Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.945472] ==================================================================
[   19.945593] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.945673] Write of size 121 at addr fff00000c5a57c00 by task kunit_try_catch/285
[   19.945727] 
[   19.945770] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.945858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.945888] Hardware name: linux,dummy-virt (DT)
[   19.945962] Call trace:
[   19.945989]  show_stack+0x20/0x38 (C)
[   19.946403]  dump_stack_lvl+0x8c/0xd0
[   19.946497]  print_report+0x118/0x608
[   19.946548]  kasan_report+0xdc/0x128
[   19.946597]  kasan_check_range+0x100/0x1a8
[   19.946772]  __kasan_check_write+0x20/0x30
[   19.946906]  copy_user_test_oob+0x234/0xec8
[   19.946979]  kunit_try_run_case+0x170/0x3f0
[   19.947099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.947175]  kthread+0x328/0x630
[   19.947236]  ret_from_fork+0x10/0x20
[   19.947394] 
[   19.947489] Allocated by task 285:
[   19.947550]  kasan_save_stack+0x3c/0x68
[   19.947597]  kasan_save_track+0x20/0x40
[   19.947675]  kasan_save_alloc_info+0x40/0x58
[   19.947739]  __kasan_kmalloc+0xd4/0xd8
[   19.947779]  __kmalloc_noprof+0x198/0x4c8
[   19.947822]  kunit_kmalloc_array+0x34/0x88
[   19.948082]  copy_user_test_oob+0xac/0xec8
[   19.948171]  kunit_try_run_case+0x170/0x3f0
[   19.948286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.948576]  kthread+0x328/0x630
[   19.948665]  ret_from_fork+0x10/0x20
[   19.948776] 
[   19.948811] The buggy address belongs to the object at fff00000c5a57c00
[   19.948811]  which belongs to the cache kmalloc-128 of size 128
[   19.948966] The buggy address is located 0 bytes inside of
[   19.948966]  allocated 120-byte region [fff00000c5a57c00, fff00000c5a57c78)
[   19.949164] 
[   19.949254] The buggy address belongs to the physical page:
[   19.949329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   19.949451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.949541] page_type: f5(slab)
[   19.949583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.949636] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.949677] page dumped because: kasan: bad access detected
[   19.949712] 
[   19.949734] Memory state around the buggy address:
[   19.950071]  fff00000c5a57b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.950224]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.950330] >fff00000c5a57c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.950686]                                                                 ^
[   19.950883]  fff00000c5a57c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.950928]  fff00000c5a57d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.950970] ==================================================================
[   20.001182] ==================================================================
[   20.001237] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.001294] Read of size 121 at addr fff00000c5a57c00 by task kunit_try_catch/285
[   20.002029] 
[   20.002224] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.002631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.003069] Hardware name: linux,dummy-virt (DT)
[   20.003120] Call trace:
[   20.003444]  show_stack+0x20/0x38 (C)
[   20.003551]  dump_stack_lvl+0x8c/0xd0
[   20.003760]  print_report+0x118/0x608
[   20.003816]  kasan_report+0xdc/0x128
[   20.003888]  kasan_check_range+0x100/0x1a8
[   20.004225]  __kasan_check_read+0x20/0x30
[   20.004567]  copy_user_test_oob+0x4a0/0xec8
[   20.004958]  kunit_try_run_case+0x170/0x3f0
[   20.005036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.005103]  kthread+0x328/0x630
[   20.005149]  ret_from_fork+0x10/0x20
[   20.005210] 
[   20.005241] Allocated by task 285:
[   20.005274]  kasan_save_stack+0x3c/0x68
[   20.005331]  kasan_save_track+0x20/0x40
[   20.005406]  kasan_save_alloc_info+0x40/0x58
[   20.005469]  __kasan_kmalloc+0xd4/0xd8
[   20.005523]  __kmalloc_noprof+0x198/0x4c8
[   20.005565]  kunit_kmalloc_array+0x34/0x88
[   20.005620]  copy_user_test_oob+0xac/0xec8
[   20.005662]  kunit_try_run_case+0x170/0x3f0
[   20.005702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.005749]  kthread+0x328/0x630
[   20.005786]  ret_from_fork+0x10/0x20
[   20.005823] 
[   20.005854] The buggy address belongs to the object at fff00000c5a57c00
[   20.005854]  which belongs to the cache kmalloc-128 of size 128
[   20.006529] The buggy address is located 0 bytes inside of
[   20.006529]  allocated 120-byte region [fff00000c5a57c00, fff00000c5a57c78)
[   20.006623] 
[   20.006679] The buggy address belongs to the physical page:
[   20.006873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   20.007188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.007414] page_type: f5(slab)
[   20.007463] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.007671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.007978] page dumped because: kasan: bad access detected
[   20.008155] 
[   20.008179] Memory state around the buggy address:
[   20.008262]  fff00000c5a57b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.008457]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.008822] >fff00000c5a57c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.009042]                                                                 ^
[   20.009480]  fff00000c5a57c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.009966]  fff00000c5a57d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.010077] ==================================================================
[   19.974881] ==================================================================
[   19.974957] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.975181] Write of size 121 at addr fff00000c5a57c00 by task kunit_try_catch/285
[   19.975384] 
[   19.975480] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.975589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.975699] Hardware name: linux,dummy-virt (DT)
[   19.975749] Call trace:
[   19.975775]  show_stack+0x20/0x38 (C)
[   19.975840]  dump_stack_lvl+0x8c/0xd0
[   19.976073]  print_report+0x118/0x608
[   19.976144]  kasan_report+0xdc/0x128
[   19.976573]  kasan_check_range+0x100/0x1a8
[   19.976652]  __kasan_check_write+0x20/0x30
[   19.976828]  copy_user_test_oob+0x35c/0xec8
[   19.976900]  kunit_try_run_case+0x170/0x3f0
[   19.977025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.977307]  kthread+0x328/0x630
[   19.977557]  ret_from_fork+0x10/0x20
[   19.977620] 
[   19.977660] Allocated by task 285:
[   19.977751]  kasan_save_stack+0x3c/0x68
[   19.977842]  kasan_save_track+0x20/0x40
[   19.977887]  kasan_save_alloc_info+0x40/0x58
[   19.978295]  __kasan_kmalloc+0xd4/0xd8
[   19.978531]  __kmalloc_noprof+0x198/0x4c8
[   19.978583]  kunit_kmalloc_array+0x34/0x88
[   19.978939]  copy_user_test_oob+0xac/0xec8
[   19.979154]  kunit_try_run_case+0x170/0x3f0
[   19.979331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.979439]  kthread+0x328/0x630
[   19.979517]  ret_from_fork+0x10/0x20
[   19.979661] 
[   19.979732] The buggy address belongs to the object at fff00000c5a57c00
[   19.979732]  which belongs to the cache kmalloc-128 of size 128
[   19.980150] The buggy address is located 0 bytes inside of
[   19.980150]  allocated 120-byte region [fff00000c5a57c00, fff00000c5a57c78)
[   19.980469] 
[   19.980555] The buggy address belongs to the physical page:
[   19.980697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   19.980793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.980935] page_type: f5(slab)
[   19.981013] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.981090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.981312] page dumped because: kasan: bad access detected
[   19.981509] 
[   19.981670] Memory state around the buggy address:
[   19.981936]  fff00000c5a57b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.982373]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.982463] >fff00000c5a57c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.982517]                                                                 ^
[   19.982577]  fff00000c5a57c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.982633]  fff00000c5a57d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.982866] ==================================================================
[   19.990452] ==================================================================
[   19.990603] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.990737] Write of size 121 at addr fff00000c5a57c00 by task kunit_try_catch/285
[   19.990949] 
[   19.991148] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.991283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.991436] Hardware name: linux,dummy-virt (DT)
[   19.991482] Call trace:
[   19.991878]  show_stack+0x20/0x38 (C)
[   19.991967]  dump_stack_lvl+0x8c/0xd0
[   19.992025]  print_report+0x118/0x608
[   19.992084]  kasan_report+0xdc/0x128
[   19.992134]  kasan_check_range+0x100/0x1a8
[   19.992184]  __kasan_check_write+0x20/0x30
[   19.992591]  copy_user_test_oob+0x434/0xec8
[   19.992667]  kunit_try_run_case+0x170/0x3f0
[   19.992856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.992927]  kthread+0x328/0x630
[   19.993203]  ret_from_fork+0x10/0x20
[   19.993276] 
[   19.993306] Allocated by task 285:
[   19.993354]  kasan_save_stack+0x3c/0x68
[   19.993400]  kasan_save_track+0x20/0x40
[   19.993925]  kasan_save_alloc_info+0x40/0x58
[   19.993993]  __kasan_kmalloc+0xd4/0xd8
[   19.994379]  __kmalloc_noprof+0x198/0x4c8
[   19.994641]  kunit_kmalloc_array+0x34/0x88
[   19.994820]  copy_user_test_oob+0xac/0xec8
[   19.994902]  kunit_try_run_case+0x170/0x3f0
[   19.994971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.995127]  kthread+0x328/0x630
[   19.995204]  ret_from_fork+0x10/0x20
[   19.995242] 
[   19.995287] The buggy address belongs to the object at fff00000c5a57c00
[   19.995287]  which belongs to the cache kmalloc-128 of size 128
[   19.995560] The buggy address is located 0 bytes inside of
[   19.995560]  allocated 120-byte region [fff00000c5a57c00, fff00000c5a57c78)
[   19.995762] 
[   19.995797] The buggy address belongs to the physical page:
[   19.996111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   19.996268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.996414] page_type: f5(slab)
[   19.998038] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.998323] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.998387] page dumped because: kasan: bad access detected
[   19.998591] 
[   19.998825] Memory state around the buggy address:
[   19.998909]  fff00000c5a57b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.999135]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.999311] >fff00000c5a57c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.999639]                                                                 ^
[   19.999874]  fff00000c5a57c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.999937]  fff00000c5a57d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.000281] ==================================================================
[   19.961831] ==================================================================
[   19.961892] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.962068] Read of size 121 at addr fff00000c5a57c00 by task kunit_try_catch/285
[   19.962425] 
[   19.962497] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.962665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.962804] Hardware name: linux,dummy-virt (DT)
[   19.962862] Call trace:
[   19.962933]  show_stack+0x20/0x38 (C)
[   19.963043]  dump_stack_lvl+0x8c/0xd0
[   19.963152]  print_report+0x118/0x608
[   19.963498]  kasan_report+0xdc/0x128
[   19.963567]  kasan_check_range+0x100/0x1a8
[   19.963707]  __kasan_check_read+0x20/0x30
[   19.963815]  copy_user_test_oob+0x728/0xec8
[   19.963865]  kunit_try_run_case+0x170/0x3f0
[   19.963973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.964030]  kthread+0x328/0x630
[   19.964076]  ret_from_fork+0x10/0x20
[   19.964264] 
[   19.964292] Allocated by task 285:
[   19.964324]  kasan_save_stack+0x3c/0x68
[   19.964383]  kasan_save_track+0x20/0x40
[   19.964535]  kasan_save_alloc_info+0x40/0x58
[   19.964627]  __kasan_kmalloc+0xd4/0xd8
[   19.964669]  __kmalloc_noprof+0x198/0x4c8
[   19.964739]  kunit_kmalloc_array+0x34/0x88
[   19.964829]  copy_user_test_oob+0xac/0xec8
[   19.964949]  kunit_try_run_case+0x170/0x3f0
[   19.965054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.965436]  kthread+0x328/0x630
[   19.965490]  ret_from_fork+0x10/0x20
[   19.965531] 
[   19.965571] The buggy address belongs to the object at fff00000c5a57c00
[   19.965571]  which belongs to the cache kmalloc-128 of size 128
[   19.965630] The buggy address is located 0 bytes inside of
[   19.965630]  allocated 120-byte region [fff00000c5a57c00, fff00000c5a57c78)
[   19.965702] 
[   19.965744] The buggy address belongs to the physical page:
[   19.965777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   19.965833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.965883] page_type: f5(slab)
[   19.965953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.966003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.966045] page dumped because: kasan: bad access detected
[   19.966080] 
[   19.966270] Memory state around the buggy address:
[   19.966381]  fff00000c5a57b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.966442]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.966517] >fff00000c5a57c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.966597]                                                                 ^
[   19.966728]  fff00000c5a57c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.966808]  fff00000c5a57d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.966853] ==================================================================
[   19.983881] ==================================================================
[   19.984048] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.984203] Read of size 121 at addr fff00000c5a57c00 by task kunit_try_catch/285
[   19.984260] 
[   19.984318] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.984827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.984874] Hardware name: linux,dummy-virt (DT)
[   19.985004] Call trace:
[   19.985047]  show_stack+0x20/0x38 (C)
[   19.985318]  dump_stack_lvl+0x8c/0xd0
[   19.985490]  print_report+0x118/0x608
[   19.985552]  kasan_report+0xdc/0x128
[   19.985946]  kasan_check_range+0x100/0x1a8
[   19.986021]  __kasan_check_read+0x20/0x30
[   19.986320]  copy_user_test_oob+0x3c8/0xec8
[   19.986623]  kunit_try_run_case+0x170/0x3f0
[   19.986766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.986841]  kthread+0x328/0x630
[   19.987178]  ret_from_fork+0x10/0x20
[   19.987363] 
[   19.987423] Allocated by task 285:
[   19.987475]  kasan_save_stack+0x3c/0x68
[   19.987549]  kasan_save_track+0x20/0x40
[   19.987742]  kasan_save_alloc_info+0x40/0x58
[   19.987798]  __kasan_kmalloc+0xd4/0xd8
[   19.987838]  __kmalloc_noprof+0x198/0x4c8
[   19.987879]  kunit_kmalloc_array+0x34/0x88
[   19.988029]  copy_user_test_oob+0xac/0xec8
[   19.988077]  kunit_try_run_case+0x170/0x3f0
[   19.988144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.988201]  kthread+0x328/0x630
[   19.988238]  ret_from_fork+0x10/0x20
[   19.988276] 
[   19.988307] The buggy address belongs to the object at fff00000c5a57c00
[   19.988307]  which belongs to the cache kmalloc-128 of size 128
[   19.988390] The buggy address is located 0 bytes inside of
[   19.988390]  allocated 120-byte region [fff00000c5a57c00, fff00000c5a57c78)
[   19.988454] 
[   19.988477] The buggy address belongs to the physical page:
[   19.988508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   19.988572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.988622] page_type: f5(slab)
[   19.988690] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.988753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.988807] page dumped because: kasan: bad access detected
[   19.988851] 
[   19.988880] Memory state around the buggy address:
[   19.988930]  fff00000c5a57b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.988989]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.989035] >fff00000c5a57c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.989085]                                                                 ^
[   19.989129]  fff00000c5a57c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.989174]  fff00000c5a57d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.989224] ==================================================================

[   16.606478] ==================================================================
[   16.606774] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.607232] Read of size 121 at addr ffff888102791f00 by task kunit_try_catch/302
[   16.607541] 
[   16.607656] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.607697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.607710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.607730] Call Trace:
[   16.607745]  <TASK>
[   16.607760]  dump_stack_lvl+0x73/0xb0
[   16.607789]  print_report+0xd1/0x650
[   16.607812]  ? __virt_addr_valid+0x1db/0x2d0
[   16.607836]  ? copy_user_test_oob+0x604/0x10f0
[   16.607860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.607884]  ? copy_user_test_oob+0x604/0x10f0
[   16.607909]  kasan_report+0x141/0x180
[   16.607932]  ? copy_user_test_oob+0x604/0x10f0
[   16.607967]  kasan_check_range+0x10c/0x1c0
[   16.607992]  __kasan_check_read+0x15/0x20
[   16.608012]  copy_user_test_oob+0x604/0x10f0
[   16.608406]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.608438]  ? finish_task_switch.isra.0+0x153/0x700
[   16.608464]  ? __switch_to+0x47/0xf50
[   16.608490]  ? __schedule+0x10cc/0x2b60
[   16.608514]  ? __pfx_read_tsc+0x10/0x10
[   16.608536]  ? ktime_get_ts64+0x86/0x230
[   16.608561]  kunit_try_run_case+0x1a5/0x480
[   16.608586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.608610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.608636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.608662]  ? __kthread_parkme+0x82/0x180
[   16.608684]  ? preempt_count_sub+0x50/0x80
[   16.608709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.608735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.608761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.608787]  kthread+0x337/0x6f0
[   16.608807]  ? trace_preempt_on+0x20/0xc0
[   16.608831]  ? __pfx_kthread+0x10/0x10
[   16.608852]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.608875]  ? calculate_sigpending+0x7b/0xa0
[   16.608900]  ? __pfx_kthread+0x10/0x10
[   16.608923]  ret_from_fork+0x116/0x1d0
[   16.608950]  ? __pfx_kthread+0x10/0x10
[   16.608972]  ret_from_fork_asm+0x1a/0x30
[   16.609003]  </TASK>
[   16.609013] 
[   16.618432] Allocated by task 302:
[   16.618700]  kasan_save_stack+0x45/0x70
[   16.618976]  kasan_save_track+0x18/0x40
[   16.619176]  kasan_save_alloc_info+0x3b/0x50
[   16.619477]  __kasan_kmalloc+0xb7/0xc0
[   16.619740]  __kmalloc_noprof+0x1c9/0x500
[   16.619906]  kunit_kmalloc_array+0x25/0x60
[   16.620147]  copy_user_test_oob+0xab/0x10f0
[   16.620468]  kunit_try_run_case+0x1a5/0x480
[   16.620669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.620898]  kthread+0x337/0x6f0
[   16.621289]  ret_from_fork+0x116/0x1d0
[   16.621472]  ret_from_fork_asm+0x1a/0x30
[   16.621773] 
[   16.621876] The buggy address belongs to the object at ffff888102791f00
[   16.621876]  which belongs to the cache kmalloc-128 of size 128
[   16.622469] The buggy address is located 0 bytes inside of
[   16.622469]  allocated 120-byte region [ffff888102791f00, ffff888102791f78)
[   16.623130] 
[   16.623297] The buggy address belongs to the physical page:
[   16.623568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   16.624039] flags: 0x200000000000000(node=0|zone=2)
[   16.624272] page_type: f5(slab)
[   16.624414] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.624745] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.625290] page dumped because: kasan: bad access detected
[   16.625586] 
[   16.625667] Memory state around the buggy address:
[   16.625869]  ffff888102791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.626340]  ffff888102791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.626720] >ffff888102791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.626976]                                                                 ^
[   16.627501]  ffff888102791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.627885]  ffff888102792000: 00 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc
[   16.628263] ==================================================================
[   16.583979] ==================================================================
[   16.584576] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.585018] Write of size 121 at addr ffff888102791f00 by task kunit_try_catch/302
[   16.585302] 
[   16.585597] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.585642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.585655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.585675] Call Trace:
[   16.585691]  <TASK>
[   16.585706]  dump_stack_lvl+0x73/0xb0
[   16.585735]  print_report+0xd1/0x650
[   16.585759]  ? __virt_addr_valid+0x1db/0x2d0
[   16.585782]  ? copy_user_test_oob+0x557/0x10f0
[   16.585806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.585831]  ? copy_user_test_oob+0x557/0x10f0
[   16.585856]  kasan_report+0x141/0x180
[   16.585879]  ? copy_user_test_oob+0x557/0x10f0
[   16.585908]  kasan_check_range+0x10c/0x1c0
[   16.586000]  __kasan_check_write+0x18/0x20
[   16.586024]  copy_user_test_oob+0x557/0x10f0
[   16.586064]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.586088]  ? finish_task_switch.isra.0+0x153/0x700
[   16.586111]  ? __switch_to+0x47/0xf50
[   16.586137]  ? __schedule+0x10cc/0x2b60
[   16.586160]  ? __pfx_read_tsc+0x10/0x10
[   16.586184]  ? ktime_get_ts64+0x86/0x230
[   16.586209]  kunit_try_run_case+0x1a5/0x480
[   16.586235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.586259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.586285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.586310]  ? __kthread_parkme+0x82/0x180
[   16.586332]  ? preempt_count_sub+0x50/0x80
[   16.586356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.586383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.586408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.586435]  kthread+0x337/0x6f0
[   16.586456]  ? trace_preempt_on+0x20/0xc0
[   16.586479]  ? __pfx_kthread+0x10/0x10
[   16.586501]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.586524]  ? calculate_sigpending+0x7b/0xa0
[   16.586549]  ? __pfx_kthread+0x10/0x10
[   16.586572]  ret_from_fork+0x116/0x1d0
[   16.586592]  ? __pfx_kthread+0x10/0x10
[   16.586613]  ret_from_fork_asm+0x1a/0x30
[   16.586645]  </TASK>
[   16.586656] 
[   16.595814] Allocated by task 302:
[   16.596186]  kasan_save_stack+0x45/0x70
[   16.596371]  kasan_save_track+0x18/0x40
[   16.596674]  kasan_save_alloc_info+0x3b/0x50
[   16.596946]  __kasan_kmalloc+0xb7/0xc0
[   16.597113]  __kmalloc_noprof+0x1c9/0x500
[   16.597318]  kunit_kmalloc_array+0x25/0x60
[   16.597685]  copy_user_test_oob+0xab/0x10f0
[   16.597878]  kunit_try_run_case+0x1a5/0x480
[   16.598237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.598485]  kthread+0x337/0x6f0
[   16.598749]  ret_from_fork+0x116/0x1d0
[   16.598927]  ret_from_fork_asm+0x1a/0x30
[   16.599275] 
[   16.599359] The buggy address belongs to the object at ffff888102791f00
[   16.599359]  which belongs to the cache kmalloc-128 of size 128
[   16.599908] The buggy address is located 0 bytes inside of
[   16.599908]  allocated 120-byte region [ffff888102791f00, ffff888102791f78)
[   16.600745] 
[   16.600840] The buggy address belongs to the physical page:
[   16.601248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   16.601637] flags: 0x200000000000000(node=0|zone=2)
[   16.601947] page_type: f5(slab)
[   16.602098] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.602574] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.602890] page dumped because: kasan: bad access detected
[   16.603217] 
[   16.603291] Memory state around the buggy address:
[   16.603503]  ffff888102791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.603792]  ffff888102791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.604304] >ffff888102791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.604688]                                                                 ^
[   16.605066]  ffff888102791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605379]  ffff888102792000: 00 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc
[   16.605807] ==================================================================
[   16.561370] ==================================================================
[   16.561671] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.562393] Read of size 121 at addr ffff888102791f00 by task kunit_try_catch/302
[   16.562881] 
[   16.563013] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.563147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.563162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.563184] Call Trace:
[   16.563255]  <TASK>
[   16.563273]  dump_stack_lvl+0x73/0xb0
[   16.563304]  print_report+0xd1/0x650
[   16.563327]  ? __virt_addr_valid+0x1db/0x2d0
[   16.563351]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.563375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.563399]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.563424]  kasan_report+0x141/0x180
[   16.563447]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.563477]  kasan_check_range+0x10c/0x1c0
[   16.563501]  __kasan_check_read+0x15/0x20
[   16.563522]  copy_user_test_oob+0x4aa/0x10f0
[   16.563548]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.563572]  ? finish_task_switch.isra.0+0x153/0x700
[   16.563596]  ? __switch_to+0x47/0xf50
[   16.563621]  ? __schedule+0x10cc/0x2b60
[   16.563643]  ? __pfx_read_tsc+0x10/0x10
[   16.563665]  ? ktime_get_ts64+0x86/0x230
[   16.563689]  kunit_try_run_case+0x1a5/0x480
[   16.563714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.563738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.563763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.563789]  ? __kthread_parkme+0x82/0x180
[   16.563810]  ? preempt_count_sub+0x50/0x80
[   16.563834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.563860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.563887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.563914]  kthread+0x337/0x6f0
[   16.563955]  ? trace_preempt_on+0x20/0xc0
[   16.563981]  ? __pfx_kthread+0x10/0x10
[   16.564002]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.564025]  ? calculate_sigpending+0x7b/0xa0
[   16.564061]  ? __pfx_kthread+0x10/0x10
[   16.564083]  ret_from_fork+0x116/0x1d0
[   16.564103]  ? __pfx_kthread+0x10/0x10
[   16.564124]  ret_from_fork_asm+0x1a/0x30
[   16.564156]  </TASK>
[   16.564168] 
[   16.573544] Allocated by task 302:
[   16.573714]  kasan_save_stack+0x45/0x70
[   16.573913]  kasan_save_track+0x18/0x40
[   16.574370]  kasan_save_alloc_info+0x3b/0x50
[   16.574569]  __kasan_kmalloc+0xb7/0xc0
[   16.574738]  __kmalloc_noprof+0x1c9/0x500
[   16.574921]  kunit_kmalloc_array+0x25/0x60
[   16.575315]  copy_user_test_oob+0xab/0x10f0
[   16.575572]  kunit_try_run_case+0x1a5/0x480
[   16.575739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.576168]  kthread+0x337/0x6f0
[   16.576408]  ret_from_fork+0x116/0x1d0
[   16.576637]  ret_from_fork_asm+0x1a/0x30
[   16.576831] 
[   16.576920] The buggy address belongs to the object at ffff888102791f00
[   16.576920]  which belongs to the cache kmalloc-128 of size 128
[   16.577597] The buggy address is located 0 bytes inside of
[   16.577597]  allocated 120-byte region [ffff888102791f00, ffff888102791f78)
[   16.578210] 
[   16.578432] The buggy address belongs to the physical page:
[   16.578636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   16.578997] flags: 0x200000000000000(node=0|zone=2)
[   16.579396] page_type: f5(slab)
[   16.579626] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.579985] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.580324] page dumped because: kasan: bad access detected
[   16.580552] 
[   16.580630] Memory state around the buggy address:
[   16.580860]  ffff888102791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.581489]  ffff888102791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.581863] >ffff888102791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.582224]                                                                 ^
[   16.582626]  ffff888102791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.583045]  ffff888102792000: 00 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc
[   16.583401] ==================================================================
[   16.538786] ==================================================================
[   16.539148] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.539464] Write of size 121 at addr ffff888102791f00 by task kunit_try_catch/302
[   16.539768] 
[   16.539869] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.539912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.539925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.540201] Call Trace:
[   16.540220]  <TASK>
[   16.540324]  dump_stack_lvl+0x73/0xb0
[   16.540360]  print_report+0xd1/0x650
[   16.540384]  ? __virt_addr_valid+0x1db/0x2d0
[   16.540409]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.540434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.540459]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.540483]  kasan_report+0x141/0x180
[   16.540506]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.540535]  kasan_check_range+0x10c/0x1c0
[   16.540560]  __kasan_check_write+0x18/0x20
[   16.540580]  copy_user_test_oob+0x3fd/0x10f0
[   16.540607]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.540631]  ? finish_task_switch.isra.0+0x153/0x700
[   16.540655]  ? __switch_to+0x47/0xf50
[   16.540681]  ? __schedule+0x10cc/0x2b60
[   16.540704]  ? __pfx_read_tsc+0x10/0x10
[   16.540725]  ? ktime_get_ts64+0x86/0x230
[   16.540750]  kunit_try_run_case+0x1a5/0x480
[   16.540775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.540799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.540824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.540849]  ? __kthread_parkme+0x82/0x180
[   16.540870]  ? preempt_count_sub+0x50/0x80
[   16.540894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.540920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.540960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.540987]  kthread+0x337/0x6f0
[   16.541007]  ? trace_preempt_on+0x20/0xc0
[   16.541041]  ? __pfx_kthread+0x10/0x10
[   16.541063]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.541085]  ? calculate_sigpending+0x7b/0xa0
[   16.541110]  ? __pfx_kthread+0x10/0x10
[   16.541133]  ret_from_fork+0x116/0x1d0
[   16.541152]  ? __pfx_kthread+0x10/0x10
[   16.541174]  ret_from_fork_asm+0x1a/0x30
[   16.541206]  </TASK>
[   16.541218] 
[   16.550727] Allocated by task 302:
[   16.550974]  kasan_save_stack+0x45/0x70
[   16.551190]  kasan_save_track+0x18/0x40
[   16.551362]  kasan_save_alloc_info+0x3b/0x50
[   16.551552]  __kasan_kmalloc+0xb7/0xc0
[   16.551728]  __kmalloc_noprof+0x1c9/0x500
[   16.551906]  kunit_kmalloc_array+0x25/0x60
[   16.552465]  copy_user_test_oob+0xab/0x10f0
[   16.552651]  kunit_try_run_case+0x1a5/0x480
[   16.552867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.553352]  kthread+0x337/0x6f0
[   16.553497]  ret_from_fork+0x116/0x1d0
[   16.553809]  ret_from_fork_asm+0x1a/0x30
[   16.554058] 
[   16.554235] The buggy address belongs to the object at ffff888102791f00
[   16.554235]  which belongs to the cache kmalloc-128 of size 128
[   16.554819] The buggy address is located 0 bytes inside of
[   16.554819]  allocated 120-byte region [ffff888102791f00, ffff888102791f78)
[   16.555547] 
[   16.555771] The buggy address belongs to the physical page:
[   16.556009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   16.556516] flags: 0x200000000000000(node=0|zone=2)
[   16.556798] page_type: f5(slab)
[   16.556930] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.557338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.557665] page dumped because: kasan: bad access detected
[   16.557890] 
[   16.557967] Memory state around the buggy address:
[   16.558479]  ffff888102791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.558859]  ffff888102791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.559218] >ffff888102791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.559622]                                                                 ^
[   16.559981]  ffff888102791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.560305]  ffff888102792000: 00 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc
[   16.560708] ==================================================================