Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.054979] ==================================================================
[   20.055043] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.055206] Write of size 121 at addr fff00000c7834500 by task kunit_try_catch/285
[   20.055323] 
[   20.055355] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.055437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.055465] Hardware name: linux,dummy-virt (DT)
[   20.055508] Call trace:
[   20.055546]  show_stack+0x20/0x38 (C)
[   20.055604]  dump_stack_lvl+0x8c/0xd0
[   20.055651]  print_report+0x118/0x608
[   20.055702]  kasan_report+0xdc/0x128
[   20.055747]  kasan_check_range+0x100/0x1a8
[   20.055803]  __kasan_check_write+0x20/0x30
[   20.055850]  copy_user_test_oob+0x434/0xec8
[   20.055896]  kunit_try_run_case+0x170/0x3f0
[   20.055944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.055997]  kthread+0x328/0x630
[   20.056053]  ret_from_fork+0x10/0x20
[   20.056111] 
[   20.056132] Allocated by task 285:
[   20.056162]  kasan_save_stack+0x3c/0x68
[   20.056203]  kasan_save_track+0x20/0x40
[   20.056243]  kasan_save_alloc_info+0x40/0x58
[   20.056284]  __kasan_kmalloc+0xd4/0xd8
[   20.056321]  __kmalloc_noprof+0x198/0x4c8
[   20.056360]  kunit_kmalloc_array+0x34/0x88
[   20.056397]  copy_user_test_oob+0xac/0xec8
[   20.056436]  kunit_try_run_case+0x170/0x3f0
[   20.056488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.056544]  kthread+0x328/0x630
[   20.056579]  ret_from_fork+0x10/0x20
[   20.056614] 
[   20.056643] The buggy address belongs to the object at fff00000c7834500
[   20.056643]  which belongs to the cache kmalloc-128 of size 128
[   20.056702] The buggy address is located 0 bytes inside of
[   20.056702]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.056763] 
[   20.056785] The buggy address belongs to the physical page:
[   20.056822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.056874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.056921] page_type: f5(slab)
[   20.056966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.057757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.057861] page dumped because: kasan: bad access detected
[   20.058022] 
[   20.058258] Memory state around the buggy address:
[   20.058344]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.058390]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.058436] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.058475]                                                                 ^
[   20.058619]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.058671]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.058713] ==================================================================
[   20.059661] ==================================================================
[   20.059776] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.059827] Read of size 121 at addr fff00000c7834500 by task kunit_try_catch/285
[   20.059882] 
[   20.059912] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.060240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.060317] Hardware name: linux,dummy-virt (DT)
[   20.060382] Call trace:
[   20.060410]  show_stack+0x20/0x38 (C)
[   20.060482]  dump_stack_lvl+0x8c/0xd0
[   20.060563]  print_report+0x118/0x608
[   20.060659]  kasan_report+0xdc/0x128
[   20.060729]  kasan_check_range+0x100/0x1a8
[   20.060777]  __kasan_check_read+0x20/0x30
[   20.060972]  copy_user_test_oob+0x4a0/0xec8
[   20.061046]  kunit_try_run_case+0x170/0x3f0
[   20.061117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.061170]  kthread+0x328/0x630
[   20.061213]  ret_from_fork+0x10/0x20
[   20.061352] 
[   20.061375] Allocated by task 285:
[   20.061407]  kasan_save_stack+0x3c/0x68
[   20.061449]  kasan_save_track+0x20/0x40
[   20.061554]  kasan_save_alloc_info+0x40/0x58
[   20.061691]  __kasan_kmalloc+0xd4/0xd8
[   20.061788]  __kmalloc_noprof+0x198/0x4c8
[   20.061903]  kunit_kmalloc_array+0x34/0x88
[   20.062294]  copy_user_test_oob+0xac/0xec8
[   20.062465]  kunit_try_run_case+0x170/0x3f0
[   20.062594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.062674]  kthread+0x328/0x630
[   20.062720]  ret_from_fork+0x10/0x20
[   20.062820] 
[   20.062869] The buggy address belongs to the object at fff00000c7834500
[   20.062869]  which belongs to the cache kmalloc-128 of size 128
[   20.062991] The buggy address is located 0 bytes inside of
[   20.062991]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.063077] 
[   20.063098] The buggy address belongs to the physical page:
[   20.063130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.063360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.063502] page_type: f5(slab)
[   20.063659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.063790] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.064054] page dumped because: kasan: bad access detected
[   20.064132] 
[   20.064262] Memory state around the buggy address:
[   20.064407]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.064458]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.064504] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.064545]                                                                 ^
[   20.064588]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.064633]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.064762] ==================================================================
[   20.043936] ==================================================================
[   20.043994] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.044089] Write of size 121 at addr fff00000c7834500 by task kunit_try_catch/285
[   20.044162] 
[   20.044200] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.044338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.044369] Hardware name: linux,dummy-virt (DT)
[   20.044399] Call trace:
[   20.044423]  show_stack+0x20/0x38 (C)
[   20.044482]  dump_stack_lvl+0x8c/0xd0
[   20.044537]  print_report+0x118/0x608
[   20.044898]  kasan_report+0xdc/0x128
[   20.045009]  kasan_check_range+0x100/0x1a8
[   20.045132]  __kasan_check_write+0x20/0x30
[   20.045261]  copy_user_test_oob+0x35c/0xec8
[   20.045310]  kunit_try_run_case+0x170/0x3f0
[   20.045387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.045696]  kthread+0x328/0x630
[   20.045783]  ret_from_fork+0x10/0x20
[   20.045948] 
[   20.046008] Allocated by task 285:
[   20.046128]  kasan_save_stack+0x3c/0x68
[   20.046172]  kasan_save_track+0x20/0x40
[   20.046256]  kasan_save_alloc_info+0x40/0x58
[   20.046548]  __kasan_kmalloc+0xd4/0xd8
[   20.046629]  __kmalloc_noprof+0x198/0x4c8
[   20.046688]  kunit_kmalloc_array+0x34/0x88
[   20.046772]  copy_user_test_oob+0xac/0xec8
[   20.046880]  kunit_try_run_case+0x170/0x3f0
[   20.046922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.047195]  kthread+0x328/0x630
[   20.047324]  ret_from_fork+0x10/0x20
[   20.047466] 
[   20.047545] The buggy address belongs to the object at fff00000c7834500
[   20.047545]  which belongs to the cache kmalloc-128 of size 128
[   20.047662] The buggy address is located 0 bytes inside of
[   20.047662]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.047756] 
[   20.047824] The buggy address belongs to the physical page:
[   20.047870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.047922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.048276] page_type: f5(slab)
[   20.048410] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.048526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.048605] page dumped because: kasan: bad access detected
[   20.048640] 
[   20.048660] Memory state around the buggy address:
[   20.048815]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.048862]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.048987] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.049146]                                                                 ^
[   20.049212]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.049282]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.049370] ==================================================================
[   20.049946] ==================================================================
[   20.049999] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.050084] Read of size 121 at addr fff00000c7834500 by task kunit_try_catch/285
[   20.050136] 
[   20.050167] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.050251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.050383] Hardware name: linux,dummy-virt (DT)
[   20.050475] Call trace:
[   20.050621]  show_stack+0x20/0x38 (C)
[   20.050828]  dump_stack_lvl+0x8c/0xd0
[   20.050887]  print_report+0x118/0x608
[   20.050975]  kasan_report+0xdc/0x128
[   20.051025]  kasan_check_range+0x100/0x1a8
[   20.051194]  __kasan_check_read+0x20/0x30
[   20.051310]  copy_user_test_oob+0x3c8/0xec8
[   20.051365]  kunit_try_run_case+0x170/0x3f0
[   20.051453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.051535]  kthread+0x328/0x630
[   20.051601]  ret_from_fork+0x10/0x20
[   20.051652] 
[   20.051691] Allocated by task 285:
[   20.051734]  kasan_save_stack+0x3c/0x68
[   20.051777]  kasan_save_track+0x20/0x40
[   20.051822]  kasan_save_alloc_info+0x40/0x58
[   20.051865]  __kasan_kmalloc+0xd4/0xd8
[   20.052023]  __kmalloc_noprof+0x198/0x4c8
[   20.052193]  kunit_kmalloc_array+0x34/0x88
[   20.052246]  copy_user_test_oob+0xac/0xec8
[   20.052295]  kunit_try_run_case+0x170/0x3f0
[   20.052336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.052381]  kthread+0x328/0x630
[   20.052414]  ret_from_fork+0x10/0x20
[   20.052457] 
[   20.052488] The buggy address belongs to the object at fff00000c7834500
[   20.052488]  which belongs to the cache kmalloc-128 of size 128
[   20.052719] The buggy address is located 0 bytes inside of
[   20.052719]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.052844] 
[   20.052953] The buggy address belongs to the physical page:
[   20.053012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.053075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.053311] page_type: f5(slab)
[   20.053368] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.053476] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.053582] page dumped because: kasan: bad access detected
[   20.053672] 
[   20.053751] Memory state around the buggy address:
[   20.053847]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.053946]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.054004] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.054182]                                                                 ^
[   20.054373]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.054493]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.054592] ==================================================================
[   20.026370] ==================================================================
[   20.026514] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.026652] Write of size 121 at addr fff00000c7834500 by task kunit_try_catch/285
[   20.026708] 
[   20.026753] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.027138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.027170] Hardware name: linux,dummy-virt (DT)
[   20.027255] Call trace:
[   20.027283]  show_stack+0x20/0x38 (C)
[   20.027337]  dump_stack_lvl+0x8c/0xd0
[   20.027388]  print_report+0x118/0x608
[   20.027443]  kasan_report+0xdc/0x128
[   20.027489]  kasan_check_range+0x100/0x1a8
[   20.027575]  __kasan_check_write+0x20/0x30
[   20.027669]  copy_user_test_oob+0x234/0xec8
[   20.027721]  kunit_try_run_case+0x170/0x3f0
[   20.027772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.027825]  kthread+0x328/0x630
[   20.027868]  ret_from_fork+0x10/0x20
[   20.027920] 
[   20.027941] Allocated by task 285:
[   20.027971]  kasan_save_stack+0x3c/0x68
[   20.028016]  kasan_save_track+0x20/0x40
[   20.028064]  kasan_save_alloc_info+0x40/0x58
[   20.028134]  __kasan_kmalloc+0xd4/0xd8
[   20.028172]  __kmalloc_noprof+0x198/0x4c8
[   20.028214]  kunit_kmalloc_array+0x34/0x88
[   20.028252]  copy_user_test_oob+0xac/0xec8
[   20.028291]  kunit_try_run_case+0x170/0x3f0
[   20.028328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.028378]  kthread+0x328/0x630
[   20.028413]  ret_from_fork+0x10/0x20
[   20.028453] 
[   20.028573] The buggy address belongs to the object at fff00000c7834500
[   20.028573]  which belongs to the cache kmalloc-128 of size 128
[   20.028693] The buggy address is located 0 bytes inside of
[   20.028693]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.028783] 
[   20.028838] The buggy address belongs to the physical page:
[   20.028882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.028968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.029045] page_type: f5(slab)
[   20.029120] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.029174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.029216] page dumped because: kasan: bad access detected
[   20.029250] 
[   20.029271] Memory state around the buggy address:
[   20.029306]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.029351]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.029396] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.029438]                                                                 ^
[   20.029480]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.029531]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.029573] ==================================================================
[   20.035760] ==================================================================
[   20.035852] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.035904] Read of size 121 at addr fff00000c7834500 by task kunit_try_catch/285
[   20.036009] 
[   20.036061] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.036151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.036247] Hardware name: linux,dummy-virt (DT)
[   20.036315] Call trace:
[   20.036365]  show_stack+0x20/0x38 (C)
[   20.036451]  dump_stack_lvl+0x8c/0xd0
[   20.036504]  print_report+0x118/0x608
[   20.036571]  kasan_report+0xdc/0x128
[   20.036904]  kasan_check_range+0x100/0x1a8
[   20.037133]  __kasan_check_read+0x20/0x30
[   20.037183]  copy_user_test_oob+0x728/0xec8
[   20.037410]  kunit_try_run_case+0x170/0x3f0
[   20.037457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.037565]  kthread+0x328/0x630
[   20.037634]  ret_from_fork+0x10/0x20
[   20.037757] 
[   20.037875] Allocated by task 285:
[   20.038017]  kasan_save_stack+0x3c/0x68
[   20.038134]  kasan_save_track+0x20/0x40
[   20.038251]  kasan_save_alloc_info+0x40/0x58
[   20.038366]  __kasan_kmalloc+0xd4/0xd8
[   20.038414]  __kmalloc_noprof+0x198/0x4c8
[   20.038487]  kunit_kmalloc_array+0x34/0x88
[   20.038533]  copy_user_test_oob+0xac/0xec8
[   20.038582]  kunit_try_run_case+0x170/0x3f0
[   20.038622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.038665]  kthread+0x328/0x630
[   20.038708]  ret_from_fork+0x10/0x20
[   20.038753] 
[   20.038783] The buggy address belongs to the object at fff00000c7834500
[   20.038783]  which belongs to the cache kmalloc-128 of size 128
[   20.038841] The buggy address is located 0 bytes inside of
[   20.038841]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.038903] 
[   20.038925] The buggy address belongs to the physical page:
[   20.038972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.039042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.039104] page_type: f5(slab)
[   20.039152] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.039205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.039247] page dumped because: kasan: bad access detected
[   20.039297] 
[   20.039329] Memory state around the buggy address:
[   20.039364]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.039410]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039456] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.039504]                                                                 ^
[   20.039552]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039604]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039660] ==================================================================

[   15.523362] ==================================================================
[   15.523710] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.523998] Read of size 121 at addr ffff8881029dbd00 by task kunit_try_catch/303
[   15.524336] 
[   15.524442] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.524484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.524497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.524518] Call Trace:
[   15.524533]  <TASK>
[   15.524547]  dump_stack_lvl+0x73/0xb0
[   15.524574]  print_report+0xd1/0x650
[   15.524597]  ? __virt_addr_valid+0x1db/0x2d0
[   15.524620]  ? copy_user_test_oob+0x604/0x10f0
[   15.524643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.524666]  ? copy_user_test_oob+0x604/0x10f0
[   15.524690]  kasan_report+0x141/0x180
[   15.524713]  ? copy_user_test_oob+0x604/0x10f0
[   15.524741]  kasan_check_range+0x10c/0x1c0
[   15.524765]  __kasan_check_read+0x15/0x20
[   15.524785]  copy_user_test_oob+0x604/0x10f0
[   15.524811]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.524833]  ? finish_task_switch.isra.0+0x153/0x700
[   15.524856]  ? __switch_to+0x47/0xf50
[   15.524881]  ? __schedule+0x10cc/0x2b60
[   15.524904]  ? __pfx_read_tsc+0x10/0x10
[   15.524925]  ? ktime_get_ts64+0x86/0x230
[   15.524950]  kunit_try_run_case+0x1a5/0x480
[   15.524975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.524998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.525022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.525046]  ? __kthread_parkme+0x82/0x180
[   15.525068]  ? preempt_count_sub+0x50/0x80
[   15.525091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.525128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.525152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.525176]  kthread+0x337/0x6f0
[   15.525196]  ? trace_preempt_on+0x20/0xc0
[   15.525221]  ? __pfx_kthread+0x10/0x10
[   15.525243]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.525264]  ? calculate_sigpending+0x7b/0xa0
[   15.525289]  ? __pfx_kthread+0x10/0x10
[   15.525311]  ret_from_fork+0x116/0x1d0
[   15.525341]  ? __pfx_kthread+0x10/0x10
[   15.525362]  ret_from_fork_asm+0x1a/0x30
[   15.525393]  </TASK>
[   15.525403] 
[   15.532775] Allocated by task 303:
[   15.532935]  kasan_save_stack+0x45/0x70
[   15.533082]  kasan_save_track+0x18/0x40
[   15.533291]  kasan_save_alloc_info+0x3b/0x50
[   15.533511]  __kasan_kmalloc+0xb7/0xc0
[   15.533648]  __kmalloc_noprof+0x1c9/0x500
[   15.533830]  kunit_kmalloc_array+0x25/0x60
[   15.534033]  copy_user_test_oob+0xab/0x10f0
[   15.534250]  kunit_try_run_case+0x1a5/0x480
[   15.534398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.534860]  kthread+0x337/0x6f0
[   15.534983]  ret_from_fork+0x116/0x1d0
[   15.535130]  ret_from_fork_asm+0x1a/0x30
[   15.535334] 
[   15.535433] The buggy address belongs to the object at ffff8881029dbd00
[   15.535433]  which belongs to the cache kmalloc-128 of size 128
[   15.536036] The buggy address is located 0 bytes inside of
[   15.536036]  allocated 120-byte region [ffff8881029dbd00, ffff8881029dbd78)
[   15.536402] 
[   15.536476] The buggy address belongs to the physical page:
[   15.536649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   15.536887] flags: 0x200000000000000(node=0|zone=2)
[   15.537050] page_type: f5(slab)
[   15.537227] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.537566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.538167] page dumped because: kasan: bad access detected
[   15.538449] 
[   15.538521] Memory state around the buggy address:
[   15.538679]  ffff8881029dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.538899]  ffff8881029dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.539126] >ffff8881029dbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.539399]                                                                 ^
[   15.539717]  ffff8881029dbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540045]  ffff8881029dbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540441] ==================================================================
[   15.504129] ==================================================================
[   15.505092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.505702] Write of size 121 at addr ffff8881029dbd00 by task kunit_try_catch/303
[   15.506326] 
[   15.506415] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.506474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.506487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.506509] Call Trace:
[   15.506532]  <TASK>
[   15.506547]  dump_stack_lvl+0x73/0xb0
[   15.506574]  print_report+0xd1/0x650
[   15.506619]  ? __virt_addr_valid+0x1db/0x2d0
[   15.506643]  ? copy_user_test_oob+0x557/0x10f0
[   15.506667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.506690]  ? copy_user_test_oob+0x557/0x10f0
[   15.506715]  kasan_report+0x141/0x180
[   15.506739]  ? copy_user_test_oob+0x557/0x10f0
[   15.506767]  kasan_check_range+0x10c/0x1c0
[   15.506792]  __kasan_check_write+0x18/0x20
[   15.506811]  copy_user_test_oob+0x557/0x10f0
[   15.506837]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.506860]  ? finish_task_switch.isra.0+0x153/0x700
[   15.506883]  ? __switch_to+0x47/0xf50
[   15.506909]  ? __schedule+0x10cc/0x2b60
[   15.506931]  ? __pfx_read_tsc+0x10/0x10
[   15.506952]  ? ktime_get_ts64+0x86/0x230
[   15.506977]  kunit_try_run_case+0x1a5/0x480
[   15.507001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.507048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.507071]  ? __kthread_parkme+0x82/0x180
[   15.507093]  ? preempt_count_sub+0x50/0x80
[   15.507127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.507176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.507206]  kthread+0x337/0x6f0
[   15.507226]  ? trace_preempt_on+0x20/0xc0
[   15.507250]  ? __pfx_kthread+0x10/0x10
[   15.507271]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.507292]  ? calculate_sigpending+0x7b/0xa0
[   15.507319]  ? __pfx_kthread+0x10/0x10
[   15.507342]  ret_from_fork+0x116/0x1d0
[   15.507361]  ? __pfx_kthread+0x10/0x10
[   15.507382]  ret_from_fork_asm+0x1a/0x30
[   15.507412]  </TASK>
[   15.507424] 
[   15.514975] Allocated by task 303:
[   15.515117]  kasan_save_stack+0x45/0x70
[   15.515325]  kasan_save_track+0x18/0x40
[   15.515522]  kasan_save_alloc_info+0x3b/0x50
[   15.515866]  __kasan_kmalloc+0xb7/0xc0
[   15.516029]  __kmalloc_noprof+0x1c9/0x500
[   15.516182]  kunit_kmalloc_array+0x25/0x60
[   15.516348]  copy_user_test_oob+0xab/0x10f0
[   15.516564]  kunit_try_run_case+0x1a5/0x480
[   15.516771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.517020]  kthread+0x337/0x6f0
[   15.517204]  ret_from_fork+0x116/0x1d0
[   15.517412]  ret_from_fork_asm+0x1a/0x30
[   15.517590] 
[   15.517677] The buggy address belongs to the object at ffff8881029dbd00
[   15.517677]  which belongs to the cache kmalloc-128 of size 128
[   15.518131] The buggy address is located 0 bytes inside of
[   15.518131]  allocated 120-byte region [ffff8881029dbd00, ffff8881029dbd78)
[   15.518644] 
[   15.518719] The buggy address belongs to the physical page:
[   15.518893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   15.519146] flags: 0x200000000000000(node=0|zone=2)
[   15.519362] page_type: f5(slab)
[   15.519531] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.520067] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.520417] page dumped because: kasan: bad access detected
[   15.520667] 
[   15.520737] Memory state around the buggy address:
[   15.520894]  ffff8881029dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.521130]  ffff8881029dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.521609] >ffff8881029dbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.521936]                                                                 ^
[   15.522253]  ffff8881029dbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522642]  ffff8881029dbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522905] ==================================================================
[   15.459514] ==================================================================
[   15.459845] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.460344] Write of size 121 at addr ffff8881029dbd00 by task kunit_try_catch/303
[   15.460627] 
[   15.460738] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.460783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.460797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.460817] Call Trace:
[   15.460832]  <TASK>
[   15.460850]  dump_stack_lvl+0x73/0xb0
[   15.460877]  print_report+0xd1/0x650
[   15.460899]  ? __virt_addr_valid+0x1db/0x2d0
[   15.460922]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.460946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.460969]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.460993]  kasan_report+0x141/0x180
[   15.461016]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.461044]  kasan_check_range+0x10c/0x1c0
[   15.461068]  __kasan_check_write+0x18/0x20
[   15.461088]  copy_user_test_oob+0x3fd/0x10f0
[   15.461126]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.461149]  ? finish_task_switch.isra.0+0x153/0x700
[   15.461171]  ? __switch_to+0x47/0xf50
[   15.461196]  ? __schedule+0x10cc/0x2b60
[   15.461218]  ? __pfx_read_tsc+0x10/0x10
[   15.461240]  ? ktime_get_ts64+0x86/0x230
[   15.461263]  kunit_try_run_case+0x1a5/0x480
[   15.461287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.461310]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.461332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.461356]  ? __kthread_parkme+0x82/0x180
[   15.461377]  ? preempt_count_sub+0x50/0x80
[   15.461401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.461425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.461451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.461475]  kthread+0x337/0x6f0
[   15.461495]  ? trace_preempt_on+0x20/0xc0
[   15.461518]  ? __pfx_kthread+0x10/0x10
[   15.461540]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.461561]  ? calculate_sigpending+0x7b/0xa0
[   15.461585]  ? __pfx_kthread+0x10/0x10
[   15.461607]  ret_from_fork+0x116/0x1d0
[   15.461626]  ? __pfx_kthread+0x10/0x10
[   15.461648]  ret_from_fork_asm+0x1a/0x30
[   15.461679]  </TASK>
[   15.461690] 
[   15.470480] Allocated by task 303:
[   15.470622]  kasan_save_stack+0x45/0x70
[   15.470836]  kasan_save_track+0x18/0x40
[   15.471033]  kasan_save_alloc_info+0x3b/0x50
[   15.471262]  __kasan_kmalloc+0xb7/0xc0
[   15.471431]  __kmalloc_noprof+0x1c9/0x500
[   15.471664]  kunit_kmalloc_array+0x25/0x60
[   15.471908]  copy_user_test_oob+0xab/0x10f0
[   15.472127]  kunit_try_run_case+0x1a5/0x480
[   15.472360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.472537]  kthread+0x337/0x6f0
[   15.472827]  ret_from_fork+0x116/0x1d0
[   15.473612]  ret_from_fork_asm+0x1a/0x30
[   15.473776] 
[   15.473878] The buggy address belongs to the object at ffff8881029dbd00
[   15.473878]  which belongs to the cache kmalloc-128 of size 128
[   15.474573] The buggy address is located 0 bytes inside of
[   15.474573]  allocated 120-byte region [ffff8881029dbd00, ffff8881029dbd78)
[   15.475058] 
[   15.475152] The buggy address belongs to the physical page:
[   15.475599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   15.475939] flags: 0x200000000000000(node=0|zone=2)
[   15.476172] page_type: f5(slab)
[   15.476322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.476842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.477247] page dumped because: kasan: bad access detected
[   15.477623] 
[   15.477704] Memory state around the buggy address:
[   15.477929]  ffff8881029dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.478270]  ffff8881029dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.478781] >ffff8881029dbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.479155]                                                                 ^
[   15.479653]  ffff8881029dbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.480069]  ffff8881029dbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.480525] ==================================================================
[   15.481558] ==================================================================
[   15.481876] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.482376] Read of size 121 at addr ffff8881029dbd00 by task kunit_try_catch/303
[   15.482651] 
[   15.482764] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.482806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.482819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.482841] Call Trace:
[   15.482856]  <TASK>
[   15.482871]  dump_stack_lvl+0x73/0xb0
[   15.482898]  print_report+0xd1/0x650
[   15.482921]  ? __virt_addr_valid+0x1db/0x2d0
[   15.482944]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.482967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.482990]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.483014]  kasan_report+0x141/0x180
[   15.483037]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.483065]  kasan_check_range+0x10c/0x1c0
[   15.483089]  __kasan_check_read+0x15/0x20
[   15.483137]  copy_user_test_oob+0x4aa/0x10f0
[   15.483163]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.483186]  ? finish_task_switch.isra.0+0x153/0x700
[   15.483212]  ? __switch_to+0x47/0xf50
[   15.483396]  ? __schedule+0x10cc/0x2b60
[   15.483421]  ? __pfx_read_tsc+0x10/0x10
[   15.483443]  ? ktime_get_ts64+0x86/0x230
[   15.483467]  kunit_try_run_case+0x1a5/0x480
[   15.483494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.483517]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.483556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.483580]  ? __kthread_parkme+0x82/0x180
[   15.483615]  ? preempt_count_sub+0x50/0x80
[   15.483640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.483665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.483689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.483714]  kthread+0x337/0x6f0
[   15.483735]  ? trace_preempt_on+0x20/0xc0
[   15.483758]  ? __pfx_kthread+0x10/0x10
[   15.483780]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.483802]  ? calculate_sigpending+0x7b/0xa0
[   15.483826]  ? __pfx_kthread+0x10/0x10
[   15.483848]  ret_from_fork+0x116/0x1d0
[   15.483867]  ? __pfx_kthread+0x10/0x10
[   15.483888]  ret_from_fork_asm+0x1a/0x30
[   15.483918]  </TASK>
[   15.483931] 
[   15.491244] Allocated by task 303:
[   15.491407]  kasan_save_stack+0x45/0x70
[   15.491561]  kasan_save_track+0x18/0x40
[   15.491934]  kasan_save_alloc_info+0x3b/0x50
[   15.492619]  __kasan_kmalloc+0xb7/0xc0
[   15.492822]  __kmalloc_noprof+0x1c9/0x500
[   15.493031]  kunit_kmalloc_array+0x25/0x60
[   15.493480]  copy_user_test_oob+0xab/0x10f0
[   15.493645]  kunit_try_run_case+0x1a5/0x480
[   15.493796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.493975]  kthread+0x337/0x6f0
[   15.494110]  ret_from_fork+0x116/0x1d0
[   15.494656]  ret_from_fork_asm+0x1a/0x30
[   15.494808] 
[   15.494883] The buggy address belongs to the object at ffff8881029dbd00
[   15.494883]  which belongs to the cache kmalloc-128 of size 128
[   15.495547] The buggy address is located 0 bytes inside of
[   15.495547]  allocated 120-byte region [ffff8881029dbd00, ffff8881029dbd78)
[   15.496123] 
[   15.496227] The buggy address belongs to the physical page:
[   15.496804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   15.497481] flags: 0x200000000000000(node=0|zone=2)
[   15.497953] page_type: f5(slab)
[   15.498282] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.498927] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.499497] page dumped because: kasan: bad access detected
[   15.499963] 
[   15.500183] Memory state around the buggy address:
[   15.500383]  ffff8881029dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.501022]  ffff8881029dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.501711] >ffff8881029dbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.502115]                                                                 ^
[   15.502692]  ffff8881029dbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.503083]  ffff8881029dbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.503656] ==================================================================