Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.558701] ==================================================================
[   22.558769] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   22.558819] Write of size 121 at addr fff00000c5713f00 by task kunit_try_catch/285
[   22.559276] 
[   22.559329] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.559737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.560006] Hardware name: linux,dummy-virt (DT)
[   22.560235] Call trace:
[   22.560361]  show_stack+0x20/0x38 (C)
[   22.560467]  dump_stack_lvl+0x8c/0xd0
[   22.560517]  print_report+0x118/0x608
[   22.560565]  kasan_report+0xdc/0x128
[   22.560611]  kasan_check_range+0x100/0x1a8
[   22.560658]  __kasan_check_write+0x20/0x30
[   22.560703]  copy_user_test_oob+0x434/0xec8
[   22.560771]  kunit_try_run_case+0x170/0x3f0
[   22.560835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.560887]  kthread+0x328/0x630
[   22.560938]  ret_from_fork+0x10/0x20
[   22.561001] 
[   22.561030] Allocated by task 285:
[   22.561069]  kasan_save_stack+0x3c/0x68
[   22.561117]  kasan_save_track+0x20/0x40
[   22.561158]  kasan_save_alloc_info+0x40/0x58
[   22.561200]  __kasan_kmalloc+0xd4/0xd8
[   22.561247]  __kmalloc_noprof+0x198/0x4c8
[   22.561295]  kunit_kmalloc_array+0x34/0x88
[   22.561333]  copy_user_test_oob+0xac/0xec8
[   22.561374]  kunit_try_run_case+0x170/0x3f0
[   22.561422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.561467]  kthread+0x328/0x630
[   22.561510]  ret_from_fork+0x10/0x20
[   22.561546] 
[   22.561567] The buggy address belongs to the object at fff00000c5713f00
[   22.561567]  which belongs to the cache kmalloc-128 of size 128
[   22.561627] The buggy address is located 0 bytes inside of
[   22.561627]  allocated 120-byte region [fff00000c5713f00, fff00000c5713f78)
[   22.561692] 
[   22.561733] The buggy address belongs to the physical page:
[   22.561765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713
[   22.561826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.561876] page_type: f5(slab)
[   22.561925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.561986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.562043] page dumped because: kasan: bad access detected
[   22.562090] 
[   22.562112] Memory state around the buggy address:
[   22.562154]  fff00000c5713e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.562198]  fff00000c5713e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.562254] >fff00000c5713f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.562295]                                                                 ^
[   22.562337]  fff00000c5713f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.562388]  fff00000c5714000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.562430] ==================================================================
[   22.541833] ==================================================================
[   22.541915] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   22.542061] Write of size 121 at addr fff00000c5713f00 by task kunit_try_catch/285
[   22.542147] 
[   22.542182] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.542272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.542301] Hardware name: linux,dummy-virt (DT)
[   22.542400] Call trace:
[   22.542462]  show_stack+0x20/0x38 (C)
[   22.542516]  dump_stack_lvl+0x8c/0xd0
[   22.542993]  print_report+0x118/0x608
[   22.543061]  kasan_report+0xdc/0x128
[   22.543149]  kasan_check_range+0x100/0x1a8
[   22.543202]  __kasan_check_write+0x20/0x30
[   22.543247]  copy_user_test_oob+0x35c/0xec8
[   22.543674]  kunit_try_run_case+0x170/0x3f0
[   22.543941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.544219]  kthread+0x328/0x630
[   22.544377]  ret_from_fork+0x10/0x20
[   22.544431] 
[   22.544452] Allocated by task 285:
[   22.544502]  kasan_save_stack+0x3c/0x68
[   22.544554]  kasan_save_track+0x20/0x40
[   22.544594]  kasan_save_alloc_info+0x40/0x58
[   22.544634]  __kasan_kmalloc+0xd4/0xd8
[   22.544681]  __kmalloc_noprof+0x198/0x4c8
[   22.544748]  kunit_kmalloc_array+0x34/0x88
[   22.544806]  copy_user_test_oob+0xac/0xec8
[   22.544860]  kunit_try_run_case+0x170/0x3f0
[   22.544898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.544945]  kthread+0x328/0x630
[   22.544978]  ret_from_fork+0x10/0x20
[   22.545015] 
[   22.545044] The buggy address belongs to the object at fff00000c5713f00
[   22.545044]  which belongs to the cache kmalloc-128 of size 128
[   22.545119] The buggy address is located 0 bytes inside of
[   22.545119]  allocated 120-byte region [fff00000c5713f00, fff00000c5713f78)
[   22.545200] 
[   22.545236] The buggy address belongs to the physical page:
[   22.545279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713
[   22.545332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.545389] page_type: f5(slab)
[   22.545430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.545481] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.545523] page dumped because: kasan: bad access detected
[   22.545567] 
[   22.545603] Memory state around the buggy address:
[   22.545638]  fff00000c5713e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.545683]  fff00000c5713e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.546107] >fff00000c5713f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.546544]                                                                 ^
[   22.546614]  fff00000c5713f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.546679]  fff00000c5714000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.546755] ==================================================================
[   22.525878] ==================================================================
[   22.525948] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   22.526001] Read of size 121 at addr fff00000c5713f00 by task kunit_try_catch/285
[   22.526085] 
[   22.526367] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.526551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.526585] Hardware name: linux,dummy-virt (DT)
[   22.526645] Call trace:
[   22.526753]  show_stack+0x20/0x38 (C)
[   22.526826]  dump_stack_lvl+0x8c/0xd0
[   22.526914]  print_report+0x118/0x608
[   22.526960]  kasan_report+0xdc/0x128
[   22.527312]  kasan_check_range+0x100/0x1a8
[   22.527381]  __kasan_check_read+0x20/0x30
[   22.527425]  copy_user_test_oob+0x728/0xec8
[   22.527693]  kunit_try_run_case+0x170/0x3f0
[   22.527822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.527972]  kthread+0x328/0x630
[   22.528322]  ret_from_fork+0x10/0x20
[   22.528549] 
[   22.528595] Allocated by task 285:
[   22.528664]  kasan_save_stack+0x3c/0x68
[   22.528808]  kasan_save_track+0x20/0x40
[   22.528850]  kasan_save_alloc_info+0x40/0x58
[   22.529130]  __kasan_kmalloc+0xd4/0xd8
[   22.529744]  __kmalloc_noprof+0x198/0x4c8
[   22.530154]  kunit_kmalloc_array+0x34/0x88
[   22.530375]  copy_user_test_oob+0xac/0xec8
[   22.530420]  kunit_try_run_case+0x170/0x3f0
[   22.530462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.530507]  kthread+0x328/0x630
[   22.530540]  ret_from_fork+0x10/0x20
[   22.530576] 
[   22.530600] The buggy address belongs to the object at fff00000c5713f00
[   22.530600]  which belongs to the cache kmalloc-128 of size 128
[   22.530661] The buggy address is located 0 bytes inside of
[   22.530661]  allocated 120-byte region [fff00000c5713f00, fff00000c5713f78)
[   22.530900] 
[   22.530930] The buggy address belongs to the physical page:
[   22.530970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713
[   22.531033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.531082] page_type: f5(slab)
[   22.531123] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.531175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.531217] page dumped because: kasan: bad access detected
[   22.531256] 
[   22.531297] Memory state around the buggy address:
[   22.531331]  fff00000c5713e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.531376]  fff00000c5713e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.531420] >fff00000c5713f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.531837]                                                                 ^
[   22.532049]  fff00000c5713f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.532124]  fff00000c5714000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.532406] ==================================================================
[   22.563201] ==================================================================
[   22.563254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   22.563747] Read of size 121 at addr fff00000c5713f00 by task kunit_try_catch/285
[   22.563848] 
[   22.563912] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.564227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.564303] Hardware name: linux,dummy-virt (DT)
[   22.564469] Call trace:
[   22.564647]  show_stack+0x20/0x38 (C)
[   22.565079]  dump_stack_lvl+0x8c/0xd0
[   22.565204]  print_report+0x118/0x608
[   22.565385]  kasan_report+0xdc/0x128
[   22.565439]  kasan_check_range+0x100/0x1a8
[   22.565702]  __kasan_check_read+0x20/0x30
[   22.566101]  copy_user_test_oob+0x4a0/0xec8
[   22.566321]  kunit_try_run_case+0x170/0x3f0
[   22.566547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.566845]  kthread+0x328/0x630
[   22.567219]  ret_from_fork+0x10/0x20
[   22.567442] 
[   22.567513] Allocated by task 285:
[   22.567603]  kasan_save_stack+0x3c/0x68
[   22.567668]  kasan_save_track+0x20/0x40
[   22.567706]  kasan_save_alloc_info+0x40/0x58
[   22.567761]  __kasan_kmalloc+0xd4/0xd8
[   22.567798]  __kmalloc_noprof+0x198/0x4c8
[   22.568005]  kunit_kmalloc_array+0x34/0x88
[   22.568281]  copy_user_test_oob+0xac/0xec8
[   22.568509]  kunit_try_run_case+0x170/0x3f0
[   22.568652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.568745]  kthread+0x328/0x630
[   22.568967]  ret_from_fork+0x10/0x20
[   22.569207] 
[   22.569249] The buggy address belongs to the object at fff00000c5713f00
[   22.569249]  which belongs to the cache kmalloc-128 of size 128
[   22.569768] The buggy address is located 0 bytes inside of
[   22.569768]  allocated 120-byte region [fff00000c5713f00, fff00000c5713f78)
[   22.569927] 
[   22.570089] The buggy address belongs to the physical page:
[   22.570175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713
[   22.570258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.570370] page_type: f5(slab)
[   22.570410] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.570743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.571263] page dumped because: kasan: bad access detected
[   22.571694] 
[   22.571749] Memory state around the buggy address:
[   22.571825]  fff00000c5713e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.571909]  fff00000c5713e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.572085] >fff00000c5713f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.572284]                                                                 ^
[   22.572898]  fff00000c5713f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.573046]  fff00000c5714000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.573258] ==================================================================
[   22.513305] ==================================================================
[   22.513872] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   22.514015] Write of size 121 at addr fff00000c5713f00 by task kunit_try_catch/285
[   22.514071] 
[   22.514538] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.514920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.514967] Hardware name: linux,dummy-virt (DT)
[   22.515032] Call trace:
[   22.515060]  show_stack+0x20/0x38 (C)
[   22.515209]  dump_stack_lvl+0x8c/0xd0
[   22.515265]  print_report+0x118/0x608
[   22.515325]  kasan_report+0xdc/0x128
[   22.515370]  kasan_check_range+0x100/0x1a8
[   22.515418]  __kasan_check_write+0x20/0x30
[   22.515464]  copy_user_test_oob+0x234/0xec8
[   22.515676]  kunit_try_run_case+0x170/0x3f0
[   22.515932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.516022]  kthread+0x328/0x630
[   22.516176]  ret_from_fork+0x10/0x20
[   22.516250] 
[   22.516271] Allocated by task 285:
[   22.516569]  kasan_save_stack+0x3c/0x68
[   22.516793]  kasan_save_track+0x20/0x40
[   22.516965]  kasan_save_alloc_info+0x40/0x58
[   22.517256]  __kasan_kmalloc+0xd4/0xd8
[   22.517374]  __kmalloc_noprof+0x198/0x4c8
[   22.517424]  kunit_kmalloc_array+0x34/0x88
[   22.517488]  copy_user_test_oob+0xac/0xec8
[   22.517814]  kunit_try_run_case+0x170/0x3f0
[   22.517888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.518178]  kthread+0x328/0x630
[   22.518362]  ret_from_fork+0x10/0x20
[   22.518472] 
[   22.518501] The buggy address belongs to the object at fff00000c5713f00
[   22.518501]  which belongs to the cache kmalloc-128 of size 128
[   22.518584] The buggy address is located 0 bytes inside of
[   22.518584]  allocated 120-byte region [fff00000c5713f00, fff00000c5713f78)
[   22.518649] 
[   22.518698] The buggy address belongs to the physical page:
[   22.518766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713
[   22.518825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.518876] page_type: f5(slab)
[   22.518941] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.519008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.519050] page dumped because: kasan: bad access detected
[   22.519084] 
[   22.519104] Memory state around the buggy address:
[   22.519152]  fff00000c5713e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.519197]  fff00000c5713e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.519250] >fff00000c5713f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.519298]                                                                 ^
[   22.519341]  fff00000c5713f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.519384]  fff00000c5714000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.519434] ==================================================================
[   22.548559] ==================================================================
[   22.548935] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   22.549006] Read of size 121 at addr fff00000c5713f00 by task kunit_try_catch/285
[   22.549059] 
[   22.549092] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.549203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.549250] Hardware name: linux,dummy-virt (DT)
[   22.549287] Call trace:
[   22.549316]  show_stack+0x20/0x38 (C)
[   22.549642]  dump_stack_lvl+0x8c/0xd0
[   22.549863]  print_report+0x118/0x608
[   22.549913]  kasan_report+0xdc/0x128
[   22.550314]  kasan_check_range+0x100/0x1a8
[   22.550394]  __kasan_check_read+0x20/0x30
[   22.550440]  copy_user_test_oob+0x3c8/0xec8
[   22.550735]  kunit_try_run_case+0x170/0x3f0
[   22.550814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.550870]  kthread+0x328/0x630
[   22.551002]  ret_from_fork+0x10/0x20
[   22.551324] 
[   22.551383] Allocated by task 285:
[   22.551418]  kasan_save_stack+0x3c/0x68
[   22.551580]  kasan_save_track+0x20/0x40
[   22.551685]  kasan_save_alloc_info+0x40/0x58
[   22.552116]  __kasan_kmalloc+0xd4/0xd8
[   22.552232]  __kmalloc_noprof+0x198/0x4c8
[   22.552343]  kunit_kmalloc_array+0x34/0x88
[   22.552385]  copy_user_test_oob+0xac/0xec8
[   22.552675]  kunit_try_run_case+0x170/0x3f0
[   22.552807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.552917]  kthread+0x328/0x630
[   22.553318]  ret_from_fork+0x10/0x20
[   22.553497] 
[   22.553636] The buggy address belongs to the object at fff00000c5713f00
[   22.553636]  which belongs to the cache kmalloc-128 of size 128
[   22.553751] The buggy address is located 0 bytes inside of
[   22.553751]  allocated 120-byte region [fff00000c5713f00, fff00000c5713f78)
[   22.553978] 
[   22.554041] The buggy address belongs to the physical page:
[   22.554166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713
[   22.554256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.554622] page_type: f5(slab)
[   22.554945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.555269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.555352] page dumped because: kasan: bad access detected
[   22.555733] 
[   22.555978] Memory state around the buggy address:
[   22.556034]  fff00000c5713e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.556089]  fff00000c5713e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.556503] >fff00000c5713f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.556669]                                                                 ^
[   22.556921]  fff00000c5713f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.556989]  fff00000c5714000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.557030] ==================================================================

[   17.311468] ==================================================================
[   17.311801] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   17.312249] Write of size 121 at addr ffff888102629100 by task kunit_try_catch/302
[   17.312986] 
[   17.313161] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.313210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.313225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.313248] Call Trace:
[   17.313262]  <TASK>
[   17.313277]  dump_stack_lvl+0x73/0xb0
[   17.313471]  print_report+0xd1/0x650
[   17.313506]  ? __virt_addr_valid+0x1db/0x2d0
[   17.313530]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.313558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.313586]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.313610]  kasan_report+0x141/0x180
[   17.313632]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.313661]  kasan_check_range+0x10c/0x1c0
[   17.313685]  __kasan_check_write+0x18/0x20
[   17.313705]  copy_user_test_oob+0x3fd/0x10f0
[   17.313731]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.313755]  ? finish_task_switch.isra.0+0x153/0x700
[   17.313778]  ? __switch_to+0x47/0xf50
[   17.313804]  ? __schedule+0x10cc/0x2b60
[   17.313830]  ? __pfx_read_tsc+0x10/0x10
[   17.313852]  ? ktime_get_ts64+0x86/0x230
[   17.313877]  kunit_try_run_case+0x1a5/0x480
[   17.313902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.313926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.313950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.313974]  ? __kthread_parkme+0x82/0x180
[   17.313996]  ? preempt_count_sub+0x50/0x80
[   17.314021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.314057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.314083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.314107]  kthread+0x337/0x6f0
[   17.314127]  ? trace_preempt_on+0x20/0xc0
[   17.314151]  ? __pfx_kthread+0x10/0x10
[   17.314172]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.314194]  ? calculate_sigpending+0x7b/0xa0
[   17.314218]  ? __pfx_kthread+0x10/0x10
[   17.314241]  ret_from_fork+0x116/0x1d0
[   17.314260]  ? __pfx_kthread+0x10/0x10
[   17.314282]  ret_from_fork_asm+0x1a/0x30
[   17.314314]  </TASK>
[   17.314327] 
[   17.325101] Allocated by task 302:
[   17.325527]  kasan_save_stack+0x45/0x70
[   17.325734]  kasan_save_track+0x18/0x40
[   17.325910]  kasan_save_alloc_info+0x3b/0x50
[   17.326139]  __kasan_kmalloc+0xb7/0xc0
[   17.326336]  __kmalloc_noprof+0x1c9/0x500
[   17.326529]  kunit_kmalloc_array+0x25/0x60
[   17.326934]  copy_user_test_oob+0xab/0x10f0
[   17.327148]  kunit_try_run_case+0x1a5/0x480
[   17.327350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.327947]  kthread+0x337/0x6f0
[   17.328112]  ret_from_fork+0x116/0x1d0
[   17.328486]  ret_from_fork_asm+0x1a/0x30
[   17.328864] 
[   17.328969] The buggy address belongs to the object at ffff888102629100
[   17.328969]  which belongs to the cache kmalloc-128 of size 128
[   17.329491] The buggy address is located 0 bytes inside of
[   17.329491]  allocated 120-byte region [ffff888102629100, ffff888102629178)
[   17.329993] 
[   17.330091] The buggy address belongs to the physical page:
[   17.330343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102629
[   17.331130] flags: 0x200000000000000(node=0|zone=2)
[   17.331334] page_type: f5(slab)
[   17.331865] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.332377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.332879] page dumped because: kasan: bad access detected
[   17.333251] 
[   17.333339] Memory state around the buggy address:
[   17.333509]  ffff888102629000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.333739]  ffff888102629080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.333956] >ffff888102629100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.334211]                                                                 ^
[   17.334429]  ffff888102629180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.335008]  ffff888102629200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.335650] ==================================================================
[   17.399386] ==================================================================
[   17.400168] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   17.401025] Read of size 121 at addr ffff888102629100 by task kunit_try_catch/302
[   17.401774] 
[   17.401973] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.402022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.402036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.402069] Call Trace:
[   17.402084]  <TASK>
[   17.402101]  dump_stack_lvl+0x73/0xb0
[   17.402187]  print_report+0xd1/0x650
[   17.402222]  ? __virt_addr_valid+0x1db/0x2d0
[   17.402246]  ? copy_user_test_oob+0x604/0x10f0
[   17.402270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.402297]  ? copy_user_test_oob+0x604/0x10f0
[   17.402321]  kasan_report+0x141/0x180
[   17.402344]  ? copy_user_test_oob+0x604/0x10f0
[   17.402373]  kasan_check_range+0x10c/0x1c0
[   17.402397]  __kasan_check_read+0x15/0x20
[   17.402417]  copy_user_test_oob+0x604/0x10f0
[   17.402442]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.402465]  ? finish_task_switch.isra.0+0x153/0x700
[   17.402488]  ? __switch_to+0x47/0xf50
[   17.402526]  ? __schedule+0x10cc/0x2b60
[   17.402549]  ? __pfx_read_tsc+0x10/0x10
[   17.402571]  ? ktime_get_ts64+0x86/0x230
[   17.402596]  kunit_try_run_case+0x1a5/0x480
[   17.402622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.402645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.402670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.402693]  ? __kthread_parkme+0x82/0x180
[   17.402715]  ? preempt_count_sub+0x50/0x80
[   17.402739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.402765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.402788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.402812]  kthread+0x337/0x6f0
[   17.402833]  ? trace_preempt_on+0x20/0xc0
[   17.402857]  ? __pfx_kthread+0x10/0x10
[   17.402878]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.402900]  ? calculate_sigpending+0x7b/0xa0
[   17.402925]  ? __pfx_kthread+0x10/0x10
[   17.402947]  ret_from_fork+0x116/0x1d0
[   17.402967]  ? __pfx_kthread+0x10/0x10
[   17.402988]  ret_from_fork_asm+0x1a/0x30
[   17.403020]  </TASK>
[   17.403033] 
[   17.414844] Allocated by task 302:
[   17.414980]  kasan_save_stack+0x45/0x70
[   17.415130]  kasan_save_track+0x18/0x40
[   17.415265]  kasan_save_alloc_info+0x3b/0x50
[   17.415410]  __kasan_kmalloc+0xb7/0xc0
[   17.415602]  __kmalloc_noprof+0x1c9/0x500
[   17.415975]  kunit_kmalloc_array+0x25/0x60
[   17.416358]  copy_user_test_oob+0xab/0x10f0
[   17.416821]  kunit_try_run_case+0x1a5/0x480
[   17.417225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.417728]  kthread+0x337/0x6f0
[   17.418104]  ret_from_fork+0x116/0x1d0
[   17.418468]  ret_from_fork_asm+0x1a/0x30
[   17.418849] 
[   17.419033] The buggy address belongs to the object at ffff888102629100
[   17.419033]  which belongs to the cache kmalloc-128 of size 128
[   17.420130] The buggy address is located 0 bytes inside of
[   17.420130]  allocated 120-byte region [ffff888102629100, ffff888102629178)
[   17.420479] 
[   17.420620] The buggy address belongs to the physical page:
[   17.421136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102629
[   17.421876] flags: 0x200000000000000(node=0|zone=2)
[   17.422338] page_type: f5(slab)
[   17.422644] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.423106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.423330] page dumped because: kasan: bad access detected
[   17.423499] 
[   17.423680] Memory state around the buggy address:
[   17.424141]  ffff888102629000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.424779]  ffff888102629080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.425412] >ffff888102629100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.426051]                                                                 ^
[   17.426486]  ffff888102629180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.426708]  ffff888102629200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.426921] ==================================================================
[   17.367074] ==================================================================
[   17.368155] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   17.369149] Write of size 121 at addr ffff888102629100 by task kunit_try_catch/302
[   17.370221] 
[   17.370450] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.370497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.370510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.370533] Call Trace:
[   17.370717]  <TASK>
[   17.370737]  dump_stack_lvl+0x73/0xb0
[   17.370767]  print_report+0xd1/0x650
[   17.370790]  ? __virt_addr_valid+0x1db/0x2d0
[   17.370814]  ? copy_user_test_oob+0x557/0x10f0
[   17.370839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.370867]  ? copy_user_test_oob+0x557/0x10f0
[   17.370893]  kasan_report+0x141/0x180
[   17.370916]  ? copy_user_test_oob+0x557/0x10f0
[   17.370946]  kasan_check_range+0x10c/0x1c0
[   17.370970]  __kasan_check_write+0x18/0x20
[   17.370990]  copy_user_test_oob+0x557/0x10f0
[   17.371016]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.371039]  ? finish_task_switch.isra.0+0x153/0x700
[   17.371073]  ? __switch_to+0x47/0xf50
[   17.371101]  ? __schedule+0x10cc/0x2b60
[   17.371123]  ? __pfx_read_tsc+0x10/0x10
[   17.371144]  ? ktime_get_ts64+0x86/0x230
[   17.371168]  kunit_try_run_case+0x1a5/0x480
[   17.371193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.371216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.371240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.371263]  ? __kthread_parkme+0x82/0x180
[   17.371285]  ? preempt_count_sub+0x50/0x80
[   17.371309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.371333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.371357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.371380]  kthread+0x337/0x6f0
[   17.371401]  ? trace_preempt_on+0x20/0xc0
[   17.371425]  ? __pfx_kthread+0x10/0x10
[   17.371446]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.371468]  ? calculate_sigpending+0x7b/0xa0
[   17.371492]  ? __pfx_kthread+0x10/0x10
[   17.371514]  ret_from_fork+0x116/0x1d0
[   17.371534]  ? __pfx_kthread+0x10/0x10
[   17.371554]  ret_from_fork_asm+0x1a/0x30
[   17.371586]  </TASK>
[   17.371597] 
[   17.385748] Allocated by task 302:
[   17.386465]  kasan_save_stack+0x45/0x70
[   17.386884]  kasan_save_track+0x18/0x40
[   17.387267]  kasan_save_alloc_info+0x3b/0x50
[   17.387772]  __kasan_kmalloc+0xb7/0xc0
[   17.388168]  __kmalloc_noprof+0x1c9/0x500
[   17.388572]  kunit_kmalloc_array+0x25/0x60
[   17.388972]  copy_user_test_oob+0xab/0x10f0
[   17.389246]  kunit_try_run_case+0x1a5/0x480
[   17.389399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.389599]  kthread+0x337/0x6f0
[   17.389981]  ret_from_fork+0x116/0x1d0
[   17.390152]  ret_from_fork_asm+0x1a/0x30
[   17.390294] 
[   17.390370] The buggy address belongs to the object at ffff888102629100
[   17.390370]  which belongs to the cache kmalloc-128 of size 128
[   17.391244] The buggy address is located 0 bytes inside of
[   17.391244]  allocated 120-byte region [ffff888102629100, ffff888102629178)
[   17.392364] 
[   17.392565] The buggy address belongs to the physical page:
[   17.392773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102629
[   17.393020] flags: 0x200000000000000(node=0|zone=2)
[   17.393197] page_type: f5(slab)
[   17.393322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.393665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.394344] page dumped because: kasan: bad access detected
[   17.394877] 
[   17.395035] Memory state around the buggy address:
[   17.395525]  ffff888102629000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.396164]  ffff888102629080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.396956] >ffff888102629100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.397532]                                                                 ^
[   17.397998]  ffff888102629180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.398231]  ffff888102629200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.398448] ==================================================================
[   17.336587] ==================================================================
[   17.337079] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   17.337662] Read of size 121 at addr ffff888102629100 by task kunit_try_catch/302
[   17.338181] 
[   17.338373] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.338417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.338431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.338452] Call Trace:
[   17.338466]  <TASK>
[   17.338481]  dump_stack_lvl+0x73/0xb0
[   17.338534]  print_report+0xd1/0x650
[   17.338577]  ? __virt_addr_valid+0x1db/0x2d0
[   17.338599]  ? copy_user_test_oob+0x4aa/0x10f0
[   17.338622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.338649]  ? copy_user_test_oob+0x4aa/0x10f0
[   17.338673]  kasan_report+0x141/0x180
[   17.338696]  ? copy_user_test_oob+0x4aa/0x10f0
[   17.338724]  kasan_check_range+0x10c/0x1c0
[   17.338749]  __kasan_check_read+0x15/0x20
[   17.338769]  copy_user_test_oob+0x4aa/0x10f0
[   17.338795]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.338817]  ? finish_task_switch.isra.0+0x153/0x700
[   17.338840]  ? __switch_to+0x47/0xf50
[   17.338865]  ? __schedule+0x10cc/0x2b60
[   17.338887]  ? __pfx_read_tsc+0x10/0x10
[   17.338908]  ? ktime_get_ts64+0x86/0x230
[   17.338932]  kunit_try_run_case+0x1a5/0x480
[   17.338957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.338979]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.339002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.339026]  ? __kthread_parkme+0x82/0x180
[   17.339056]  ? preempt_count_sub+0x50/0x80
[   17.339081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.339106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.339129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.339153]  kthread+0x337/0x6f0
[   17.339173]  ? trace_preempt_on+0x20/0xc0
[   17.339197]  ? __pfx_kthread+0x10/0x10
[   17.339217]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.339239]  ? calculate_sigpending+0x7b/0xa0
[   17.339264]  ? __pfx_kthread+0x10/0x10
[   17.339286]  ret_from_fork+0x116/0x1d0
[   17.339305]  ? __pfx_kthread+0x10/0x10
[   17.339326]  ret_from_fork_asm+0x1a/0x30
[   17.339357]  </TASK>
[   17.339368] 
[   17.350472] Allocated by task 302:
[   17.350917]  kasan_save_stack+0x45/0x70
[   17.351281]  kasan_save_track+0x18/0x40
[   17.351664]  kasan_save_alloc_info+0x3b/0x50
[   17.352073]  __kasan_kmalloc+0xb7/0xc0
[   17.352417]  __kmalloc_noprof+0x1c9/0x500
[   17.352750]  kunit_kmalloc_array+0x25/0x60
[   17.352952]  copy_user_test_oob+0xab/0x10f0
[   17.353148]  kunit_try_run_case+0x1a5/0x480
[   17.353319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.354364]  kthread+0x337/0x6f0
[   17.354829]  ret_from_fork+0x116/0x1d0
[   17.355592]  ret_from_fork_asm+0x1a/0x30
[   17.356333] 
[   17.356698] The buggy address belongs to the object at ffff888102629100
[   17.356698]  which belongs to the cache kmalloc-128 of size 128
[   17.358509] The buggy address is located 0 bytes inside of
[   17.358509]  allocated 120-byte region [ffff888102629100, ffff888102629178)
[   17.359841] 
[   17.359927] The buggy address belongs to the physical page:
[   17.360125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102629
[   17.360372] flags: 0x200000000000000(node=0|zone=2)
[   17.360557] page_type: f5(slab)
[   17.360899] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.362020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.362872] page dumped because: kasan: bad access detected
[   17.363496] 
[   17.363674] Memory state around the buggy address:
[   17.364318]  ffff888102629000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.364812]  ffff888102629080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365056] >ffff888102629100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.365277]                                                                 ^
[   17.365494]  ffff888102629180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365721]  ffff888102629200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365940] ==================================================================