Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.553956] ==================================================================
[   19.554033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   19.554148] Read of size 121 at addr fff00000c79f8300 by task kunit_try_catch/285
[   19.554201] 
[   19.554235] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.554619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.554664] Hardware name: linux,dummy-virt (DT)
[   19.554705] Call trace:
[   19.554740]  show_stack+0x20/0x38 (C)
[   19.554794]  dump_stack_lvl+0x8c/0xd0
[   19.554840]  print_report+0x118/0x5d0
[   19.554895]  kasan_report+0xdc/0x128
[   19.554943]  kasan_check_range+0x100/0x1a8
[   19.554990]  __kasan_check_read+0x20/0x30
[   19.555035]  copy_user_test_oob+0x4a0/0xec8
[   19.555091]  kunit_try_run_case+0x170/0x3f0
[   19.555149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555203]  kthread+0x328/0x630
[   19.555261]  ret_from_fork+0x10/0x20
[   19.555330] 
[   19.555353] Allocated by task 285:
[   19.555381]  kasan_save_stack+0x3c/0x68
[   19.555424]  kasan_save_track+0x20/0x40
[   19.555486]  kasan_save_alloc_info+0x40/0x58
[   19.555531]  __kasan_kmalloc+0xd4/0xd8
[   19.555568]  __kmalloc_noprof+0x198/0x4c8
[   19.555608]  kunit_kmalloc_array+0x34/0x88
[   19.555646]  copy_user_test_oob+0xac/0xec8
[   19.555685]  kunit_try_run_case+0x170/0x3f0
[   19.555782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555831]  kthread+0x328/0x630
[   19.555876]  ret_from_fork+0x10/0x20
[   19.555913] 
[   19.555936] The buggy address belongs to the object at fff00000c79f8300
[   19.555936]  which belongs to the cache kmalloc-128 of size 128
[   19.555993] The buggy address is located 0 bytes inside of
[   19.555993]  allocated 120-byte region [fff00000c79f8300, fff00000c79f8378)
[   19.556373] 
[   19.556401] The buggy address belongs to the physical page:
[   19.556436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f8
[   19.556492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.556556] page_type: f5(slab)
[   19.556624] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.556677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.556720] page dumped because: kasan: bad access detected
[   19.556754] 
[   19.556774] Memory state around the buggy address:
[   19.556809]  fff00000c79f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.556970]  fff00000c79f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.557097] >fff00000c79f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.557185]                                                                 ^
[   19.557296]  fff00000c79f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.557392]  fff00000c79f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.557434] ==================================================================
[   19.538772] ==================================================================
[   19.538847] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.538913] Read of size 121 at addr fff00000c79f8300 by task kunit_try_catch/285
[   19.539163] 
[   19.539206] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.539304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.539430] Hardware name: linux,dummy-virt (DT)
[   19.539465] Call trace:
[   19.539506]  show_stack+0x20/0x38 (C)
[   19.539556]  dump_stack_lvl+0x8c/0xd0
[   19.539604]  print_report+0x118/0x5d0
[   19.540018]  kasan_report+0xdc/0x128
[   19.540154]  kasan_check_range+0x100/0x1a8
[   19.540456]  __kasan_check_read+0x20/0x30
[   19.540511]  copy_user_test_oob+0x3c8/0xec8
[   19.540566]  kunit_try_run_case+0x170/0x3f0
[   19.540613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.540667]  kthread+0x328/0x630
[   19.540712]  ret_from_fork+0x10/0x20
[   19.541105] 
[   19.541159] Allocated by task 285:
[   19.541209]  kasan_save_stack+0x3c/0x68
[   19.541446]  kasan_save_track+0x20/0x40
[   19.541620]  kasan_save_alloc_info+0x40/0x58
[   19.541706]  __kasan_kmalloc+0xd4/0xd8
[   19.541806]  __kmalloc_noprof+0x198/0x4c8
[   19.541884]  kunit_kmalloc_array+0x34/0x88
[   19.541956]  copy_user_test_oob+0xac/0xec8
[   19.542073]  kunit_try_run_case+0x170/0x3f0
[   19.542172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.542249]  kthread+0x328/0x630
[   19.542352]  ret_from_fork+0x10/0x20
[   19.542431] 
[   19.542495] The buggy address belongs to the object at fff00000c79f8300
[   19.542495]  which belongs to the cache kmalloc-128 of size 128
[   19.542555] The buggy address is located 0 bytes inside of
[   19.542555]  allocated 120-byte region [fff00000c79f8300, fff00000c79f8378)
[   19.542874] 
[   19.543002] The buggy address belongs to the physical page:
[   19.543072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f8
[   19.543157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.543371] page_type: f5(slab)
[   19.543545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.543681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.543781] page dumped because: kasan: bad access detected
[   19.543845] 
[   19.543955] Memory state around the buggy address:
[   19.544001]  fff00000c79f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.544069]  fff00000c79f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544122] >fff00000c79f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.544228]                                                                 ^
[   19.544278]  fff00000c79f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544324]  fff00000c79f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544375] ==================================================================
[   19.534573] ==================================================================
[   19.534639] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.534696] Write of size 121 at addr fff00000c79f8300 by task kunit_try_catch/285
[   19.534749] 
[   19.534785] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.534882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.534911] Hardware name: linux,dummy-virt (DT)
[   19.534944] Call trace:
[   19.534970]  show_stack+0x20/0x38 (C)
[   19.535020]  dump_stack_lvl+0x8c/0xd0
[   19.535067]  print_report+0x118/0x5d0
[   19.535113]  kasan_report+0xdc/0x128
[   19.535172]  kasan_check_range+0x100/0x1a8
[   19.535229]  __kasan_check_write+0x20/0x30
[   19.535287]  copy_user_test_oob+0x35c/0xec8
[   19.535336]  kunit_try_run_case+0x170/0x3f0
[   19.535384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535445]  kthread+0x328/0x630
[   19.535491]  ret_from_fork+0x10/0x20
[   19.535549] 
[   19.535573] Allocated by task 285:
[   19.535611]  kasan_save_stack+0x3c/0x68
[   19.535658]  kasan_save_track+0x20/0x40
[   19.535699]  kasan_save_alloc_info+0x40/0x58
[   19.535769]  __kasan_kmalloc+0xd4/0xd8
[   19.535810]  __kmalloc_noprof+0x198/0x4c8
[   19.535850]  kunit_kmalloc_array+0x34/0x88
[   19.536320]  copy_user_test_oob+0xac/0xec8
[   19.536381]  kunit_try_run_case+0x170/0x3f0
[   19.536448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.536536]  kthread+0x328/0x630
[   19.536573]  ret_from_fork+0x10/0x20
[   19.536645] 
[   19.536690] The buggy address belongs to the object at fff00000c79f8300
[   19.536690]  which belongs to the cache kmalloc-128 of size 128
[   19.536751] The buggy address is located 0 bytes inside of
[   19.536751]  allocated 120-byte region [fff00000c79f8300, fff00000c79f8378)
[   19.536813] 
[   19.536968] The buggy address belongs to the physical page:
[   19.537011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f8
[   19.537065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.537121] page_type: f5(slab)
[   19.537162] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.537214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.537255] page dumped because: kasan: bad access detected
[   19.537288] 
[   19.537310] Memory state around the buggy address:
[   19.537397]  fff00000c79f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.537500]  fff00000c79f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.537546] >fff00000c79f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.537616]                                                                 ^
[   19.537693]  fff00000c79f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.537818]  fff00000c79f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.537899] ==================================================================
[   19.547876] ==================================================================
[   19.547932] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.547984] Write of size 121 at addr fff00000c79f8300 by task kunit_try_catch/285
[   19.548035] 
[   19.548068] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.548152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.548182] Hardware name: linux,dummy-virt (DT)
[   19.548213] Call trace:
[   19.548237]  show_stack+0x20/0x38 (C)
[   19.548284]  dump_stack_lvl+0x8c/0xd0
[   19.548332]  print_report+0x118/0x5d0
[   19.548378]  kasan_report+0xdc/0x128
[   19.548424]  kasan_check_range+0x100/0x1a8
[   19.548475]  __kasan_check_write+0x20/0x30
[   19.548521]  copy_user_test_oob+0x434/0xec8
[   19.548570]  kunit_try_run_case+0x170/0x3f0
[   19.548620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.548674]  kthread+0x328/0x630
[   19.548717]  ret_from_fork+0x10/0x20
[   19.548765] 
[   19.548786] Allocated by task 285:
[   19.548816]  kasan_save_stack+0x3c/0x68
[   19.548857]  kasan_save_track+0x20/0x40
[   19.548905]  kasan_save_alloc_info+0x40/0x58
[   19.548946]  __kasan_kmalloc+0xd4/0xd8
[   19.548985]  __kmalloc_noprof+0x198/0x4c8
[   19.549024]  kunit_kmalloc_array+0x34/0x88
[   19.549063]  copy_user_test_oob+0xac/0xec8
[   19.549100]  kunit_try_run_case+0x170/0x3f0
[   19.549146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.549192]  kthread+0x328/0x630
[   19.549225]  ret_from_fork+0x10/0x20
[   19.549262] 
[   19.549283] The buggy address belongs to the object at fff00000c79f8300
[   19.549283]  which belongs to the cache kmalloc-128 of size 128
[   19.549341] The buggy address is located 0 bytes inside of
[   19.549341]  allocated 120-byte region [fff00000c79f8300, fff00000c79f8378)
[   19.549404] 
[   19.549425] The buggy address belongs to the physical page:
[   19.549458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f8
[   19.549510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.549559] page_type: f5(slab)
[   19.549597] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.549648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.549689] page dumped because: kasan: bad access detected
[   19.549724] 
[   19.549744] Memory state around the buggy address:
[   19.549778]  fff00000c79f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.549822]  fff00000c79f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549910] >fff00000c79f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.549951]                                                                 ^
[   19.550331]  fff00000c79f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.550381]  fff00000c79f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.550422] ==================================================================
[   19.523554] ==================================================================
[   19.523851] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.523957] Read of size 121 at addr fff00000c79f8300 by task kunit_try_catch/285
[   19.524044] 
[   19.524110] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.524210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.524263] Hardware name: linux,dummy-virt (DT)
[   19.524339] Call trace:
[   19.524363]  show_stack+0x20/0x38 (C)
[   19.524437]  dump_stack_lvl+0x8c/0xd0
[   19.524511]  print_report+0x118/0x5d0
[   19.524617]  kasan_report+0xdc/0x128
[   19.524664]  kasan_check_range+0x100/0x1a8
[   19.524712]  __kasan_check_read+0x20/0x30
[   19.524756]  copy_user_test_oob+0x728/0xec8
[   19.524805]  kunit_try_run_case+0x170/0x3f0
[   19.525065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525177]  kthread+0x328/0x630
[   19.525242]  ret_from_fork+0x10/0x20
[   19.525315] 
[   19.525354] Allocated by task 285:
[   19.525385]  kasan_save_stack+0x3c/0x68
[   19.525634]  kasan_save_track+0x20/0x40
[   19.525765]  kasan_save_alloc_info+0x40/0x58
[   19.525833]  __kasan_kmalloc+0xd4/0xd8
[   19.525910]  __kmalloc_noprof+0x198/0x4c8
[   19.526022]  kunit_kmalloc_array+0x34/0x88
[   19.526108]  copy_user_test_oob+0xac/0xec8
[   19.526211]  kunit_try_run_case+0x170/0x3f0
[   19.526290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.526373]  kthread+0x328/0x630
[   19.526448]  ret_from_fork+0x10/0x20
[   19.526526] 
[   19.526574] The buggy address belongs to the object at fff00000c79f8300
[   19.526574]  which belongs to the cache kmalloc-128 of size 128
[   19.526634] The buggy address is located 0 bytes inside of
[   19.526634]  allocated 120-byte region [fff00000c79f8300, fff00000c79f8378)
[   19.526991] 
[   19.527027] The buggy address belongs to the physical page:
[   19.527087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f8
[   19.527168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.527509] page_type: f5(slab)
[   19.527564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.527659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.527752] page dumped because: kasan: bad access detected
[   19.527806] 
[   19.527851] Memory state around the buggy address:
[   19.527918]  fff00000c79f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.528001]  fff00000c79f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.528085] >fff00000c79f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.528164]                                                                 ^
[   19.528248]  fff00000c79f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.528294]  fff00000c79f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.528334] ==================================================================
[   19.514816] ==================================================================
[   19.514982] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.515082] Write of size 121 at addr fff00000c79f8300 by task kunit_try_catch/285
[   19.515148] 
[   19.515196] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.515479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.515528] Hardware name: linux,dummy-virt (DT)
[   19.515604] Call trace:
[   19.515641]  show_stack+0x20/0x38 (C)
[   19.515704]  dump_stack_lvl+0x8c/0xd0
[   19.515791]  print_report+0x118/0x5d0
[   19.516016]  kasan_report+0xdc/0x128
[   19.516093]  kasan_check_range+0x100/0x1a8
[   19.516144]  __kasan_check_write+0x20/0x30
[   19.516191]  copy_user_test_oob+0x234/0xec8
[   19.516247]  kunit_try_run_case+0x170/0x3f0
[   19.516305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.516369]  kthread+0x328/0x630
[   19.516422]  ret_from_fork+0x10/0x20
[   19.516501] 
[   19.516532] Allocated by task 285:
[   19.516582]  kasan_save_stack+0x3c/0x68
[   19.516638]  kasan_save_track+0x20/0x40
[   19.516677]  kasan_save_alloc_info+0x40/0x58
[   19.516719]  __kasan_kmalloc+0xd4/0xd8
[   19.516762]  __kmalloc_noprof+0x198/0x4c8
[   19.516802]  kunit_kmalloc_array+0x34/0x88
[   19.516850]  copy_user_test_oob+0xac/0xec8
[   19.516903]  kunit_try_run_case+0x170/0x3f0
[   19.516945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.516991]  kthread+0x328/0x630
[   19.517038]  ret_from_fork+0x10/0x20
[   19.517093] 
[   19.517129] The buggy address belongs to the object at fff00000c79f8300
[   19.517129]  which belongs to the cache kmalloc-128 of size 128
[   19.517213] The buggy address is located 0 bytes inside of
[   19.517213]  allocated 120-byte region [fff00000c79f8300, fff00000c79f8378)
[   19.517277] 
[   19.517302] The buggy address belongs to the physical page:
[   19.517348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f8
[   19.517419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.517474] page_type: f5(slab)
[   19.517528] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.517589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.517632] page dumped because: kasan: bad access detected
[   19.517665] 
[   19.517692] Memory state around the buggy address:
[   19.517734]  fff00000c79f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.517780]  fff00000c79f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517825] >fff00000c79f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.517887]                                                                 ^
[   19.517930]  fff00000c79f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517974]  fff00000c79f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.518488] ==================================================================

[   16.406607] ==================================================================
[   16.406854] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.407228] Write of size 121 at addr ffff888102f5e000 by task kunit_try_catch/302
[   16.407541] 
[   16.407665] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.407708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.407720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.407742] Call Trace:
[   16.407759]  <TASK>
[   16.407776]  dump_stack_lvl+0x73/0xb0
[   16.407805]  print_report+0xd1/0x610
[   16.407828]  ? __virt_addr_valid+0x1db/0x2d0
[   16.407851]  ? copy_user_test_oob+0x557/0x10f0
[   16.407875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.407899]  ? copy_user_test_oob+0x557/0x10f0
[   16.407923]  kasan_report+0x141/0x180
[   16.407946]  ? copy_user_test_oob+0x557/0x10f0
[   16.407975]  kasan_check_range+0x10c/0x1c0
[   16.408000]  __kasan_check_write+0x18/0x20
[   16.408020]  copy_user_test_oob+0x557/0x10f0
[   16.408046]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.408081]  ? finish_task_switch.isra.0+0x153/0x700
[   16.408105]  ? __switch_to+0x47/0xf50
[   16.408133]  ? __schedule+0x10cc/0x2b60
[   16.408156]  ? __pfx_read_tsc+0x10/0x10
[   16.408178]  ? ktime_get_ts64+0x86/0x230
[   16.408202]  kunit_try_run_case+0x1a5/0x480
[   16.408228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.408252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.408277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.408302]  ? __kthread_parkme+0x82/0x180
[   16.408324]  ? preempt_count_sub+0x50/0x80
[   16.408348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.408373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.408397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.408422]  kthread+0x337/0x6f0
[   16.408442]  ? trace_preempt_on+0x20/0xc0
[   16.408467]  ? __pfx_kthread+0x10/0x10
[   16.408488]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.408510]  ? calculate_sigpending+0x7b/0xa0
[   16.408535]  ? __pfx_kthread+0x10/0x10
[   16.408557]  ret_from_fork+0x116/0x1d0
[   16.408576]  ? __pfx_kthread+0x10/0x10
[   16.408606]  ret_from_fork_asm+0x1a/0x30
[   16.408639]  </TASK>
[   16.408649] 
[   16.415994] Allocated by task 302:
[   16.416185]  kasan_save_stack+0x45/0x70
[   16.416390]  kasan_save_track+0x18/0x40
[   16.416538]  kasan_save_alloc_info+0x3b/0x50
[   16.416772]  __kasan_kmalloc+0xb7/0xc0
[   16.416907]  __kmalloc_noprof+0x1c9/0x500
[   16.417047]  kunit_kmalloc_array+0x25/0x60
[   16.417200]  copy_user_test_oob+0xab/0x10f0
[   16.417616]  kunit_try_run_case+0x1a5/0x480
[   16.417810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.418025]  kthread+0x337/0x6f0
[   16.418167]  ret_from_fork+0x116/0x1d0
[   16.418308]  ret_from_fork_asm+0x1a/0x30
[   16.418449] 
[   16.418522] The buggy address belongs to the object at ffff888102f5e000
[   16.418522]  which belongs to the cache kmalloc-128 of size 128
[   16.419260] The buggy address is located 0 bytes inside of
[   16.419260]  allocated 120-byte region [ffff888102f5e000, ffff888102f5e078)
[   16.419863] 
[   16.419936] The buggy address belongs to the physical page:
[   16.420121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f5e
[   16.420483] flags: 0x200000000000000(node=0|zone=2)
[   16.420913] page_type: f5(slab)
[   16.421089] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.421428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.421730] page dumped because: kasan: bad access detected
[   16.421940] 
[   16.422011] Memory state around the buggy address:
[   16.422255]  ffff888102f5df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422569]  ffff888102f5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422844] >ffff888102f5e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.423162]                                                                 ^
[   16.423417]  ffff888102f5e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.423742]  ffff888102f5e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.424043] ==================================================================
[   16.424609] ==================================================================
[   16.424974] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.425291] Read of size 121 at addr ffff888102f5e000 by task kunit_try_catch/302
[   16.425666] 
[   16.425787] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.425833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.425846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.425869] Call Trace:
[   16.425887]  <TASK>
[   16.425906]  dump_stack_lvl+0x73/0xb0
[   16.425935]  print_report+0xd1/0x610
[   16.425958]  ? __virt_addr_valid+0x1db/0x2d0
[   16.425983]  ? copy_user_test_oob+0x604/0x10f0
[   16.426007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.426031]  ? copy_user_test_oob+0x604/0x10f0
[   16.426069]  kasan_report+0x141/0x180
[   16.426094]  ? copy_user_test_oob+0x604/0x10f0
[   16.426126]  kasan_check_range+0x10c/0x1c0
[   16.426152]  __kasan_check_read+0x15/0x20
[   16.426172]  copy_user_test_oob+0x604/0x10f0
[   16.426203]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.426226]  ? finish_task_switch.isra.0+0x153/0x700
[   16.426251]  ? __switch_to+0x47/0xf50
[   16.426280]  ? __schedule+0x10cc/0x2b60
[   16.426304]  ? __pfx_read_tsc+0x10/0x10
[   16.426326]  ? ktime_get_ts64+0x86/0x230
[   16.426352]  kunit_try_run_case+0x1a5/0x480
[   16.426378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.426427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.426452]  ? __kthread_parkme+0x82/0x180
[   16.426474]  ? preempt_count_sub+0x50/0x80
[   16.426498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.426548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.426574]  kthread+0x337/0x6f0
[   16.426606]  ? trace_preempt_on+0x20/0xc0
[   16.426632]  ? __pfx_kthread+0x10/0x10
[   16.426653]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.426676]  ? calculate_sigpending+0x7b/0xa0
[   16.426702]  ? __pfx_kthread+0x10/0x10
[   16.426724]  ret_from_fork+0x116/0x1d0
[   16.426744]  ? __pfx_kthread+0x10/0x10
[   16.426764]  ret_from_fork_asm+0x1a/0x30
[   16.426798]  </TASK>
[   16.426809] 
[   16.434132] Allocated by task 302:
[   16.434325]  kasan_save_stack+0x45/0x70
[   16.434542]  kasan_save_track+0x18/0x40
[   16.434735]  kasan_save_alloc_info+0x3b/0x50
[   16.434902]  __kasan_kmalloc+0xb7/0xc0
[   16.435098]  __kmalloc_noprof+0x1c9/0x500
[   16.435312]  kunit_kmalloc_array+0x25/0x60
[   16.435512]  copy_user_test_oob+0xab/0x10f0
[   16.435741]  kunit_try_run_case+0x1a5/0x480
[   16.435942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.436203]  kthread+0x337/0x6f0
[   16.436330]  ret_from_fork+0x116/0x1d0
[   16.436465]  ret_from_fork_asm+0x1a/0x30
[   16.436608] 
[   16.436681] The buggy address belongs to the object at ffff888102f5e000
[   16.436681]  which belongs to the cache kmalloc-128 of size 128
[   16.437046] The buggy address is located 0 bytes inside of
[   16.437046]  allocated 120-byte region [ffff888102f5e000, ffff888102f5e078)
[   16.437562] 
[   16.437672] The buggy address belongs to the physical page:
[   16.437928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f5e
[   16.438300] flags: 0x200000000000000(node=0|zone=2)
[   16.438545] page_type: f5(slab)
[   16.438855] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.439125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.439354] page dumped because: kasan: bad access detected
[   16.439528] 
[   16.439619] Memory state around the buggy address:
[   16.439849]  ffff888102f5df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.440186]  ffff888102f5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.440512] >ffff888102f5e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.441103]                                                                 ^
[   16.441389]  ffff888102f5e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.441679]  ffff888102f5e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.441986] ==================================================================
[   16.366234] ==================================================================
[   16.366571] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.366960] Write of size 121 at addr ffff888102f5e000 by task kunit_try_catch/302
[   16.367277] 
[   16.367399] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.367445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.367458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.367481] Call Trace:
[   16.367495]  <TASK>
[   16.367513]  dump_stack_lvl+0x73/0xb0
[   16.367542]  print_report+0xd1/0x610
[   16.367565]  ? __virt_addr_valid+0x1db/0x2d0
[   16.367589]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.367626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.367650]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.367674]  kasan_report+0x141/0x180
[   16.367697]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.367727]  kasan_check_range+0x10c/0x1c0
[   16.367751]  __kasan_check_write+0x18/0x20
[   16.367771]  copy_user_test_oob+0x3fd/0x10f0
[   16.367798]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.367821]  ? finish_task_switch.isra.0+0x153/0x700
[   16.367845]  ? __switch_to+0x47/0xf50
[   16.367872]  ? __schedule+0x10cc/0x2b60
[   16.367896]  ? __pfx_read_tsc+0x10/0x10
[   16.367916]  ? ktime_get_ts64+0x86/0x230
[   16.367942]  kunit_try_run_case+0x1a5/0x480
[   16.367967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.367990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.368016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.368040]  ? __kthread_parkme+0x82/0x180
[   16.368073]  ? preempt_count_sub+0x50/0x80
[   16.368098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.368123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.368148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.368173]  kthread+0x337/0x6f0
[   16.368193]  ? trace_preempt_on+0x20/0xc0
[   16.368217]  ? __pfx_kthread+0x10/0x10
[   16.368239]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.368261]  ? calculate_sigpending+0x7b/0xa0
[   16.368286]  ? __pfx_kthread+0x10/0x10
[   16.368309]  ret_from_fork+0x116/0x1d0
[   16.368328]  ? __pfx_kthread+0x10/0x10
[   16.368349]  ret_from_fork_asm+0x1a/0x30
[   16.368382]  </TASK>
[   16.368392] 
[   16.375674] Allocated by task 302:
[   16.375859]  kasan_save_stack+0x45/0x70
[   16.376072]  kasan_save_track+0x18/0x40
[   16.376238]  kasan_save_alloc_info+0x3b/0x50
[   16.376388]  __kasan_kmalloc+0xb7/0xc0
[   16.376522]  __kmalloc_noprof+0x1c9/0x500
[   16.376867]  kunit_kmalloc_array+0x25/0x60
[   16.377086]  copy_user_test_oob+0xab/0x10f0
[   16.377295]  kunit_try_run_case+0x1a5/0x480
[   16.377504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.377770]  kthread+0x337/0x6f0
[   16.377910]  ret_from_fork+0x116/0x1d0
[   16.378100]  ret_from_fork_asm+0x1a/0x30
[   16.378292] 
[   16.378377] The buggy address belongs to the object at ffff888102f5e000
[   16.378377]  which belongs to the cache kmalloc-128 of size 128
[   16.378863] The buggy address is located 0 bytes inside of
[   16.378863]  allocated 120-byte region [ffff888102f5e000, ffff888102f5e078)
[   16.379351] 
[   16.379426] The buggy address belongs to the physical page:
[   16.379612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f5e
[   16.379964] flags: 0x200000000000000(node=0|zone=2)
[   16.380322] page_type: f5(slab)
[   16.380448] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.380705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.381086] page dumped because: kasan: bad access detected
[   16.381463] 
[   16.381558] Memory state around the buggy address:
[   16.381795]  ffff888102f5df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.382041]  ffff888102f5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.382365] >ffff888102f5e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.382687]                                                                 ^
[   16.382903]  ffff888102f5e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.383158]  ffff888102f5e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.383473] ==================================================================
[   16.384306] ==================================================================
[   16.384768] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.385095] Read of size 121 at addr ffff888102f5e000 by task kunit_try_catch/302
[   16.385390] 
[   16.385480] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.385526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.385538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.385561] Call Trace:
[   16.385578]  <TASK>
[   16.385597]  dump_stack_lvl+0x73/0xb0
[   16.385625]  print_report+0xd1/0x610
[   16.385649]  ? __virt_addr_valid+0x1db/0x2d0
[   16.385672]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.385697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.385720]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.385745]  kasan_report+0x141/0x180
[   16.385768]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.385798]  kasan_check_range+0x10c/0x1c0
[   16.385823]  __kasan_check_read+0x15/0x20
[   16.385842]  copy_user_test_oob+0x4aa/0x10f0
[   16.385868]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.385891]  ? finish_task_switch.isra.0+0x153/0x700
[   16.385915]  ? __switch_to+0x47/0xf50
[   16.385942]  ? __schedule+0x10cc/0x2b60
[   16.385980]  ? __pfx_read_tsc+0x10/0x10
[   16.386002]  ? ktime_get_ts64+0x86/0x230
[   16.386027]  kunit_try_run_case+0x1a5/0x480
[   16.386065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.386088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.386114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.386139]  ? __kthread_parkme+0x82/0x180
[   16.386160]  ? preempt_count_sub+0x50/0x80
[   16.386185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.386213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.386238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.386263]  kthread+0x337/0x6f0
[   16.386282]  ? trace_preempt_on+0x20/0xc0
[   16.386307]  ? __pfx_kthread+0x10/0x10
[   16.386328]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.386350]  ? calculate_sigpending+0x7b/0xa0
[   16.386376]  ? __pfx_kthread+0x10/0x10
[   16.386398]  ret_from_fork+0x116/0x1d0
[   16.386417]  ? __pfx_kthread+0x10/0x10
[   16.386438]  ret_from_fork_asm+0x1a/0x30
[   16.386471]  </TASK>
[   16.386481] 
[   16.394215] Allocated by task 302:
[   16.394375]  kasan_save_stack+0x45/0x70
[   16.394544]  kasan_save_track+0x18/0x40
[   16.394778]  kasan_save_alloc_info+0x3b/0x50
[   16.394960]  __kasan_kmalloc+0xb7/0xc0
[   16.395154]  __kmalloc_noprof+0x1c9/0x500
[   16.395307]  kunit_kmalloc_array+0x25/0x60
[   16.395482]  copy_user_test_oob+0xab/0x10f0
[   16.395693]  kunit_try_run_case+0x1a5/0x480
[   16.395901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.396128]  kthread+0x337/0x6f0
[   16.396288]  ret_from_fork+0x116/0x1d0
[   16.396467]  ret_from_fork_asm+0x1a/0x30
[   16.398251] 
[   16.398383] The buggy address belongs to the object at ffff888102f5e000
[   16.398383]  which belongs to the cache kmalloc-128 of size 128
[   16.398802] The buggy address is located 0 bytes inside of
[   16.398802]  allocated 120-byte region [ffff888102f5e000, ffff888102f5e078)
[   16.399177] 
[   16.399253] The buggy address belongs to the physical page:
[   16.399429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f5e
[   16.400440] flags: 0x200000000000000(node=0|zone=2)
[   16.401163] page_type: f5(slab)
[   16.401405] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.402124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.402467] page dumped because: kasan: bad access detected
[   16.402869] 
[   16.403116] Memory state around the buggy address:
[   16.403453]  ffff888102f5df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.403929]  ffff888102f5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.404372] >ffff888102f5e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.404810]                                                                 ^
[   16.405314]  ffff888102f5e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.405781]  ffff888102f5e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.406091] ==================================================================