Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.119470] ==================================================================
[   20.119622] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.119716] Write of size 121 at addr fff00000c57ee700 by task kunit_try_catch/286
[   20.119774] 
[   20.119823] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.121754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.121857] Hardware name: linux,dummy-virt (DT)
[   20.121903] Call trace:
[   20.121930]  show_stack+0x20/0x38 (C)
[   20.122218]  dump_stack_lvl+0x8c/0xd0
[   20.122745]  print_report+0x118/0x608
[   20.122810]  kasan_report+0xdc/0x128
[   20.122915]  kasan_check_range+0x100/0x1a8
[   20.122965]  __kasan_check_write+0x20/0x30
[   20.123014]  copy_user_test_oob+0x234/0xec8
[   20.123072]  kunit_try_run_case+0x170/0x3f0
[   20.123138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.123194]  kthread+0x328/0x630
[   20.123239]  ret_from_fork+0x10/0x20
[   20.123478] 
[   20.123503] Allocated by task 286:
[   20.123793]  kasan_save_stack+0x3c/0x68
[   20.123956]  kasan_save_track+0x20/0x40
[   20.123998]  kasan_save_alloc_info+0x40/0x58
[   20.124419]  __kasan_kmalloc+0xd4/0xd8
[   20.124504]  __kmalloc_noprof+0x198/0x4c8
[   20.124550]  kunit_kmalloc_array+0x34/0x88
[   20.124892]  copy_user_test_oob+0xac/0xec8
[   20.125267]  kunit_try_run_case+0x170/0x3f0
[   20.125461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.125515]  kthread+0x328/0x630
[   20.125606]  ret_from_fork+0x10/0x20
[   20.125652] 
[   20.125824] The buggy address belongs to the object at fff00000c57ee700
[   20.125824]  which belongs to the cache kmalloc-128 of size 128
[   20.126197] The buggy address is located 0 bytes inside of
[   20.126197]  allocated 120-byte region [fff00000c57ee700, fff00000c57ee778)
[   20.126629] 
[   20.126685] The buggy address belongs to the physical page:
[   20.127024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.127494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.127578] page_type: f5(slab)
[   20.127625] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.128100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.128173] page dumped because: kasan: bad access detected
[   20.128236] 
[   20.128257] Memory state around the buggy address:
[   20.128504]  fff00000c57ee600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.128580]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.128756] >fff00000c57ee700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.129179]                                                                 ^
[   20.129344]  fff00000c57ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.129454]  fff00000c57ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.129644] ==================================================================
[   20.168875] ==================================================================
[   20.168931] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.168982] Write of size 121 at addr fff00000c57ee700 by task kunit_try_catch/286
[   20.169171] 
[   20.169230] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.169472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.169599] Hardware name: linux,dummy-virt (DT)
[   20.169680] Call trace:
[   20.169711]  show_stack+0x20/0x38 (C)
[   20.169791]  dump_stack_lvl+0x8c/0xd0
[   20.169840]  print_report+0x118/0x608
[   20.170146]  kasan_report+0xdc/0x128
[   20.170402]  kasan_check_range+0x100/0x1a8
[   20.170552]  __kasan_check_write+0x20/0x30
[   20.170692]  copy_user_test_oob+0x434/0xec8
[   20.170835]  kunit_try_run_case+0x170/0x3f0
[   20.171002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.171059]  kthread+0x328/0x630
[   20.171132]  ret_from_fork+0x10/0x20
[   20.171493] 
[   20.171639] Allocated by task 286:
[   20.171753]  kasan_save_stack+0x3c/0x68
[   20.171932]  kasan_save_track+0x20/0x40
[   20.172090]  kasan_save_alloc_info+0x40/0x58
[   20.172262]  __kasan_kmalloc+0xd4/0xd8
[   20.172428]  __kmalloc_noprof+0x198/0x4c8
[   20.172485]  kunit_kmalloc_array+0x34/0x88
[   20.172524]  copy_user_test_oob+0xac/0xec8
[   20.172762]  kunit_try_run_case+0x170/0x3f0
[   20.172923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.173154]  kthread+0x328/0x630
[   20.173330]  ret_from_fork+0x10/0x20
[   20.173393] 
[   20.173447] The buggy address belongs to the object at fff00000c57ee700
[   20.173447]  which belongs to the cache kmalloc-128 of size 128
[   20.173604] The buggy address is located 0 bytes inside of
[   20.173604]  allocated 120-byte region [fff00000c57ee700, fff00000c57ee778)
[   20.173686] 
[   20.173812] The buggy address belongs to the physical page:
[   20.173891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.173977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.174028] page_type: f5(slab)
[   20.174221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.174309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.174401] page dumped because: kasan: bad access detected
[   20.174588] 
[   20.174747] Memory state around the buggy address:
[   20.174821]  fff00000c57ee600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.174889]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.175009] >fff00000c57ee700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.175071]                                                                 ^
[   20.175117]  fff00000c57ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.175421]  fff00000c57ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.175736] ==================================================================
[   20.177708] ==================================================================
[   20.177818] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.177983] Read of size 121 at addr fff00000c57ee700 by task kunit_try_catch/286
[   20.178167] 
[   20.178206] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.178614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.178689] Hardware name: linux,dummy-virt (DT)
[   20.178779] Call trace:
[   20.178942]  show_stack+0x20/0x38 (C)
[   20.179171]  dump_stack_lvl+0x8c/0xd0
[   20.179297]  print_report+0x118/0x608
[   20.179355]  kasan_report+0xdc/0x128
[   20.179401]  kasan_check_range+0x100/0x1a8
[   20.179459]  __kasan_check_read+0x20/0x30
[   20.179505]  copy_user_test_oob+0x4a0/0xec8
[   20.179585]  kunit_try_run_case+0x170/0x3f0
[   20.179632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.179696]  kthread+0x328/0x630
[   20.179737]  ret_from_fork+0x10/0x20
[   20.179788] 
[   20.179817] Allocated by task 286:
[   20.179849]  kasan_save_stack+0x3c/0x68
[   20.179890]  kasan_save_track+0x20/0x40
[   20.179930]  kasan_save_alloc_info+0x40/0x58
[   20.179972]  __kasan_kmalloc+0xd4/0xd8
[   20.180020]  __kmalloc_noprof+0x198/0x4c8
[   20.180061]  kunit_kmalloc_array+0x34/0x88
[   20.180102]  copy_user_test_oob+0xac/0xec8
[   20.180147]  kunit_try_run_case+0x170/0x3f0
[   20.180187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.180233]  kthread+0x328/0x630
[   20.180266]  ret_from_fork+0x10/0x20
[   20.180312] 
[   20.180333] The buggy address belongs to the object at fff00000c57ee700
[   20.180333]  which belongs to the cache kmalloc-128 of size 128
[   20.180414] The buggy address is located 0 bytes inside of
[   20.180414]  allocated 120-byte region [fff00000c57ee700, fff00000c57ee778)
[   20.180480] 
[   20.180526] The buggy address belongs to the physical page:
[   20.180576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.181272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.181374] page_type: f5(slab)
[   20.181436] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.181693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.182074] page dumped because: kasan: bad access detected
[   20.182158] 
[   20.182180] Memory state around the buggy address:
[   20.182217]  fff00000c57ee600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.182834]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.182924] >fff00000c57ee700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.183102]                                                                 ^
[   20.183153]  fff00000c57ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.183529]  fff00000c57ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.183788] ==================================================================
[   20.163726] ==================================================================
[   20.163874] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.163952] Read of size 121 at addr fff00000c57ee700 by task kunit_try_catch/286
[   20.164007] 
[   20.164040] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.164126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.164154] Hardware name: linux,dummy-virt (DT)
[   20.164188] Call trace:
[   20.164210]  show_stack+0x20/0x38 (C)
[   20.164258]  dump_stack_lvl+0x8c/0xd0
[   20.164305]  print_report+0x118/0x608
[   20.164354]  kasan_report+0xdc/0x128
[   20.164400]  kasan_check_range+0x100/0x1a8
[   20.164449]  __kasan_check_read+0x20/0x30
[   20.164503]  copy_user_test_oob+0x3c8/0xec8
[   20.164552]  kunit_try_run_case+0x170/0x3f0
[   20.164612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.164665]  kthread+0x328/0x630
[   20.164707]  ret_from_fork+0x10/0x20
[   20.164756] 
[   20.164776] Allocated by task 286:
[   20.164810]  kasan_save_stack+0x3c/0x68
[   20.164853]  kasan_save_track+0x20/0x40
[   20.164894]  kasan_save_alloc_info+0x40/0x58
[   20.164936]  __kasan_kmalloc+0xd4/0xd8
[   20.164983]  __kmalloc_noprof+0x198/0x4c8
[   20.165031]  kunit_kmalloc_array+0x34/0x88
[   20.165071]  copy_user_test_oob+0xac/0xec8
[   20.165109]  kunit_try_run_case+0x170/0x3f0
[   20.165149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.165195]  kthread+0x328/0x630
[   20.165227]  ret_from_fork+0x10/0x20
[   20.165269] 
[   20.165296] The buggy address belongs to the object at fff00000c57ee700
[   20.165296]  which belongs to the cache kmalloc-128 of size 128
[   20.165396] The buggy address is located 0 bytes inside of
[   20.165396]  allocated 120-byte region [fff00000c57ee700, fff00000c57ee778)
[   20.165460] 
[   20.165482] The buggy address belongs to the physical page:
[   20.165518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.165589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.166328] page_type: f5(slab)
[   20.166460] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.166733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.166847] page dumped because: kasan: bad access detected
[   20.166958] 
[   20.167023] Memory state around the buggy address:
[   20.167283]  fff00000c57ee600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.167451]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.167553] >fff00000c57ee700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.167672]                                                                 ^
[   20.167719]  fff00000c57ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.167989]  fff00000c57ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.168098] ==================================================================
[   20.157277] ==================================================================
[   20.157442] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.157777] Write of size 121 at addr fff00000c57ee700 by task kunit_try_catch/286
[   20.157925] 
[   20.158055] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.158148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.158377] Hardware name: linux,dummy-virt (DT)
[   20.158528] Call trace:
[   20.158562]  show_stack+0x20/0x38 (C)
[   20.158892]  dump_stack_lvl+0x8c/0xd0
[   20.159022]  print_report+0x118/0x608
[   20.159136]  kasan_report+0xdc/0x128
[   20.159254]  kasan_check_range+0x100/0x1a8
[   20.159324]  __kasan_check_write+0x20/0x30
[   20.159605]  copy_user_test_oob+0x35c/0xec8
[   20.159691]  kunit_try_run_case+0x170/0x3f0
[   20.159742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.159797]  kthread+0x328/0x630
[   20.159841]  ret_from_fork+0x10/0x20
[   20.159891] 
[   20.159911] Allocated by task 286:
[   20.159942]  kasan_save_stack+0x3c/0x68
[   20.159984]  kasan_save_track+0x20/0x40
[   20.160024]  kasan_save_alloc_info+0x40/0x58
[   20.160065]  __kasan_kmalloc+0xd4/0xd8
[   20.160105]  __kmalloc_noprof+0x198/0x4c8
[   20.160146]  kunit_kmalloc_array+0x34/0x88
[   20.160184]  copy_user_test_oob+0xac/0xec8
[   20.160223]  kunit_try_run_case+0x170/0x3f0
[   20.160261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.160308]  kthread+0x328/0x630
[   20.160341]  ret_from_fork+0x10/0x20
[   20.160379] 
[   20.160400] The buggy address belongs to the object at fff00000c57ee700
[   20.160400]  which belongs to the cache kmalloc-128 of size 128
[   20.160462] The buggy address is located 0 bytes inside of
[   20.160462]  allocated 120-byte region [fff00000c57ee700, fff00000c57ee778)
[   20.160526] 
[   20.160550] The buggy address belongs to the physical page:
[   20.160629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.160711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.160774] page_type: f5(slab)
[   20.160980] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.161103] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.161207] page dumped because: kasan: bad access detected
[   20.161393] 
[   20.161421] Memory state around the buggy address:
[   20.161460]  fff00000c57ee600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.161518]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.161793] >fff00000c57ee700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.161971]                                                                 ^
[   20.162062]  fff00000c57ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.162185]  fff00000c57ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.162248] ==================================================================
[   20.140177] ==================================================================
[   20.140594] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.140710] Read of size 121 at addr fff00000c57ee700 by task kunit_try_catch/286
[   20.140921] 
[   20.140962] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.141485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.141538] Hardware name: linux,dummy-virt (DT)
[   20.141785] Call trace:
[   20.141812]  show_stack+0x20/0x38 (C)
[   20.142071]  dump_stack_lvl+0x8c/0xd0
[   20.142169]  print_report+0x118/0x608
[   20.142339]  kasan_report+0xdc/0x128
[   20.142658]  kasan_check_range+0x100/0x1a8
[   20.142713]  __kasan_check_read+0x20/0x30
[   20.143172]  copy_user_test_oob+0x728/0xec8
[   20.143232]  kunit_try_run_case+0x170/0x3f0
[   20.143289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.143345]  kthread+0x328/0x630
[   20.143900]  ret_from_fork+0x10/0x20
[   20.143969] 
[   20.144092] Allocated by task 286:
[   20.144316]  kasan_save_stack+0x3c/0x68
[   20.144364]  kasan_save_track+0x20/0x40
[   20.144403]  kasan_save_alloc_info+0x40/0x58
[   20.144446]  __kasan_kmalloc+0xd4/0xd8
[   20.145012]  __kmalloc_noprof+0x198/0x4c8
[   20.145093]  kunit_kmalloc_array+0x34/0x88
[   20.145134]  copy_user_test_oob+0xac/0xec8
[   20.145380]  kunit_try_run_case+0x170/0x3f0
[   20.145856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.145939]  kthread+0x328/0x630
[   20.145974]  ret_from_fork+0x10/0x20
[   20.146260] 
[   20.146398] The buggy address belongs to the object at fff00000c57ee700
[   20.146398]  which belongs to the cache kmalloc-128 of size 128
[   20.146640] The buggy address is located 0 bytes inside of
[   20.146640]  allocated 120-byte region [fff00000c57ee700, fff00000c57ee778)
[   20.146715] 
[   20.146738] The buggy address belongs to the physical page:
[   20.146972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.147044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.147378] page_type: f5(slab)
[   20.147613] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.148154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.148247] page dumped because: kasan: bad access detected
[   20.148485] 
[   20.148531] Memory state around the buggy address:
[   20.148578]  fff00000c57ee600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.149044]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.149106] >fff00000c57ee700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.149723]                                                                 ^
[   20.149861]  fff00000c57ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.150117]  fff00000c57ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.150167] ==================================================================

[   15.541760] ==================================================================
[   15.542223] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.542548] Write of size 121 at addr ffff8881027e1800 by task kunit_try_catch/302
[   15.542879] 
[   15.542988] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.543048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.543060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.543082] Call Trace:
[   15.543098]  <TASK>
[   15.543113]  dump_stack_lvl+0x73/0xb0
[   15.543141]  print_report+0xd1/0x650
[   15.543174]  ? __virt_addr_valid+0x1db/0x2d0
[   15.543199]  ? copy_user_test_oob+0x557/0x10f0
[   15.543234]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.543257]  ? copy_user_test_oob+0x557/0x10f0
[   15.543282]  kasan_report+0x141/0x180
[   15.543314]  ? copy_user_test_oob+0x557/0x10f0
[   15.543342]  kasan_check_range+0x10c/0x1c0
[   15.543367]  __kasan_check_write+0x18/0x20
[   15.543397]  copy_user_test_oob+0x557/0x10f0
[   15.543423]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.543446]  ? finish_task_switch.isra.0+0x153/0x700
[   15.543478]  ? __switch_to+0x47/0xf50
[   15.543504]  ? __schedule+0x10cc/0x2b60
[   15.543529]  ? __pfx_read_tsc+0x10/0x10
[   15.543561]  ? ktime_get_ts64+0x86/0x230
[   15.543585]  kunit_try_run_case+0x1a5/0x480
[   15.543611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.543652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.543676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.543711]  ? __kthread_parkme+0x82/0x180
[   15.543733]  ? preempt_count_sub+0x50/0x80
[   15.543755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.543779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.543803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.543826]  kthread+0x337/0x6f0
[   15.543846]  ? trace_preempt_on+0x20/0xc0
[   15.543870]  ? __pfx_kthread+0x10/0x10
[   15.543891]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.543921]  ? calculate_sigpending+0x7b/0xa0
[   15.543946]  ? __pfx_kthread+0x10/0x10
[   15.543968]  ret_from_fork+0x116/0x1d0
[   15.543998]  ? __pfx_kthread+0x10/0x10
[   15.544028]  ret_from_fork_asm+0x1a/0x30
[   15.544058]  </TASK>
[   15.544071] 
[   15.552005] Allocated by task 302:
[   15.552207]  kasan_save_stack+0x45/0x70
[   15.552408]  kasan_save_track+0x18/0x40
[   15.552587]  kasan_save_alloc_info+0x3b/0x50
[   15.552848]  __kasan_kmalloc+0xb7/0xc0
[   15.553091]  __kmalloc_noprof+0x1c9/0x500
[   15.553327]  kunit_kmalloc_array+0x25/0x60
[   15.553547]  copy_user_test_oob+0xab/0x10f0
[   15.553854]  kunit_try_run_case+0x1a5/0x480
[   15.554110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.554349]  kthread+0x337/0x6f0
[   15.554534]  ret_from_fork+0x116/0x1d0
[   15.554728]  ret_from_fork_asm+0x1a/0x30
[   15.555070] 
[   15.555165] The buggy address belongs to the object at ffff8881027e1800
[   15.555165]  which belongs to the cache kmalloc-128 of size 128
[   15.555747] The buggy address is located 0 bytes inside of
[   15.555747]  allocated 120-byte region [ffff8881027e1800, ffff8881027e1878)
[   15.556277] 
[   15.556410] The buggy address belongs to the physical page:
[   15.556656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e1
[   15.556985] flags: 0x200000000000000(node=0|zone=2)
[   15.557161] page_type: f5(slab)
[   15.557288] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.557521] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.557809] page dumped because: kasan: bad access detected
[   15.558305] 
[   15.558419] Memory state around the buggy address:
[   15.558678]  ffff8881027e1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.558983]  ffff8881027e1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.559252] >ffff8881027e1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.559503]                                                                 ^
[   15.559878]  ffff8881027e1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560281]  ffff8881027e1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560707] ==================================================================
[   15.523056] ==================================================================
[   15.523524] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.524064] Read of size 121 at addr ffff8881027e1800 by task kunit_try_catch/302
[   15.524303] 
[   15.524399] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.524445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.524460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.524483] Call Trace:
[   15.524503]  <TASK>
[   15.524523]  dump_stack_lvl+0x73/0xb0
[   15.524556]  print_report+0xd1/0x650
[   15.524580]  ? __virt_addr_valid+0x1db/0x2d0
[   15.524606]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.524630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.524654]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.524678]  kasan_report+0x141/0x180
[   15.524700]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.524729]  kasan_check_range+0x10c/0x1c0
[   15.524753]  __kasan_check_read+0x15/0x20
[   15.524773]  copy_user_test_oob+0x4aa/0x10f0
[   15.524798]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.524821]  ? finish_task_switch.isra.0+0x153/0x700
[   15.524845]  ? __switch_to+0x47/0xf50
[   15.524871]  ? __schedule+0x10cc/0x2b60
[   15.524895]  ? __pfx_read_tsc+0x10/0x10
[   15.524917]  ? ktime_get_ts64+0x86/0x230
[   15.524941]  kunit_try_run_case+0x1a5/0x480
[   15.524990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.525012]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.525053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.525077]  ? __kthread_parkme+0x82/0x180
[   15.525099]  ? preempt_count_sub+0x50/0x80
[   15.525121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.525145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.525169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.525201]  kthread+0x337/0x6f0
[   15.525222]  ? trace_preempt_on+0x20/0xc0
[   15.525246]  ? __pfx_kthread+0x10/0x10
[   15.525278]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.525299]  ? calculate_sigpending+0x7b/0xa0
[   15.525324]  ? __pfx_kthread+0x10/0x10
[   15.525347]  ret_from_fork+0x116/0x1d0
[   15.525365]  ? __pfx_kthread+0x10/0x10
[   15.525386]  ret_from_fork_asm+0x1a/0x30
[   15.525417]  </TASK>
[   15.525429] 
[   15.533076] Allocated by task 302:
[   15.533205]  kasan_save_stack+0x45/0x70
[   15.533354]  kasan_save_track+0x18/0x40
[   15.533571]  kasan_save_alloc_info+0x3b/0x50
[   15.533879]  __kasan_kmalloc+0xb7/0xc0
[   15.534122]  __kmalloc_noprof+0x1c9/0x500
[   15.534323]  kunit_kmalloc_array+0x25/0x60
[   15.534527]  copy_user_test_oob+0xab/0x10f0
[   15.534850]  kunit_try_run_case+0x1a5/0x480
[   15.535070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.535250]  kthread+0x337/0x6f0
[   15.535374]  ret_from_fork+0x116/0x1d0
[   15.535506]  ret_from_fork_asm+0x1a/0x30
[   15.535765] 
[   15.535861] The buggy address belongs to the object at ffff8881027e1800
[   15.535861]  which belongs to the cache kmalloc-128 of size 128
[   15.536460] The buggy address is located 0 bytes inside of
[   15.536460]  allocated 120-byte region [ffff8881027e1800, ffff8881027e1878)
[   15.536956] 
[   15.537062] The buggy address belongs to the physical page:
[   15.537328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e1
[   15.537597] flags: 0x200000000000000(node=0|zone=2)
[   15.537955] page_type: f5(slab)
[   15.538118] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.538617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.538941] page dumped because: kasan: bad access detected
[   15.539182] 
[   15.539277] Memory state around the buggy address:
[   15.539492]  ffff8881027e1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.539805]  ffff8881027e1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540135] >ffff8881027e1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.540444]                                                                 ^
[   15.540698]  ffff8881027e1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540916]  ffff8881027e1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.541216] ==================================================================
[   15.561898] ==================================================================
[   15.562330] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.562633] Read of size 121 at addr ffff8881027e1800 by task kunit_try_catch/302
[   15.563003] 
[   15.563112] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.563158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.563171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.563194] Call Trace:
[   15.563215]  <TASK>
[   15.563234]  dump_stack_lvl+0x73/0xb0
[   15.563265]  print_report+0xd1/0x650
[   15.563290]  ? __virt_addr_valid+0x1db/0x2d0
[   15.563315]  ? copy_user_test_oob+0x604/0x10f0
[   15.563339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.563362]  ? copy_user_test_oob+0x604/0x10f0
[   15.563421]  kasan_report+0x141/0x180
[   15.563459]  ? copy_user_test_oob+0x604/0x10f0
[   15.563513]  kasan_check_range+0x10c/0x1c0
[   15.563550]  __kasan_check_read+0x15/0x20
[   15.563584]  copy_user_test_oob+0x604/0x10f0
[   15.563636]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.563672]  ? finish_task_switch.isra.0+0x153/0x700
[   15.563708]  ? __switch_to+0x47/0xf50
[   15.563748]  ? __schedule+0x10cc/0x2b60
[   15.563785]  ? __pfx_read_tsc+0x10/0x10
[   15.563806]  ? ktime_get_ts64+0x86/0x230
[   15.563844]  kunit_try_run_case+0x1a5/0x480
[   15.563895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.563940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.563964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.563988]  ? __kthread_parkme+0x82/0x180
[   15.564028]  ? preempt_count_sub+0x50/0x80
[   15.564051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.564075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.564099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.564122]  kthread+0x337/0x6f0
[   15.564147]  ? trace_preempt_on+0x20/0xc0
[   15.564172]  ? __pfx_kthread+0x10/0x10
[   15.564194]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.564216]  ? calculate_sigpending+0x7b/0xa0
[   15.564241]  ? __pfx_kthread+0x10/0x10
[   15.564263]  ret_from_fork+0x116/0x1d0
[   15.564282]  ? __pfx_kthread+0x10/0x10
[   15.564313]  ret_from_fork_asm+0x1a/0x30
[   15.564344]  </TASK>
[   15.564358] 
[   15.572997] Allocated by task 302:
[   15.573239]  kasan_save_stack+0x45/0x70
[   15.573456]  kasan_save_track+0x18/0x40
[   15.573709]  kasan_save_alloc_info+0x3b/0x50
[   15.573935]  __kasan_kmalloc+0xb7/0xc0
[   15.574144]  __kmalloc_noprof+0x1c9/0x500
[   15.574368]  kunit_kmalloc_array+0x25/0x60
[   15.574570]  copy_user_test_oob+0xab/0x10f0
[   15.574803]  kunit_try_run_case+0x1a5/0x480
[   15.575050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.575317]  kthread+0x337/0x6f0
[   15.575484]  ret_from_fork+0x116/0x1d0
[   15.575738]  ret_from_fork_asm+0x1a/0x30
[   15.575909] 
[   15.576007] The buggy address belongs to the object at ffff8881027e1800
[   15.576007]  which belongs to the cache kmalloc-128 of size 128
[   15.576607] The buggy address is located 0 bytes inside of
[   15.576607]  allocated 120-byte region [ffff8881027e1800, ffff8881027e1878)
[   15.577186] 
[   15.577317] The buggy address belongs to the physical page:
[   15.577590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e1
[   15.578013] flags: 0x200000000000000(node=0|zone=2)
[   15.578310] page_type: f5(slab)
[   15.578509] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.578946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.579387] page dumped because: kasan: bad access detected
[   15.579633] 
[   15.579728] Memory state around the buggy address:
[   15.579975]  ffff8881027e1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.580422]  ffff8881027e1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.580784] >ffff8881027e1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.581126]                                                                 ^
[   15.581435]  ffff8881027e1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.581784]  ffff8881027e1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.582100] ==================================================================
[   15.505161] ==================================================================
[   15.505527] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.505902] Write of size 121 at addr ffff8881027e1800 by task kunit_try_catch/302
[   15.506263] 
[   15.506362] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.506410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.506424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.506448] Call Trace:
[   15.506464]  <TASK>
[   15.506485]  dump_stack_lvl+0x73/0xb0
[   15.506526]  print_report+0xd1/0x650
[   15.506551]  ? __virt_addr_valid+0x1db/0x2d0
[   15.506576]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.506612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.506636]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.506672]  kasan_report+0x141/0x180
[   15.506695]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.506733]  kasan_check_range+0x10c/0x1c0
[   15.506757]  __kasan_check_write+0x18/0x20
[   15.506777]  copy_user_test_oob+0x3fd/0x10f0
[   15.506814]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.506837]  ? finish_task_switch.isra.0+0x153/0x700
[   15.506861]  ? __switch_to+0x47/0xf50
[   15.506896]  ? __schedule+0x10cc/0x2b60
[   15.506920]  ? __pfx_read_tsc+0x10/0x10
[   15.506942]  ? ktime_get_ts64+0x86/0x230
[   15.506976]  kunit_try_run_case+0x1a5/0x480
[   15.507001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.507056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.507080]  ? __kthread_parkme+0x82/0x180
[   15.507101]  ? preempt_count_sub+0x50/0x80
[   15.507124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.507172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.507195]  kthread+0x337/0x6f0
[   15.507215]  ? trace_preempt_on+0x20/0xc0
[   15.507239]  ? __pfx_kthread+0x10/0x10
[   15.507260]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.507281]  ? calculate_sigpending+0x7b/0xa0
[   15.507306]  ? __pfx_kthread+0x10/0x10
[   15.507328]  ret_from_fork+0x116/0x1d0
[   15.507347]  ? __pfx_kthread+0x10/0x10
[   15.507368]  ret_from_fork_asm+0x1a/0x30
[   15.507398]  </TASK>
[   15.507410] 
[   15.514809] Allocated by task 302:
[   15.514961]  kasan_save_stack+0x45/0x70
[   15.515122]  kasan_save_track+0x18/0x40
[   15.515260]  kasan_save_alloc_info+0x3b/0x50
[   15.515498]  __kasan_kmalloc+0xb7/0xc0
[   15.515684]  __kmalloc_noprof+0x1c9/0x500
[   15.515885]  kunit_kmalloc_array+0x25/0x60
[   15.516078]  copy_user_test_oob+0xab/0x10f0
[   15.516230]  kunit_try_run_case+0x1a5/0x480
[   15.516399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.516656]  kthread+0x337/0x6f0
[   15.516831]  ret_from_fork+0x116/0x1d0
[   15.517056]  ret_from_fork_asm+0x1a/0x30
[   15.517248] 
[   15.517323] The buggy address belongs to the object at ffff8881027e1800
[   15.517323]  which belongs to the cache kmalloc-128 of size 128
[   15.517843] The buggy address is located 0 bytes inside of
[   15.517843]  allocated 120-byte region [ffff8881027e1800, ffff8881027e1878)
[   15.518342] 
[   15.518432] The buggy address belongs to the physical page:
[   15.518607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e1
[   15.519012] flags: 0x200000000000000(node=0|zone=2)
[   15.519223] page_type: f5(slab)
[   15.519393] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.519764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.520090] page dumped because: kasan: bad access detected
[   15.520353] 
[   15.520447] Memory state around the buggy address:
[   15.520677]  ffff8881027e1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.520980]  ffff8881027e1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.521223] >ffff8881027e1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.521440]                                                                 ^
[   15.521659]  ffff8881027e1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522006]  ffff8881027e1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522327] ==================================================================