Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.299387] ==================================================================
[   21.299446] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.299659] Read of size 121 at addr fff00000c6398d00 by task kunit_try_catch/285
[   21.299721] 
[   21.299770] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.299891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.299939] Hardware name: linux,dummy-virt (DT)
[   21.300002] Call trace:
[   21.300030]  show_stack+0x20/0x38 (C)
[   21.300096]  dump_stack_lvl+0x8c/0xd0
[   21.300186]  print_report+0x118/0x608
[   21.300235]  kasan_report+0xdc/0x128
[   21.300295]  kasan_check_range+0x100/0x1a8
[   21.300343]  __kasan_check_read+0x20/0x30
[   21.300389]  copy_user_test_oob+0x3c8/0xec8
[   21.300459]  kunit_try_run_case+0x170/0x3f0
[   21.300510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.300562]  kthread+0x328/0x630
[   21.300604]  ret_from_fork+0x10/0x20
[   21.300651] 
[   21.300672] Allocated by task 285:
[   21.300782]  kasan_save_stack+0x3c/0x68
[   21.300849]  kasan_save_track+0x20/0x40
[   21.300905]  kasan_save_alloc_info+0x40/0x58
[   21.300948]  __kasan_kmalloc+0xd4/0xd8
[   21.300985]  __kmalloc_noprof+0x198/0x4c8
[   21.301042]  kunit_kmalloc_array+0x34/0x88
[   21.301095]  copy_user_test_oob+0xac/0xec8
[   21.301141]  kunit_try_run_case+0x170/0x3f0
[   21.301196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.301242]  kthread+0x328/0x630
[   21.301276]  ret_from_fork+0x10/0x20
[   21.301312] 
[   21.301358] The buggy address belongs to the object at fff00000c6398d00
[   21.301358]  which belongs to the cache kmalloc-128 of size 128
[   21.301489] The buggy address is located 0 bytes inside of
[   21.301489]  allocated 120-byte region [fff00000c6398d00, fff00000c6398d78)
[   21.301552] 
[   21.301612] The buggy address belongs to the physical page:
[   21.301656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   21.301707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.301754] page_type: f5(slab)
[   21.301800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.301893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.301937] page dumped because: kasan: bad access detected
[   21.302088] 
[   21.302110] Memory state around the buggy address:
[   21.302229]  fff00000c6398c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.302275]  fff00000c6398c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.302318] >fff00000c6398d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.302377]                                                                 ^
[   21.302420]  fff00000c6398d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.302505]  fff00000c6398e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.302551] ==================================================================
[   21.284360] ==================================================================
[   21.284478] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.284671] Read of size 121 at addr fff00000c6398d00 by task kunit_try_catch/285
[   21.284770] 
[   21.284805] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.284922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.284969] Hardware name: linux,dummy-virt (DT)
[   21.285007] Call trace:
[   21.285056]  show_stack+0x20/0x38 (C)
[   21.285107]  dump_stack_lvl+0x8c/0xd0
[   21.285181]  print_report+0x118/0x608
[   21.285228]  kasan_report+0xdc/0x128
[   21.285274]  kasan_check_range+0x100/0x1a8
[   21.285325]  __kasan_check_read+0x20/0x30
[   21.285370]  copy_user_test_oob+0x728/0xec8
[   21.285540]  kunit_try_run_case+0x170/0x3f0
[   21.285622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.285695]  kthread+0x328/0x630
[   21.285766]  ret_from_fork+0x10/0x20
[   21.285973] 
[   21.286002] Allocated by task 285:
[   21.286072]  kasan_save_stack+0x3c/0x68
[   21.286117]  kasan_save_track+0x20/0x40
[   21.286157]  kasan_save_alloc_info+0x40/0x58
[   21.286277]  __kasan_kmalloc+0xd4/0xd8
[   21.286358]  __kmalloc_noprof+0x198/0x4c8
[   21.286471]  kunit_kmalloc_array+0x34/0x88
[   21.286514]  copy_user_test_oob+0xac/0xec8
[   21.286588]  kunit_try_run_case+0x170/0x3f0
[   21.286635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.286699]  kthread+0x328/0x630
[   21.286742]  ret_from_fork+0x10/0x20
[   21.286963] 
[   21.287010] The buggy address belongs to the object at fff00000c6398d00
[   21.287010]  which belongs to the cache kmalloc-128 of size 128
[   21.287074] The buggy address is located 0 bytes inside of
[   21.287074]  allocated 120-byte region [fff00000c6398d00, fff00000c6398d78)
[   21.287137] 
[   21.287162] The buggy address belongs to the physical page:
[   21.287192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   21.287506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.287595] page_type: f5(slab)
[   21.287652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.287726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.287909] page dumped because: kasan: bad access detected
[   21.288001] 
[   21.288022] Memory state around the buggy address:
[   21.288131]  fff00000c6398c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.288221]  fff00000c6398c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.288310] >fff00000c6398d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.288426]                                                                 ^
[   21.288505]  fff00000c6398d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.288589]  fff00000c6398e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.288645] ==================================================================
[   21.274952] ==================================================================
[   21.275056] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.275149] Write of size 121 at addr fff00000c6398d00 by task kunit_try_catch/285
[   21.275206] 
[   21.275250] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.275338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.275367] Hardware name: linux,dummy-virt (DT)
[   21.275402] Call trace:
[   21.275440]  show_stack+0x20/0x38 (C)
[   21.275492]  dump_stack_lvl+0x8c/0xd0
[   21.275543]  print_report+0x118/0x608
[   21.275599]  kasan_report+0xdc/0x128
[   21.275645]  kasan_check_range+0x100/0x1a8
[   21.275704]  __kasan_check_write+0x20/0x30
[   21.275757]  copy_user_test_oob+0x234/0xec8
[   21.275806]  kunit_try_run_case+0x170/0x3f0
[   21.275854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.275919]  kthread+0x328/0x630
[   21.275963]  ret_from_fork+0x10/0x20
[   21.276058] 
[   21.276104] Allocated by task 285:
[   21.276971]  kasan_save_stack+0x3c/0x68
[   21.277080]  kasan_save_track+0x20/0x40
[   21.277244]  kasan_save_alloc_info+0x40/0x58
[   21.277333]  __kasan_kmalloc+0xd4/0xd8
[   21.277434]  __kmalloc_noprof+0x198/0x4c8
[   21.277512]  kunit_kmalloc_array+0x34/0x88
[   21.277623]  copy_user_test_oob+0xac/0xec8
[   21.277690]  kunit_try_run_case+0x170/0x3f0
[   21.277778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.277847]  kthread+0x328/0x630
[   21.277919]  ret_from_fork+0x10/0x20
[   21.278007] 
[   21.278056] The buggy address belongs to the object at fff00000c6398d00
[   21.278056]  which belongs to the cache kmalloc-128 of size 128
[   21.278118] The buggy address is located 0 bytes inside of
[   21.278118]  allocated 120-byte region [fff00000c6398d00, fff00000c6398d78)
[   21.278180] 
[   21.278226] The buggy address belongs to the physical page:
[   21.278262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   21.278398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.278469] page_type: f5(slab)
[   21.278511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.278565] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.278632] page dumped because: kasan: bad access detected
[   21.278777] 
[   21.278821] Memory state around the buggy address:
[   21.278908]  fff00000c6398c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.278984]  fff00000c6398c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279048] >fff00000c6398d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.279111]                                                                 ^
[   21.279189]  fff00000c6398d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279244]  fff00000c6398e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279450] ==================================================================
[   21.294107] ==================================================================
[   21.294169] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.294224] Write of size 121 at addr fff00000c6398d00 by task kunit_try_catch/285
[   21.294302] 
[   21.294338] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.294420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.294449] Hardware name: linux,dummy-virt (DT)
[   21.294480] Call trace:
[   21.294504]  show_stack+0x20/0x38 (C)
[   21.294713]  dump_stack_lvl+0x8c/0xd0
[   21.294824]  print_report+0x118/0x608
[   21.294936]  kasan_report+0xdc/0x128
[   21.295143]  kasan_check_range+0x100/0x1a8
[   21.295318]  __kasan_check_write+0x20/0x30
[   21.295384]  copy_user_test_oob+0x35c/0xec8
[   21.295487]  kunit_try_run_case+0x170/0x3f0
[   21.295574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.295665]  kthread+0x328/0x630
[   21.295748]  ret_from_fork+0x10/0x20
[   21.295886] 
[   21.295955] Allocated by task 285:
[   21.296007]  kasan_save_stack+0x3c/0x68
[   21.296093]  kasan_save_track+0x20/0x40
[   21.296250]  kasan_save_alloc_info+0x40/0x58
[   21.296429]  __kasan_kmalloc+0xd4/0xd8
[   21.296510]  __kmalloc_noprof+0x198/0x4c8
[   21.296622]  kunit_kmalloc_array+0x34/0x88
[   21.296731]  copy_user_test_oob+0xac/0xec8
[   21.296812]  kunit_try_run_case+0x170/0x3f0
[   21.296882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.296966]  kthread+0x328/0x630
[   21.297025]  ret_from_fork+0x10/0x20
[   21.297080] 
[   21.297104] The buggy address belongs to the object at fff00000c6398d00
[   21.297104]  which belongs to the cache kmalloc-128 of size 128
[   21.297161] The buggy address is located 0 bytes inside of
[   21.297161]  allocated 120-byte region [fff00000c6398d00, fff00000c6398d78)
[   21.297248] 
[   21.297274] The buggy address belongs to the physical page:
[   21.297306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   21.297359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.297407] page_type: f5(slab)
[   21.297445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.297615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.297717] page dumped because: kasan: bad access detected
[   21.297806] 
[   21.297837] Memory state around the buggy address:
[   21.297917]  fff00000c6398c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.298250]  fff00000c6398c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298317] >fff00000c6398d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.298452]                                                                 ^
[   21.298558]  fff00000c6398d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298642]  fff00000c6398e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298683] ==================================================================
[   21.302695] ==================================================================
[   21.302738] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.303124] Write of size 121 at addr fff00000c6398d00 by task kunit_try_catch/285
[   21.303220] 
[   21.303279] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.303402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.303436] Hardware name: linux,dummy-virt (DT)
[   21.303467] Call trace:
[   21.303489]  show_stack+0x20/0x38 (C)
[   21.303536]  dump_stack_lvl+0x8c/0xd0
[   21.303585]  print_report+0x118/0x608
[   21.303631]  kasan_report+0xdc/0x128
[   21.303678]  kasan_check_range+0x100/0x1a8
[   21.303726]  __kasan_check_write+0x20/0x30
[   21.303773]  copy_user_test_oob+0x434/0xec8
[   21.303820]  kunit_try_run_case+0x170/0x3f0
[   21.303879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.304087]  kthread+0x328/0x630
[   21.304150]  ret_from_fork+0x10/0x20
[   21.304292] 
[   21.304350] Allocated by task 285:
[   21.304434]  kasan_save_stack+0x3c/0x68
[   21.304671]  kasan_save_track+0x20/0x40
[   21.304757]  kasan_save_alloc_info+0x40/0x58
[   21.305105]  __kasan_kmalloc+0xd4/0xd8
[   21.305147]  __kmalloc_noprof+0x198/0x4c8
[   21.305187]  kunit_kmalloc_array+0x34/0x88
[   21.305225]  copy_user_test_oob+0xac/0xec8
[   21.305265]  kunit_try_run_case+0x170/0x3f0
[   21.305305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.305351]  kthread+0x328/0x630
[   21.305386]  ret_from_fork+0x10/0x20
[   21.305422] 
[   21.305445] The buggy address belongs to the object at fff00000c6398d00
[   21.305445]  which belongs to the cache kmalloc-128 of size 128
[   21.305503] The buggy address is located 0 bytes inside of
[   21.305503]  allocated 120-byte region [fff00000c6398d00, fff00000c6398d78)
[   21.305566] 
[   21.305586] The buggy address belongs to the physical page:
[   21.305618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   21.305669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.305716] page_type: f5(slab)
[   21.305754] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.305804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.305846] page dumped because: kasan: bad access detected
[   21.305957] 
[   21.306024] Memory state around the buggy address:
[   21.306137]  fff00000c6398c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.306183]  fff00000c6398c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.306227] >fff00000c6398d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.306266]                                                                 ^
[   21.306309]  fff00000c6398d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.306363]  fff00000c6398e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.306411] ==================================================================
[   21.306632] ==================================================================
[   21.306707] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.307016] Read of size 121 at addr fff00000c6398d00 by task kunit_try_catch/285
[   21.307124] 
[   21.307232] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.307447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.307480] Hardware name: linux,dummy-virt (DT)
[   21.307511] Call trace:
[   21.307535]  show_stack+0x20/0x38 (C)
[   21.307586]  dump_stack_lvl+0x8c/0xd0
[   21.307635]  print_report+0x118/0x608
[   21.307681]  kasan_report+0xdc/0x128
[   21.307727]  kasan_check_range+0x100/0x1a8
[   21.307776]  __kasan_check_read+0x20/0x30
[   21.307960]  copy_user_test_oob+0x4a0/0xec8
[   21.308112]  kunit_try_run_case+0x170/0x3f0
[   21.308169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.308268]  kthread+0x328/0x630
[   21.308345]  ret_from_fork+0x10/0x20
[   21.308393] 
[   21.308413] Allocated by task 285:
[   21.308443]  kasan_save_stack+0x3c/0x68
[   21.308685]  kasan_save_track+0x20/0x40
[   21.308752]  kasan_save_alloc_info+0x40/0x58
[   21.308872]  __kasan_kmalloc+0xd4/0xd8
[   21.308911]  __kmalloc_noprof+0x198/0x4c8
[   21.309089]  kunit_kmalloc_array+0x34/0x88
[   21.309178]  copy_user_test_oob+0xac/0xec8
[   21.309221]  kunit_try_run_case+0x170/0x3f0
[   21.309346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.309436]  kthread+0x328/0x630
[   21.309513]  ret_from_fork+0x10/0x20
[   21.309569] 
[   21.309590] The buggy address belongs to the object at fff00000c6398d00
[   21.309590]  which belongs to the cache kmalloc-128 of size 128
[   21.309649] The buggy address is located 0 bytes inside of
[   21.309649]  allocated 120-byte region [fff00000c6398d00, fff00000c6398d78)
[   21.309870] 
[   21.309945] The buggy address belongs to the physical page:
[   21.310012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   21.310158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.310254] page_type: f5(slab)
[   21.310381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.310452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.310518] page dumped because: kasan: bad access detected
[   21.310559] 
[   21.310579] Memory state around the buggy address:
[   21.310613]  fff00000c6398c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.310656]  fff00000c6398c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.310710] >fff00000c6398d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.311065]                                                                 ^
[   21.311161]  fff00000c6398d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.311207]  fff00000c6398e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.311247] ==================================================================

[   15.708488] ==================================================================
[   15.708747] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.709907] Read of size 121 at addr ffff8881031c1900 by task kunit_try_catch/304
[   15.710227] 
[   15.710605] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.710655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.710670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.710704] Call Trace:
[   15.710719]  <TASK>
[   15.710737]  dump_stack_lvl+0x73/0xb0
[   15.710792]  print_report+0xd1/0x650
[   15.710819]  ? __virt_addr_valid+0x1db/0x2d0
[   15.710846]  ? copy_user_test_oob+0x604/0x10f0
[   15.710872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.710896]  ? copy_user_test_oob+0x604/0x10f0
[   15.710922]  kasan_report+0x141/0x180
[   15.710946]  ? copy_user_test_oob+0x604/0x10f0
[   15.710976]  kasan_check_range+0x10c/0x1c0
[   15.711000]  __kasan_check_read+0x15/0x20
[   15.711020]  copy_user_test_oob+0x604/0x10f0
[   15.711047]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.711071]  ? finish_task_switch.isra.0+0x153/0x700
[   15.711094]  ? __switch_to+0x47/0xf50
[   15.711120]  ? __schedule+0x10cc/0x2b60
[   15.711143]  ? __pfx_read_tsc+0x10/0x10
[   15.711164]  ? ktime_get_ts64+0x86/0x230
[   15.711189]  kunit_try_run_case+0x1a5/0x480
[   15.711214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.711238]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.711262]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.711287]  ? __kthread_parkme+0x82/0x180
[   15.711308]  ? preempt_count_sub+0x50/0x80
[   15.711332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.711357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.711381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.711406]  kthread+0x337/0x6f0
[   15.711426]  ? trace_preempt_on+0x20/0xc0
[   15.711463]  ? __pfx_kthread+0x10/0x10
[   15.711486]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.711509]  ? calculate_sigpending+0x7b/0xa0
[   15.711535]  ? __pfx_kthread+0x10/0x10
[   15.711558]  ret_from_fork+0x116/0x1d0
[   15.711577]  ? __pfx_kthread+0x10/0x10
[   15.711598]  ret_from_fork_asm+0x1a/0x30
[   15.711630]  </TASK>
[   15.711642] 
[   15.719421] Allocated by task 304:
[   15.719616]  kasan_save_stack+0x45/0x70
[   15.719855]  kasan_save_track+0x18/0x40
[   15.720067]  kasan_save_alloc_info+0x3b/0x50
[   15.720286]  __kasan_kmalloc+0xb7/0xc0
[   15.720505]  __kmalloc_noprof+0x1c9/0x500
[   15.720715]  kunit_kmalloc_array+0x25/0x60
[   15.720935]  copy_user_test_oob+0xab/0x10f0
[   15.721141]  kunit_try_run_case+0x1a5/0x480
[   15.721336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.721571]  kthread+0x337/0x6f0
[   15.721847]  ret_from_fork+0x116/0x1d0
[   15.722033]  ret_from_fork_asm+0x1a/0x30
[   15.722226] 
[   15.722305] The buggy address belongs to the object at ffff8881031c1900
[   15.722305]  which belongs to the cache kmalloc-128 of size 128
[   15.722889] The buggy address is located 0 bytes inside of
[   15.722889]  allocated 120-byte region [ffff8881031c1900, ffff8881031c1978)
[   15.723383] 
[   15.723514] The buggy address belongs to the physical page:
[   15.723881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c1
[   15.724222] flags: 0x200000000000000(node=0|zone=2)
[   15.724442] page_type: f5(slab)
[   15.724614] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.725025] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.725335] page dumped because: kasan: bad access detected
[   15.725609] 
[   15.725720] Memory state around the buggy address:
[   15.725914]  ffff8881031c1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.726136]  ffff8881031c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726356] >ffff8881031c1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.726681]                                                                 ^
[   15.726996]  ffff8881031c1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.727390]  ffff8881031c1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.727626] ==================================================================
[   15.658579] ==================================================================
[   15.659176] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.659428] Read of size 121 at addr ffff8881031c1900 by task kunit_try_catch/304
[   15.660147] 
[   15.660358] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.660406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.660420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.660445] Call Trace:
[   15.660473]  <TASK>
[   15.660491]  dump_stack_lvl+0x73/0xb0
[   15.660520]  print_report+0xd1/0x650
[   15.660566]  ? __virt_addr_valid+0x1db/0x2d0
[   15.660589]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.660614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.660638]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.660663]  kasan_report+0x141/0x180
[   15.660698]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.660728]  kasan_check_range+0x10c/0x1c0
[   15.660753]  __kasan_check_read+0x15/0x20
[   15.660773]  copy_user_test_oob+0x4aa/0x10f0
[   15.660800]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.660824]  ? finish_task_switch.isra.0+0x153/0x700
[   15.660847]  ? __switch_to+0x47/0xf50
[   15.660873]  ? __schedule+0x10cc/0x2b60
[   15.660897]  ? __pfx_read_tsc+0x10/0x10
[   15.660919]  ? ktime_get_ts64+0x86/0x230
[   15.660944]  kunit_try_run_case+0x1a5/0x480
[   15.660970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.660994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.661019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.661044]  ? __kthread_parkme+0x82/0x180
[   15.661066]  ? preempt_count_sub+0x50/0x80
[   15.661090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.661116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.661165]  kthread+0x337/0x6f0
[   15.661185]  ? trace_preempt_on+0x20/0xc0
[   15.661210]  ? __pfx_kthread+0x10/0x10
[   15.661232]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.661254]  ? calculate_sigpending+0x7b/0xa0
[   15.661280]  ? __pfx_kthread+0x10/0x10
[   15.661302]  ret_from_fork+0x116/0x1d0
[   15.661322]  ? __pfx_kthread+0x10/0x10
[   15.661344]  ret_from_fork_asm+0x1a/0x30
[   15.661375]  </TASK>
[   15.661394] 
[   15.674195] Allocated by task 304:
[   15.674438]  kasan_save_stack+0x45/0x70
[   15.674728]  kasan_save_track+0x18/0x40
[   15.675103]  kasan_save_alloc_info+0x3b/0x50
[   15.675405]  __kasan_kmalloc+0xb7/0xc0
[   15.675556]  __kmalloc_noprof+0x1c9/0x500
[   15.675725]  kunit_kmalloc_array+0x25/0x60
[   15.676142]  copy_user_test_oob+0xab/0x10f0
[   15.676565]  kunit_try_run_case+0x1a5/0x480
[   15.676991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.677491]  kthread+0x337/0x6f0
[   15.677848]  ret_from_fork+0x116/0x1d0
[   15.678124]  ret_from_fork_asm+0x1a/0x30
[   15.678269] 
[   15.678344] The buggy address belongs to the object at ffff8881031c1900
[   15.678344]  which belongs to the cache kmalloc-128 of size 128
[   15.678804] The buggy address is located 0 bytes inside of
[   15.678804]  allocated 120-byte region [ffff8881031c1900, ffff8881031c1978)
[   15.679904] 
[   15.680086] The buggy address belongs to the physical page:
[   15.680573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c1
[   15.681259] flags: 0x200000000000000(node=0|zone=2)
[   15.681727] page_type: f5(slab)
[   15.682040] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.682363] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.682607] page dumped because: kasan: bad access detected
[   15.682819] 
[   15.682943] Memory state around the buggy address:
[   15.683173]  ffff8881031c1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.683483]  ffff8881031c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.683826] >ffff8881031c1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.684131]                                                                 ^
[   15.684420]  ffff8881031c1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.684771]  ffff8881031c1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.685060] ==================================================================
[   15.685892] ==================================================================
[   15.686560] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.686966] Write of size 121 at addr ffff8881031c1900 by task kunit_try_catch/304
[   15.687283] 
[   15.687398] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.687473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.687489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.687526] Call Trace:
[   15.687545]  <TASK>
[   15.687562]  dump_stack_lvl+0x73/0xb0
[   15.687591]  print_report+0xd1/0x650
[   15.687615]  ? __virt_addr_valid+0x1db/0x2d0
[   15.687639]  ? copy_user_test_oob+0x557/0x10f0
[   15.687664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.687687]  ? copy_user_test_oob+0x557/0x10f0
[   15.687712]  kasan_report+0x141/0x180
[   15.687735]  ? copy_user_test_oob+0x557/0x10f0
[   15.687775]  kasan_check_range+0x10c/0x1c0
[   15.687800]  __kasan_check_write+0x18/0x20
[   15.687821]  copy_user_test_oob+0x557/0x10f0
[   15.687867]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.687890]  ? finish_task_switch.isra.0+0x153/0x700
[   15.687913]  ? __switch_to+0x47/0xf50
[   15.687940]  ? __schedule+0x10cc/0x2b60
[   15.687963]  ? __pfx_read_tsc+0x10/0x10
[   15.687984]  ? ktime_get_ts64+0x86/0x230
[   15.688008]  kunit_try_run_case+0x1a5/0x480
[   15.688052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.688077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.688101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.688126]  ? __kthread_parkme+0x82/0x180
[   15.688148]  ? preempt_count_sub+0x50/0x80
[   15.688172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.688196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.688220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.688245]  kthread+0x337/0x6f0
[   15.688265]  ? trace_preempt_on+0x20/0xc0
[   15.688290]  ? __pfx_kthread+0x10/0x10
[   15.688312]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.688335]  ? calculate_sigpending+0x7b/0xa0
[   15.688359]  ? __pfx_kthread+0x10/0x10
[   15.688383]  ret_from_fork+0x116/0x1d0
[   15.688401]  ? __pfx_kthread+0x10/0x10
[   15.688423]  ret_from_fork_asm+0x1a/0x30
[   15.688464]  </TASK>
[   15.688476] 
[   15.698955] Allocated by task 304:
[   15.699161]  kasan_save_stack+0x45/0x70
[   15.699350]  kasan_save_track+0x18/0x40
[   15.699541]  kasan_save_alloc_info+0x3b/0x50
[   15.699817]  __kasan_kmalloc+0xb7/0xc0
[   15.699999]  __kmalloc_noprof+0x1c9/0x500
[   15.700204]  kunit_kmalloc_array+0x25/0x60
[   15.700354]  copy_user_test_oob+0xab/0x10f0
[   15.700561]  kunit_try_run_case+0x1a5/0x480
[   15.700769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701006]  kthread+0x337/0x6f0
[   15.701130]  ret_from_fork+0x116/0x1d0
[   15.701264]  ret_from_fork_asm+0x1a/0x30
[   15.701478] 
[   15.701598] The buggy address belongs to the object at ffff8881031c1900
[   15.701598]  which belongs to the cache kmalloc-128 of size 128
[   15.702398] The buggy address is located 0 bytes inside of
[   15.702398]  allocated 120-byte region [ffff8881031c1900, ffff8881031c1978)
[   15.702911] 
[   15.703005] The buggy address belongs to the physical page:
[   15.703250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c1
[   15.703586] flags: 0x200000000000000(node=0|zone=2)
[   15.703878] page_type: f5(slab)
[   15.704056] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.704355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.704710] page dumped because: kasan: bad access detected
[   15.704939] 
[   15.705035] Memory state around the buggy address:
[   15.705270]  ffff8881031c1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.705628]  ffff8881031c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.705953] >ffff8881031c1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.706263]                                                                 ^
[   15.706486]  ffff8881031c1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.707160]  ffff8881031c1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.707474] ==================================================================
[   15.631166] ==================================================================
[   15.631515] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.631931] Write of size 121 at addr ffff8881031c1900 by task kunit_try_catch/304
[   15.632298] 
[   15.632411] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.632467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.632482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.632506] Call Trace:
[   15.632522]  <TASK>
[   15.632538]  dump_stack_lvl+0x73/0xb0
[   15.632569]  print_report+0xd1/0x650
[   15.632593]  ? __virt_addr_valid+0x1db/0x2d0
[   15.632617]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.632642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.632665]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.632726]  kasan_report+0x141/0x180
[   15.632774]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.632833]  kasan_check_range+0x10c/0x1c0
[   15.632859]  __kasan_check_write+0x18/0x20
[   15.632880]  copy_user_test_oob+0x3fd/0x10f0
[   15.632918]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.632942]  ? finish_task_switch.isra.0+0x153/0x700
[   15.632964]  ? __switch_to+0x47/0xf50
[   15.632991]  ? __schedule+0x10cc/0x2b60
[   15.633014]  ? __pfx_read_tsc+0x10/0x10
[   15.633036]  ? ktime_get_ts64+0x86/0x230
[   15.633062]  kunit_try_run_case+0x1a5/0x480
[   15.633088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.633112]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.633137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.633161]  ? __kthread_parkme+0x82/0x180
[   15.633183]  ? preempt_count_sub+0x50/0x80
[   15.633207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.633232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.633256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.633280]  kthread+0x337/0x6f0
[   15.633301]  ? trace_preempt_on+0x20/0xc0
[   15.633326]  ? __pfx_kthread+0x10/0x10
[   15.633348]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.633370]  ? calculate_sigpending+0x7b/0xa0
[   15.633398]  ? __pfx_kthread+0x10/0x10
[   15.633421]  ret_from_fork+0x116/0x1d0
[   15.633441]  ? __pfx_kthread+0x10/0x10
[   15.633471]  ret_from_fork_asm+0x1a/0x30
[   15.633501]  </TASK>
[   15.633514] 
[   15.641546] Allocated by task 304:
[   15.641742]  kasan_save_stack+0x45/0x70
[   15.641995]  kasan_save_track+0x18/0x40
[   15.642233]  kasan_save_alloc_info+0x3b/0x50
[   15.642471]  __kasan_kmalloc+0xb7/0xc0
[   15.642703]  __kmalloc_noprof+0x1c9/0x500
[   15.642851]  kunit_kmalloc_array+0x25/0x60
[   15.642997]  copy_user_test_oob+0xab/0x10f0
[   15.643627]  kunit_try_run_case+0x1a5/0x480
[   15.643857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.644119]  kthread+0x337/0x6f0
[   15.644296]  ret_from_fork+0x116/0x1d0
[   15.645780]  ret_from_fork_asm+0x1a/0x30
[   15.646111] 
[   15.646201] The buggy address belongs to the object at ffff8881031c1900
[   15.646201]  which belongs to the cache kmalloc-128 of size 128
[   15.646585] The buggy address is located 0 bytes inside of
[   15.646585]  allocated 120-byte region [ffff8881031c1900, ffff8881031c1978)
[   15.646957] 
[   15.647034] The buggy address belongs to the physical page:
[   15.647211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c1
[   15.648657] flags: 0x200000000000000(node=0|zone=2)
[   15.649263] page_type: f5(slab)
[   15.649994] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.651012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.652066] page dumped because: kasan: bad access detected
[   15.652814] 
[   15.652991] Memory state around the buggy address:
[   15.653655]  ffff8881031c1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.654575]  ffff8881031c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.655507] >ffff8881031c1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.656262]                                                                 ^
[   15.656503]  ffff8881031c1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.656891]  ffff8881031c1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.657515] ==================================================================