Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.394148] ==================================================================
[   18.394219] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   18.394271] Read of size 121 at addr fff00000c64df100 by task kunit_try_catch/286
[   18.394325] 
[   18.394357] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.394443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.394471] Hardware name: linux,dummy-virt (DT)
[   18.394502] Call trace:
[   18.394528]  show_stack+0x20/0x38 (C)
[   18.394578]  dump_stack_lvl+0x8c/0xd0
[   18.394912]  print_report+0x118/0x5d0
[   18.394986]  kasan_report+0xdc/0x128
[   18.395035]  kasan_check_range+0x100/0x1a8
[   18.395085]  __kasan_check_read+0x20/0x30
[   18.395131]  copy_user_test_oob+0x4a0/0xec8
[   18.395181]  kunit_try_run_case+0x170/0x3f0
[   18.395244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.395301]  kthread+0x328/0x630
[   18.395345]  ret_from_fork+0x10/0x20
[   18.395412] 
[   18.395434] Allocated by task 286:
[   18.395470]  kasan_save_stack+0x3c/0x68
[   18.395515]  kasan_save_track+0x20/0x40
[   18.395563]  kasan_save_alloc_info+0x40/0x58
[   18.395615]  __kasan_kmalloc+0xd4/0xd8
[   18.395664]  __kmalloc_noprof+0x198/0x4c8
[   18.395703]  kunit_kmalloc_array+0x34/0x88
[   18.395745]  copy_user_test_oob+0xac/0xec8
[   18.395784]  kunit_try_run_case+0x170/0x3f0
[   18.395824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.395870]  kthread+0x328/0x630
[   18.395905]  ret_from_fork+0x10/0x20
[   18.395942] 
[   18.395966] The buggy address belongs to the object at fff00000c64df100
[   18.395966]  which belongs to the cache kmalloc-128 of size 128
[   18.396033] The buggy address is located 0 bytes inside of
[   18.396033]  allocated 120-byte region [fff00000c64df100, fff00000c64df178)
[   18.396097] 
[   18.396119] The buggy address belongs to the physical page:
[   18.396164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064df
[   18.397330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.397735] page_type: f5(slab)
[   18.397793] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.397865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.398161] page dumped because: kasan: bad access detected
[   18.398357] 
[   18.398524] Memory state around the buggy address:
[   18.398673]  fff00000c64df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.398726]  fff00000c64df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.399019] >fff00000c64df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.399181]                                                                 ^
[   18.399272]  fff00000c64df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.399526]  fff00000c64df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.399855] ==================================================================
[   18.382500] ==================================================================
[   18.382556] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   18.382827] Write of size 121 at addr fff00000c64df100 by task kunit_try_catch/286
[   18.383254] 
[   18.383455] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.383735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.383801] Hardware name: linux,dummy-virt (DT)
[   18.383836] Call trace:
[   18.384169]  show_stack+0x20/0x38 (C)
[   18.384429]  dump_stack_lvl+0x8c/0xd0
[   18.384499]  print_report+0x118/0x5d0
[   18.384731]  kasan_report+0xdc/0x128
[   18.384885]  kasan_check_range+0x100/0x1a8
[   18.385274]  __kasan_check_write+0x20/0x30
[   18.385445]  copy_user_test_oob+0x434/0xec8
[   18.385586]  kunit_try_run_case+0x170/0x3f0
[   18.385680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.385837]  kthread+0x328/0x630
[   18.385886]  ret_from_fork+0x10/0x20
[   18.386514] 
[   18.386751] Allocated by task 286:
[   18.386812]  kasan_save_stack+0x3c/0x68
[   18.386954]  kasan_save_track+0x20/0x40
[   18.387051]  kasan_save_alloc_info+0x40/0x58
[   18.387245]  __kasan_kmalloc+0xd4/0xd8
[   18.387290]  __kmalloc_noprof+0x198/0x4c8
[   18.387531]  kunit_kmalloc_array+0x34/0x88
[   18.387695]  copy_user_test_oob+0xac/0xec8
[   18.387918]  kunit_try_run_case+0x170/0x3f0
[   18.388170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.388330]  kthread+0x328/0x630
[   18.388421]  ret_from_fork+0x10/0x20
[   18.388697] 
[   18.388809] The buggy address belongs to the object at fff00000c64df100
[   18.388809]  which belongs to the cache kmalloc-128 of size 128
[   18.389309] The buggy address is located 0 bytes inside of
[   18.389309]  allocated 120-byte region [fff00000c64df100, fff00000c64df178)
[   18.389491] 
[   18.389524] The buggy address belongs to the physical page:
[   18.389920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064df
[   18.390326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.390489] page_type: f5(slab)
[   18.390583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.390675] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.391033] page dumped because: kasan: bad access detected
[   18.391315] 
[   18.391461] Memory state around the buggy address:
[   18.391502]  fff00000c64df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.392008]  fff00000c64df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.392278] >fff00000c64df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.392402]                                                                 ^
[   18.392607]  fff00000c64df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.392906]  fff00000c64df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.393096] ==================================================================
[   18.372662] ==================================================================
[   18.372948] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   18.373288] Read of size 121 at addr fff00000c64df100 by task kunit_try_catch/286
[   18.373451] 
[   18.373489] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.373777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.373817] Hardware name: linux,dummy-virt (DT)
[   18.373976] Call trace:
[   18.374027]  show_stack+0x20/0x38 (C)
[   18.374082]  dump_stack_lvl+0x8c/0xd0
[   18.374143]  print_report+0x118/0x5d0
[   18.374223]  kasan_report+0xdc/0x128
[   18.374271]  kasan_check_range+0x100/0x1a8
[   18.374323]  __kasan_check_read+0x20/0x30
[   18.374370]  copy_user_test_oob+0x3c8/0xec8
[   18.374419]  kunit_try_run_case+0x170/0x3f0
[   18.374466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.374529]  kthread+0x328/0x630
[   18.374583]  ret_from_fork+0x10/0x20
[   18.374642] 
[   18.374673] Allocated by task 286:
[   18.374719]  kasan_save_stack+0x3c/0x68
[   18.374764]  kasan_save_track+0x20/0x40
[   18.374812]  kasan_save_alloc_info+0x40/0x58
[   18.374866]  __kasan_kmalloc+0xd4/0xd8
[   18.374913]  __kmalloc_noprof+0x198/0x4c8
[   18.374955]  kunit_kmalloc_array+0x34/0x88
[   18.374995]  copy_user_test_oob+0xac/0xec8
[   18.375033]  kunit_try_run_case+0x170/0x3f0
[   18.375073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.375139]  kthread+0x328/0x630
[   18.375183]  ret_from_fork+0x10/0x20
[   18.376045] 
[   18.376110] The buggy address belongs to the object at fff00000c64df100
[   18.376110]  which belongs to the cache kmalloc-128 of size 128
[   18.376195] The buggy address is located 0 bytes inside of
[   18.376195]  allocated 120-byte region [fff00000c64df100, fff00000c64df178)
[   18.376276] 
[   18.376468] The buggy address belongs to the physical page:
[   18.376674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064df
[   18.376820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.376937] page_type: f5(slab)
[   18.377094] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.377588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.377667] page dumped because: kasan: bad access detected
[   18.377704] 
[   18.378055] Memory state around the buggy address:
[   18.378492]  fff00000c64df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.378585]  fff00000c64df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378642] >fff00000c64df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.379163]                                                                 ^
[   18.379423]  fff00000c64df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.379556]  fff00000c64df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.379767] ==================================================================
[   18.362020] ==================================================================
[   18.362092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   18.362409] Write of size 121 at addr fff00000c64df100 by task kunit_try_catch/286
[   18.362565] 
[   18.362607] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.362719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.362831] Hardware name: linux,dummy-virt (DT)
[   18.362869] Call trace:
[   18.362914]  show_stack+0x20/0x38 (C)
[   18.363287]  dump_stack_lvl+0x8c/0xd0
[   18.363465]  print_report+0x118/0x5d0
[   18.363563]  kasan_report+0xdc/0x128
[   18.363708]  kasan_check_range+0x100/0x1a8
[   18.363762]  __kasan_check_write+0x20/0x30
[   18.363809]  copy_user_test_oob+0x35c/0xec8
[   18.363860]  kunit_try_run_case+0x170/0x3f0
[   18.364232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.364312]  kthread+0x328/0x630
[   18.365307]  ret_from_fork+0x10/0x20
[   18.365395] 
[   18.365417] Allocated by task 286:
[   18.365607]  kasan_save_stack+0x3c/0x68
[   18.365851]  kasan_save_track+0x20/0x40
[   18.365929]  kasan_save_alloc_info+0x40/0x58
[   18.366095]  __kasan_kmalloc+0xd4/0xd8
[   18.366184]  __kmalloc_noprof+0x198/0x4c8
[   18.366306]  kunit_kmalloc_array+0x34/0x88
[   18.366364]  copy_user_test_oob+0xac/0xec8
[   18.366434]  kunit_try_run_case+0x170/0x3f0
[   18.366691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.366802]  kthread+0x328/0x630
[   18.366864]  ret_from_fork+0x10/0x20
[   18.367132] 
[   18.367202] The buggy address belongs to the object at fff00000c64df100
[   18.367202]  which belongs to the cache kmalloc-128 of size 128
[   18.367292] The buggy address is located 0 bytes inside of
[   18.367292]  allocated 120-byte region [fff00000c64df100, fff00000c64df178)
[   18.367984] 
[   18.368045] The buggy address belongs to the physical page:
[   18.368098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064df
[   18.368308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.368453] page_type: f5(slab)
[   18.368516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.368569] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.369247] page dumped because: kasan: bad access detected
[   18.369425] 
[   18.369549] Memory state around the buggy address:
[   18.369699]  fff00000c64df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.369799]  fff00000c64df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.369952] >fff00000c64df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.370041]                                                                 ^
[   18.370104]  fff00000c64df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.370148]  fff00000c64df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.370379] ==================================================================
[   18.339830] ==================================================================
[   18.339888] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   18.339942] Read of size 121 at addr fff00000c64df100 by task kunit_try_catch/286
[   18.340447] 
[   18.340529] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.340917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.340960] Hardware name: linux,dummy-virt (DT)
[   18.341015] Call trace:
[   18.341041]  show_stack+0x20/0x38 (C)
[   18.341226]  dump_stack_lvl+0x8c/0xd0
[   18.341310]  print_report+0x118/0x5d0
[   18.341392]  kasan_report+0xdc/0x128
[   18.341481]  kasan_check_range+0x100/0x1a8
[   18.341778]  __kasan_check_read+0x20/0x30
[   18.342327]  copy_user_test_oob+0x728/0xec8
[   18.342404]  kunit_try_run_case+0x170/0x3f0
[   18.342587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.342862]  kthread+0x328/0x630
[   18.343042]  ret_from_fork+0x10/0x20
[   18.343436] 
[   18.343533] Allocated by task 286:
[   18.343656]  kasan_save_stack+0x3c/0x68
[   18.343753]  kasan_save_track+0x20/0x40
[   18.344006]  kasan_save_alloc_info+0x40/0x58
[   18.344251]  __kasan_kmalloc+0xd4/0xd8
[   18.344427]  __kmalloc_noprof+0x198/0x4c8
[   18.344703]  kunit_kmalloc_array+0x34/0x88
[   18.344981]  copy_user_test_oob+0xac/0xec8
[   18.345158]  kunit_try_run_case+0x170/0x3f0
[   18.345215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.345282]  kthread+0x328/0x630
[   18.345562]  ret_from_fork+0x10/0x20
[   18.345925] 
[   18.346076] The buggy address belongs to the object at fff00000c64df100
[   18.346076]  which belongs to the cache kmalloc-128 of size 128
[   18.346313] The buggy address is located 0 bytes inside of
[   18.346313]  allocated 120-byte region [fff00000c64df100, fff00000c64df178)
[   18.346576] 
[   18.346672] The buggy address belongs to the physical page:
[   18.346824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064df
[   18.346915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.347168] page_type: f5(slab)
[   18.347237] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.347487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.347646] page dumped because: kasan: bad access detected
[   18.347729] 
[   18.347793] Memory state around the buggy address:
[   18.347830]  fff00000c64df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.348373]  fff00000c64df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.348996] >fff00000c64df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.349256]                                                                 ^
[   18.349876]  fff00000c64df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.350103]  fff00000c64df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.350346] ==================================================================
[   18.328061] ==================================================================
[   18.328181] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   18.328286] Write of size 121 at addr fff00000c64df100 by task kunit_try_catch/286
[   18.328361] 
[   18.328405] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.328514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.328551] Hardware name: linux,dummy-virt (DT)
[   18.328588] Call trace:
[   18.328633]  show_stack+0x20/0x38 (C)
[   18.328698]  dump_stack_lvl+0x8c/0xd0
[   18.328806]  print_report+0x118/0x5d0
[   18.328872]  kasan_report+0xdc/0x128
[   18.328949]  kasan_check_range+0x100/0x1a8
[   18.329000]  __kasan_check_write+0x20/0x30
[   18.329050]  copy_user_test_oob+0x234/0xec8
[   18.329348]  kunit_try_run_case+0x170/0x3f0
[   18.329434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.329557]  kthread+0x328/0x630
[   18.329652]  ret_from_fork+0x10/0x20
[   18.329802] 
[   18.329871] Allocated by task 286:
[   18.329958]  kasan_save_stack+0x3c/0x68
[   18.330089]  kasan_save_track+0x20/0x40
[   18.330183]  kasan_save_alloc_info+0x40/0x58
[   18.330288]  __kasan_kmalloc+0xd4/0xd8
[   18.330327]  __kmalloc_noprof+0x198/0x4c8
[   18.330379]  kunit_kmalloc_array+0x34/0x88
[   18.330660]  copy_user_test_oob+0xac/0xec8
[   18.330788]  kunit_try_run_case+0x170/0x3f0
[   18.330992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.331205]  kthread+0x328/0x630
[   18.331243]  ret_from_fork+0x10/0x20
[   18.331322] 
[   18.331375] The buggy address belongs to the object at fff00000c64df100
[   18.331375]  which belongs to the cache kmalloc-128 of size 128
[   18.331662] The buggy address is located 0 bytes inside of
[   18.331662]  allocated 120-byte region [fff00000c64df100, fff00000c64df178)
[   18.331796] 
[   18.331879] The buggy address belongs to the physical page:
[   18.331960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064df
[   18.332073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.332205] page_type: f5(slab)
[   18.332287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.332386] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.332430] page dumped because: kasan: bad access detected
[   18.332462] 
[   18.332522] Memory state around the buggy address:
[   18.332806]  fff00000c64df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.332943]  fff00000c64df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.333247] >fff00000c64df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.333488]                                                                 ^
[   18.333592]  fff00000c64df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.333703]  fff00000c64df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.333745] ==================================================================

[   17.131097] ==================================================================
[   17.131386] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   17.131639] Read of size 121 at addr ffff8881029dff00 by task kunit_try_catch/303
[   17.132126] 
[   17.132243] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   17.132291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.132304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.132328] Call Trace:
[   17.132346]  <TASK>
[   17.132364]  dump_stack_lvl+0x73/0xb0
[   17.132395]  print_report+0xd1/0x610
[   17.132421]  ? __virt_addr_valid+0x1db/0x2d0
[   17.132446]  ? copy_user_test_oob+0x604/0x10f0
[   17.132483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.132508]  ? copy_user_test_oob+0x604/0x10f0
[   17.132533]  kasan_report+0x141/0x180
[   17.132557]  ? copy_user_test_oob+0x604/0x10f0
[   17.132587]  kasan_check_range+0x10c/0x1c0
[   17.132612]  __kasan_check_read+0x15/0x20
[   17.132632]  copy_user_test_oob+0x604/0x10f0
[   17.132660]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.132684]  ? finish_task_switch.isra.0+0x153/0x700
[   17.132709]  ? __switch_to+0x47/0xf50
[   17.132737]  ? __schedule+0x10c6/0x2b60
[   17.132763]  ? __pfx_read_tsc+0x10/0x10
[   17.132787]  ? ktime_get_ts64+0x86/0x230
[   17.132813]  kunit_try_run_case+0x1a5/0x480
[   17.132840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.132864]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.132891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.132917]  ? __kthread_parkme+0x82/0x180
[   17.132941]  ? preempt_count_sub+0x50/0x80
[   17.132989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.133016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.133041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.133085]  kthread+0x337/0x6f0
[   17.133107]  ? trace_preempt_on+0x20/0xc0
[   17.133133]  ? __pfx_kthread+0x10/0x10
[   17.133175]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.133199]  ? calculate_sigpending+0x7b/0xa0
[   17.133225]  ? __pfx_kthread+0x10/0x10
[   17.133266]  ret_from_fork+0x116/0x1d0
[   17.133286]  ? __pfx_kthread+0x10/0x10
[   17.133322]  ret_from_fork_asm+0x1a/0x30
[   17.133356]  </TASK>
[   17.133368] 
[   17.141430] Allocated by task 303:
[   17.141656]  kasan_save_stack+0x45/0x70
[   17.141888]  kasan_save_track+0x18/0x40
[   17.142157]  kasan_save_alloc_info+0x3b/0x50
[   17.142391]  __kasan_kmalloc+0xb7/0xc0
[   17.142594]  __kmalloc_noprof+0x1c9/0x500
[   17.142812]  kunit_kmalloc_array+0x25/0x60
[   17.143021]  copy_user_test_oob+0xab/0x10f0
[   17.143232]  kunit_try_run_case+0x1a5/0x480
[   17.143441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.143709]  kthread+0x337/0x6f0
[   17.143867]  ret_from_fork+0x116/0x1d0
[   17.144004]  ret_from_fork_asm+0x1a/0x30
[   17.144145] 
[   17.144218] The buggy address belongs to the object at ffff8881029dff00
[   17.144218]  which belongs to the cache kmalloc-128 of size 128
[   17.144585] The buggy address is located 0 bytes inside of
[   17.144585]  allocated 120-byte region [ffff8881029dff00, ffff8881029dff78)
[   17.145410] 
[   17.145524] The buggy address belongs to the physical page:
[   17.145851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029df
[   17.146255] flags: 0x200000000000000(node=0|zone=2)
[   17.146528] page_type: f5(slab)
[   17.146727] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.147271] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.147615] page dumped because: kasan: bad access detected
[   17.147799] 
[   17.147872] Memory state around the buggy address:
[   17.148134]  ffff8881029dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.148509]  ffff8881029dfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.148871] >ffff8881029dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.149127]                                                                 ^
[   17.149441]  ffff8881029dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.149746]  ffff8881029e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.150083] ==================================================================
[   17.070232] ==================================================================
[   17.070636] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   17.071339] Write of size 121 at addr ffff8881029dff00 by task kunit_try_catch/303
[   17.072036] 
[   17.072220] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   17.072273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.072286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.072311] Call Trace:
[   17.072328]  <TASK>
[   17.072347]  dump_stack_lvl+0x73/0xb0
[   17.072382]  print_report+0xd1/0x610
[   17.072407]  ? __virt_addr_valid+0x1db/0x2d0
[   17.072433]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.072459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.072497]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.072522]  kasan_report+0x141/0x180
[   17.072546]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.072576]  kasan_check_range+0x10c/0x1c0
[   17.072601]  __kasan_check_write+0x18/0x20
[   17.072622]  copy_user_test_oob+0x3fd/0x10f0
[   17.072648]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.072673]  ? finish_task_switch.isra.0+0x153/0x700
[   17.072697]  ? __switch_to+0x47/0xf50
[   17.072725]  ? __schedule+0x10c6/0x2b60
[   17.072750]  ? __pfx_read_tsc+0x10/0x10
[   17.072774]  ? ktime_get_ts64+0x86/0x230
[   17.072814]  kunit_try_run_case+0x1a5/0x480
[   17.072840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.072865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.072892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.072917]  ? __kthread_parkme+0x82/0x180
[   17.072941]  ? preempt_count_sub+0x50/0x80
[   17.072966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.072991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.073016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.073042]  kthread+0x337/0x6f0
[   17.073063]  ? trace_preempt_on+0x20/0xc0
[   17.073089]  ? __pfx_kthread+0x10/0x10
[   17.073111]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.073134]  ? calculate_sigpending+0x7b/0xa0
[   17.073161]  ? __pfx_kthread+0x10/0x10
[   17.073184]  ret_from_fork+0x116/0x1d0
[   17.073205]  ? __pfx_kthread+0x10/0x10
[   17.073226]  ret_from_fork_asm+0x1a/0x30
[   17.073259]  </TASK>
[   17.073271] 
[   17.080775] Allocated by task 303:
[   17.080970]  kasan_save_stack+0x45/0x70
[   17.081180]  kasan_save_track+0x18/0x40
[   17.081376]  kasan_save_alloc_info+0x3b/0x50
[   17.081550]  __kasan_kmalloc+0xb7/0xc0
[   17.081692]  __kmalloc_noprof+0x1c9/0x500
[   17.082011]  kunit_kmalloc_array+0x25/0x60
[   17.082232]  copy_user_test_oob+0xab/0x10f0
[   17.082458]  kunit_try_run_case+0x1a5/0x480
[   17.082685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.083058]  kthread+0x337/0x6f0
[   17.083222]  ret_from_fork+0x116/0x1d0
[   17.083417]  ret_from_fork_asm+0x1a/0x30
[   17.083581] 
[   17.083662] The buggy address belongs to the object at ffff8881029dff00
[   17.083662]  which belongs to the cache kmalloc-128 of size 128
[   17.084427] The buggy address is located 0 bytes inside of
[   17.084427]  allocated 120-byte region [ffff8881029dff00, ffff8881029dff78)
[   17.084968] 
[   17.085053] The buggy address belongs to the physical page:
[   17.085293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029df
[   17.085638] flags: 0x200000000000000(node=0|zone=2)
[   17.085904] page_type: f5(slab)
[   17.086059] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.086340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.086800] page dumped because: kasan: bad access detected
[   17.087320] 
[   17.087503] Memory state around the buggy address:
[   17.087985]  ffff8881029dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.088594]  ffff8881029dfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.089223] >ffff8881029dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.089827]                                                                 ^
[   17.090518]  ffff8881029dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.091159]  ffff8881029e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.091815] ==================================================================
[   17.092874] ==================================================================
[   17.093454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   17.093730] Read of size 121 at addr ffff8881029dff00 by task kunit_try_catch/303
[   17.094528] 
[   17.094711] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   17.094761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.094774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.094800] Call Trace:
[   17.094820]  <TASK>
[   17.094840]  dump_stack_lvl+0x73/0xb0
[   17.094872]  print_report+0xd1/0x610
[   17.094898]  ? __virt_addr_valid+0x1db/0x2d0
[   17.094923]  ? copy_user_test_oob+0x4aa/0x10f0
[   17.094947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.094971]  ? copy_user_test_oob+0x4aa/0x10f0
[   17.094997]  kasan_report+0x141/0x180
[   17.095021]  ? copy_user_test_oob+0x4aa/0x10f0
[   17.095050]  kasan_check_range+0x10c/0x1c0
[   17.095076]  __kasan_check_read+0x15/0x20
[   17.095095]  copy_user_test_oob+0x4aa/0x10f0
[   17.095122]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.095146]  ? finish_task_switch.isra.0+0x153/0x700
[   17.095172]  ? __switch_to+0x47/0xf50
[   17.095199]  ? __schedule+0x10c6/0x2b60
[   17.095225]  ? __pfx_read_tsc+0x10/0x10
[   17.095248]  ? ktime_get_ts64+0x86/0x230
[   17.095274]  kunit_try_run_case+0x1a5/0x480
[   17.095301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.095325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.095351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.095376]  ? __kthread_parkme+0x82/0x180
[   17.095399]  ? preempt_count_sub+0x50/0x80
[   17.095423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.095449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.095486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.095512]  kthread+0x337/0x6f0
[   17.095533]  ? trace_preempt_on+0x20/0xc0
[   17.095559]  ? __pfx_kthread+0x10/0x10
[   17.095581]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.095604]  ? calculate_sigpending+0x7b/0xa0
[   17.095630]  ? __pfx_kthread+0x10/0x10
[   17.095653]  ret_from_fork+0x116/0x1d0
[   17.095673]  ? __pfx_kthread+0x10/0x10
[   17.095695]  ret_from_fork_asm+0x1a/0x30
[   17.095727]  </TASK>
[   17.095739] 
[   17.103956] Allocated by task 303:
[   17.104129]  kasan_save_stack+0x45/0x70
[   17.104283]  kasan_save_track+0x18/0x40
[   17.104426]  kasan_save_alloc_info+0x3b/0x50
[   17.104655]  __kasan_kmalloc+0xb7/0xc0
[   17.104848]  __kmalloc_noprof+0x1c9/0x500
[   17.105061]  kunit_kmalloc_array+0x25/0x60
[   17.105286]  copy_user_test_oob+0xab/0x10f0
[   17.105519]  kunit_try_run_case+0x1a5/0x480
[   17.105720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.105904]  kthread+0x337/0x6f0
[   17.106090]  ret_from_fork+0x116/0x1d0
[   17.106291]  ret_from_fork_asm+0x1a/0x30
[   17.106511] 
[   17.106609] The buggy address belongs to the object at ffff8881029dff00
[   17.106609]  which belongs to the cache kmalloc-128 of size 128
[   17.107114] The buggy address is located 0 bytes inside of
[   17.107114]  allocated 120-byte region [ffff8881029dff00, ffff8881029dff78)
[   17.107633] 
[   17.107721] The buggy address belongs to the physical page:
[   17.107978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029df
[   17.108301] flags: 0x200000000000000(node=0|zone=2)
[   17.108522] page_type: f5(slab)
[   17.108703] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.109066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.109310] page dumped because: kasan: bad access detected
[   17.109502] 
[   17.109577] Memory state around the buggy address:
[   17.109743]  ffff8881029dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.110269]  ffff8881029dfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.110602] >ffff8881029dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.110963]                                                                 ^
[   17.111258]  ffff8881029dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.111492]  ffff8881029e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.111714] ==================================================================
[   17.112366] ==================================================================
[   17.112798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   17.113183] Write of size 121 at addr ffff8881029dff00 by task kunit_try_catch/303
[   17.113620] 
[   17.113781] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   17.113837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.113850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.113874] Call Trace:
[   17.113893]  <TASK>
[   17.113910]  dump_stack_lvl+0x73/0xb0
[   17.113943]  print_report+0xd1/0x610
[   17.113968]  ? __virt_addr_valid+0x1db/0x2d0
[   17.113994]  ? copy_user_test_oob+0x557/0x10f0
[   17.114019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.114043]  ? copy_user_test_oob+0x557/0x10f0
[   17.114069]  kasan_report+0x141/0x180
[   17.114092]  ? copy_user_test_oob+0x557/0x10f0
[   17.114127]  kasan_check_range+0x10c/0x1c0
[   17.114153]  __kasan_check_write+0x18/0x20
[   17.114174]  copy_user_test_oob+0x557/0x10f0
[   17.114201]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.114225]  ? finish_task_switch.isra.0+0x153/0x700
[   17.114250]  ? __switch_to+0x47/0xf50
[   17.114278]  ? __schedule+0x10c6/0x2b60
[   17.114304]  ? __pfx_read_tsc+0x10/0x10
[   17.114327]  ? ktime_get_ts64+0x86/0x230
[   17.114353]  kunit_try_run_case+0x1a5/0x480
[   17.114380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.114404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.114430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.114456]  ? __kthread_parkme+0x82/0x180
[   17.114493]  ? preempt_count_sub+0x50/0x80
[   17.114518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.114544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.114570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.114595]  kthread+0x337/0x6f0
[   17.114617]  ? trace_preempt_on+0x20/0xc0
[   17.114643]  ? __pfx_kthread+0x10/0x10
[   17.114665]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.114689]  ? calculate_sigpending+0x7b/0xa0
[   17.114715]  ? __pfx_kthread+0x10/0x10
[   17.114740]  ret_from_fork+0x116/0x1d0
[   17.114759]  ? __pfx_kthread+0x10/0x10
[   17.114782]  ret_from_fork_asm+0x1a/0x30
[   17.114815]  </TASK>
[   17.114826] 
[   17.122327] Allocated by task 303:
[   17.122510]  kasan_save_stack+0x45/0x70
[   17.122700]  kasan_save_track+0x18/0x40
[   17.122963]  kasan_save_alloc_info+0x3b/0x50
[   17.123121]  __kasan_kmalloc+0xb7/0xc0
[   17.123260]  __kmalloc_noprof+0x1c9/0x500
[   17.123465]  kunit_kmalloc_array+0x25/0x60
[   17.123686]  copy_user_test_oob+0xab/0x10f0
[   17.124038]  kunit_try_run_case+0x1a5/0x480
[   17.124217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.124454]  kthread+0x337/0x6f0
[   17.124592]  ret_from_fork+0x116/0x1d0
[   17.124733]  ret_from_fork_asm+0x1a/0x30
[   17.124881] 
[   17.124981] The buggy address belongs to the object at ffff8881029dff00
[   17.124981]  which belongs to the cache kmalloc-128 of size 128
[   17.125536] The buggy address is located 0 bytes inside of
[   17.125536]  allocated 120-byte region [ffff8881029dff00, ffff8881029dff78)
[   17.125984] 
[   17.126061] The buggy address belongs to the physical page:
[   17.126248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029df
[   17.126528] flags: 0x200000000000000(node=0|zone=2)
[   17.126790] page_type: f5(slab)
[   17.126966] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.127315] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.127665] page dumped because: kasan: bad access detected
[   17.128131] 
[   17.128233] Memory state around the buggy address:
[   17.128402]  ffff8881029dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.128649]  ffff8881029dfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.129229] >ffff8881029dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.129556]                                                                 ^
[   17.129857]  ffff8881029dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.130113]  ffff8881029e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.130447] ==================================================================