Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.536275] ==================================================================
[   18.536543] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   18.536608] Read of size 121 at addr fff00000c77d3500 by task kunit_try_catch/286
[   18.536942] 
[   18.537156] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.537256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.537294] Hardware name: linux,dummy-virt (DT)
[   18.537328] Call trace:
[   18.537353]  show_stack+0x20/0x38 (C)
[   18.537594]  dump_stack_lvl+0x8c/0xd0
[   18.537662]  print_report+0x118/0x5d0
[   18.537710]  kasan_report+0xdc/0x128
[   18.537756]  kasan_check_range+0x100/0x1a8
[   18.537813]  __kasan_check_read+0x20/0x30
[   18.537858]  copy_user_test_oob+0x3c8/0xec8
[   18.537915]  kunit_try_run_case+0x170/0x3f0
[   18.537972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.538027]  kthread+0x328/0x630
[   18.538071]  ret_from_fork+0x10/0x20
[   18.538119] 
[   18.538140] Allocated by task 286:
[   18.538169]  kasan_save_stack+0x3c/0x68
[   18.538230]  kasan_save_track+0x20/0x40
[   18.538269]  kasan_save_alloc_info+0x40/0x58
[   18.538321]  __kasan_kmalloc+0xd4/0xd8
[   18.538362]  __kmalloc_noprof+0x198/0x4c8
[   18.538415]  kunit_kmalloc_array+0x34/0x88
[   18.538455]  copy_user_test_oob+0xac/0xec8
[   18.538503]  kunit_try_run_case+0x170/0x3f0
[   18.539138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.539816]  kthread+0x328/0x630
[   18.540102]  ret_from_fork+0x10/0x20
[   18.540240] 
[   18.540266] The buggy address belongs to the object at fff00000c77d3500
[   18.540266]  which belongs to the cache kmalloc-128 of size 128
[   18.540414] The buggy address is located 0 bytes inside of
[   18.540414]  allocated 120-byte region [fff00000c77d3500, fff00000c77d3578)
[   18.540498] 
[   18.540984] The buggy address belongs to the physical page:
[   18.541126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d3
[   18.541502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.541760] page_type: f5(slab)
[   18.541813] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.541995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.542164] page dumped because: kasan: bad access detected
[   18.542619] 
[   18.542679] Memory state around the buggy address:
[   18.542985]  fff00000c77d3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.543054]  fff00000c77d3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.543144] >fff00000c77d3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.543218]                                                                 ^
[   18.543411]  fff00000c77d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.543491]  fff00000c77d3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.544172] ==================================================================
[   18.488611] ==================================================================
[   18.488751] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   18.488909] Write of size 121 at addr fff00000c77d3500 by task kunit_try_catch/286
[   18.489444] 
[   18.489602] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.489715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.489803] Hardware name: linux,dummy-virt (DT)
[   18.489995] Call trace:
[   18.490084]  show_stack+0x20/0x38 (C)
[   18.490291]  dump_stack_lvl+0x8c/0xd0
[   18.490436]  print_report+0x118/0x5d0
[   18.490768]  kasan_report+0xdc/0x128
[   18.490956]  kasan_check_range+0x100/0x1a8
[   18.491082]  __kasan_check_write+0x20/0x30
[   18.491252]  copy_user_test_oob+0x234/0xec8
[   18.491503]  kunit_try_run_case+0x170/0x3f0
[   18.491895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.492021]  kthread+0x328/0x630
[   18.492174]  ret_from_fork+0x10/0x20
[   18.492330] 
[   18.492410] Allocated by task 286:
[   18.492446]  kasan_save_stack+0x3c/0x68
[   18.493028]  kasan_save_track+0x20/0x40
[   18.493468]  kasan_save_alloc_info+0x40/0x58
[   18.493728]  __kasan_kmalloc+0xd4/0xd8
[   18.494098]  __kmalloc_noprof+0x198/0x4c8
[   18.494156]  kunit_kmalloc_array+0x34/0x88
[   18.494196]  copy_user_test_oob+0xac/0xec8
[   18.494238]  kunit_try_run_case+0x170/0x3f0
[   18.494476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.494591]  kthread+0x328/0x630
[   18.494966]  ret_from_fork+0x10/0x20
[   18.495121] 
[   18.495489] The buggy address belongs to the object at fff00000c77d3500
[   18.495489]  which belongs to the cache kmalloc-128 of size 128
[   18.495592] The buggy address is located 0 bytes inside of
[   18.495592]  allocated 120-byte region [fff00000c77d3500, fff00000c77d3578)
[   18.495891] 
[   18.495940] The buggy address belongs to the physical page:
[   18.496010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d3
[   18.496079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.496160] page_type: f5(slab)
[   18.496205] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.496450] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.496780] page dumped because: kasan: bad access detected
[   18.496831] 
[   18.496852] Memory state around the buggy address:
[   18.496911]  fff00000c77d3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.496959]  fff00000c77d3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.497007] >fff00000c77d3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.497049]                                                                 ^
[   18.497094]  fff00000c77d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.497139]  fff00000c77d3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.497179] ==================================================================
[   18.525209] ==================================================================
[   18.525427] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   18.525503] Write of size 121 at addr fff00000c77d3500 by task kunit_try_catch/286
[   18.525678] 
[   18.526094] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.526290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.526322] Hardware name: linux,dummy-virt (DT)
[   18.526980] Call trace:
[   18.527018]  show_stack+0x20/0x38 (C)
[   18.527196]  dump_stack_lvl+0x8c/0xd0
[   18.527364]  print_report+0x118/0x5d0
[   18.527634]  kasan_report+0xdc/0x128
[   18.527900]  kasan_check_range+0x100/0x1a8
[   18.527964]  __kasan_check_write+0x20/0x30
[   18.528167]  copy_user_test_oob+0x35c/0xec8
[   18.528374]  kunit_try_run_case+0x170/0x3f0
[   18.528456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.528618]  kthread+0x328/0x630
[   18.528781]  ret_from_fork+0x10/0x20
[   18.528855] 
[   18.528878] Allocated by task 286:
[   18.528955]  kasan_save_stack+0x3c/0x68
[   18.529184]  kasan_save_track+0x20/0x40
[   18.529385]  kasan_save_alloc_info+0x40/0x58
[   18.529542]  __kasan_kmalloc+0xd4/0xd8
[   18.529651]  __kmalloc_noprof+0x198/0x4c8
[   18.529714]  kunit_kmalloc_array+0x34/0x88
[   18.529829]  copy_user_test_oob+0xac/0xec8
[   18.529872]  kunit_try_run_case+0x170/0x3f0
[   18.529912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.530113]  kthread+0x328/0x630
[   18.530499]  ret_from_fork+0x10/0x20
[   18.530609] 
[   18.530639] The buggy address belongs to the object at fff00000c77d3500
[   18.530639]  which belongs to the cache kmalloc-128 of size 128
[   18.530920] The buggy address is located 0 bytes inside of
[   18.530920]  allocated 120-byte region [fff00000c77d3500, fff00000c77d3578)
[   18.531159] 
[   18.531252] The buggy address belongs to the physical page:
[   18.531365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d3
[   18.531440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.531491] page_type: f5(slab)
[   18.531548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.532068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.532120] page dumped because: kasan: bad access detected
[   18.532253] 
[   18.532397] Memory state around the buggy address:
[   18.532915]  fff00000c77d3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.532982]  fff00000c77d3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.533230] >fff00000c77d3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.533504]                                                                 ^
[   18.533592]  fff00000c77d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.534044]  fff00000c77d3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.534182] ==================================================================
[   18.546577] ==================================================================
[   18.546642] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   18.546876] Write of size 121 at addr fff00000c77d3500 by task kunit_try_catch/286
[   18.547046] 
[   18.547090] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.547183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.547448] Hardware name: linux,dummy-virt (DT)
[   18.547524] Call trace:
[   18.547672]  show_stack+0x20/0x38 (C)
[   18.547735]  dump_stack_lvl+0x8c/0xd0
[   18.547991]  print_report+0x118/0x5d0
[   18.548234]  kasan_report+0xdc/0x128
[   18.548296]  kasan_check_range+0x100/0x1a8
[   18.548609]  __kasan_check_write+0x20/0x30
[   18.548687]  copy_user_test_oob+0x434/0xec8
[   18.549035]  kunit_try_run_case+0x170/0x3f0
[   18.549206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.549402]  kthread+0x328/0x630
[   18.549464]  ret_from_fork+0x10/0x20
[   18.549562] 
[   18.549612] Allocated by task 286:
[   18.549645]  kasan_save_stack+0x3c/0x68
[   18.549689]  kasan_save_track+0x20/0x40
[   18.549903]  kasan_save_alloc_info+0x40/0x58
[   18.549979]  __kasan_kmalloc+0xd4/0xd8
[   18.550183]  __kmalloc_noprof+0x198/0x4c8
[   18.550388]  kunit_kmalloc_array+0x34/0x88
[   18.550593]  copy_user_test_oob+0xac/0xec8
[   18.550854]  kunit_try_run_case+0x170/0x3f0
[   18.550905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.551099]  kthread+0x328/0x630
[   18.551210]  ret_from_fork+0x10/0x20
[   18.551299] 
[   18.551810] The buggy address belongs to the object at fff00000c77d3500
[   18.551810]  which belongs to the cache kmalloc-128 of size 128
[   18.551927] The buggy address is located 0 bytes inside of
[   18.551927]  allocated 120-byte region [fff00000c77d3500, fff00000c77d3578)
[   18.552044] 
[   18.552173] The buggy address belongs to the physical page:
[   18.552207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d3
[   18.552285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.552566] page_type: f5(slab)
[   18.552837] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.552904] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.552969] page dumped because: kasan: bad access detected
[   18.553014] 
[   18.553037] Memory state around the buggy address:
[   18.553072]  fff00000c77d3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.553119]  fff00000c77d3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.553164] >fff00000c77d3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.553205]                                                                 ^
[   18.553273]  fff00000c77d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.553335]  fff00000c77d3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.553377] ==================================================================
[   18.556011] ==================================================================
[   18.556410] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   18.556499] Read of size 121 at addr fff00000c77d3500 by task kunit_try_catch/286
[   18.556603] 
[   18.556638] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.556724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.556754] Hardware name: linux,dummy-virt (DT)
[   18.557014] Call trace:
[   18.557189]  show_stack+0x20/0x38 (C)
[   18.557378]  dump_stack_lvl+0x8c/0xd0
[   18.557442]  print_report+0x118/0x5d0
[   18.557714]  kasan_report+0xdc/0x128
[   18.557822]  kasan_check_range+0x100/0x1a8
[   18.558032]  __kasan_check_read+0x20/0x30
[   18.558248]  copy_user_test_oob+0x4a0/0xec8
[   18.558339]  kunit_try_run_case+0x170/0x3f0
[   18.558517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.558915]  kthread+0x328/0x630
[   18.559018]  ret_from_fork+0x10/0x20
[   18.559169] 
[   18.559773] Allocated by task 286:
[   18.560003]  kasan_save_stack+0x3c/0x68
[   18.560127]  kasan_save_track+0x20/0x40
[   18.560217]  kasan_save_alloc_info+0x40/0x58
[   18.560356]  __kasan_kmalloc+0xd4/0xd8
[   18.560559]  __kmalloc_noprof+0x198/0x4c8
[   18.560649]  kunit_kmalloc_array+0x34/0x88
[   18.560787]  copy_user_test_oob+0xac/0xec8
[   18.561088]  kunit_try_run_case+0x170/0x3f0
[   18.561182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.561348]  kthread+0x328/0x630
[   18.561491]  ret_from_fork+0x10/0x20
[   18.561597] 
[   18.561623] The buggy address belongs to the object at fff00000c77d3500
[   18.561623]  which belongs to the cache kmalloc-128 of size 128
[   18.561702] The buggy address is located 0 bytes inside of
[   18.561702]  allocated 120-byte region [fff00000c77d3500, fff00000c77d3578)
[   18.561783] 
[   18.561813] The buggy address belongs to the physical page:
[   18.561847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d3
[   18.561911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.561960] page_type: f5(slab)
[   18.562000] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.562052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.562104] page dumped because: kasan: bad access detected
[   18.562150] 
[   18.562180] Memory state around the buggy address:
[   18.562222]  fff00000c77d3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.562269]  fff00000c77d3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.562316] >fff00000c77d3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.562356]                                                                 ^
[   18.562408]  fff00000c77d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.562472]  fff00000c77d3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.562521] ==================================================================
[   18.507104] ==================================================================
[   18.507169] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   18.507234] Read of size 121 at addr fff00000c77d3500 by task kunit_try_catch/286
[   18.507288] 
[   18.507336] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.507422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.507456] Hardware name: linux,dummy-virt (DT)
[   18.507491] Call trace:
[   18.507524]  show_stack+0x20/0x38 (C)
[   18.508275]  dump_stack_lvl+0x8c/0xd0
[   18.508545]  print_report+0x118/0x5d0
[   18.508619]  kasan_report+0xdc/0x128
[   18.508724]  kasan_check_range+0x100/0x1a8
[   18.508779]  __kasan_check_read+0x20/0x30
[   18.508824]  copy_user_test_oob+0x728/0xec8
[   18.509035]  kunit_try_run_case+0x170/0x3f0
[   18.509371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.509440]  kthread+0x328/0x630
[   18.509650]  ret_from_fork+0x10/0x20
[   18.509700] 
[   18.510109] Allocated by task 286:
[   18.510237]  kasan_save_stack+0x3c/0x68
[   18.510287]  kasan_save_track+0x20/0x40
[   18.510326]  kasan_save_alloc_info+0x40/0x58
[   18.510569]  __kasan_kmalloc+0xd4/0xd8
[   18.510695]  __kmalloc_noprof+0x198/0x4c8
[   18.510854]  kunit_kmalloc_array+0x34/0x88
[   18.511154]  copy_user_test_oob+0xac/0xec8
[   18.511272]  kunit_try_run_case+0x170/0x3f0
[   18.511334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.511416]  kthread+0x328/0x630
[   18.511484]  ret_from_fork+0x10/0x20
[   18.511555] 
[   18.511896] The buggy address belongs to the object at fff00000c77d3500
[   18.511896]  which belongs to the cache kmalloc-128 of size 128
[   18.512126] The buggy address is located 0 bytes inside of
[   18.512126]  allocated 120-byte region [fff00000c77d3500, fff00000c77d3578)
[   18.512525] 
[   18.512656] The buggy address belongs to the physical page:
[   18.512693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d3
[   18.512767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.513201] page_type: f5(slab)
[   18.513548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.513654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.513822] page dumped because: kasan: bad access detected
[   18.514144] 
[   18.514336] Memory state around the buggy address:
[   18.514388]  fff00000c77d3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.514442]  fff00000c77d3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.514489] >fff00000c77d3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.514948]                                                                 ^
[   18.515065]  fff00000c77d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.515117]  fff00000c77d3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.515515] ==================================================================

[   16.165295] ==================================================================
[   16.165839] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.166137] Write of size 121 at addr ffff888102f59b00 by task kunit_try_catch/303
[   16.166875] 
[   16.167077] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.167125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.167137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.167159] Call Trace:
[   16.167173]  <TASK>
[   16.167190]  dump_stack_lvl+0x73/0xb0
[   16.167219]  print_report+0xd1/0x610
[   16.167253]  ? __virt_addr_valid+0x1db/0x2d0
[   16.167278]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.167302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.167326]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.167349]  kasan_report+0x141/0x180
[   16.167372]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.167401]  kasan_check_range+0x10c/0x1c0
[   16.167426]  __kasan_check_write+0x18/0x20
[   16.167445]  copy_user_test_oob+0x3fd/0x10f0
[   16.167471]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.167495]  ? finish_task_switch.isra.0+0x153/0x700
[   16.167530]  ? __switch_to+0x47/0xf50
[   16.167555]  ? __schedule+0x10cc/0x2b60
[   16.167578]  ? __pfx_read_tsc+0x10/0x10
[   16.167600]  ? ktime_get_ts64+0x86/0x230
[   16.167625]  kunit_try_run_case+0x1a5/0x480
[   16.167650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.167673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.167698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.167723]  ? __kthread_parkme+0x82/0x180
[   16.167745]  ? preempt_count_sub+0x50/0x80
[   16.167769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.167793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.167818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.167848]  kthread+0x337/0x6f0
[   16.167870]  ? trace_preempt_on+0x20/0xc0
[   16.167894]  ? __pfx_kthread+0x10/0x10
[   16.167914]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.167936]  ? calculate_sigpending+0x7b/0xa0
[   16.167962]  ? __pfx_kthread+0x10/0x10
[   16.167984]  ret_from_fork+0x116/0x1d0
[   16.168003]  ? __pfx_kthread+0x10/0x10
[   16.168024]  ret_from_fork_asm+0x1a/0x30
[   16.168055]  </TASK>
[   16.168066] 
[   16.179003] Allocated by task 303:
[   16.179208]  kasan_save_stack+0x45/0x70
[   16.179415]  kasan_save_track+0x18/0x40
[   16.179619]  kasan_save_alloc_info+0x3b/0x50
[   16.179809]  __kasan_kmalloc+0xb7/0xc0
[   16.179943]  __kmalloc_noprof+0x1c9/0x500
[   16.180109]  kunit_kmalloc_array+0x25/0x60
[   16.180307]  copy_user_test_oob+0xab/0x10f0
[   16.180508]  kunit_try_run_case+0x1a5/0x480
[   16.180713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.180890]  kthread+0x337/0x6f0
[   16.181060]  ret_from_fork+0x116/0x1d0
[   16.181360]  ret_from_fork_asm+0x1a/0x30
[   16.181573] 
[   16.181647] The buggy address belongs to the object at ffff888102f59b00
[   16.181647]  which belongs to the cache kmalloc-128 of size 128
[   16.182118] The buggy address is located 0 bytes inside of
[   16.182118]  allocated 120-byte region [ffff888102f59b00, ffff888102f59b78)
[   16.182639] 
[   16.182713] The buggy address belongs to the physical page:
[   16.182889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59
[   16.183174] flags: 0x200000000000000(node=0|zone=2)
[   16.183418] page_type: f5(slab)
[   16.183597] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.183939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.184211] page dumped because: kasan: bad access detected
[   16.184382] 
[   16.184468] Memory state around the buggy address:
[   16.184705]  ffff888102f59a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.185033]  ffff888102f59a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.185423] >ffff888102f59b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.185729]                                                                 ^
[   16.185999]  ffff888102f59b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.186238]  ffff888102f59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.186621] ==================================================================
[   16.205304] ==================================================================
[   16.205625] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.205919] Write of size 121 at addr ffff888102f59b00 by task kunit_try_catch/303
[   16.206293] 
[   16.206388] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.206434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.206446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.206469] Call Trace:
[   16.206488]  <TASK>
[   16.206517]  dump_stack_lvl+0x73/0xb0
[   16.206546]  print_report+0xd1/0x610
[   16.206568]  ? __virt_addr_valid+0x1db/0x2d0
[   16.206593]  ? copy_user_test_oob+0x557/0x10f0
[   16.206616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.206639]  ? copy_user_test_oob+0x557/0x10f0
[   16.206664]  kasan_report+0x141/0x180
[   16.206685]  ? copy_user_test_oob+0x557/0x10f0
[   16.206713]  kasan_check_range+0x10c/0x1c0
[   16.206738]  __kasan_check_write+0x18/0x20
[   16.206759]  copy_user_test_oob+0x557/0x10f0
[   16.206785]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.206808]  ? finish_task_switch.isra.0+0x153/0x700
[   16.206832]  ? __switch_to+0x47/0xf50
[   16.206859]  ? __schedule+0x10cc/0x2b60
[   16.206882]  ? __pfx_read_tsc+0x10/0x10
[   16.206904]  ? ktime_get_ts64+0x86/0x230
[   16.206929]  kunit_try_run_case+0x1a5/0x480
[   16.206955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.206978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.207003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.207027]  ? __kthread_parkme+0x82/0x180
[   16.207049]  ? preempt_count_sub+0x50/0x80
[   16.207073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.207123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.207148]  kthread+0x337/0x6f0
[   16.207182]  ? trace_preempt_on+0x20/0xc0
[   16.207206]  ? __pfx_kthread+0x10/0x10
[   16.207227]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.207249]  ? calculate_sigpending+0x7b/0xa0
[   16.207274]  ? __pfx_kthread+0x10/0x10
[   16.207297]  ret_from_fork+0x116/0x1d0
[   16.207317]  ? __pfx_kthread+0x10/0x10
[   16.207337]  ret_from_fork_asm+0x1a/0x30
[   16.207369]  </TASK>
[   16.207380] 
[   16.214435] Allocated by task 303:
[   16.214624]  kasan_save_stack+0x45/0x70
[   16.214785]  kasan_save_track+0x18/0x40
[   16.214978]  kasan_save_alloc_info+0x3b/0x50
[   16.215155]  __kasan_kmalloc+0xb7/0xc0
[   16.215336]  __kmalloc_noprof+0x1c9/0x500
[   16.215547]  kunit_kmalloc_array+0x25/0x60
[   16.215727]  copy_user_test_oob+0xab/0x10f0
[   16.215900]  kunit_try_run_case+0x1a5/0x480
[   16.216118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216339]  kthread+0x337/0x6f0
[   16.216514]  ret_from_fork+0x116/0x1d0
[   16.216682]  ret_from_fork_asm+0x1a/0x30
[   16.216870] 
[   16.216941] The buggy address belongs to the object at ffff888102f59b00
[   16.216941]  which belongs to the cache kmalloc-128 of size 128
[   16.217453] The buggy address is located 0 bytes inside of
[   16.217453]  allocated 120-byte region [ffff888102f59b00, ffff888102f59b78)
[   16.217949] 
[   16.218023] The buggy address belongs to the physical page:
[   16.218393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59
[   16.218712] flags: 0x200000000000000(node=0|zone=2)
[   16.218922] page_type: f5(slab)
[   16.219088] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.219458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.219762] page dumped because: kasan: bad access detected
[   16.220000] 
[   16.220085] Memory state around the buggy address:
[   16.220341]  ffff888102f59a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.220609]  ffff888102f59a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.220831] >ffff888102f59b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.221046]                                                                 ^
[   16.221313]  ffff888102f59b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.221819]  ffff888102f59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.222097] ==================================================================
[   16.222589] ==================================================================
[   16.223105] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.223729] Read of size 121 at addr ffff888102f59b00 by task kunit_try_catch/303
[   16.224066] 
[   16.224171] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.224216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.224228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.224250] Call Trace:
[   16.224271]  <TASK>
[   16.224287]  dump_stack_lvl+0x73/0xb0
[   16.224316]  print_report+0xd1/0x610
[   16.224340]  ? __virt_addr_valid+0x1db/0x2d0
[   16.224365]  ? copy_user_test_oob+0x604/0x10f0
[   16.224390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.224413]  ? copy_user_test_oob+0x604/0x10f0
[   16.224437]  kasan_report+0x141/0x180
[   16.224459]  ? copy_user_test_oob+0x604/0x10f0
[   16.224487]  kasan_check_range+0x10c/0x1c0
[   16.224522]  __kasan_check_read+0x15/0x20
[   16.224542]  copy_user_test_oob+0x604/0x10f0
[   16.224567]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.224591]  ? finish_task_switch.isra.0+0x153/0x700
[   16.224615]  ? __switch_to+0x47/0xf50
[   16.224642]  ? __schedule+0x10cc/0x2b60
[   16.224665]  ? __pfx_read_tsc+0x10/0x10
[   16.224687]  ? ktime_get_ts64+0x86/0x230
[   16.224712]  kunit_try_run_case+0x1a5/0x480
[   16.224737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.224760]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.224785]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.224810]  ? __kthread_parkme+0x82/0x180
[   16.224831]  ? preempt_count_sub+0x50/0x80
[   16.224855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.224880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.224904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.224929]  kthread+0x337/0x6f0
[   16.224950]  ? trace_preempt_on+0x20/0xc0
[   16.224974]  ? __pfx_kthread+0x10/0x10
[   16.224995]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.225016]  ? calculate_sigpending+0x7b/0xa0
[   16.225042]  ? __pfx_kthread+0x10/0x10
[   16.225063]  ret_from_fork+0x116/0x1d0
[   16.225083]  ? __pfx_kthread+0x10/0x10
[   16.225104]  ret_from_fork_asm+0x1a/0x30
[   16.225136]  </TASK>
[   16.225146] 
[   16.232119] Allocated by task 303:
[   16.232489]  kasan_save_stack+0x45/0x70
[   16.232703]  kasan_save_track+0x18/0x40
[   16.232899]  kasan_save_alloc_info+0x3b/0x50
[   16.233112]  __kasan_kmalloc+0xb7/0xc0
[   16.233387]  __kmalloc_noprof+0x1c9/0x500
[   16.233560]  kunit_kmalloc_array+0x25/0x60
[   16.233732]  copy_user_test_oob+0xab/0x10f0
[   16.233943]  kunit_try_run_case+0x1a5/0x480
[   16.234122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.234463]  kthread+0x337/0x6f0
[   16.234622]  ret_from_fork+0x116/0x1d0
[   16.234797]  ret_from_fork_asm+0x1a/0x30
[   16.234993] 
[   16.235071] The buggy address belongs to the object at ffff888102f59b00
[   16.235071]  which belongs to the cache kmalloc-128 of size 128
[   16.235625] The buggy address is located 0 bytes inside of
[   16.235625]  allocated 120-byte region [ffff888102f59b00, ffff888102f59b78)
[   16.235985] 
[   16.236059] The buggy address belongs to the physical page:
[   16.236234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59
[   16.236477] flags: 0x200000000000000(node=0|zone=2)
[   16.236651] page_type: f5(slab)
[   16.236775] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.237109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.237857] page dumped because: kasan: bad access detected
[   16.238102] 
[   16.238199] Memory state around the buggy address:
[   16.238419]  ffff888102f59a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.238741]  ffff888102f59a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.239052] >ffff888102f59b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.239362]                                                                 ^
[   16.239763]  ffff888102f59b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.240019]  ffff888102f59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.240425] ==================================================================
[   16.187382] ==================================================================
[   16.187734] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.187971] Read of size 121 at addr ffff888102f59b00 by task kunit_try_catch/303
[   16.188198] 
[   16.188286] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.188330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.188342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.188364] Call Trace:
[   16.188384]  <TASK>
[   16.188402]  dump_stack_lvl+0x73/0xb0
[   16.188429]  print_report+0xd1/0x610
[   16.188451]  ? __virt_addr_valid+0x1db/0x2d0
[   16.188473]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.188496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.188529]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.188552]  kasan_report+0x141/0x180
[   16.188573]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.188602]  kasan_check_range+0x10c/0x1c0
[   16.188626]  __kasan_check_read+0x15/0x20
[   16.188645]  copy_user_test_oob+0x4aa/0x10f0
[   16.188670]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.188693]  ? finish_task_switch.isra.0+0x153/0x700
[   16.188716]  ? __switch_to+0x47/0xf50
[   16.188741]  ? __schedule+0x10cc/0x2b60
[   16.188783]  ? __pfx_read_tsc+0x10/0x10
[   16.188805]  ? ktime_get_ts64+0x86/0x230
[   16.188830]  kunit_try_run_case+0x1a5/0x480
[   16.188855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.188879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.188904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.188928]  ? __kthread_parkme+0x82/0x180
[   16.188950]  ? preempt_count_sub+0x50/0x80
[   16.188974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.188998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.189023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.189048]  kthread+0x337/0x6f0
[   16.189068]  ? trace_preempt_on+0x20/0xc0
[   16.189092]  ? __pfx_kthread+0x10/0x10
[   16.189113]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.189135]  ? calculate_sigpending+0x7b/0xa0
[   16.189161]  ? __pfx_kthread+0x10/0x10
[   16.189182]  ret_from_fork+0x116/0x1d0
[   16.189202]  ? __pfx_kthread+0x10/0x10
[   16.189223]  ret_from_fork_asm+0x1a/0x30
[   16.189255]  </TASK>
[   16.189266] 
[   16.196955] Allocated by task 303:
[   16.197094]  kasan_save_stack+0x45/0x70
[   16.197354]  kasan_save_track+0x18/0x40
[   16.197573]  kasan_save_alloc_info+0x3b/0x50
[   16.197791]  __kasan_kmalloc+0xb7/0xc0
[   16.197976]  __kmalloc_noprof+0x1c9/0x500
[   16.198151]  kunit_kmalloc_array+0x25/0x60
[   16.198355]  copy_user_test_oob+0xab/0x10f0
[   16.198539]  kunit_try_run_case+0x1a5/0x480
[   16.198739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.198972]  kthread+0x337/0x6f0
[   16.199096]  ret_from_fork+0x116/0x1d0
[   16.199398]  ret_from_fork_asm+0x1a/0x30
[   16.199604] 
[   16.199691] The buggy address belongs to the object at ffff888102f59b00
[   16.199691]  which belongs to the cache kmalloc-128 of size 128
[   16.200158] The buggy address is located 0 bytes inside of
[   16.200158]  allocated 120-byte region [ffff888102f59b00, ffff888102f59b78)
[   16.200568] 
[   16.200642] The buggy address belongs to the physical page:
[   16.200816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59
[   16.201059] flags: 0x200000000000000(node=0|zone=2)
[   16.201263] page_type: f5(slab)
[   16.201517] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.201855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.202231] page dumped because: kasan: bad access detected
[   16.202482] 
[   16.202582] Memory state around the buggy address:
[   16.202931]  ffff888102f59a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.203214]  ffff888102f59a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.203520] >ffff888102f59b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.203763]                                                                 ^
[   16.204081]  ffff888102f59b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.204410]  ffff888102f59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.204697] ==================================================================