Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.611545] ==================================================================
[   18.611604] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   18.611656] Write of size 121 at addr fff00000c771e200 by task kunit_try_catch/285
[   18.611711] 
[   18.612272] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.612398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.612747] Hardware name: linux,dummy-virt (DT)
[   18.612825] Call trace:
[   18.612852]  show_stack+0x20/0x38 (C)
[   18.612906]  dump_stack_lvl+0x8c/0xd0
[   18.612962]  print_report+0x118/0x5d0
[   18.613106]  kasan_report+0xdc/0x128
[   18.613159]  kasan_check_range+0x100/0x1a8
[   18.613237]  __kasan_check_write+0x20/0x30
[   18.613396]  copy_user_test_oob+0x35c/0xec8
[   18.613447]  kunit_try_run_case+0x170/0x3f0
[   18.613502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.613747]  kthread+0x328/0x630
[   18.614048]  ret_from_fork+0x10/0x20
[   18.614161] 
[   18.614259] Allocated by task 285:
[   18.614352]  kasan_save_stack+0x3c/0x68
[   18.614406]  kasan_save_track+0x20/0x40
[   18.614640]  kasan_save_alloc_info+0x40/0x58
[   18.614831]  __kasan_kmalloc+0xd4/0xd8
[   18.614913]  __kmalloc_noprof+0x198/0x4c8
[   18.615106]  kunit_kmalloc_array+0x34/0x88
[   18.615295]  copy_user_test_oob+0xac/0xec8
[   18.615445]  kunit_try_run_case+0x170/0x3f0
[   18.615535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.615773]  kthread+0x328/0x630
[   18.615998]  ret_from_fork+0x10/0x20
[   18.616195] 
[   18.616365] The buggy address belongs to the object at fff00000c771e200
[   18.616365]  which belongs to the cache kmalloc-128 of size 128
[   18.616449] The buggy address is located 0 bytes inside of
[   18.616449]  allocated 120-byte region [fff00000c771e200, fff00000c771e278)
[   18.616603] 
[   18.616663] The buggy address belongs to the physical page:
[   18.616743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   18.617137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.617231] page_type: f5(slab)
[   18.617518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.617614] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.617735] page dumped because: kasan: bad access detected
[   18.617844] 
[   18.617914] Memory state around the buggy address:
[   18.618067]  fff00000c771e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.618163]  fff00000c771e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.618226] >fff00000c771e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.618552]                                                                 ^
[   18.618741]  fff00000c771e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.618825]  fff00000c771e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.618878] ==================================================================
[   18.596106] ==================================================================
[   18.596224] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   18.596308] Read of size 121 at addr fff00000c771e200 by task kunit_try_catch/285
[   18.596553] 
[   18.596612] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.596997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.597049] Hardware name: linux,dummy-virt (DT)
[   18.597085] Call trace:
[   18.597110]  show_stack+0x20/0x38 (C)
[   18.597240]  dump_stack_lvl+0x8c/0xd0
[   18.597292]  print_report+0x118/0x5d0
[   18.597460]  kasan_report+0xdc/0x128
[   18.597549]  kasan_check_range+0x100/0x1a8
[   18.597701]  __kasan_check_read+0x20/0x30
[   18.597767]  copy_user_test_oob+0x728/0xec8
[   18.597816]  kunit_try_run_case+0x170/0x3f0
[   18.598215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.598362]  kthread+0x328/0x630
[   18.598490]  ret_from_fork+0x10/0x20
[   18.598611] 
[   18.598672] Allocated by task 285:
[   18.598767]  kasan_save_stack+0x3c/0x68
[   18.598847]  kasan_save_track+0x20/0x40
[   18.599164]  kasan_save_alloc_info+0x40/0x58
[   18.599233]  __kasan_kmalloc+0xd4/0xd8
[   18.599277]  __kmalloc_noprof+0x198/0x4c8
[   18.599319]  kunit_kmalloc_array+0x34/0x88
[   18.599523]  copy_user_test_oob+0xac/0xec8
[   18.599714]  kunit_try_run_case+0x170/0x3f0
[   18.599911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.600060]  kthread+0x328/0x630
[   18.600099]  ret_from_fork+0x10/0x20
[   18.600156] 
[   18.600240] The buggy address belongs to the object at fff00000c771e200
[   18.600240]  which belongs to the cache kmalloc-128 of size 128
[   18.600622] The buggy address is located 0 bytes inside of
[   18.600622]  allocated 120-byte region [fff00000c771e200, fff00000c771e278)
[   18.600710] 
[   18.600826] The buggy address belongs to the physical page:
[   18.600906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   18.601056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.601106] page_type: f5(slab)
[   18.601180] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.601406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.601625] page dumped because: kasan: bad access detected
[   18.601874] 
[   18.601922] Memory state around the buggy address:
[   18.602177]  fff00000c771e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.602252]  fff00000c771e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.602316] >fff00000c771e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.602367]                                                                 ^
[   18.602447]  fff00000c771e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.602492]  fff00000c771e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.602534] ==================================================================
[   18.636261] ==================================================================
[   18.636337] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   18.636390] Read of size 121 at addr fff00000c771e200 by task kunit_try_catch/285
[   18.636844] 
[   18.637073] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.637272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.637311] Hardware name: linux,dummy-virt (DT)
[   18.637545] Call trace:
[   18.637594]  show_stack+0x20/0x38 (C)
[   18.637659]  dump_stack_lvl+0x8c/0xd0
[   18.637723]  print_report+0x118/0x5d0
[   18.637782]  kasan_report+0xdc/0x128
[   18.637841]  kasan_check_range+0x100/0x1a8
[   18.637902]  __kasan_check_read+0x20/0x30
[   18.637949]  copy_user_test_oob+0x4a0/0xec8
[   18.637999]  kunit_try_run_case+0x170/0x3f0
[   18.638056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.638111]  kthread+0x328/0x630
[   18.638154]  ret_from_fork+0x10/0x20
[   18.638213] 
[   18.638234] Allocated by task 285:
[   18.638272]  kasan_save_stack+0x3c/0x68
[   18.638316]  kasan_save_track+0x20/0x40
[   18.638369]  kasan_save_alloc_info+0x40/0x58
[   18.638411]  __kasan_kmalloc+0xd4/0xd8
[   18.638452]  __kmalloc_noprof+0x198/0x4c8
[   18.638490]  kunit_kmalloc_array+0x34/0x88
[   18.638530]  copy_user_test_oob+0xac/0xec8
[   18.638578]  kunit_try_run_case+0x170/0x3f0
[   18.638618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.638665]  kthread+0x328/0x630
[   18.638699]  ret_from_fork+0x10/0x20
[   18.638747] 
[   18.638777] The buggy address belongs to the object at fff00000c771e200
[   18.638777]  which belongs to the cache kmalloc-128 of size 128
[   18.638836] The buggy address is located 0 bytes inside of
[   18.638836]  allocated 120-byte region [fff00000c771e200, fff00000c771e278)
[   18.638900] 
[   18.638923] The buggy address belongs to the physical page:
[   18.638956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   18.639010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.639060] page_type: f5(slab)
[   18.639109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.639163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.639205] page dumped because: kasan: bad access detected
[   18.639239] 
[   18.639260] Memory state around the buggy address:
[   18.639294]  fff00000c771e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.639349]  fff00000c771e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.639555] >fff00000c771e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.639751]                                                                 ^
[   18.640013]  fff00000c771e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.640318]  fff00000c771e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.640508] ==================================================================
[   18.581300] ==================================================================
[   18.582407] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   18.582494] Write of size 121 at addr fff00000c771e200 by task kunit_try_catch/285
[   18.582909] 
[   18.583273] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.583490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.583571] Hardware name: linux,dummy-virt (DT)
[   18.583983] Call trace:
[   18.584039]  show_stack+0x20/0x38 (C)
[   18.584365]  dump_stack_lvl+0x8c/0xd0
[   18.584546]  print_report+0x118/0x5d0
[   18.584621]  kasan_report+0xdc/0x128
[   18.584991]  kasan_check_range+0x100/0x1a8
[   18.585070]  __kasan_check_write+0x20/0x30
[   18.585120]  copy_user_test_oob+0x234/0xec8
[   18.585170]  kunit_try_run_case+0x170/0x3f0
[   18.585253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.585362]  kthread+0x328/0x630
[   18.585422]  ret_from_fork+0x10/0x20
[   18.585870] 
[   18.585920] Allocated by task 285:
[   18.585991]  kasan_save_stack+0x3c/0x68
[   18.586157]  kasan_save_track+0x20/0x40
[   18.586206]  kasan_save_alloc_info+0x40/0x58
[   18.586255]  __kasan_kmalloc+0xd4/0xd8
[   18.586319]  __kmalloc_noprof+0x198/0x4c8
[   18.586381]  kunit_kmalloc_array+0x34/0x88
[   18.586423]  copy_user_test_oob+0xac/0xec8
[   18.586462]  kunit_try_run_case+0x170/0x3f0
[   18.586503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.586559]  kthread+0x328/0x630
[   18.586596]  ret_from_fork+0x10/0x20
[   18.586636] 
[   18.586667] The buggy address belongs to the object at fff00000c771e200
[   18.586667]  which belongs to the cache kmalloc-128 of size 128
[   18.586731] The buggy address is located 0 bytes inside of
[   18.586731]  allocated 120-byte region [fff00000c771e200, fff00000c771e278)
[   18.586794] 
[   18.586826] The buggy address belongs to the physical page:
[   18.586870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   18.586941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.587020] page_type: f5(slab)
[   18.587067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.587121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.587171] page dumped because: kasan: bad access detected
[   18.587207] 
[   18.587237] Memory state around the buggy address:
[   18.587285]  fff00000c771e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.587350]  fff00000c771e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.587897] >fff00000c771e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.587967]                                                                 ^
[   18.588040]  fff00000c771e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.588119]  fff00000c771e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.588514] ==================================================================
[   18.627391] ==================================================================
[   18.627659] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   18.627865] Write of size 121 at addr fff00000c771e200 by task kunit_try_catch/285
[   18.628051] 
[   18.628137] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.628265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.628587] Hardware name: linux,dummy-virt (DT)
[   18.628631] Call trace:
[   18.628658]  show_stack+0x20/0x38 (C)
[   18.628714]  dump_stack_lvl+0x8c/0xd0
[   18.628812]  print_report+0x118/0x5d0
[   18.628864]  kasan_report+0xdc/0x128
[   18.628911]  kasan_check_range+0x100/0x1a8
[   18.629412]  __kasan_check_write+0x20/0x30
[   18.629517]  copy_user_test_oob+0x434/0xec8
[   18.629592]  kunit_try_run_case+0x170/0x3f0
[   18.629868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.630103]  kthread+0x328/0x630
[   18.630188]  ret_from_fork+0x10/0x20
[   18.630287] 
[   18.630411] Allocated by task 285:
[   18.630488]  kasan_save_stack+0x3c/0x68
[   18.630535]  kasan_save_track+0x20/0x40
[   18.630574]  kasan_save_alloc_info+0x40/0x58
[   18.630826]  __kasan_kmalloc+0xd4/0xd8
[   18.630994]  __kmalloc_noprof+0x198/0x4c8
[   18.631068]  kunit_kmalloc_array+0x34/0x88
[   18.631315]  copy_user_test_oob+0xac/0xec8
[   18.631492]  kunit_try_run_case+0x170/0x3f0
[   18.631575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.631706]  kthread+0x328/0x630
[   18.631784]  ret_from_fork+0x10/0x20
[   18.631873] 
[   18.631925] The buggy address belongs to the object at fff00000c771e200
[   18.631925]  which belongs to the cache kmalloc-128 of size 128
[   18.632350] The buggy address is located 0 bytes inside of
[   18.632350]  allocated 120-byte region [fff00000c771e200, fff00000c771e278)
[   18.632458] 
[   18.632785] The buggy address belongs to the physical page:
[   18.632842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   18.633053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.633162] page_type: f5(slab)
[   18.633231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.633489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.633674] page dumped because: kasan: bad access detected
[   18.633738] 
[   18.633917] Memory state around the buggy address:
[   18.634142]  fff00000c771e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.634214]  fff00000c771e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.634556] >fff00000c771e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.634662]                                                                 ^
[   18.634814]  fff00000c771e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.634910]  fff00000c771e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.635138] ==================================================================
[   18.620248] ==================================================================
[   18.620504] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   18.620667] Read of size 121 at addr fff00000c771e200 by task kunit_try_catch/285
[   18.620730] 
[   18.620940] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.621145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.621365] Hardware name: linux,dummy-virt (DT)
[   18.621411] Call trace:
[   18.621436]  show_stack+0x20/0x38 (C)
[   18.621702]  dump_stack_lvl+0x8c/0xd0
[   18.621856]  print_report+0x118/0x5d0
[   18.621949]  kasan_report+0xdc/0x128
[   18.622046]  kasan_check_range+0x100/0x1a8
[   18.622338]  __kasan_check_read+0x20/0x30
[   18.622602]  copy_user_test_oob+0x3c8/0xec8
[   18.622686]  kunit_try_run_case+0x170/0x3f0
[   18.622760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.622989]  kthread+0x328/0x630
[   18.623143]  ret_from_fork+0x10/0x20
[   18.623217] 
[   18.623241] Allocated by task 285:
[   18.623345]  kasan_save_stack+0x3c/0x68
[   18.623391]  kasan_save_track+0x20/0x40
[   18.623432]  kasan_save_alloc_info+0x40/0x58
[   18.623476]  __kasan_kmalloc+0xd4/0xd8
[   18.623513]  __kmalloc_noprof+0x198/0x4c8
[   18.623564]  kunit_kmalloc_array+0x34/0x88
[   18.623622]  copy_user_test_oob+0xac/0xec8
[   18.623670]  kunit_try_run_case+0x170/0x3f0
[   18.623716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.623762]  kthread+0x328/0x630
[   18.623803]  ret_from_fork+0x10/0x20
[   18.623840] 
[   18.623863] The buggy address belongs to the object at fff00000c771e200
[   18.623863]  which belongs to the cache kmalloc-128 of size 128
[   18.623922] The buggy address is located 0 bytes inside of
[   18.623922]  allocated 120-byte region [fff00000c771e200, fff00000c771e278)
[   18.623999] 
[   18.624041] The buggy address belongs to the physical page:
[   18.624091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   18.624144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.624204] page_type: f5(slab)
[   18.624242] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.624294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.624370] page dumped because: kasan: bad access detected
[   18.624918] 
[   18.625188] Memory state around the buggy address:
[   18.625263]  fff00000c771e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.625372]  fff00000c771e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.625435] >fff00000c771e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.625500]                                                                 ^
[   18.625754]  fff00000c771e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626017]  fff00000c771e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626066] ==================================================================

[   16.364227] ==================================================================
[   16.364630] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.364955] Read of size 121 at addr ffff8881039ee400 by task kunit_try_catch/304
[   16.365293] 
[   16.365400] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.365443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.365456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.365477] Call Trace:
[   16.365492]  <TASK>
[   16.365505]  dump_stack_lvl+0x73/0xb0
[   16.365543]  print_report+0xd1/0x610
[   16.365566]  ? __virt_addr_valid+0x1db/0x2d0
[   16.365588]  ? copy_user_test_oob+0x604/0x10f0
[   16.365624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.365657]  ? copy_user_test_oob+0x604/0x10f0
[   16.365682]  kasan_report+0x141/0x180
[   16.365705]  ? copy_user_test_oob+0x604/0x10f0
[   16.365744]  kasan_check_range+0x10c/0x1c0
[   16.365768]  __kasan_check_read+0x15/0x20
[   16.365788]  copy_user_test_oob+0x604/0x10f0
[   16.365823]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.365848]  ? __kasan_check_write+0x18/0x20
[   16.365867]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.365905]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   16.365930]  ? __pfx_read_tsc+0x10/0x10
[   16.365952]  ? ktime_get_ts64+0x86/0x230
[   16.365984]  kunit_try_run_case+0x1a5/0x480
[   16.366009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.366031]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   16.366065]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.366090]  ? __kthread_parkme+0x82/0x180
[   16.366110]  ? preempt_count_sub+0x50/0x80
[   16.366144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.366168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.366192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.366228]  kthread+0x337/0x6f0
[   16.366248]  ? trace_preempt_on+0x20/0xc0
[   16.366271]  ? __pfx_kthread+0x10/0x10
[   16.366293]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.366315]  ? calculate_sigpending+0x7b/0xa0
[   16.366348]  ? __pfx_kthread+0x10/0x10
[   16.366370]  ret_from_fork+0x116/0x1d0
[   16.366388]  ? __pfx_kthread+0x10/0x10
[   16.366409]  ret_from_fork_asm+0x1a/0x30
[   16.366441]  </TASK>
[   16.366452] 
[   16.374023] Allocated by task 304:
[   16.374457]  kasan_save_stack+0x45/0x70
[   16.374934]  kasan_save_track+0x18/0x40
[   16.375552]  kasan_save_alloc_info+0x3b/0x50
[   16.376019]  __kasan_kmalloc+0xb7/0xc0
[   16.376545]  __kmalloc_noprof+0x1c9/0x500
[   16.376874]  kunit_kmalloc_array+0x25/0x60
[   16.377081]  copy_user_test_oob+0xab/0x10f0
[   16.377281]  kunit_try_run_case+0x1a5/0x480
[   16.378223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.378429]  kthread+0x337/0x6f0
[   16.378690]  ret_from_fork+0x116/0x1d0
[   16.378862]  ret_from_fork_asm+0x1a/0x30
[   16.379044] 
[   16.379137] The buggy address belongs to the object at ffff8881039ee400
[   16.379137]  which belongs to the cache kmalloc-128 of size 128
[   16.380128] The buggy address is located 0 bytes inside of
[   16.380128]  allocated 120-byte region [ffff8881039ee400, ffff8881039ee478)
[   16.381049] 
[   16.381315] The buggy address belongs to the physical page:
[   16.381601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039ee
[   16.381925] flags: 0x200000000000000(node=0|zone=2)
[   16.382130] page_type: f5(slab)
[   16.382288] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.383021] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.383489] page dumped because: kasan: bad access detected
[   16.383874] 
[   16.383968] Memory state around the buggy address:
[   16.384172]  ffff8881039ee300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.384435]  ffff8881039ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.384685] >ffff8881039ee400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.385022]                                                                 ^
[   16.385305]  ffff8881039ee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.385675]  ffff8881039ee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.385948] ==================================================================
[   16.345176] ==================================================================
[   16.345529] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.345838] Write of size 121 at addr ffff8881039ee400 by task kunit_try_catch/304
[   16.346167] 
[   16.346251] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.346292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.346305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.346337] Call Trace:
[   16.346353]  <TASK>
[   16.346368]  dump_stack_lvl+0x73/0xb0
[   16.346396]  print_report+0xd1/0x610
[   16.346418]  ? __virt_addr_valid+0x1db/0x2d0
[   16.346441]  ? copy_user_test_oob+0x557/0x10f0
[   16.346465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.346488]  ? copy_user_test_oob+0x557/0x10f0
[   16.346524]  kasan_report+0x141/0x180
[   16.346557]  ? copy_user_test_oob+0x557/0x10f0
[   16.346585]  kasan_check_range+0x10c/0x1c0
[   16.346610]  __kasan_check_write+0x18/0x20
[   16.346642]  copy_user_test_oob+0x557/0x10f0
[   16.346669]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.346694]  ? __kasan_check_write+0x18/0x20
[   16.346714]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.346740]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   16.346765]  ? __pfx_read_tsc+0x10/0x10
[   16.346785]  ? ktime_get_ts64+0x86/0x230
[   16.346810]  kunit_try_run_case+0x1a5/0x480
[   16.346834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.346859]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   16.346883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.346916]  ? __kthread_parkme+0x82/0x180
[   16.346938]  ? preempt_count_sub+0x50/0x80
[   16.346962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.346999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.347025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.347050]  kthread+0x337/0x6f0
[   16.347071]  ? trace_preempt_on+0x20/0xc0
[   16.347103]  ? __pfx_kthread+0x10/0x10
[   16.347123]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.347146]  ? calculate_sigpending+0x7b/0xa0
[   16.347181]  ? __pfx_kthread+0x10/0x10
[   16.347202]  ret_from_fork+0x116/0x1d0
[   16.347222]  ? __pfx_kthread+0x10/0x10
[   16.347243]  ret_from_fork_asm+0x1a/0x30
[   16.347282]  </TASK>
[   16.347292] 
[   16.355078] Allocated by task 304:
[   16.355265]  kasan_save_stack+0x45/0x70
[   16.355481]  kasan_save_track+0x18/0x40
[   16.355671]  kasan_save_alloc_info+0x3b/0x50
[   16.355856]  __kasan_kmalloc+0xb7/0xc0
[   16.356055]  __kmalloc_noprof+0x1c9/0x500
[   16.356230]  kunit_kmalloc_array+0x25/0x60
[   16.356398]  copy_user_test_oob+0xab/0x10f0
[   16.356741]  kunit_try_run_case+0x1a5/0x480
[   16.356945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.357196]  kthread+0x337/0x6f0
[   16.357385]  ret_from_fork+0x116/0x1d0
[   16.357575]  ret_from_fork_asm+0x1a/0x30
[   16.357770] 
[   16.357848] The buggy address belongs to the object at ffff8881039ee400
[   16.357848]  which belongs to the cache kmalloc-128 of size 128
[   16.358378] The buggy address is located 0 bytes inside of
[   16.358378]  allocated 120-byte region [ffff8881039ee400, ffff8881039ee478)
[   16.358900] 
[   16.359006] The buggy address belongs to the physical page:
[   16.359254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039ee
[   16.359646] flags: 0x200000000000000(node=0|zone=2)
[   16.359873] page_type: f5(slab)
[   16.360041] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.360297] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.360806] page dumped because: kasan: bad access detected
[   16.361047] 
[   16.361119] Memory state around the buggy address:
[   16.361299]  ffff8881039ee300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.361817]  ffff8881039ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.362151] >ffff8881039ee400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.362403]                                                                 ^
[   16.362904]  ffff8881039ee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.363181]  ffff8881039ee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.363466] ==================================================================
[   16.307586] ==================================================================
[   16.307906] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.308263] Write of size 121 at addr ffff8881039ee400 by task kunit_try_catch/304
[   16.308663] 
[   16.308791] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.308847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.308860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.308882] Call Trace:
[   16.308895]  <TASK>
[   16.308920]  dump_stack_lvl+0x73/0xb0
[   16.308948]  print_report+0xd1/0x610
[   16.308971]  ? __virt_addr_valid+0x1db/0x2d0
[   16.309009]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.309034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.309058]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.309091]  kasan_report+0x141/0x180
[   16.309114]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.309143]  kasan_check_range+0x10c/0x1c0
[   16.309177]  __kasan_check_write+0x18/0x20
[   16.309197]  copy_user_test_oob+0x3fd/0x10f0
[   16.309223]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.309249]  ? __kasan_check_write+0x18/0x20
[   16.309270]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.309297]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   16.309334]  ? __pfx_read_tsc+0x10/0x10
[   16.309355]  ? ktime_get_ts64+0x86/0x230
[   16.309379]  kunit_try_run_case+0x1a5/0x480
[   16.309404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.309427]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   16.309451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.309475]  ? __kthread_parkme+0x82/0x180
[   16.309496]  ? preempt_count_sub+0x50/0x80
[   16.309529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.309562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.309587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.309623]  kthread+0x337/0x6f0
[   16.309643]  ? trace_preempt_on+0x20/0xc0
[   16.309667]  ? __pfx_kthread+0x10/0x10
[   16.309688]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.309710]  ? calculate_sigpending+0x7b/0xa0
[   16.309734]  ? __pfx_kthread+0x10/0x10
[   16.309756]  ret_from_fork+0x116/0x1d0
[   16.309775]  ? __pfx_kthread+0x10/0x10
[   16.309796]  ret_from_fork_asm+0x1a/0x30
[   16.309827]  </TASK>
[   16.309836] 
[   16.317335] Allocated by task 304:
[   16.317558]  kasan_save_stack+0x45/0x70
[   16.317756]  kasan_save_track+0x18/0x40
[   16.317948]  kasan_save_alloc_info+0x3b/0x50
[   16.318158]  __kasan_kmalloc+0xb7/0xc0
[   16.318353]  __kmalloc_noprof+0x1c9/0x500
[   16.318613]  kunit_kmalloc_array+0x25/0x60
[   16.318816]  copy_user_test_oob+0xab/0x10f0
[   16.318991]  kunit_try_run_case+0x1a5/0x480
[   16.319198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.319453]  kthread+0x337/0x6f0
[   16.319745]  ret_from_fork+0x116/0x1d0
[   16.319927]  ret_from_fork_asm+0x1a/0x30
[   16.320084] 
[   16.320158] The buggy address belongs to the object at ffff8881039ee400
[   16.320158]  which belongs to the cache kmalloc-128 of size 128
[   16.320531] The buggy address is located 0 bytes inside of
[   16.320531]  allocated 120-byte region [ffff8881039ee400, ffff8881039ee478)
[   16.321065] 
[   16.321160] The buggy address belongs to the physical page:
[   16.321429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039ee
[   16.321858] flags: 0x200000000000000(node=0|zone=2)
[   16.322025] page_type: f5(slab)
[   16.322147] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.322421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.323092] page dumped because: kasan: bad access detected
[   16.323381] 
[   16.323474] Memory state around the buggy address:
[   16.323825]  ffff8881039ee300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.324142]  ffff8881039ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.324450] >ffff8881039ee400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.324826]                                                                 ^
[   16.325145]  ffff8881039ee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.325454]  ffff8881039ee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.325761] ==================================================================
[   16.326353] ==================================================================
[   16.326823] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.327180] Read of size 121 at addr ffff8881039ee400 by task kunit_try_catch/304
[   16.327550] 
[   16.327663] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.327706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.327729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.327751] Call Trace:
[   16.327766]  <TASK>
[   16.327781]  dump_stack_lvl+0x73/0xb0
[   16.327810]  print_report+0xd1/0x610
[   16.327832]  ? __virt_addr_valid+0x1db/0x2d0
[   16.327855]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.327890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.327914]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.327949]  kasan_report+0x141/0x180
[   16.327972]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.328001]  kasan_check_range+0x10c/0x1c0
[   16.328025]  __kasan_check_read+0x15/0x20
[   16.328046]  copy_user_test_oob+0x4aa/0x10f0
[   16.328072]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.328098]  ? __kasan_check_write+0x18/0x20
[   16.328118]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.328143]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   16.328169]  ? __pfx_read_tsc+0x10/0x10
[   16.328190]  ? ktime_get_ts64+0x86/0x230
[   16.328213]  kunit_try_run_case+0x1a5/0x480
[   16.328239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.328262]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   16.328285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.328309]  ? __kthread_parkme+0x82/0x180
[   16.328340]  ? preempt_count_sub+0x50/0x80
[   16.328364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.328389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.328413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.328438]  kthread+0x337/0x6f0
[   16.328459]  ? trace_preempt_on+0x20/0xc0
[   16.328483]  ? __pfx_kthread+0x10/0x10
[   16.328503]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.328525]  ? calculate_sigpending+0x7b/0xa0
[   16.328549]  ? __pfx_kthread+0x10/0x10
[   16.328571]  ret_from_fork+0x116/0x1d0
[   16.328590]  ? __pfx_kthread+0x10/0x10
[   16.328611]  ret_from_fork_asm+0x1a/0x30
[   16.328651]  </TASK>
[   16.328661] 
[   16.336594] Allocated by task 304:
[   16.336783]  kasan_save_stack+0x45/0x70
[   16.336963]  kasan_save_track+0x18/0x40
[   16.337164]  kasan_save_alloc_info+0x3b/0x50
[   16.337314]  __kasan_kmalloc+0xb7/0xc0
[   16.337459]  __kmalloc_noprof+0x1c9/0x500
[   16.337600]  kunit_kmalloc_array+0x25/0x60
[   16.337745]  copy_user_test_oob+0xab/0x10f0
[   16.337944]  kunit_try_run_case+0x1a5/0x480
[   16.338168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.338442]  kthread+0x337/0x6f0
[   16.338758]  ret_from_fork+0x116/0x1d0
[   16.338942]  ret_from_fork_asm+0x1a/0x30
[   16.339134] 
[   16.339227] The buggy address belongs to the object at ffff8881039ee400
[   16.339227]  which belongs to the cache kmalloc-128 of size 128
[   16.339751] The buggy address is located 0 bytes inside of
[   16.339751]  allocated 120-byte region [ffff8881039ee400, ffff8881039ee478)
[   16.340190] 
[   16.340283] The buggy address belongs to the physical page:
[   16.340628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039ee
[   16.340947] flags: 0x200000000000000(node=0|zone=2)
[   16.341190] page_type: f5(slab)
[   16.341356] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.341713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.342037] page dumped because: kasan: bad access detected
[   16.342297] 
[   16.342403] Memory state around the buggy address:
[   16.342635]  ffff8881039ee300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.342988]  ffff8881039ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.343365] >ffff8881039ee400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.343700]                                                                 ^
[   16.344011]  ffff8881039ee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.344248]  ffff8881039ee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.344472] ==================================================================