Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   36.518870] ==================================================================
[   36.519744] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   36.520030] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.520188] 
[   36.520356] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.520578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.520650] Hardware name: linux,dummy-virt (DT)
[   36.520733] Call trace:
[   36.520802]  show_stack+0x20/0x38 (C)
[   36.521306]  dump_stack_lvl+0x8c/0xd0
[   36.521515]  print_report+0x118/0x608
[   36.521653]  kasan_report+0xdc/0x128
[   36.521802]  kasan_check_range+0x100/0x1a8
[   36.521940]  __kasan_check_write+0x20/0x30
[   36.522368]  copy_user_test_oob+0x234/0xec8
[   36.522683]  kunit_try_run_case+0x170/0x3f0
[   36.522900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.523041]  kthread+0x328/0x630
[   36.523193]  ret_from_fork+0x10/0x20
[   36.523325] 
[   36.523385] Allocated by task 296:
[   36.523478]  kasan_save_stack+0x3c/0x68
[   36.523585]  kasan_save_track+0x20/0x40
[   36.523695]  kasan_save_alloc_info+0x40/0x58
[   36.523817]  __kasan_kmalloc+0xd4/0xd8
[   36.523926]  __kmalloc_noprof+0x198/0x4c8
[   36.524045]  kunit_kmalloc_array+0x34/0x88
[   36.524145]  copy_user_test_oob+0xac/0xec8
[   36.524247]  kunit_try_run_case+0x170/0x3f0
[   36.524382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.524484]  kthread+0x328/0x630
[   36.524661]  ret_from_fork+0x10/0x20
[   36.524938] 
[   36.524996] The buggy address belongs to the object at fff00000c6515800
[   36.524996]  which belongs to the cache kmalloc-128 of size 128
[   36.525208] The buggy address is located 0 bytes inside of
[   36.525208]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.525368] 
[   36.525422] The buggy address belongs to the physical page:
[   36.525739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.526006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.526144] page_type: f5(slab)
[   36.526261] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.526407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.526603] page dumped because: kasan: bad access detected
[   36.526805] 
[   36.526861] Memory state around the buggy address:
[   36.526961]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.527087]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.527549] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.527831]                                                                 ^
[   36.528443]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.528928]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.529096] ==================================================================
[   36.594303] ==================================================================
[   36.594468] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   36.594634] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.594774] 
[   36.594863] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.595098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.595169] Hardware name: linux,dummy-virt (DT)
[   36.595259] Call trace:
[   36.595619]  show_stack+0x20/0x38 (C)
[   36.595908]  dump_stack_lvl+0x8c/0xd0
[   36.596197]  print_report+0x118/0x608
[   36.596765]  kasan_report+0xdc/0x128
[   36.597022]  kasan_check_range+0x100/0x1a8
[   36.597314]  __kasan_check_read+0x20/0x30
[   36.597679]  copy_user_test_oob+0x3c8/0xec8
[   36.597796]  kunit_try_run_case+0x170/0x3f0
[   36.597912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.598403]  kthread+0x328/0x630
[   36.598523]  ret_from_fork+0x10/0x20
[   36.599195] 
[   36.599306] Allocated by task 296:
[   36.599513]  kasan_save_stack+0x3c/0x68
[   36.599650]  kasan_save_track+0x20/0x40
[   36.599740]  kasan_save_alloc_info+0x40/0x58
[   36.600097]  __kasan_kmalloc+0xd4/0xd8
[   36.600214]  __kmalloc_noprof+0x198/0x4c8
[   36.600388]  kunit_kmalloc_array+0x34/0x88
[   36.600524]  copy_user_test_oob+0xac/0xec8
[   36.600757]  kunit_try_run_case+0x170/0x3f0
[   36.601124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.601244]  kthread+0x328/0x630
[   36.601437]  ret_from_fork+0x10/0x20
[   36.601659] 
[   36.601724] The buggy address belongs to the object at fff00000c6515800
[   36.601724]  which belongs to the cache kmalloc-128 of size 128
[   36.601970] The buggy address is located 0 bytes inside of
[   36.601970]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.602303] 
[   36.602366] The buggy address belongs to the physical page:
[   36.602478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.602632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.602830] page_type: f5(slab)
[   36.603053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.603497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.603718] page dumped because: kasan: bad access detected
[   36.603879] 
[   36.604159] Memory state around the buggy address:
[   36.604273]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.604387]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.604622] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.604787]                                                                 ^
[   36.604918]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605302]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605589] ==================================================================
[   36.621437] ==================================================================
[   36.621589] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   36.622004] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.622136] 
[   36.622235] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.622470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.622550] Hardware name: linux,dummy-virt (DT)
[   36.622645] Call trace:
[   36.622714]  show_stack+0x20/0x38 (C)
[   36.622913]  dump_stack_lvl+0x8c/0xd0
[   36.623042]  print_report+0x118/0x608
[   36.623164]  kasan_report+0xdc/0x128
[   36.623304]  kasan_check_range+0x100/0x1a8
[   36.623439]  __kasan_check_read+0x20/0x30
[   36.623725]  copy_user_test_oob+0x4a0/0xec8
[   36.624087]  kunit_try_run_case+0x170/0x3f0
[   36.624208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.624420]  kthread+0x328/0x630
[   36.624541]  ret_from_fork+0x10/0x20
[   36.624690] 
[   36.624746] Allocated by task 296:
[   36.624830]  kasan_save_stack+0x3c/0x68
[   36.624940]  kasan_save_track+0x20/0x40
[   36.625036]  kasan_save_alloc_info+0x40/0x58
[   36.625120]  __kasan_kmalloc+0xd4/0xd8
[   36.625190]  __kmalloc_noprof+0x198/0x4c8
[   36.625292]  kunit_kmalloc_array+0x34/0x88
[   36.625386]  copy_user_test_oob+0xac/0xec8
[   36.625487]  kunit_try_run_case+0x170/0x3f0
[   36.625587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.625719]  kthread+0x328/0x630
[   36.625801]  ret_from_fork+0x10/0x20
[   36.626285] 
[   36.626386] The buggy address belongs to the object at fff00000c6515800
[   36.626386]  which belongs to the cache kmalloc-128 of size 128
[   36.628376] The buggy address is located 0 bytes inside of
[   36.628376]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.628476] 
[   36.628511] The buggy address belongs to the physical page:
[   36.628588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.628763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.629419] page_type: f5(slab)
[   36.629522] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.629862] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.629999] page dumped because: kasan: bad access detected
[   36.630272] 
[   36.630326] Memory state around the buggy address:
[   36.630478]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.630697]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.631179] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.631404]                                                                 ^
[   36.631617]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.632009]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.632177] ==================================================================
[   36.543586] ==================================================================
[   36.543828] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   36.544045] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.544188] 
[   36.544285] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.544658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.544742] Hardware name: linux,dummy-virt (DT)
[   36.544837] Call trace:
[   36.544904]  show_stack+0x20/0x38 (C)
[   36.545039]  dump_stack_lvl+0x8c/0xd0
[   36.545159]  print_report+0x118/0x608
[   36.545281]  kasan_report+0xdc/0x128
[   36.545381]  kasan_check_range+0x100/0x1a8
[   36.545479]  __kasan_check_read+0x20/0x30
[   36.545630]  copy_user_test_oob+0x728/0xec8
[   36.545782]  kunit_try_run_case+0x170/0x3f0
[   36.545893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.546001]  kthread+0x328/0x630
[   36.546081]  ret_from_fork+0x10/0x20
[   36.546178] 
[   36.546226] Allocated by task 296:
[   36.546297]  kasan_save_stack+0x3c/0x68
[   36.546416]  kasan_save_track+0x20/0x40
[   36.546511]  kasan_save_alloc_info+0x40/0x58
[   36.546663]  __kasan_kmalloc+0xd4/0xd8
[   36.546785]  __kmalloc_noprof+0x198/0x4c8
[   36.546915]  kunit_kmalloc_array+0x34/0x88
[   36.547050]  copy_user_test_oob+0xac/0xec8
[   36.547188]  kunit_try_run_case+0x170/0x3f0
[   36.547312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.547450]  kthread+0x328/0x630
[   36.547541]  ret_from_fork+0x10/0x20
[   36.547674] 
[   36.547729] The buggy address belongs to the object at fff00000c6515800
[   36.547729]  which belongs to the cache kmalloc-128 of size 128
[   36.547893] The buggy address is located 0 bytes inside of
[   36.547893]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.548086] 
[   36.548230] The buggy address belongs to the physical page:
[   36.548398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.548641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.548796] page_type: f5(slab)
[   36.548912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.549032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.549174] page dumped because: kasan: bad access detected
[   36.549243] 
[   36.549283] Memory state around the buggy address:
[   36.549388]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.549495]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.549623] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.549731]                                                                 ^
[   36.549883]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550054]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550190] ==================================================================
[   36.579521] ==================================================================
[   36.580028] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   36.580198] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.580411] 
[   36.580724] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.581283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.581375] Hardware name: linux,dummy-virt (DT)
[   36.581571] Call trace:
[   36.581727]  show_stack+0x20/0x38 (C)
[   36.582304]  dump_stack_lvl+0x8c/0xd0
[   36.582460]  print_report+0x118/0x608
[   36.582577]  kasan_report+0xdc/0x128
[   36.583120]  kasan_check_range+0x100/0x1a8
[   36.583365]  __kasan_check_write+0x20/0x30
[   36.583597]  copy_user_test_oob+0x35c/0xec8
[   36.583741]  kunit_try_run_case+0x170/0x3f0
[   36.583869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.584010]  kthread+0x328/0x630
[   36.584621]  ret_from_fork+0x10/0x20
[   36.584894] 
[   36.584991] Allocated by task 296:
[   36.585274]  kasan_save_stack+0x3c/0x68
[   36.585632]  kasan_save_track+0x20/0x40
[   36.585750]  kasan_save_alloc_info+0x40/0x58
[   36.585854]  __kasan_kmalloc+0xd4/0xd8
[   36.586023]  __kmalloc_noprof+0x198/0x4c8
[   36.586134]  kunit_kmalloc_array+0x34/0x88
[   36.586326]  copy_user_test_oob+0xac/0xec8
[   36.586718]  kunit_try_run_case+0x170/0x3f0
[   36.587239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.587592]  kthread+0x328/0x630
[   36.587709]  ret_from_fork+0x10/0x20
[   36.587798] 
[   36.587856] The buggy address belongs to the object at fff00000c6515800
[   36.587856]  which belongs to the cache kmalloc-128 of size 128
[   36.588025] The buggy address is located 0 bytes inside of
[   36.588025]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.588198] 
[   36.588258] The buggy address belongs to the physical page:
[   36.588695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.588860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.588986] page_type: f5(slab)
[   36.589075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.589173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.589491] page dumped because: kasan: bad access detected
[   36.589690] 
[   36.589742] Memory state around the buggy address:
[   36.589870]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.590069]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.590190] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.590302]                                                                 ^
[   36.590448]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.590685]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.591053] ==================================================================
[   36.608066] ==================================================================
[   36.608338] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   36.608591] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.608952] 
[   36.609050] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.609381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.609521] Hardware name: linux,dummy-virt (DT)
[   36.609654] Call trace:
[   36.609912]  show_stack+0x20/0x38 (C)
[   36.610053]  dump_stack_lvl+0x8c/0xd0
[   36.610172]  print_report+0x118/0x608
[   36.610290]  kasan_report+0xdc/0x128
[   36.610406]  kasan_check_range+0x100/0x1a8
[   36.610525]  __kasan_check_write+0x20/0x30
[   36.610976]  copy_user_test_oob+0x434/0xec8
[   36.611173]  kunit_try_run_case+0x170/0x3f0
[   36.611423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.612026]  kthread+0x328/0x630
[   36.612243]  ret_from_fork+0x10/0x20
[   36.612436] 
[   36.612493] Allocated by task 296:
[   36.612685]  kasan_save_stack+0x3c/0x68
[   36.612787]  kasan_save_track+0x20/0x40
[   36.612862]  kasan_save_alloc_info+0x40/0x58
[   36.613154]  __kasan_kmalloc+0xd4/0xd8
[   36.613278]  __kmalloc_noprof+0x198/0x4c8
[   36.613391]  kunit_kmalloc_array+0x34/0x88
[   36.613634]  copy_user_test_oob+0xac/0xec8
[   36.613843]  kunit_try_run_case+0x170/0x3f0
[   36.614054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.614167]  kthread+0x328/0x630
[   36.614571]  ret_from_fork+0x10/0x20
[   36.614826] 
[   36.614886] The buggy address belongs to the object at fff00000c6515800
[   36.614886]  which belongs to the cache kmalloc-128 of size 128
[   36.615067] The buggy address is located 0 bytes inside of
[   36.615067]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.615236] 
[   36.615293] The buggy address belongs to the physical page:
[   36.615379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.615546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.615688] page_type: f5(slab)
[   36.615805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.616495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.616693] page dumped because: kasan: bad access detected
[   36.616899] 
[   36.616953] Memory state around the buggy address:
[   36.617248]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.617379]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.617478] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.617591]                                                                 ^
[   36.617840]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.618088]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.618621] ==================================================================

[   30.729477] ==================================================================
[   30.730639] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   30.731290] Write of size 121 at addr ffff888102337100 by task kunit_try_catch/314
[   30.731874] 
[   30.732108] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.732253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.732289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.732345] Call Trace:
[   30.732395]  <TASK>
[   30.732450]  dump_stack_lvl+0x73/0xb0
[   30.732529]  print_report+0xd1/0x650
[   30.732580]  ? __virt_addr_valid+0x1db/0x2d0
[   30.732645]  ? copy_user_test_oob+0x557/0x10f0
[   30.732722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.732800]  ? copy_user_test_oob+0x557/0x10f0
[   30.732864]  kasan_report+0x141/0x180
[   30.732934]  ? copy_user_test_oob+0x557/0x10f0
[   30.733004]  kasan_check_range+0x10c/0x1c0
[   30.733063]  __kasan_check_write+0x18/0x20
[   30.733119]  copy_user_test_oob+0x557/0x10f0
[   30.733174]  ? __pfx_copy_user_test_oob+0x10/0x10
[   30.733220]  ? finish_task_switch.isra.0+0x153/0x700
[   30.733272]  ? __switch_to+0x47/0xf50
[   30.733333]  ? __schedule+0x10cc/0x2b60
[   30.733387]  ? __pfx_read_tsc+0x10/0x10
[   30.733437]  ? ktime_get_ts64+0x86/0x230
[   30.733665]  kunit_try_run_case+0x1a5/0x480
[   30.734578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.734644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.734703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.734759]  ? __kthread_parkme+0x82/0x180
[   30.734814]  ? preempt_count_sub+0x50/0x80
[   30.734870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.734929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.734986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.735043]  kthread+0x337/0x6f0
[   30.735092]  ? trace_preempt_on+0x20/0xc0
[   30.736087]  ? __pfx_kthread+0x10/0x10
[   30.736222]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.736281]  ? calculate_sigpending+0x7b/0xa0
[   30.736343]  ? __pfx_kthread+0x10/0x10
[   30.736396]  ret_from_fork+0x116/0x1d0
[   30.736458]  ? __pfx_kthread+0x10/0x10
[   30.736513]  ret_from_fork_asm+0x1a/0x30
[   30.736587]  </TASK>
[   30.736620] 
[   30.746193] Allocated by task 314:
[   30.746434]  kasan_save_stack+0x45/0x70
[   30.746877]  kasan_save_track+0x18/0x40
[   30.747243]  kasan_save_alloc_info+0x3b/0x50
[   30.747623]  __kasan_kmalloc+0xb7/0xc0
[   30.747953]  __kmalloc_noprof+0x1c9/0x500
[   30.748260]  kunit_kmalloc_array+0x25/0x60
[   30.748553]  copy_user_test_oob+0xab/0x10f0
[   30.748912]  kunit_try_run_case+0x1a5/0x480
[   30.749109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.749368]  kthread+0x337/0x6f0
[   30.749668]  ret_from_fork+0x116/0x1d0
[   30.749982]  ret_from_fork_asm+0x1a/0x30
[   30.750365] 
[   30.750549] The buggy address belongs to the object at ffff888102337100
[   30.750549]  which belongs to the cache kmalloc-128 of size 128
[   30.751337] The buggy address is located 0 bytes inside of
[   30.751337]  allocated 120-byte region [ffff888102337100, ffff888102337178)
[   30.751837] 
[   30.751947] The buggy address belongs to the physical page:
[   30.752210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102337
[   30.752813] flags: 0x200000000000000(node=0|zone=2)
[   30.753252] page_type: f5(slab)
[   30.753558] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.754166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.754462] page dumped because: kasan: bad access detected
[   30.754723] 
[   30.754883] Memory state around the buggy address:
[   30.755300]  ffff888102337000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.755843]  ffff888102337080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.756232] >ffff888102337100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.756718]                                                                 ^
[   30.756990]  ffff888102337180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.757286]  ffff888102337200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.757681] ==================================================================
[   30.759374] ==================================================================
[   30.760088] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   30.760730] Read of size 121 at addr ffff888102337100 by task kunit_try_catch/314
[   30.761130] 
[   30.761319] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.761437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.761478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.761529] Call Trace:
[   30.761575]  <TASK>
[   30.761624]  dump_stack_lvl+0x73/0xb0
[   30.761703]  print_report+0xd1/0x650
[   30.761787]  ? __virt_addr_valid+0x1db/0x2d0
[   30.761843]  ? copy_user_test_oob+0x604/0x10f0
[   30.761899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.761952]  ? copy_user_test_oob+0x604/0x10f0
[   30.762000]  kasan_report+0x141/0x180
[   30.762063]  ? copy_user_test_oob+0x604/0x10f0
[   30.762131]  kasan_check_range+0x10c/0x1c0
[   30.762227]  __kasan_check_read+0x15/0x20
[   30.762282]  copy_user_test_oob+0x604/0x10f0
[   30.762343]  ? __pfx_copy_user_test_oob+0x10/0x10
[   30.762396]  ? finish_task_switch.isra.0+0x153/0x700
[   30.762463]  ? __switch_to+0x47/0xf50
[   30.762519]  ? __schedule+0x10cc/0x2b60
[   30.762563]  ? __pfx_read_tsc+0x10/0x10
[   30.762610]  ? ktime_get_ts64+0x86/0x230
[   30.762662]  kunit_try_run_case+0x1a5/0x480
[   30.762746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.762794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.762856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.762910]  ? __kthread_parkme+0x82/0x180
[   30.762957]  ? preempt_count_sub+0x50/0x80
[   30.763006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.763053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.763098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.763179]  kthread+0x337/0x6f0
[   30.763228]  ? trace_preempt_on+0x20/0xc0
[   30.763281]  ? __pfx_kthread+0x10/0x10
[   30.763329]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.763377]  ? calculate_sigpending+0x7b/0xa0
[   30.763433]  ? __pfx_kthread+0x10/0x10
[   30.763495]  ret_from_fork+0x116/0x1d0
[   30.763536]  ? __pfx_kthread+0x10/0x10
[   30.763585]  ret_from_fork_asm+0x1a/0x30
[   30.763656]  </TASK>
[   30.763690] 
[   30.775393] Allocated by task 314:
[   30.775652]  kasan_save_stack+0x45/0x70
[   30.776058]  kasan_save_track+0x18/0x40
[   30.776392]  kasan_save_alloc_info+0x3b/0x50
[   30.776608]  __kasan_kmalloc+0xb7/0xc0
[   30.776915]  __kmalloc_noprof+0x1c9/0x500
[   30.777170]  kunit_kmalloc_array+0x25/0x60
[   30.777562]  copy_user_test_oob+0xab/0x10f0
[   30.777788]  kunit_try_run_case+0x1a5/0x480
[   30.777983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.778476]  kthread+0x337/0x6f0
[   30.778787]  ret_from_fork+0x116/0x1d0
[   30.779026]  ret_from_fork_asm+0x1a/0x30
[   30.779303] 
[   30.779402] The buggy address belongs to the object at ffff888102337100
[   30.779402]  which belongs to the cache kmalloc-128 of size 128
[   30.779993] The buggy address is located 0 bytes inside of
[   30.779993]  allocated 120-byte region [ffff888102337100, ffff888102337178)
[   30.780867] 
[   30.781074] The buggy address belongs to the physical page:
[   30.781399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102337
[   30.781756] flags: 0x200000000000000(node=0|zone=2)
[   30.781982] page_type: f5(slab)
[   30.782169] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.782775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.783364] page dumped because: kasan: bad access detected
[   30.783724] 
[   30.783885] Memory state around the buggy address:
[   30.784095]  ffff888102337000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.784555]  ffff888102337080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.784932] >ffff888102337100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.785449]                                                                 ^
[   30.785749]  ffff888102337180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.786033]  ffff888102337200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.786611] ==================================================================
[   30.701597] ==================================================================
[   30.702281] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   30.702867] Read of size 121 at addr ffff888102337100 by task kunit_try_catch/314
[   30.703313] 
[   30.703525] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.703644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.703679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.703732] Call Trace:
[   30.703780]  <TASK>
[   30.703829]  dump_stack_lvl+0x73/0xb0
[   30.703906]  print_report+0xd1/0x650
[   30.703963]  ? __virt_addr_valid+0x1db/0x2d0
[   30.704015]  ? copy_user_test_oob+0x4aa/0x10f0
[   30.704076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.704146]  ? copy_user_test_oob+0x4aa/0x10f0
[   30.704195]  kasan_report+0x141/0x180
[   30.704248]  ? copy_user_test_oob+0x4aa/0x10f0
[   30.704311]  kasan_check_range+0x10c/0x1c0
[   30.704362]  __kasan_check_read+0x15/0x20
[   30.704417]  copy_user_test_oob+0x4aa/0x10f0
[   30.704492]  ? __pfx_copy_user_test_oob+0x10/0x10
[   30.704544]  ? finish_task_switch.isra.0+0x153/0x700
[   30.704597]  ? __switch_to+0x47/0xf50
[   30.704668]  ? __schedule+0x10cc/0x2b60
[   30.704737]  ? __pfx_read_tsc+0x10/0x10
[   30.704789]  ? ktime_get_ts64+0x86/0x230
[   30.704840]  kunit_try_run_case+0x1a5/0x480
[   30.704895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.704953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.705006]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.705077]  ? __kthread_parkme+0x82/0x180
[   30.705130]  ? preempt_count_sub+0x50/0x80
[   30.705178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.705240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.705311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.705367]  kthread+0x337/0x6f0
[   30.705415]  ? trace_preempt_on+0x20/0xc0
[   30.705486]  ? __pfx_kthread+0x10/0x10
[   30.705533]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.705601]  ? calculate_sigpending+0x7b/0xa0
[   30.705652]  ? __pfx_kthread+0x10/0x10
[   30.705703]  ret_from_fork+0x116/0x1d0
[   30.705758]  ? __pfx_kthread+0x10/0x10
[   30.705825]  ret_from_fork_asm+0x1a/0x30
[   30.705900]  </TASK>
[   30.705932] 
[   30.715980] Allocated by task 314:
[   30.716501]  kasan_save_stack+0x45/0x70
[   30.716932]  kasan_save_track+0x18/0x40
[   30.717288]  kasan_save_alloc_info+0x3b/0x50
[   30.717596]  __kasan_kmalloc+0xb7/0xc0
[   30.717789]  __kmalloc_noprof+0x1c9/0x500
[   30.717975]  kunit_kmalloc_array+0x25/0x60
[   30.718187]  copy_user_test_oob+0xab/0x10f0
[   30.718586]  kunit_try_run_case+0x1a5/0x480
[   30.718953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.719438]  kthread+0x337/0x6f0
[   30.719746]  ret_from_fork+0x116/0x1d0
[   30.720071]  ret_from_fork_asm+0x1a/0x30
[   30.720462] 
[   30.720592] The buggy address belongs to the object at ffff888102337100
[   30.720592]  which belongs to the cache kmalloc-128 of size 128
[   30.721133] The buggy address is located 0 bytes inside of
[   30.721133]  allocated 120-byte region [ffff888102337100, ffff888102337178)
[   30.721934] 
[   30.722134] The buggy address belongs to the physical page:
[   30.722372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102337
[   30.722928] flags: 0x200000000000000(node=0|zone=2)
[   30.723436] page_type: f5(slab)
[   30.723617] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.724107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.724606] page dumped because: kasan: bad access detected
[   30.724839] 
[   30.725009] Memory state around the buggy address:
[   30.725409]  ffff888102337000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.725812]  ffff888102337080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.726292] >ffff888102337100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.726743]                                                                 ^
[   30.727015]  ffff888102337180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.727275]  ffff888102337200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.727543] ==================================================================
[   30.674748] ==================================================================
[   30.675199] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   30.675603] Write of size 121 at addr ffff888102337100 by task kunit_try_catch/314
[   30.676209] 
[   30.676412] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.676538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.676572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.676627] Call Trace:
[   30.676669]  <TASK>
[   30.676713]  dump_stack_lvl+0x73/0xb0
[   30.676802]  print_report+0xd1/0x650
[   30.676874]  ? __virt_addr_valid+0x1db/0x2d0
[   30.676936]  ? copy_user_test_oob+0x3fd/0x10f0
[   30.677002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.677065]  ? copy_user_test_oob+0x3fd/0x10f0
[   30.677121]  kasan_report+0x141/0x180
[   30.677169]  ? copy_user_test_oob+0x3fd/0x10f0
[   30.677228]  kasan_check_range+0x10c/0x1c0
[   30.677276]  __kasan_check_write+0x18/0x20
[   30.677327]  copy_user_test_oob+0x3fd/0x10f0
[   30.677386]  ? __pfx_copy_user_test_oob+0x10/0x10
[   30.677435]  ? finish_task_switch.isra.0+0x153/0x700
[   30.677506]  ? __switch_to+0x47/0xf50
[   30.677564]  ? __schedule+0x10cc/0x2b60
[   30.677615]  ? __pfx_read_tsc+0x10/0x10
[   30.677661]  ? ktime_get_ts64+0x86/0x230
[   30.677730]  kunit_try_run_case+0x1a5/0x480
[   30.677811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.677858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.677901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.677936]  ? __kthread_parkme+0x82/0x180
[   30.677962]  ? preempt_count_sub+0x50/0x80
[   30.677989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.678016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.678058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.678086]  kthread+0x337/0x6f0
[   30.678110]  ? trace_preempt_on+0x20/0xc0
[   30.678138]  ? __pfx_kthread+0x10/0x10
[   30.678176]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.678212]  ? calculate_sigpending+0x7b/0xa0
[   30.678241]  ? __pfx_kthread+0x10/0x10
[   30.678266]  ret_from_fork+0x116/0x1d0
[   30.678289]  ? __pfx_kthread+0x10/0x10
[   30.678313]  ret_from_fork_asm+0x1a/0x30
[   30.678349]  </TASK>
[   30.678366] 
[   30.688340] Allocated by task 314:
[   30.688616]  kasan_save_stack+0x45/0x70
[   30.688865]  kasan_save_track+0x18/0x40
[   30.689045]  kasan_save_alloc_info+0x3b/0x50
[   30.689407]  __kasan_kmalloc+0xb7/0xc0
[   30.689744]  __kmalloc_noprof+0x1c9/0x500
[   30.690091]  kunit_kmalloc_array+0x25/0x60
[   30.690411]  copy_user_test_oob+0xab/0x10f0
[   30.690623]  kunit_try_run_case+0x1a5/0x480
[   30.690820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.691044]  kthread+0x337/0x6f0
[   30.691448]  ret_from_fork+0x116/0x1d0
[   30.691793]  ret_from_fork_asm+0x1a/0x30
[   30.692182] 
[   30.692377] The buggy address belongs to the object at ffff888102337100
[   30.692377]  which belongs to the cache kmalloc-128 of size 128
[   30.693353] The buggy address is located 0 bytes inside of
[   30.693353]  allocated 120-byte region [ffff888102337100, ffff888102337178)
[   30.694052] 
[   30.694300] The buggy address belongs to the physical page:
[   30.694751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102337
[   30.695187] flags: 0x200000000000000(node=0|zone=2)
[   30.695629] page_type: f5(slab)
[   30.695908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.696372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.696827] page dumped because: kasan: bad access detected
[   30.697153] 
[   30.697340] Memory state around the buggy address:
[   30.697559]  ffff888102337000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.698098]  ffff888102337080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.698571] >ffff888102337100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.698852]                                                                 ^
[   30.699123]  ffff888102337180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.699382]  ffff888102337200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.699930] ==================================================================