Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   37.332680] ==================================================================
[   37.332786] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   37.332907] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.333483] 
[   37.333714] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.335060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.335228] Hardware name: linux,dummy-virt (DT)
[   37.335455] Call trace:
[   37.336220]  show_stack+0x20/0x38 (C)
[   37.336353]  dump_stack_lvl+0x8c/0xd0
[   37.337706]  print_report+0x118/0x608
[   37.338494]  kasan_report+0xdc/0x128
[   37.339179]  kasan_check_range+0x100/0x1a8
[   37.339882]  __kasan_check_write+0x20/0x30
[   37.340337]  copy_user_test_oob+0x35c/0xec8
[   37.340513]  kunit_try_run_case+0x170/0x3f0
[   37.340634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.341267]  kthread+0x328/0x630
[   37.341758]  ret_from_fork+0x10/0x20
[   37.342345] 
[   37.342418] Allocated by task 297:
[   37.342757]  kasan_save_stack+0x3c/0x68
[   37.343177]  kasan_save_track+0x20/0x40
[   37.343287]  kasan_save_alloc_info+0x40/0x58
[   37.343384]  __kasan_kmalloc+0xd4/0xd8
[   37.343474]  __kmalloc_noprof+0x198/0x4c8
[   37.343572]  kunit_kmalloc_array+0x34/0x88
[   37.343890]  copy_user_test_oob+0xac/0xec8
[   37.344171]  kunit_try_run_case+0x170/0x3f0
[   37.344569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.345218]  kthread+0x328/0x630
[   37.345336]  ret_from_fork+0x10/0x20
[   37.345435] 
[   37.346113] The buggy address belongs to the object at fff00000c7801300
[   37.346113]  which belongs to the cache kmalloc-128 of size 128
[   37.346896] The buggy address is located 0 bytes inside of
[   37.346896]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.347529] 
[   37.347588] The buggy address belongs to the physical page:
[   37.347666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.347809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.348167] page_type: f5(slab)
[   37.348381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.348509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.348613] page dumped because: kasan: bad access detected
[   37.348691] 
[   37.348738] Memory state around the buggy address:
[   37.348817]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.348930]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.349129] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.349234]                                                                 ^
[   37.349356]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.349560]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.350268] ==================================================================
[   37.280098] ==================================================================
[   37.280341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   37.280506] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.280633] 
[   37.280724] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.280926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.280994] Hardware name: linux,dummy-virt (DT)
[   37.281628] Call trace:
[   37.281708]  show_stack+0x20/0x38 (C)
[   37.281874]  dump_stack_lvl+0x8c/0xd0
[   37.282121]  print_report+0x118/0x608
[   37.282258]  kasan_report+0xdc/0x128
[   37.282375]  kasan_check_range+0x100/0x1a8
[   37.282496]  __kasan_check_write+0x20/0x30
[   37.282635]  copy_user_test_oob+0x234/0xec8
[   37.282794]  kunit_try_run_case+0x170/0x3f0
[   37.282953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.283226]  kthread+0x328/0x630
[   37.283366]  ret_from_fork+0x10/0x20
[   37.283639] 
[   37.283937] Allocated by task 297:
[   37.284077]  kasan_save_stack+0x3c/0x68
[   37.284199]  kasan_save_track+0x20/0x40
[   37.284488]  kasan_save_alloc_info+0x40/0x58
[   37.284737]  __kasan_kmalloc+0xd4/0xd8
[   37.284909]  __kmalloc_noprof+0x198/0x4c8
[   37.285392]  kunit_kmalloc_array+0x34/0x88
[   37.285774]  copy_user_test_oob+0xac/0xec8
[   37.285943]  kunit_try_run_case+0x170/0x3f0
[   37.286100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.286209]  kthread+0x328/0x630
[   37.286330]  ret_from_fork+0x10/0x20
[   37.286754] 
[   37.286853] The buggy address belongs to the object at fff00000c7801300
[   37.286853]  which belongs to the cache kmalloc-128 of size 128
[   37.287003] The buggy address is located 0 bytes inside of
[   37.287003]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.287191] 
[   37.287255] The buggy address belongs to the physical page:
[   37.287340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.287607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.287745] page_type: f5(slab)
[   37.287897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.288043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.288157] page dumped because: kasan: bad access detected
[   37.288235] 
[   37.288283] Memory state around the buggy address:
[   37.288408]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.288520]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.288626] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.288726]                                                                 ^
[   37.288875]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.288984]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.289618] ==================================================================
[   37.302652] ==================================================================
[   37.303556] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   37.304219] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.304375] 
[   37.304452] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.304930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.305086] Hardware name: linux,dummy-virt (DT)
[   37.305225] Call trace:
[   37.305291]  show_stack+0x20/0x38 (C)
[   37.305444]  dump_stack_lvl+0x8c/0xd0
[   37.305696]  print_report+0x118/0x608
[   37.305938]  kasan_report+0xdc/0x128
[   37.306286]  kasan_check_range+0x100/0x1a8
[   37.306451]  __kasan_check_read+0x20/0x30
[   37.306690]  copy_user_test_oob+0x728/0xec8
[   37.307143]  kunit_try_run_case+0x170/0x3f0
[   37.307426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.307600]  kthread+0x328/0x630
[   37.307783]  ret_from_fork+0x10/0x20
[   37.307943] 
[   37.308002] Allocated by task 297:
[   37.308103]  kasan_save_stack+0x3c/0x68
[   37.308209]  kasan_save_track+0x20/0x40
[   37.308388]  kasan_save_alloc_info+0x40/0x58
[   37.308583]  __kasan_kmalloc+0xd4/0xd8
[   37.308868]  __kmalloc_noprof+0x198/0x4c8
[   37.308996]  kunit_kmalloc_array+0x34/0x88
[   37.309129]  copy_user_test_oob+0xac/0xec8
[   37.309437]  kunit_try_run_case+0x170/0x3f0
[   37.309716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.309845]  kthread+0x328/0x630
[   37.310123]  ret_from_fork+0x10/0x20
[   37.310326] 
[   37.310381] The buggy address belongs to the object at fff00000c7801300
[   37.310381]  which belongs to the cache kmalloc-128 of size 128
[   37.310661] The buggy address is located 0 bytes inside of
[   37.310661]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.310845] 
[   37.310913] The buggy address belongs to the physical page:
[   37.311178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.312327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.312524] page_type: f5(slab)
[   37.312632] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.312760] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.312914] page dumped because: kasan: bad access detected
[   37.313059] 
[   37.313145] Memory state around the buggy address:
[   37.313396]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.313510]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.313617] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.313713]                                                                 ^
[   37.313814]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.313920]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.314015] ==================================================================
[   37.376958] ==================================================================
[   37.377190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   37.377472] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.377697] 
[   37.377904] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.378220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.378292] Hardware name: linux,dummy-virt (DT)
[   37.378374] Call trace:
[   37.378560]  show_stack+0x20/0x38 (C)
[   37.378715]  dump_stack_lvl+0x8c/0xd0
[   37.378872]  print_report+0x118/0x608
[   37.379088]  kasan_report+0xdc/0x128
[   37.379277]  kasan_check_range+0x100/0x1a8
[   37.379501]  __kasan_check_read+0x20/0x30
[   37.379660]  copy_user_test_oob+0x4a0/0xec8
[   37.379850]  kunit_try_run_case+0x170/0x3f0
[   37.380054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.380216]  kthread+0x328/0x630
[   37.380995]  ret_from_fork+0x10/0x20
[   37.381192] 
[   37.381327] Allocated by task 297:
[   37.381406]  kasan_save_stack+0x3c/0x68
[   37.381509]  kasan_save_track+0x20/0x40
[   37.381613]  kasan_save_alloc_info+0x40/0x58
[   37.381733]  __kasan_kmalloc+0xd4/0xd8
[   37.381857]  __kmalloc_noprof+0x198/0x4c8
[   37.382147]  kunit_kmalloc_array+0x34/0x88
[   37.382290]  copy_user_test_oob+0xac/0xec8
[   37.382391]  kunit_try_run_case+0x170/0x3f0
[   37.382493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.382666]  kthread+0x328/0x630
[   37.382790]  ret_from_fork+0x10/0x20
[   37.383022] 
[   37.383141] The buggy address belongs to the object at fff00000c7801300
[   37.383141]  which belongs to the cache kmalloc-128 of size 128
[   37.383353] The buggy address is located 0 bytes inside of
[   37.383353]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.383589] 
[   37.383654] The buggy address belongs to the physical page:
[   37.383743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.383885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.384014] page_type: f5(slab)
[   37.384259] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.384617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.384909] page dumped because: kasan: bad access detected
[   37.385107] 
[   37.385165] Memory state around the buggy address:
[   37.385282]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.385397]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.385542] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.385641]                                                                 ^
[   37.385747]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.385851]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.385944] ==================================================================
[   37.368233] ==================================================================
[   37.368407] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   37.368559] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.368698] 
[   37.368794] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.369233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.369430] Hardware name: linux,dummy-virt (DT)
[   37.369562] Call trace:
[   37.369670]  show_stack+0x20/0x38 (C)
[   37.369903]  dump_stack_lvl+0x8c/0xd0
[   37.370050]  print_report+0x118/0x608
[   37.370173]  kasan_report+0xdc/0x128
[   37.370290]  kasan_check_range+0x100/0x1a8
[   37.370426]  __kasan_check_write+0x20/0x30
[   37.370633]  copy_user_test_oob+0x434/0xec8
[   37.370845]  kunit_try_run_case+0x170/0x3f0
[   37.371020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.371180]  kthread+0x328/0x630
[   37.371310]  ret_from_fork+0x10/0x20
[   37.371429] 
[   37.371569] Allocated by task 297:
[   37.371680]  kasan_save_stack+0x3c/0x68
[   37.371790]  kasan_save_track+0x20/0x40
[   37.371884]  kasan_save_alloc_info+0x40/0x58
[   37.371980]  __kasan_kmalloc+0xd4/0xd8
[   37.372097]  __kmalloc_noprof+0x198/0x4c8
[   37.372194]  kunit_kmalloc_array+0x34/0x88
[   37.372288]  copy_user_test_oob+0xac/0xec8
[   37.372385]  kunit_try_run_case+0x170/0x3f0
[   37.372482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.372612]  kthread+0x328/0x630
[   37.372722]  ret_from_fork+0x10/0x20
[   37.372918] 
[   37.372976] The buggy address belongs to the object at fff00000c7801300
[   37.372976]  which belongs to the cache kmalloc-128 of size 128
[   37.373183] The buggy address is located 0 bytes inside of
[   37.373183]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.373428] 
[   37.373492] The buggy address belongs to the physical page:
[   37.373596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.373827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.374057] page_type: f5(slab)
[   37.374172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.374299] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.374399] page dumped because: kasan: bad access detected
[   37.374539] 
[   37.374608] Memory state around the buggy address:
[   37.374801]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.374951]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.375143] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.375243]                                                                 ^
[   37.375413]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.375529]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.375633] ==================================================================
[   37.352200] ==================================================================
[   37.352304] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   37.352421] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297
[   37.352551] 
[   37.352625] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.352832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.352903] Hardware name: linux,dummy-virt (DT)
[   37.352974] Call trace:
[   37.353051]  show_stack+0x20/0x38 (C)
[   37.353174]  dump_stack_lvl+0x8c/0xd0
[   37.353288]  print_report+0x118/0x608
[   37.353418]  kasan_report+0xdc/0x128
[   37.353564]  kasan_check_range+0x100/0x1a8
[   37.354165]  __kasan_check_read+0x20/0x30
[   37.354614]  copy_user_test_oob+0x3c8/0xec8
[   37.354792]  kunit_try_run_case+0x170/0x3f0
[   37.354924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.355090]  kthread+0x328/0x630
[   37.355235]  ret_from_fork+0x10/0x20
[   37.355379] 
[   37.355554] Allocated by task 297:
[   37.356486]  kasan_save_stack+0x3c/0x68
[   37.356765]  kasan_save_track+0x20/0x40
[   37.356978]  kasan_save_alloc_info+0x40/0x58
[   37.357279]  __kasan_kmalloc+0xd4/0xd8
[   37.357549]  __kmalloc_noprof+0x198/0x4c8
[   37.357651]  kunit_kmalloc_array+0x34/0x88
[   37.357747]  copy_user_test_oob+0xac/0xec8
[   37.357847]  kunit_try_run_case+0x170/0x3f0
[   37.357944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.358073]  kthread+0x328/0x630
[   37.358173]  ret_from_fork+0x10/0x20
[   37.358288] 
[   37.358350] The buggy address belongs to the object at fff00000c7801300
[   37.358350]  which belongs to the cache kmalloc-128 of size 128
[   37.359302] The buggy address is located 0 bytes inside of
[   37.359302]  allocated 120-byte region [fff00000c7801300, fff00000c7801378)
[   37.360301] 
[   37.360418] The buggy address belongs to the physical page:
[   37.360558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801
[   37.360730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.360872] page_type: f5(slab)
[   37.360986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.361732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.361836] page dumped because: kasan: bad access detected
[   37.362068] 
[   37.362121] Memory state around the buggy address:
[   37.362200]  fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.362307]  fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.362412] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.362501]                                                                 ^
[   37.362660]  fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.362783]  fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.362962] ==================================================================

[   26.221357] ==================================================================
[   26.221672] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   26.221991] Write of size 121 at addr ffff888102c14900 by task kunit_try_catch/314
[   26.222408] 
[   26.222770] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   26.223116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.223160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.223196] Call Trace:
[   26.223227]  <TASK>
[   26.223254]  dump_stack_lvl+0x73/0xb0
[   26.223288]  print_report+0xd1/0x650
[   26.223308]  ? __virt_addr_valid+0x1db/0x2d0
[   26.223330]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.223349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.223370]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.223410]  kasan_report+0x141/0x180
[   26.223431]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.223455]  kasan_check_range+0x10c/0x1c0
[   26.223475]  __kasan_check_write+0x18/0x20
[   26.223495]  copy_user_test_oob+0x3fd/0x10f0
[   26.223517]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.223536]  ? finish_task_switch.isra.0+0x153/0x700
[   26.223556]  ? __switch_to+0x47/0xf50
[   26.223579]  ? __schedule+0x10cc/0x2b60
[   26.223599]  ? __pfx_read_tsc+0x10/0x10
[   26.223618]  ? ktime_get_ts64+0x86/0x230
[   26.223639]  kunit_try_run_case+0x1a5/0x480
[   26.223661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.223681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.223700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.223720]  ? __kthread_parkme+0x82/0x180
[   26.223738]  ? preempt_count_sub+0x50/0x80
[   26.223757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.223778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.223798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.223819]  kthread+0x337/0x6f0
[   26.223861]  ? trace_preempt_on+0x20/0xc0
[   26.223912]  ? __pfx_kthread+0x10/0x10
[   26.223949]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.223985]  ? calculate_sigpending+0x7b/0xa0
[   26.224019]  ? __pfx_kthread+0x10/0x10
[   26.224050]  ret_from_fork+0x116/0x1d0
[   26.224082]  ? __pfx_kthread+0x10/0x10
[   26.224114]  ret_from_fork_asm+0x1a/0x30
[   26.224171]  </TASK>
[   26.224192] 
[   26.231758] Allocated by task 314:
[   26.231936]  kasan_save_stack+0x45/0x70
[   26.232101]  kasan_save_track+0x18/0x40
[   26.232248]  kasan_save_alloc_info+0x3b/0x50
[   26.232509]  __kasan_kmalloc+0xb7/0xc0
[   26.232758]  __kmalloc_noprof+0x1c9/0x500
[   26.233073]  kunit_kmalloc_array+0x25/0x60
[   26.233339]  copy_user_test_oob+0xab/0x10f0
[   26.233647]  kunit_try_run_case+0x1a5/0x480
[   26.233958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.234338]  kthread+0x337/0x6f0
[   26.234616]  ret_from_fork+0x116/0x1d0
[   26.234874]  ret_from_fork_asm+0x1a/0x30
[   26.235081] 
[   26.235210] The buggy address belongs to the object at ffff888102c14900
[   26.235210]  which belongs to the cache kmalloc-128 of size 128
[   26.235723] The buggy address is located 0 bytes inside of
[   26.235723]  allocated 120-byte region [ffff888102c14900, ffff888102c14978)
[   26.236256] 
[   26.236411] The buggy address belongs to the physical page:
[   26.236650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c14
[   26.236923] flags: 0x200000000000000(node=0|zone=2)
[   26.237246] page_type: f5(slab)
[   26.237498] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.237776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.238106] page dumped because: kasan: bad access detected
[   26.238464] 
[   26.238558] Memory state around the buggy address:
[   26.238736]  ffff888102c14800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.239005]  ffff888102c14880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.239221] >ffff888102c14900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.239501]                                                                 ^
[   26.239962]  ffff888102c14980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.240458]  ffff888102c14a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.240920] ==================================================================
[   26.290442] ==================================================================
[   26.290921] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   26.291390] Read of size 121 at addr ffff888102c14900 by task kunit_try_catch/314
[   26.291758] 
[   26.291975] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   26.292060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.292084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.292120] Call Trace:
[   26.292146]  <TASK>
[   26.292189]  dump_stack_lvl+0x73/0xb0
[   26.292243]  print_report+0xd1/0x650
[   26.292281]  ? __virt_addr_valid+0x1db/0x2d0
[   26.292320]  ? copy_user_test_oob+0x604/0x10f0
[   26.292361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.292433]  ? copy_user_test_oob+0x604/0x10f0
[   26.292475]  kasan_report+0x141/0x180
[   26.292513]  ? copy_user_test_oob+0x604/0x10f0
[   26.292558]  kasan_check_range+0x10c/0x1c0
[   26.292599]  __kasan_check_read+0x15/0x20
[   26.292656]  copy_user_test_oob+0x604/0x10f0
[   26.292701]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.292742]  ? finish_task_switch.isra.0+0x153/0x700
[   26.292781]  ? __switch_to+0x47/0xf50
[   26.292855]  ? __schedule+0x10cc/0x2b60
[   26.292916]  ? __pfx_read_tsc+0x10/0x10
[   26.292955]  ? ktime_get_ts64+0x86/0x230
[   26.292998]  kunit_try_run_case+0x1a5/0x480
[   26.293056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.293097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.293136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.293177]  ? __kthread_parkme+0x82/0x180
[   26.293227]  ? preempt_count_sub+0x50/0x80
[   26.293280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.293324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.293390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.293436]  kthread+0x337/0x6f0
[   26.293474]  ? trace_preempt_on+0x20/0xc0
[   26.293519]  ? __pfx_kthread+0x10/0x10
[   26.293559]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.293601]  ? calculate_sigpending+0x7b/0xa0
[   26.293644]  ? __pfx_kthread+0x10/0x10
[   26.293685]  ret_from_fork+0x116/0x1d0
[   26.293720]  ? __pfx_kthread+0x10/0x10
[   26.293754]  ret_from_fork_asm+0x1a/0x30
[   26.293807]  </TASK>
[   26.293869] 
[   26.301790] Allocated by task 314:
[   26.302052]  kasan_save_stack+0x45/0x70
[   26.302344]  kasan_save_track+0x18/0x40
[   26.302648]  kasan_save_alloc_info+0x3b/0x50
[   26.302999]  __kasan_kmalloc+0xb7/0xc0
[   26.303281]  __kmalloc_noprof+0x1c9/0x500
[   26.303588]  kunit_kmalloc_array+0x25/0x60
[   26.303904]  copy_user_test_oob+0xab/0x10f0
[   26.304207]  kunit_try_run_case+0x1a5/0x480
[   26.304532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.304925]  kthread+0x337/0x6f0
[   26.305118]  ret_from_fork+0x116/0x1d0
[   26.305371]  ret_from_fork_asm+0x1a/0x30
[   26.305649] 
[   26.305794] The buggy address belongs to the object at ffff888102c14900
[   26.305794]  which belongs to the cache kmalloc-128 of size 128
[   26.306184] The buggy address is located 0 bytes inside of
[   26.306184]  allocated 120-byte region [ffff888102c14900, ffff888102c14978)
[   26.306882] 
[   26.307058] The buggy address belongs to the physical page:
[   26.307406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c14
[   26.307906] flags: 0x200000000000000(node=0|zone=2)
[   26.308164] page_type: f5(slab)
[   26.308338] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.308582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.308951] page dumped because: kasan: bad access detected
[   26.309329] 
[   26.309482] Memory state around the buggy address:
[   26.309811]  ffff888102c14800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.310334]  ffff888102c14880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.310728] >ffff888102c14900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.310974]                                                                 ^
[   26.311474]  ffff888102c14980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.311972]  ffff888102c14a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.312293] ==================================================================
[   26.267289] ==================================================================
[   26.267817] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   26.268491] Write of size 121 at addr ffff888102c14900 by task kunit_try_catch/314
[   26.269004] 
[   26.269172] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   26.269276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.269300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.269333] Call Trace:
[   26.269359]  <TASK>
[   26.269397]  dump_stack_lvl+0x73/0xb0
[   26.269451]  print_report+0xd1/0x650
[   26.269493]  ? __virt_addr_valid+0x1db/0x2d0
[   26.269534]  ? copy_user_test_oob+0x557/0x10f0
[   26.269573]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.269635]  ? copy_user_test_oob+0x557/0x10f0
[   26.269674]  kasan_report+0x141/0x180
[   26.269714]  ? copy_user_test_oob+0x557/0x10f0
[   26.269760]  kasan_check_range+0x10c/0x1c0
[   26.269821]  __kasan_check_write+0x18/0x20
[   26.269894]  copy_user_test_oob+0x557/0x10f0
[   26.269939]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.269993]  ? finish_task_switch.isra.0+0x153/0x700
[   26.270045]  ? __switch_to+0x47/0xf50
[   26.270135]  ? __schedule+0x10cc/0x2b60
[   26.270192]  ? __pfx_read_tsc+0x10/0x10
[   26.270245]  ? ktime_get_ts64+0x86/0x230
[   26.270292]  kunit_try_run_case+0x1a5/0x480
[   26.270340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.270396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.270439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.270475]  ? __kthread_parkme+0x82/0x180
[   26.270508]  ? preempt_count_sub+0x50/0x80
[   26.270548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.270587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.270629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.270673]  kthread+0x337/0x6f0
[   26.270712]  ? trace_preempt_on+0x20/0xc0
[   26.270759]  ? __pfx_kthread+0x10/0x10
[   26.270801]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.270881]  ? calculate_sigpending+0x7b/0xa0
[   26.270931]  ? __pfx_kthread+0x10/0x10
[   26.270976]  ret_from_fork+0x116/0x1d0
[   26.271009]  ? __pfx_kthread+0x10/0x10
[   26.271068]  ret_from_fork_asm+0x1a/0x30
[   26.271122]  </TASK>
[   26.271154] 
[   26.279511] Allocated by task 314:
[   26.279767]  kasan_save_stack+0x45/0x70
[   26.280000]  kasan_save_track+0x18/0x40
[   26.280265]  kasan_save_alloc_info+0x3b/0x50
[   26.280508]  __kasan_kmalloc+0xb7/0xc0
[   26.280697]  __kmalloc_noprof+0x1c9/0x500
[   26.280925]  kunit_kmalloc_array+0x25/0x60
[   26.281107]  copy_user_test_oob+0xab/0x10f0
[   26.281287]  kunit_try_run_case+0x1a5/0x480
[   26.281451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.281805]  kthread+0x337/0x6f0
[   26.282105]  ret_from_fork+0x116/0x1d0
[   26.282426]  ret_from_fork_asm+0x1a/0x30
[   26.282739] 
[   26.282925] The buggy address belongs to the object at ffff888102c14900
[   26.282925]  which belongs to the cache kmalloc-128 of size 128
[   26.283623] The buggy address is located 0 bytes inside of
[   26.283623]  allocated 120-byte region [ffff888102c14900, ffff888102c14978)
[   26.284238] 
[   26.284333] The buggy address belongs to the physical page:
[   26.284721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c14
[   26.285159] flags: 0x200000000000000(node=0|zone=2)
[   26.285513] page_type: f5(slab)
[   26.285710] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.286131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.286637] page dumped because: kasan: bad access detected
[   26.286939] 
[   26.287031] Memory state around the buggy address:
[   26.287352]  ffff888102c14800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.287694]  ffff888102c14880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.288177] >ffff888102c14900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.288529]                                                                 ^
[   26.288815]  ffff888102c14980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.289246]  ffff888102c14a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.289593] ==================================================================
[   26.241799] ==================================================================
[   26.242409] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   26.242774] Read of size 121 at addr ffff888102c14900 by task kunit_try_catch/314
[   26.243146] 
[   26.243299] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   26.243374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.243411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.243444] Call Trace:
[   26.243468]  <TASK>
[   26.243495]  dump_stack_lvl+0x73/0xb0
[   26.243541]  print_report+0xd1/0x650
[   26.243573]  ? __virt_addr_valid+0x1db/0x2d0
[   26.243605]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.243635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.243668]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.243699]  kasan_report+0x141/0x180
[   26.243729]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.243766]  kasan_check_range+0x10c/0x1c0
[   26.243843]  __kasan_check_read+0x15/0x20
[   26.243880]  copy_user_test_oob+0x4aa/0x10f0
[   26.243922]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.243958]  ? finish_task_switch.isra.0+0x153/0x700
[   26.243989]  ? __switch_to+0x47/0xf50
[   26.244028]  ? __schedule+0x10cc/0x2b60
[   26.244065]  ? __pfx_read_tsc+0x10/0x10
[   26.244096]  ? ktime_get_ts64+0x86/0x230
[   26.244133]  kunit_try_run_case+0x1a5/0x480
[   26.244174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.244213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.244250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.244285]  ? __kthread_parkme+0x82/0x180
[   26.244317]  ? preempt_count_sub+0x50/0x80
[   26.244358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.244415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.244457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.244498]  kthread+0x337/0x6f0
[   26.244530]  ? trace_preempt_on+0x20/0xc0
[   26.244567]  ? __pfx_kthread+0x10/0x10
[   26.244604]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.244643]  ? calculate_sigpending+0x7b/0xa0
[   26.244678]  ? __pfx_kthread+0x10/0x10
[   26.244710]  ret_from_fork+0x116/0x1d0
[   26.244737]  ? __pfx_kthread+0x10/0x10
[   26.244766]  ret_from_fork_asm+0x1a/0x30
[   26.244807]  </TASK>
[   26.244860] 
[   26.256793] Allocated by task 314:
[   26.257019]  kasan_save_stack+0x45/0x70
[   26.257224]  kasan_save_track+0x18/0x40
[   26.257403]  kasan_save_alloc_info+0x3b/0x50
[   26.257593]  __kasan_kmalloc+0xb7/0xc0
[   26.257879]  __kmalloc_noprof+0x1c9/0x500
[   26.258209]  kunit_kmalloc_array+0x25/0x60
[   26.258525]  copy_user_test_oob+0xab/0x10f0
[   26.258810]  kunit_try_run_case+0x1a5/0x480
[   26.259135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.259495]  kthread+0x337/0x6f0
[   26.259737]  ret_from_fork+0x116/0x1d0
[   26.260012]  ret_from_fork_asm+0x1a/0x30
[   26.260285] 
[   26.260436] The buggy address belongs to the object at ffff888102c14900
[   26.260436]  which belongs to the cache kmalloc-128 of size 128
[   26.260997] The buggy address is located 0 bytes inside of
[   26.260997]  allocated 120-byte region [ffff888102c14900, ffff888102c14978)
[   26.261457] 
[   26.261563] The buggy address belongs to the physical page:
[   26.261764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c14
[   26.262217] flags: 0x200000000000000(node=0|zone=2)
[   26.262599] page_type: f5(slab)
[   26.262906] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.263402] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.263910] page dumped because: kasan: bad access detected
[   26.264269] 
[   26.264417] Memory state around the buggy address:
[   26.264734]  ffff888102c14800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.265101]  ffff888102c14880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.265373] >ffff888102c14900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.265716]                                                                 ^
[   26.266112]  ffff888102c14980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.266408]  ffff888102c14a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.266679] ==================================================================