address:
[   22.333153]  fff00000c63b9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.333213]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.333260] >fff00000c63b9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.333303]                                                                 ^
[   22.333348]  fff00000c63b9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.333405]  fff00000c63b9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.333447] ==================================================================
[   22.292955] ==================================================================
[   22.293018] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   22.295293] Read of size 121 at addr fff00000c63b9300 by task kunit_try_catch/285
[   22.295374] 
[   22.295411] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.296787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.296838] Hardware name: linux,dummy-virt (DT)
[   22.296873] Call trace:
[   22.296900]  show_stack+0x20/0x38 (C)
[   22.299203]  dump_stack_lvl+0x8c/0xd0
[   22.301177]  print_report+0x118/0x608
[   22.301592]  kasan_report+0xdc/0x128
[   22.302701]  kasan_check_range+0x100/0x1a8
[   22.302767]  __kasan_check_read+0x20/0x30
[   22.302816]  copy_user_test_oob+0x728/0xec8
[   22.303557]  kunit_try_run_case+0x170/0x3f0
[   22.303732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.303826]  kthread+0x328/0x630
[   22.303871]  ret_from_fork+0x10/0x20
[   22.303922] 
[   22.303944] Allocated by task 285:
[   22.303975]  kasan_save_stack+0x3c/0x68
[   22.304272]  kasan_save_track+0x20/0x40
[   22.304421]  kasan_save_alloc_info+0x40/0x58
[   22.304493]  __kasan_kmalloc+0xd4/0xd8
[   22.304532]  __kmalloc_noprof+0x198/0x4c8
[   22.304838]  kunit_kmalloc_array+0x34/0x88
[   22.304964]  copy_user_test_oob+0xac/0xec8
[   22.305054]  kunit_try_run_case+0x170/0x3f0
[   22.305141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.305243]  kthread+0x328/0x630
[   22.305313]  ret_from_fork+0x10/0x20
[   22.305420] 
[   22.305520] The buggy address belongs to the object at fff00000c63b9300
[   22.305520]  which belongs to the cache kmalloc-128 of size 128
[   22.305621] The buggy address is located 0 bytes inside of
[   22.305621]  allocated 120-byte region [fff00000c63b9300, fff00000c63b9378)
[   22.305733] 
[   22.305818] The buggy address belongs to the physical page:
[   22.305894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.305963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.306015] page_type: f5(slab)
[   22.306421] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.306505] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.306598] page dumped because: kasan: bad access detected
[   22.306633] 
[   22.306654] Memory state around the buggy address:
[   22.306691]  fff00000c63b9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.306739]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.306787] >fff00000c63b9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.306830]                                                                 ^
[   22.306875]  fff00000c63b9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.306934]  fff00000c63b9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.306981] ==================================================================
[   22.276792] ==================================================================
[   22.277303] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   22.277401] Write of size 121 at addr fff00000c63b9300 by task kunit_try_catch/285
[   22.277581] 
[   22.277630] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.278037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.278341] Hardware name: linux,dummy-virt (DT)
[   22.278414] Call trace:
[   22.278471]  show_stack+0x20/0x38 (C)
[   22.278554]  dump_stack_lvl+0x8c/0xd0
[   22.278692]  print_report+0x118/0x608
[   22.278747]  kasan_report+0xdc/0x128
[   22.278932]  kasan_check_range+0x100/0x1a8
[   22.278986]  __kasan_check_write+0x20/0x30
[   22.279355]  copy_user_test_oob+0x234/0xec8
[   22.279428]  kunit_try_run_case+0x170/0x3f0
[   22.279535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.279733]  kthread+0x328/0x630
[   22.279787]  ret_from_fork+0x10/0x20
[   22.279866] 
[   22.279894] Allocated by task 285:
[   22.280180]  kasan_save_stack+0x3c/0x68
[   22.280262]  kasan_save_track+0x20/0x40
[   22.280422]  kasan_save_alloc_info+0x40/0x58
[   22.280565]  __kasan_kmalloc+0xd4/0xd8
[   22.280630]  __kmalloc_noprof+0x198/0x4c8
[   22.280947]  kunit_kmalloc_array+0x34/0x88
[   22.281078]  copy_user_test_oob+0xac/0xec8
[   22.281449]  kunit_try_run_case+0x170/0x3f0
[   22.281823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.281913]  kthread+0x328/0x630
[   22.282350]  ret_from_fork+0x10/0x20
[   22.282458] 
[   22.282538] The buggy address belongs to the object at fff00000c63b9300
[   22.282538]  which belongs to the cache kmalloc-128 of size 128
[   22.282677] The buggy address is located 0 bytes inside of
[   22.282677]  allocated 120-byte region [fff00000c63b9300, fff00000c63b9378)
[   22.282778] 
[   22.283178] The buggy address belongs to the physical page:
[   22.283240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.283363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.283435] page_type: f5(slab)
[   22.283491] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.283672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.283864] page dumped because: kasan: bad access detected
[   22.283979] 
[   22.284103] Memory state around the buggy address:
[   22.284411]  fff00000c63b9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.284668]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.284842] >fff00000c63b9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.285000]                                                                 ^
[   22.285049]  fff00000c63b9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.285120]  fff00000c63b9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.285179] ==================================================================
[   22.313415] ==================================================================
[   22.313594] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   22.313688] Write of size 121 at addr fff00000c63b9300 by task kunit_try_catch/285
[   22.313746] 
[   22.313797] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.313937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.313984] Hardware name: linux,dummy-virt (DT)
[   22.314064] Call trace:
[   22.314103]  show_stack+0x20/0x38 (C)
[   22.314175]  dump_stack_lvl+0x8c/0xd0
[   22.314282]  print_report+0x118/0x608
[   22.314369]  kasan_report+0xdc/0x128
[   22.314419]  kasan_check_range+0x100/0x1a8
[   22.314470]  __kasan_check_write+0x20/0x30
[   22.314516]  copy_user_test_oob+0x35c/0xec8
[   22.314565]  kunit_try_run_case+0x170/0x3f0
[   22.314618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.314674]  kthread+0x328/0x630
[   22.314726]  ret_from_fork+0x10/0x20
[   22.314776] 
[   22.314797] Allocated by task 285:
[   22.314825]  kasan_save_stack+0x3c/0x68
[   22.314880]  kasan_save_track+0x20/0x40
[   22.314926]  kasan_save_alloc_info+0x40/0x58
[   22.314972]  __kasan_kmalloc+0xd4/0xd8
[   22.315015]  __kmalloc_noprof+0x198/0x4c8
[   22.315059]  kunit_kmalloc_array+0x34/0x88
[   22.315101]  copy_user_test_oob+0xac/0xec8
[   22.315151]  kunit_try_run_case+0x170/0x3f0
[   22.315502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.315641]  kthread+0x328/0x630
[   22.315754]  ret_from_fork+0x10/0x20
[   22.315815] 
[   22.315837] The buggy address belongs to the object at fff00000c63b9300
[   22.315837]  which belongs to the cache kmalloc-128 of size 128
[   22.315902] The buggy address is located 0 bytes inside of
[   22.315902]  allocated 120-byte region [fff00000c63b9300, fff00000c63b9378)
[   22.315969] 
[   22.316105] The buggy address belongs to the physical page:
[   22.316144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.316270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.316374] page_type: f5(slab)
[   22.316481] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.316600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.316942] page dumped because: kasan: bad access detected
[   22.317081] 
[   22.317201] Memory state around the buggy address:
[   22.317473]  fff00000c63b9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.317665]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.317771] >fff00000c63b9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.317862]                                                                 ^
[   22.317920]  fff00000c63b9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.317967]  fff00000c63b9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.318042] ==================================================================

[   16.490927] ==================================================================
[   16.491301] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.491663] Write of size 121 at addr ffff888102675c00 by task kunit_try_catch/303
[   16.491977] 
[   16.492098] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.492147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.492161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.492184] Call Trace:
[   16.492201]  <TASK>
[   16.492221]  dump_stack_lvl+0x73/0xb0
[   16.492253]  print_report+0xd1/0x650
[   16.492278]  ? __virt_addr_valid+0x1db/0x2d0
[   16.492303]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.492329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.492354]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.492378]  kasan_report+0x141/0x180
[   16.492401]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.492430]  kasan_check_range+0x10c/0x1c0
[   16.492455]  __kasan_check_write+0x18/0x20
[   16.492476]  copy_user_test_oob+0x3fd/0x10f0
[   16.492502]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.492537]  ? finish_task_switch.isra.0+0x153/0x700
[   16.492562]  ? __switch_to+0x47/0xf50
[   16.492590]  ? __schedule+0x10cc/0x2b60
[   16.492625]  ? __pfx_read_tsc+0x10/0x10
[   16.492648]  ? ktime_get_ts64+0x86/0x230
[   16.492675]  kunit_try_run_case+0x1a5/0x480
[   16.492702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.492726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.492752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.492777]  ? __kthread_parkme+0x82/0x180
[   16.492799]  ? preempt_count_sub+0x50/0x80
[   16.492824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.492849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.492875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.492901]  kthread+0x337/0x6f0
[   16.492921]  ? trace_preempt_on+0x20/0xc0
[   16.492947]  ? __pfx_kthread+0x10/0x10
[   16.492968]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.492991]  ? calculate_sigpending+0x7b/0xa0
[   16.493016]  ? __pfx_kthread+0x10/0x10
[   16.493039]  ret_from_fork+0x116/0x1d0
[   16.493058]  ? __pfx_kthread+0x10/0x10
[   16.493080]  ret_from_fork_asm+0x1a/0x30
[   16.493113]  </TASK>
[   16.493124] 
[   16.500222] Allocated by task 303:
[   16.500395]  kasan_save_stack+0x45/0x70
[   16.500631]  kasan_save_track+0x18/0x40
[   16.500807]  kasan_save_alloc_info+0x3b/0x50
[   16.500979]  __kasan_kmalloc+0xb7/0xc0
[   16.501112]  __kmalloc_noprof+0x1c9/0x500
[   16.501251]  kunit_kmalloc_array+0x25/0x60
[   16.501410]  copy_user_test_oob+0xab/0x10f0
[   16.501624]  kunit_try_run_case+0x1a5/0x480
[   16.501840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.502128]  kthread+0x337/0x6f0
[   16.502248]  ret_from_fork+0x116/0x1d0
[   16.502379]  ret_from_fork_asm+0x1a/0x30
[   16.502517] 
[   16.502614] The buggy address belongs to the object at ffff888102675c00
[   16.502614]  which belongs to the cache kmalloc-128 of size 128
[   16.503161] The buggy address is located 0 bytes inside of
[   16.503161]  allocated 120-byte region [ffff888102675c00, ffff888102675c78)
[   16.503713] 
[   16.503786] The buggy address belongs to the physical page:
[   16.503958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102675
[   16.504194] flags: 0x200000000000000(node=0|zone=2)
[   16.504394] page_type: f5(slab)
[   16.504559] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.504905] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505237] page dumped because: kasan: bad access detected
[   16.505543] 
[   16.505620] Memory state around the buggy address:
[   16.505776]  ffff888102675b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.505988]  ffff888102675b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506198] >ffff888102675c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.506541]                                                                 ^
[   16.506869]  ffff888102675c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507197]  ffff888102675d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507526] ==================================================================
[   16.548884] ==================================================================
[   16.549397] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.549847] Read of size 121 at addr ffff888102675c00 by task kunit_try_catch/303
[   16.550087] 
[   16.550397] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.550447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.550461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.550483] Call Trace:
[   16.550609]  <TASK>
[   16.550631]  dump_stack_lvl+0x73/0xb0
[   16.550667]  print_report+0xd1/0x650
[   16.550692]  ? __virt_addr_valid+0x1db/0x2d0
[   16.550717]  ? copy_user_test_oob+0x604/0x10f0
[   16.550742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.550766]  ? copy_user_test_oob+0x604/0x10f0
[   16.550791]  kasan_report+0x141/0x180
[   16.550814]  ? copy_user_test_oob+0x604/0x10f0
[   16.550844]  kasan_check_range+0x10c/0x1c0
[   16.550869]  __kasan_check_read+0x15/0x20
[   16.550890]  copy_user_test_oob+0x604/0x10f0
[   16.550916]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.550940]  ? finish_task_switch.isra.0+0x153/0x700
[   16.550965]  ? __switch_to+0x47/0xf50
[   16.550993]  ? __schedule+0x10cc/0x2b60
[   16.551016]  ? __pfx_read_tsc+0x10/0x10
[   16.551038]  ? ktime_get_ts64+0x86/0x230
[   16.551065]  kunit_try_run_case+0x1a5/0x480
[   16.551091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.551115]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.551141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.551166]  ? __kthread_parkme+0x82/0x180
[   16.551188]  ? preempt_count_sub+0x50/0x80
[   16.551214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.551240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.551265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.551292]  kthread+0x337/0x6f0
[   16.551312]  ? trace_preempt_on+0x20/0xc0
[   16.551337]  ? __pfx_kthread+0x10/0x10
[   16.551358]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.551381]  ? calculate_sigpending+0x7b/0xa0
[   16.551407]  ? __pfx_kthread+0x10/0x10
[   16.551430]  ret_from_fork+0x116/0x1d0
[   16.551449]  ? __pfx_kthread+0x10/0x10
[   16.551470]  ret_from_fork_asm+0x1a/0x30
[   16.551528]  </TASK>
[   16.551540] 
[   16.561062] Allocated by task 303:
[   16.561390]  kasan_save_stack+0x45/0x70
[   16.561712]  kasan_save_track+0x18/0x40
[   16.561871]  kasan_save_alloc_info+0x3b/0x50
[   16.562199]  __kasan_kmalloc+0xb7/0xc0
[   16.562379]  __kmalloc_noprof+0x1c9/0x500
[   16.562717]  kunit_kmalloc_array+0x25/0x60
[   16.563000]  copy_user_test_oob+0xab/0x10f0
[   16.563176]  kunit_try_run_case+0x1a5/0x480
[   16.563467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.563848]  kthread+0x337/0x6f0
[   16.564010]  ret_from_fork+0x116/0x1d0
[   16.564195]  ret_from_fork_asm+0x1a/0x30
[   16.564383] 
[   16.564461] The buggy address belongs to the object at ffff888102675c00
[   16.564461]  which belongs to the cache kmalloc-128 of size 128
[   16.565288] The buggy address is located 0 bytes inside of
[   16.565288]  allocated 120-byte region [ffff888102675c00, ffff888102675c78)
[   16.565914] 
[   16.566159] The buggy address belongs to the physical page:
[   16.566355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102675
[   16.566881] flags: 0x200000000000000(node=0|zone=2)
[   16.567108] page_type: f5(slab)
[   16.567265] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.567534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.567950] page dumped because: kasan: bad access detected
[   16.568157] 
[   16.568235] Memory state around the buggy address:
[   16.568461]  ffff888102675b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.568749]  ffff888102675b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.569047] >ffff888102675c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.569306]                                                                 ^
[   16.569574]  ffff888102675c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.569839]  ffff888102675d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.570164] ==================================================================
[   16.508164] ==================================================================
[   16.508619] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.508861] Read of size 121 at addr ffff888102675c00 by task kunit_try_catch/303
[   16.509532] 
[   16.509664] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.509714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.509727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.509748] Call Trace:
[   16.509764]  <TASK>
[   16.509781]  dump_stack_lvl+0x73/0xb0
[   16.509813]  print_report+0xd1/0x650
[   16.509837]  ? __virt_addr_valid+0x1db/0x2d0
[   16.509861]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.509887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.509912]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.509938]  kasan_report+0x141/0x180
[   16.509961]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.509991]  kasan_check_range+0x10c/0x1c0
[   16.510015]  __kasan_check_read+0x15/0x20
[   16.510035]  copy_user_test_oob+0x4aa/0x10f0
[   16.510062]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.510086]  ? finish_task_switch.isra.0+0x153/0x700
[   16.510110]  ? __switch_to+0x47/0xf50
[   16.510137]  ? __schedule+0x10cc/0x2b60
[   16.510161]  ? __pfx_read_tsc+0x10/0x10
[   16.510183]  ? ktime_get_ts64+0x86/0x230
[   16.510209]  kunit_try_run_case+0x1a5/0x480
[   16.510234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.510258]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.510283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.510308]  ? __kthread_parkme+0x82/0x180
[   16.510330]  ? preempt_count_sub+0x50/0x80
[   16.510355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.510381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.510406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.510433]  kthread+0x337/0x6f0
[   16.510452]  ? trace_preempt_on+0x20/0xc0
[   16.510477]  ? __pfx_kthread+0x10/0x10
[   16.510499]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.510521]  ? calculate_sigpending+0x7b/0xa0
[   16.510546]  ? __pfx_kthread+0x10/0x10
[   16.510569]  ret_from_fork+0x116/0x1d0
[   16.510588]  ? __pfx_kthread+0x10/0x10
[   16.510620]  ret_from_fork_asm+0x1a/0x30
[   16.510652]  </TASK>
[   16.510662] 
[   16.517881] Allocated by task 303:
[   16.518022]  kasan_save_stack+0x45/0x70
[   16.518200]  kasan_save_track+0x18/0x40
[   16.518397]  kasan_save_alloc_info+0x3b/0x50
[   16.518629]  __kasan_kmalloc+0xb7/0xc0
[   16.518762]  __kmalloc_noprof+0x1c9/0x500
[   16.518900]  kunit_kmalloc_array+0x25/0x60
[   16.519042]  copy_user_test_oob+0xab/0x10f0
[   16.519186]  kunit_try_run_case+0x1a5/0x480
[   16.519330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.519640]  kthread+0x337/0x6f0
[   16.519808]  ret_from_fork+0x116/0x1d0
[   16.519995]  ret_from_fork_asm+0x1a/0x30
[   16.520190] 
[   16.520283] The buggy address belongs to the object at ffff888102675c00
[   16.520283]  which belongs to the cache kmalloc-128 of size 128
[   16.520891] The buggy address is located 0 bytes inside of
[   16.520891]  allocated 120-byte region [ffff888102675c00, ffff888102675c78)
[   16.521250] 
[   16.521320] The buggy address belongs to the physical page:
[   16.521490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102675
[   16.521861] flags: 0x200000000000000(node=0|zone=2)
[   16.522104] page_type: f5(slab)
[   16.522273] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.522767] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.523074] page dumped because: kasan: bad access detected
[   16.523274] 
[   16.523372] Memory state around the buggy address:
[   16.523622]  ffff888102675b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.523892]  ffff888102675b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.524131] >ffff888102675c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.524342]                                                                 ^
[   16.524772]  ffff888102675c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.525102]  ffff888102675d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.525425] ==================================================================
[   16.525922] ==================================================================
[   16.526220] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.526613] Write of size 121 at addr ffff888102675c00 by task kunit_try_catch/303
[   16.526876] 
[   16.526962] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.527004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.527017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.527037] Call Trace:
[   16.527053]  <TASK>
[   16.527070]  dump_stack_lvl+0x73/0xb0
[   16.527100]  print_report+0xd1/0x650
[   16.527123]  ? __virt_addr_valid+0x1db/0x2d0
[   16.527148]  ? copy_user_test_oob+0x557/0x10f0
[   16.527172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.527197]  ? copy_user_test_oob+0x557/0x10f0
[   16.527222]  kasan_report+0x141/0x180
[   16.527244]  ? copy_user_test_oob+0x557/0x10f0
[   16.527274]  kasan_check_range+0x10c/0x1c0
[   16.527299]  __kasan_check_write+0x18/0x20
[   16.527320]  copy_user_test_oob+0x557/0x10f0
[   16.527347]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.527371]  ? finish_task_switch.isra.0+0x153/0x700
[   16.527396]  ? __switch_to+0x47/0xf50
[   16.527423]  ? __schedule+0x10cc/0x2b60
[   16.527446]  ? __pfx_read_tsc+0x10/0x10
[   16.527468]  ? ktime_get_ts64+0x86/0x230
[   16.527494]  kunit_try_run_case+0x1a5/0x480
[   16.527527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.527551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.527577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.527613]  ? __kthread_parkme+0x82/0x180
[   16.527635]  ? preempt_count_sub+0x50/0x80
[   16.527660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.527685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.527711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.527737]  kthread+0x337/0x6f0
[   16.527757]  ? trace_preempt_on+0x20/0xc0
[   16.527782]  ? __pfx_kthread+0x10/0x10
[   16.527803]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.527826]  ? calculate_sigpending+0x7b/0xa0
[   16.527852]  ? __pfx_kthread+0x10/0x10
[   16.527874]  ret_from_fork+0x116/0x1d0
[   16.527894]  ? __pfx_kthread+0x10/0x10
[   16.527915]  ret_from_fork_asm+0x1a/0x30
[   16.527947]  </TASK>
[   16.527958] 
[   16.537514] Allocated by task 303:
[   16.537872]  kasan_save_stack+0x45/0x70
[   16.538165]  kasan_save_track+0x18/0x40
[   16.538409]  kasan_save_alloc_info+0x3b/0x50
[   16.538722]  __kasan_kmalloc+0xb7/0xc0
[   16.538922]  __kmalloc_noprof+0x1c9/0x500
[   16.539218]  kunit_kmalloc_array+0x25/0x60
[   16.539412]  copy_user_test_oob+0xab/0x10f0
[   16.539745]  kunit_try_run_case+0x1a5/0x480
[   16.540033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.540237]  kthread+0x337/0x6f0
[   16.540568]  ret_from_fork+0x116/0x1d0
[   16.540782]  ret_from_fork_asm+0x1a/0x30
[   16.541084] 
[   16.541186] The buggy address belongs to the object at ffff888102675c00
[   16.541186]  which belongs to the cache kmalloc-128 of size 128
[   16.541815] The buggy address is located 0 bytes inside of
[   16.541815]  allocated 120-byte region [ffff888102675c00, ffff888102675c78)
[   16.542442] 
[   16.542698] The buggy address belongs to the physical page:
[   16.542991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102675
[   16.543381] flags: 0x200000000000000(node=0|zone=2)
[   16.543695] page_type: f5(slab)
[   16.543873] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.544313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.544722] page dumped because: kasan: bad access detected
[   16.544975] 
[   16.545223] Memory state around the buggy address:
[   16.545441]  ffff888102675b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.545842]  ffff888102675b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.546149] >ffff888102675c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.546438]                                                                 ^
[   16.546974]  ffff888102675c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547326]  ffff888102675d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547756] ==================================================================