Hay
Date
July 23, 2025, 2:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.636493] ==================================================================
[   18.636822] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   18.637007] Read of size 121 at addr fff00000c648f500 by task kunit_try_catch/285
[   18.637070] 
[   18.637130] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.637468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.637581] Hardware name: linux,dummy-virt (DT)
[   18.637804] Call trace:
[   18.637845]  show_stack+0x20/0x38 (C)
[   18.637915]  dump_stack_lvl+0x8c/0xd0
[   18.637963]  print_report+0x118/0x5d0
[   18.638012]  kasan_report+0xdc/0x128
[   18.638164]  kasan_check_range+0x100/0x1a8
[   18.638228]  __kasan_check_read+0x20/0x30
[   18.638274]  copy_user_test_oob+0x4a0/0xec8
[   18.638323]  kunit_try_run_case+0x170/0x3f0
[   18.638376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.638452]  kthread+0x328/0x630
[   18.638511]  ret_from_fork+0x10/0x20
[   18.639015] 
[   18.639142] Allocated by task 285:
[   18.639184]  kasan_save_stack+0x3c/0x68
[   18.639508]  kasan_save_track+0x20/0x40
[   18.639707]  kasan_save_alloc_info+0x40/0x58
[   18.639780]  __kasan_kmalloc+0xd4/0xd8
[   18.640072]  __kmalloc_noprof+0x198/0x4c8
[   18.640213]  kunit_kmalloc_array+0x34/0x88
[   18.640284]  copy_user_test_oob+0xac/0xec8
[   18.640539]  kunit_try_run_case+0x170/0x3f0
[   18.640762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.640873]  kthread+0x328/0x630
[   18.640950]  ret_from_fork+0x10/0x20
[   18.641067] 
[   18.641130] The buggy address belongs to the object at fff00000c648f500
[   18.641130]  which belongs to the cache kmalloc-128 of size 128
[   18.641295] The buggy address is located 0 bytes inside of
[   18.641295]  allocated 120-byte region [fff00000c648f500, fff00000c648f578)
[   18.641367] 
[   18.641389] The buggy address belongs to the physical page:
[   18.641763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648f
[   18.642117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.642241] page_type: f5(slab)
[   18.642360] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.642481] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.642911] page dumped because: kasan: bad access detected
[   18.643197] 
[   18.643249] Memory state around the buggy address:
[   18.643321]  fff00000c648f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.643405]  fff00000c648f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.643488] >fff00000c648f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.643767]                                                                 ^
[   18.643824]  fff00000c648f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.644143]  fff00000c648f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.644474] ==================================================================
[   18.577422] ==================================================================
[   18.577524] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   18.577605] Write of size 121 at addr fff00000c648f500 by task kunit_try_catch/285
[   18.578458] 
[   18.578580] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.579010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.579100] Hardware name: linux,dummy-virt (DT)
[   18.579193] Call trace:
[   18.579241]  show_stack+0x20/0x38 (C)
[   18.579318]  dump_stack_lvl+0x8c/0xd0
[   18.579708]  print_report+0x118/0x5d0
[   18.579803]  kasan_report+0xdc/0x128
[   18.579880]  kasan_check_range+0x100/0x1a8
[   18.580145]  __kasan_check_write+0x20/0x30
[   18.580232]  copy_user_test_oob+0x234/0xec8
[   18.580507]  kunit_try_run_case+0x170/0x3f0
[   18.580608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.580696]  kthread+0x328/0x630
[   18.580769]  ret_from_fork+0x10/0x20
[   18.580886] 
[   18.580944] Allocated by task 285:
[   18.581188]  kasan_save_stack+0x3c/0x68
[   18.581270]  kasan_save_track+0x20/0x40
[   18.581563]  kasan_save_alloc_info+0x40/0x58
[   18.581649]  __kasan_kmalloc+0xd4/0xd8
[   18.581712]  __kmalloc_noprof+0x198/0x4c8
[   18.581780]  kunit_kmalloc_array+0x34/0x88
[   18.582096]  copy_user_test_oob+0xac/0xec8
[   18.582199]  kunit_try_run_case+0x170/0x3f0
[   18.582275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.582324]  kthread+0x328/0x630
[   18.582387]  ret_from_fork+0x10/0x20
[   18.582718] 
[   18.582770] The buggy address belongs to the object at fff00000c648f500
[   18.582770]  which belongs to the cache kmalloc-128 of size 128
[   18.582905] The buggy address is located 0 bytes inside of
[   18.582905]  allocated 120-byte region [fff00000c648f500, fff00000c648f578)
[   18.582977] 
[   18.583174] The buggy address belongs to the physical page:
[   18.583366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648f
[   18.583532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.583893] page_type: f5(slab)
[   18.583969] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.584131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.584462] page dumped because: kasan: bad access detected
[   18.584561] 
[   18.584660] Memory state around the buggy address:
[   18.584739]  fff00000c648f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.585166]  fff00000c648f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.585241] >fff00000c648f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.585291]                                                                 ^
[   18.585339]  fff00000c648f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.585418]  fff00000c648f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.585478] ==================================================================
[   18.594347] ==================================================================
[   18.594628] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   18.594699] Read of size 121 at addr fff00000c648f500 by task kunit_try_catch/285
[   18.595092] 
[   18.595133] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.595605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.596039] Hardware name: linux,dummy-virt (DT)
[   18.596118] Call trace:
[   18.596254]  show_stack+0x20/0x38 (C)
[   18.596339]  dump_stack_lvl+0x8c/0xd0
[   18.596430]  print_report+0x118/0x5d0
[   18.596554]  kasan_report+0xdc/0x128
[   18.596823]  kasan_check_range+0x100/0x1a8
[   18.597003]  __kasan_check_read+0x20/0x30
[   18.597088]  copy_user_test_oob+0x728/0xec8
[   18.597250]  kunit_try_run_case+0x170/0x3f0
[   18.597445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.597551]  kthread+0x328/0x630
[   18.597613]  ret_from_fork+0x10/0x20
[   18.598067] 
[   18.598122] Allocated by task 285:
[   18.598228]  kasan_save_stack+0x3c/0x68
[   18.598315]  kasan_save_track+0x20/0x40
[   18.598409]  kasan_save_alloc_info+0x40/0x58
[   18.598637]  __kasan_kmalloc+0xd4/0xd8
[   18.598859]  __kmalloc_noprof+0x198/0x4c8
[   18.599006]  kunit_kmalloc_array+0x34/0x88
[   18.599095]  copy_user_test_oob+0xac/0xec8
[   18.599240]  kunit_try_run_case+0x170/0x3f0
[   18.599281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.599328]  kthread+0x328/0x630
[   18.599364]  ret_from_fork+0x10/0x20
[   18.599693] 
[   18.599749] The buggy address belongs to the object at fff00000c648f500
[   18.599749]  which belongs to the cache kmalloc-128 of size 128
[   18.599925] The buggy address is located 0 bytes inside of
[   18.599925]  allocated 120-byte region [fff00000c648f500, fff00000c648f578)
[   18.600106] 
[   18.600155] The buggy address belongs to the physical page:
[   18.600223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648f
[   18.600554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.600709] page_type: f5(slab)
[   18.600773] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.601114] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.601270] page dumped because: kasan: bad access detected
[   18.601366] 
[   18.601509] Memory state around the buggy address:
[   18.601587]  fff00000c648f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.601636]  fff00000c648f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.602317] >fff00000c648f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.602397]                                                                 ^
[   18.602452]  fff00000c648f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.602500]  fff00000c648f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.602689] ==================================================================
[   18.620155] ==================================================================
[   18.620212] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   18.620267] Read of size 121 at addr fff00000c648f500 by task kunit_try_catch/285
[   18.620322] 
[   18.620357] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.620837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.621007] Hardware name: linux,dummy-virt (DT)
[   18.621076] Call trace:
[   18.621102]  show_stack+0x20/0x38 (C)
[   18.621162]  dump_stack_lvl+0x8c/0xd0
[   18.621352]  print_report+0x118/0x5d0
[   18.621840]  kasan_report+0xdc/0x128
[   18.622066]  kasan_check_range+0x100/0x1a8
[   18.622143]  __kasan_check_read+0x20/0x30
[   18.622247]  copy_user_test_oob+0x3c8/0xec8
[   18.622332]  kunit_try_run_case+0x170/0x3f0
[   18.622395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.622600]  kthread+0x328/0x630
[   18.622896]  ret_from_fork+0x10/0x20
[   18.623058] 
[   18.623109] Allocated by task 285:
[   18.623151]  kasan_save_stack+0x3c/0x68
[   18.623199]  kasan_save_track+0x20/0x40
[   18.623240]  kasan_save_alloc_info+0x40/0x58
[   18.623562]  __kasan_kmalloc+0xd4/0xd8
[   18.623639]  __kmalloc_noprof+0x198/0x4c8
[   18.624019]  kunit_kmalloc_array+0x34/0x88
[   18.624142]  copy_user_test_oob+0xac/0xec8
[   18.624228]  kunit_try_run_case+0x170/0x3f0
[   18.624364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.624414]  kthread+0x328/0x630
[   18.624479]  ret_from_fork+0x10/0x20
[   18.624789] 
[   18.624819] The buggy address belongs to the object at fff00000c648f500
[   18.624819]  which belongs to the cache kmalloc-128 of size 128
[   18.625281] The buggy address is located 0 bytes inside of
[   18.625281]  allocated 120-byte region [fff00000c648f500, fff00000c648f578)
[   18.625398] 
[   18.625475] The buggy address belongs to the physical page:
[   18.625511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648f
[   18.625579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.625640] page_type: f5(slab)
[   18.625680] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.625735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.625787] page dumped because: kasan: bad access detected
[   18.625831] 
[   18.625874] Memory state around the buggy address:
[   18.625922]  fff00000c648f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.625970]  fff00000c648f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626016] >fff00000c648f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.626058]                                                                 ^
[   18.626103]  fff00000c648f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626149]  fff00000c648f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626191] ==================================================================
[   18.611865] ==================================================================
[   18.612089] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   18.612175] Write of size 121 at addr fff00000c648f500 by task kunit_try_catch/285
[   18.612249] 
[   18.612344] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.612437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.612465] Hardware name: linux,dummy-virt (DT)
[   18.612803] Call trace:
[   18.612847]  show_stack+0x20/0x38 (C)
[   18.613243]  dump_stack_lvl+0x8c/0xd0
[   18.613343]  print_report+0x118/0x5d0
[   18.613445]  kasan_report+0xdc/0x128
[   18.613738]  kasan_check_range+0x100/0x1a8
[   18.613818]  __kasan_check_write+0x20/0x30
[   18.613943]  copy_user_test_oob+0x35c/0xec8
[   18.614018]  kunit_try_run_case+0x170/0x3f0
[   18.614109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.614185]  kthread+0x328/0x630
[   18.614231]  ret_from_fork+0x10/0x20
[   18.614286] 
[   18.614344] Allocated by task 285:
[   18.614401]  kasan_save_stack+0x3c/0x68
[   18.614454]  kasan_save_track+0x20/0x40
[   18.614805]  kasan_save_alloc_info+0x40/0x58
[   18.615151]  __kasan_kmalloc+0xd4/0xd8
[   18.615249]  __kmalloc_noprof+0x198/0x4c8
[   18.615324]  kunit_kmalloc_array+0x34/0x88
[   18.615403]  copy_user_test_oob+0xac/0xec8
[   18.615513]  kunit_try_run_case+0x170/0x3f0
[   18.615603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.615746]  kthread+0x328/0x630
[   18.615804]  ret_from_fork+0x10/0x20
[   18.615844] 
[   18.616081] The buggy address belongs to the object at fff00000c648f500
[   18.616081]  which belongs to the cache kmalloc-128 of size 128
[   18.616324] The buggy address is located 0 bytes inside of
[   18.616324]  allocated 120-byte region [fff00000c648f500, fff00000c648f578)
[   18.616437] 
[   18.616648] The buggy address belongs to the physical page:
[   18.616869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648f
[   18.616937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.616991] page_type: f5(slab)
[   18.617375] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.617447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.617781] page dumped because: kasan: bad access detected
[   18.617905] 
[   18.617953] Memory state around the buggy address:
[   18.618027]  fff00000c648f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.618187]  fff00000c648f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.618247] >fff00000c648f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.618600]                                                                 ^
[   18.618679]  fff00000c648f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.619045]  fff00000c648f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.619145] ==================================================================
[   18.627013] ==================================================================
[   18.627358] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   18.627435] Write of size 121 at addr fff00000c648f500 by task kunit_try_catch/285
[   18.627620] 
[   18.627790] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.628011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.628307] Hardware name: linux,dummy-virt (DT)
[   18.628617] Call trace:
[   18.628666]  show_stack+0x20/0x38 (C)
[   18.628722]  dump_stack_lvl+0x8c/0xd0
[   18.628843]  print_report+0x118/0x5d0
[   18.628915]  kasan_report+0xdc/0x128
[   18.628962]  kasan_check_range+0x100/0x1a8
[   18.629295]  __kasan_check_write+0x20/0x30
[   18.629356]  copy_user_test_oob+0x434/0xec8
[   18.629678]  kunit_try_run_case+0x170/0x3f0
[   18.629845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.630030]  kthread+0x328/0x630
[   18.630084]  ret_from_fork+0x10/0x20
[   18.630414] 
[   18.630475] Allocated by task 285:
[   18.630510]  kasan_save_stack+0x3c/0x68
[   18.630666]  kasan_save_track+0x20/0x40
[   18.630750]  kasan_save_alloc_info+0x40/0x58
[   18.630820]  __kasan_kmalloc+0xd4/0xd8
[   18.631120]  __kmalloc_noprof+0x198/0x4c8
[   18.631321]  kunit_kmalloc_array+0x34/0x88
[   18.631401]  copy_user_test_oob+0xac/0xec8
[   18.631724]  kunit_try_run_case+0x170/0x3f0
[   18.631818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.632180]  kthread+0x328/0x630
[   18.632312]  ret_from_fork+0x10/0x20
[   18.632400] 
[   18.632463] The buggy address belongs to the object at fff00000c648f500
[   18.632463]  which belongs to the cache kmalloc-128 of size 128
[   18.632820] The buggy address is located 0 bytes inside of
[   18.632820]  allocated 120-byte region [fff00000c648f500, fff00000c648f578)
[   18.633286] 
[   18.633334] The buggy address belongs to the physical page:
[   18.633394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648f
[   18.633838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.633932] page_type: f5(slab)
[   18.634013] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.634147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.634219] page dumped because: kasan: bad access detected
[   18.634262] 
[   18.634283] Memory state around the buggy address:
[   18.634603]  fff00000c648f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.634961]  fff00000c648f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.635095] >fff00000c648f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.635181]                                                                 ^
[   18.635373]  fff00000c648f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.635431]  fff00000c648f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.635474] ==================================================================

[   16.465850] ==================================================================
[   16.466122] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.466405] Write of size 121 at addr ffff888102b16500 by task kunit_try_catch/302
[   16.466750] 
[   16.466852] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.466896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.466909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.466931] Call Trace:
[   16.466947]  <TASK>
[   16.466965]  dump_stack_lvl+0x73/0xb0
[   16.466994]  print_report+0xd1/0x610
[   16.467016]  ? __virt_addr_valid+0x1db/0x2d0
[   16.467039]  ? copy_user_test_oob+0x557/0x10f0
[   16.467064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.467087]  ? copy_user_test_oob+0x557/0x10f0
[   16.467112]  kasan_report+0x141/0x180
[   16.467148]  ? copy_user_test_oob+0x557/0x10f0
[   16.467177]  kasan_check_range+0x10c/0x1c0
[   16.467201]  __kasan_check_write+0x18/0x20
[   16.467221]  copy_user_test_oob+0x557/0x10f0
[   16.467247]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.467271]  ? finish_task_switch.isra.0+0x153/0x700
[   16.467294]  ? __switch_to+0x47/0xf50
[   16.467320]  ? __schedule+0x10c6/0x2b60
[   16.467343]  ? __pfx_read_tsc+0x10/0x10
[   16.467365]  ? ktime_get_ts64+0x86/0x230
[   16.467389]  kunit_try_run_case+0x1a5/0x480
[   16.467414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.467462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.467487]  ? __kthread_parkme+0x82/0x180
[   16.467509]  ? preempt_count_sub+0x50/0x80
[   16.467533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.467582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.467607]  kthread+0x337/0x6f0
[   16.467628]  ? trace_preempt_on+0x20/0xc0
[   16.467651]  ? __pfx_kthread+0x10/0x10
[   16.467673]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.467696]  ? calculate_sigpending+0x7b/0xa0
[   16.467720]  ? __pfx_kthread+0x10/0x10
[   16.467743]  ret_from_fork+0x116/0x1d0
[   16.467762]  ? __pfx_kthread+0x10/0x10
[   16.467783]  ret_from_fork_asm+0x1a/0x30
[   16.467824]  </TASK>
[   16.467835] 
[   16.475993] Allocated by task 302:
[   16.476238]  kasan_save_stack+0x45/0x70
[   16.476389]  kasan_save_track+0x18/0x40
[   16.476528]  kasan_save_alloc_info+0x3b/0x50
[   16.476683]  __kasan_kmalloc+0xb7/0xc0
[   16.476829]  __kmalloc_noprof+0x1c9/0x500
[   16.476986]  kunit_kmalloc_array+0x25/0x60
[   16.477138]  copy_user_test_oob+0xab/0x10f0
[   16.478240]  kunit_try_run_case+0x1a5/0x480
[   16.478745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.479464]  kthread+0x337/0x6f0
[   16.480039]  ret_from_fork+0x116/0x1d0
[   16.480612]  ret_from_fork_asm+0x1a/0x30
[   16.481480] 
[   16.481746] The buggy address belongs to the object at ffff888102b16500
[   16.481746]  which belongs to the cache kmalloc-128 of size 128
[   16.483464] The buggy address is located 0 bytes inside of
[   16.483464]  allocated 120-byte region [ffff888102b16500, ffff888102b16578)
[   16.484341] 
[   16.484591] The buggy address belongs to the physical page:
[   16.485459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b16
[   16.486057] flags: 0x200000000000000(node=0|zone=2)
[   16.486848] page_type: f5(slab)
[   16.487304] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.487553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.487788] page dumped because: kasan: bad access detected
[   16.488184] 
[   16.488308] Memory state around the buggy address:
[   16.488805]  ffff888102b16400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.489155]  ffff888102b16480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.489802] >ffff888102b16500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.490341]                                                                 ^
[   16.490828]  ffff888102b16580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.491048]  ffff888102b16600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.491727] ==================================================================
[   16.441662] ==================================================================
[   16.441983] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.442341] Read of size 121 at addr ffff888102b16500 by task kunit_try_catch/302
[   16.442580] 
[   16.442692] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.442735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.442748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.442770] Call Trace:
[   16.442783]  <TASK>
[   16.442797]  dump_stack_lvl+0x73/0xb0
[   16.442835]  print_report+0xd1/0x610
[   16.442858]  ? __virt_addr_valid+0x1db/0x2d0
[   16.442881]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.442905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.442928]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.442953]  kasan_report+0x141/0x180
[   16.442976]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.443005]  kasan_check_range+0x10c/0x1c0
[   16.443030]  __kasan_check_read+0x15/0x20
[   16.443050]  copy_user_test_oob+0x4aa/0x10f0
[   16.443076]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.443099]  ? finish_task_switch.isra.0+0x153/0x700
[   16.443134]  ? __switch_to+0x47/0xf50
[   16.443161]  ? __schedule+0x10c6/0x2b60
[   16.443183]  ? __pfx_read_tsc+0x10/0x10
[   16.443205]  ? ktime_get_ts64+0x86/0x230
[   16.443230]  kunit_try_run_case+0x1a5/0x480
[   16.443255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.443279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.443303]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.443328]  ? __kthread_parkme+0x82/0x180
[   16.443350]  ? preempt_count_sub+0x50/0x80
[   16.443374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.443399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.443424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.443449]  kthread+0x337/0x6f0
[   16.443470]  ? trace_preempt_on+0x20/0xc0
[   16.443494]  ? __pfx_kthread+0x10/0x10
[   16.443515]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.443538]  ? calculate_sigpending+0x7b/0xa0
[   16.443562]  ? __pfx_kthread+0x10/0x10
[   16.443585]  ret_from_fork+0x116/0x1d0
[   16.443605]  ? __pfx_kthread+0x10/0x10
[   16.443626]  ret_from_fork_asm+0x1a/0x30
[   16.443657]  </TASK>
[   16.443669] 
[   16.456982] Allocated by task 302:
[   16.457368]  kasan_save_stack+0x45/0x70
[   16.457728]  kasan_save_track+0x18/0x40
[   16.458106]  kasan_save_alloc_info+0x3b/0x50
[   16.458513]  __kasan_kmalloc+0xb7/0xc0
[   16.458761]  __kmalloc_noprof+0x1c9/0x500
[   16.458915]  kunit_kmalloc_array+0x25/0x60
[   16.459064]  copy_user_test_oob+0xab/0x10f0
[   16.459238]  kunit_try_run_case+0x1a5/0x480
[   16.459387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.459565]  kthread+0x337/0x6f0
[   16.459689]  ret_from_fork+0x116/0x1d0
[   16.459834]  ret_from_fork_asm+0x1a/0x30
[   16.459996] 
[   16.460096] The buggy address belongs to the object at ffff888102b16500
[   16.460096]  which belongs to the cache kmalloc-128 of size 128
[   16.460575] The buggy address is located 0 bytes inside of
[   16.460575]  allocated 120-byte region [ffff888102b16500, ffff888102b16578)
[   16.461065] 
[   16.461184] The buggy address belongs to the physical page:
[   16.461402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b16
[   16.461691] flags: 0x200000000000000(node=0|zone=2)
[   16.461873] page_type: f5(slab)
[   16.462035] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.462396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.462681] page dumped because: kasan: bad access detected
[   16.462955] 
[   16.463053] Memory state around the buggy address:
[   16.463467]  ffff888102b16400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.463753]  ffff888102b16480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464016] >ffff888102b16500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.464360]                                                                 ^
[   16.464739]  ffff888102b16580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.465044]  ffff888102b16600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.465357] ==================================================================
[   16.492805] ==================================================================
[   16.493499] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.493741] Read of size 121 at addr ffff888102b16500 by task kunit_try_catch/302
[   16.493987] 
[   16.494105] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.494152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.494166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.494188] Call Trace:
[   16.494241]  <TASK>
[   16.494258]  dump_stack_lvl+0x73/0xb0
[   16.494300]  print_report+0xd1/0x610
[   16.494324]  ? __virt_addr_valid+0x1db/0x2d0
[   16.494346]  ? copy_user_test_oob+0x604/0x10f0
[   16.494385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.494408]  ? copy_user_test_oob+0x604/0x10f0
[   16.494432]  kasan_report+0x141/0x180
[   16.494456]  ? copy_user_test_oob+0x604/0x10f0
[   16.494485]  kasan_check_range+0x10c/0x1c0
[   16.494510]  __kasan_check_read+0x15/0x20
[   16.494530]  copy_user_test_oob+0x604/0x10f0
[   16.494557]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.494580]  ? finish_task_switch.isra.0+0x153/0x700
[   16.494604]  ? __switch_to+0x47/0xf50
[   16.494629]  ? __schedule+0x10c6/0x2b60
[   16.494653]  ? __pfx_read_tsc+0x10/0x10
[   16.494674]  ? ktime_get_ts64+0x86/0x230
[   16.494698]  kunit_try_run_case+0x1a5/0x480
[   16.494723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.494747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.494771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.494796]  ? __kthread_parkme+0x82/0x180
[   16.494852]  ? preempt_count_sub+0x50/0x80
[   16.494876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.494901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.494936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.494961]  kthread+0x337/0x6f0
[   16.494982]  ? trace_preempt_on+0x20/0xc0
[   16.495005]  ? __pfx_kthread+0x10/0x10
[   16.495027]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.495050]  ? calculate_sigpending+0x7b/0xa0
[   16.495080]  ? __pfx_kthread+0x10/0x10
[   16.495116]  ret_from_fork+0x116/0x1d0
[   16.495136]  ? __pfx_kthread+0x10/0x10
[   16.495156]  ret_from_fork_asm+0x1a/0x30
[   16.495188]  </TASK>
[   16.495199] 
[   16.508523] Allocated by task 302:
[   16.508903]  kasan_save_stack+0x45/0x70
[   16.509205]  kasan_save_track+0x18/0x40
[   16.509494]  kasan_save_alloc_info+0x3b/0x50
[   16.509652]  __kasan_kmalloc+0xb7/0xc0
[   16.509788]  __kmalloc_noprof+0x1c9/0x500
[   16.509938]  kunit_kmalloc_array+0x25/0x60
[   16.510081]  copy_user_test_oob+0xab/0x10f0
[   16.510537]  kunit_try_run_case+0x1a5/0x480
[   16.510966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.511450]  kthread+0x337/0x6f0
[   16.511787]  ret_from_fork+0x116/0x1d0
[   16.512188]  ret_from_fork_asm+0x1a/0x30
[   16.512641] 
[   16.512904] The buggy address belongs to the object at ffff888102b16500
[   16.512904]  which belongs to the cache kmalloc-128 of size 128
[   16.514250] The buggy address is located 0 bytes inside of
[   16.514250]  allocated 120-byte region [ffff888102b16500, ffff888102b16578)
[   16.514616] 
[   16.514691] The buggy address belongs to the physical page:
[   16.514883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b16
[   16.515203] flags: 0x200000000000000(node=0|zone=2)
[   16.515484] page_type: f5(slab)
[   16.515662] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.515985] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.516709] page dumped because: kasan: bad access detected
[   16.517000] 
[   16.517081] Memory state around the buggy address:
[   16.517405]  ffff888102b16400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.517734]  ffff888102b16480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.518053] >ffff888102b16500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.518310]                                                                 ^
[   16.518631]  ffff888102b16580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.518941]  ffff888102b16600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.519507] ==================================================================
[   16.424315] ==================================================================
[   16.424657] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.424970] Write of size 121 at addr ffff888102b16500 by task kunit_try_catch/302
[   16.425316] 
[   16.425438] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.425484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.425497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.425519] Call Trace:
[   16.425533]  <TASK>
[   16.425549]  dump_stack_lvl+0x73/0xb0
[   16.425579]  print_report+0xd1/0x610
[   16.425602]  ? __virt_addr_valid+0x1db/0x2d0
[   16.425627]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.425651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.425675]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.425701]  kasan_report+0x141/0x180
[   16.425725]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.425755]  kasan_check_range+0x10c/0x1c0
[   16.425780]  __kasan_check_write+0x18/0x20
[   16.425800]  copy_user_test_oob+0x3fd/0x10f0
[   16.425838]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.425862]  ? finish_task_switch.isra.0+0x153/0x700
[   16.425886]  ? __switch_to+0x47/0xf50
[   16.425913]  ? __schedule+0x10c6/0x2b60
[   16.425937]  ? __pfx_read_tsc+0x10/0x10
[   16.425959]  ? ktime_get_ts64+0x86/0x230
[   16.425984]  kunit_try_run_case+0x1a5/0x480
[   16.426010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.426059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.426084]  ? __kthread_parkme+0x82/0x180
[   16.426115]  ? preempt_count_sub+0x50/0x80
[   16.426140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.426190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.426216]  kthread+0x337/0x6f0
[   16.426236]  ? trace_preempt_on+0x20/0xc0
[   16.426261]  ? __pfx_kthread+0x10/0x10
[   16.426283]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.426306]  ? calculate_sigpending+0x7b/0xa0
[   16.426330]  ? __pfx_kthread+0x10/0x10
[   16.426353]  ret_from_fork+0x116/0x1d0
[   16.426373]  ? __pfx_kthread+0x10/0x10
[   16.426395]  ret_from_fork_asm+0x1a/0x30
[   16.426426]  </TASK>
[   16.426438] 
[   16.433664] Allocated by task 302:
[   16.433841]  kasan_save_stack+0x45/0x70
[   16.434024]  kasan_save_track+0x18/0x40
[   16.434233]  kasan_save_alloc_info+0x3b/0x50
[   16.434427]  __kasan_kmalloc+0xb7/0xc0
[   16.434597]  __kmalloc_noprof+0x1c9/0x500
[   16.434771]  kunit_kmalloc_array+0x25/0x60
[   16.434976]  copy_user_test_oob+0xab/0x10f0
[   16.435204]  kunit_try_run_case+0x1a5/0x480
[   16.435389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.435599]  kthread+0x337/0x6f0
[   16.435760]  ret_from_fork+0x116/0x1d0
[   16.435948]  ret_from_fork_asm+0x1a/0x30
[   16.436106] 
[   16.436207] The buggy address belongs to the object at ffff888102b16500
[   16.436207]  which belongs to the cache kmalloc-128 of size 128
[   16.436686] The buggy address is located 0 bytes inside of
[   16.436686]  allocated 120-byte region [ffff888102b16500, ffff888102b16578)
[   16.437124] 
[   16.437220] The buggy address belongs to the physical page:
[   16.437459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b16
[   16.437747] flags: 0x200000000000000(node=0|zone=2)
[   16.437996] page_type: f5(slab)
[   16.438160] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.438463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.438769] page dumped because: kasan: bad access detected
[   16.439008] 
[   16.439093] Memory state around the buggy address:
[   16.439287]  ffff888102b16400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.439557]  ffff888102b16480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.439777] >ffff888102b16500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.440004]                                                                 ^
[   16.440295]  ffff888102b16580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.440878]  ffff888102b16600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.441112] ==================================================================