Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
juno-r2
qemu-arm64
qemu-x86_64

[   78.616990] ==================================================================
[   78.624309] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   78.631448] Read of size 121 at addr ffff00008039fd00 by task kunit_try_catch/371
[   78.639020] 
[   78.640552] CPU: 7 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   78.640581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.640589] Hardware name: Thundercomm Dragonboard 845c (DT)
[   78.640598] Call trace:
[   78.640605]  show_stack+0x20/0x38 (C)
[   78.640622]  dump_stack_lvl+0x8c/0xd0
[   78.640639]  print_report+0x118/0x608
[   78.640657]  kasan_report+0xdc/0x128
[   78.640675]  kasan_check_range+0x100/0x1a8
[   78.640694]  __kasan_check_read+0x20/0x30
[   78.640709]  copy_user_test_oob+0x4a0/0xec8
[   78.640728]  kunit_try_run_case+0x170/0x3f0
[   78.640745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.640765]  kthread+0x328/0x630
[   78.640778]  ret_from_fork+0x10/0x20
[   78.640795] 
[   78.709804] Allocated by task 371:
[   78.713255]  kasan_save_stack+0x3c/0x68
[   78.717161]  kasan_save_track+0x20/0x40
[   78.721065]  kasan_save_alloc_info+0x40/0x58
[   78.725400]  __kasan_kmalloc+0xd4/0xd8
[   78.729216]  __kmalloc_noprof+0x198/0x4c8
[   78.733293]  kunit_kmalloc_array+0x34/0x88
[   78.737455]  copy_user_test_oob+0xac/0xec8
[   78.741618]  kunit_try_run_case+0x170/0x3f0
[   78.745868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.751431]  kthread+0x328/0x630
[   78.754715]  ret_from_fork+0x10/0x20
[   78.758346] 
[   78.759875] The buggy address belongs to the object at ffff00008039fd00
[   78.759875]  which belongs to the cache kmalloc-128 of size 128
[   78.772531] The buggy address is located 0 bytes inside of
[   78.772531]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   78.785102] 
[   78.786625] The buggy address belongs to the physical page:
[   78.792266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   78.800366] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   78.808117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   78.815168] page_type: f5(slab)
[   78.818364] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.826203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.834043] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.841969] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.849897] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   78.857822] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   78.865743] page dumped because: kasan: bad access detected
[   78.871384] 
[   78.872916] Memory state around the buggy address:
[   78.877769]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.885086]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.892391] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.899704]                                                                 ^
[   78.906924]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.914230]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.921543] ==================================================================
[   77.680578] ==================================================================
[   77.687898] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   77.695045] Write of size 121 at addr ffff00008039fd00 by task kunit_try_catch/371
[   77.702716] 
[   77.704253] CPU: 7 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   77.704285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.704293] Hardware name: Thundercomm Dragonboard 845c (DT)
[   77.704307] Call trace:
[   77.704314]  show_stack+0x20/0x38 (C)
[   77.704333]  dump_stack_lvl+0x8c/0xd0
[   77.704352]  print_report+0x118/0x608
[   77.704370]  kasan_report+0xdc/0x128
[   77.704389]  kasan_check_range+0x100/0x1a8
[   77.704409]  __kasan_check_write+0x20/0x30
[   77.704425]  copy_user_test_oob+0x35c/0xec8
[   77.704444]  kunit_try_run_case+0x170/0x3f0
[   77.704462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.704482]  kthread+0x328/0x630
[   77.704496]  ret_from_fork+0x10/0x20
[   77.704515] 
[   77.773613] Allocated by task 371:
[   77.777067]  kasan_save_stack+0x3c/0x68
[   77.780975]  kasan_save_track+0x20/0x40
[   77.784878]  kasan_save_alloc_info+0x40/0x58
[   77.789213]  __kasan_kmalloc+0xd4/0xd8
[   77.793027]  __kmalloc_noprof+0x198/0x4c8
[   77.797105]  kunit_kmalloc_array+0x34/0x88
[   77.801267]  copy_user_test_oob+0xac/0xec8
[   77.805430]  kunit_try_run_case+0x170/0x3f0
[   77.809680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.815245]  kthread+0x328/0x630
[   77.818527]  ret_from_fork+0x10/0x20
[   77.822158] 
[   77.823688] The buggy address belongs to the object at ffff00008039fd00
[   77.823688]  which belongs to the cache kmalloc-128 of size 128
[   77.836344] The buggy address is located 0 bytes inside of
[   77.836344]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   77.848914] 
[   77.850437] The buggy address belongs to the physical page:
[   77.856080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   77.864180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   77.871935] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   77.878988] page_type: f5(slab)
[   77.882185] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.890025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.897867] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.905791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.913720] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   77.921647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   77.929569] page dumped because: kasan: bad access detected
[   77.935212] 
[   77.936742] Memory state around the buggy address:
[   77.941593]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.948907]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.956222] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.963526]                                                                 ^
[   77.970744]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.978050]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.985362] ==================================================================
[   77.367631] ==================================================================
[   77.374950] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   77.382095] Read of size 121 at addr ffff00008039fd00 by task kunit_try_catch/371
[   77.389680] 
[   77.391216] CPU: 0 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   77.391247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.391256] Hardware name: Thundercomm Dragonboard 845c (DT)
[   77.391268] Call trace:
[   77.391275]  show_stack+0x20/0x38 (C)
[   77.391294]  dump_stack_lvl+0x8c/0xd0
[   77.391315]  print_report+0x118/0x608
[   77.391335]  kasan_report+0xdc/0x128
[   77.391355]  kasan_check_range+0x100/0x1a8
[   77.391376]  __kasan_check_read+0x20/0x30
[   77.391393]  copy_user_test_oob+0x728/0xec8
[   77.391413]  kunit_try_run_case+0x170/0x3f0
[   77.391432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.391455]  kthread+0x328/0x630
[   77.391472]  ret_from_fork+0x10/0x20
[   77.391491] 
[   77.460557] Allocated by task 371:
[   77.464017]  kasan_save_stack+0x3c/0x68
[   77.467927]  kasan_save_track+0x20/0x40
[   77.471839]  kasan_save_alloc_info+0x40/0x58
[   77.476184]  __kasan_kmalloc+0xd4/0xd8
[   77.480008]  __kmalloc_noprof+0x198/0x4c8
[   77.484090]  kunit_kmalloc_array+0x34/0x88
[   77.488258]  copy_user_test_oob+0xac/0xec8
[   77.492427]  kunit_try_run_case+0x170/0x3f0
[   77.496682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.502255]  kthread+0x328/0x630
[   77.505548]  ret_from_fork+0x10/0x20
[   77.509185] 
[   77.510715] The buggy address belongs to the object at ffff00008039fd00
[   77.510715]  which belongs to the cache kmalloc-128 of size 128
[   77.523378] The buggy address is located 0 bytes inside of
[   77.523378]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   77.535957] 
[   77.537486] The buggy address belongs to the physical page:
[   77.543134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   77.551245] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   77.559003] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   77.566058] page_type: f5(slab)
[   77.569263] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.577107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.584952] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.592882] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.600813] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   77.608743] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   77.616671] page dumped because: kasan: bad access detected
[   77.622319] 
[   77.623857] Memory state around the buggy address:
[   77.628715]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.636040]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.643356] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.650668]                                                                 ^
[   77.657901]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.665226]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.672545] ==================================================================
[   78.304816] ==================================================================
[   78.312136] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   78.319278] Write of size 121 at addr ffff00008039fd00 by task kunit_try_catch/371
[   78.326947] 
[   78.328479] CPU: 7 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   78.328508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.328516] Hardware name: Thundercomm Dragonboard 845c (DT)
[   78.328527] Call trace:
[   78.328534]  show_stack+0x20/0x38 (C)
[   78.328552]  dump_stack_lvl+0x8c/0xd0
[   78.328570]  print_report+0x118/0x608
[   78.328587]  kasan_report+0xdc/0x128
[   78.328606]  kasan_check_range+0x100/0x1a8
[   78.328626]  __kasan_check_write+0x20/0x30
[   78.328641]  copy_user_test_oob+0x434/0xec8
[   78.328658]  kunit_try_run_case+0x170/0x3f0
[   78.328676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.328697]  kthread+0x328/0x630
[   78.328710]  ret_from_fork+0x10/0x20
[   78.328726] 
[   78.397825] Allocated by task 371:
[   78.401278]  kasan_save_stack+0x3c/0x68
[   78.405187]  kasan_save_track+0x20/0x40
[   78.409093]  kasan_save_alloc_info+0x40/0x58
[   78.413429]  __kasan_kmalloc+0xd4/0xd8
[   78.417246]  __kmalloc_noprof+0x198/0x4c8
[   78.421323]  kunit_kmalloc_array+0x34/0x88
[   78.425485]  copy_user_test_oob+0xac/0xec8
[   78.429650]  kunit_try_run_case+0x170/0x3f0
[   78.433900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.439464]  kthread+0x328/0x630
[   78.442750]  ret_from_fork+0x10/0x20
[   78.446381] 
[   78.447910] The buggy address belongs to the object at ffff00008039fd00
[   78.447910]  which belongs to the cache kmalloc-128 of size 128
[   78.460566] The buggy address is located 0 bytes inside of
[   78.460566]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   78.473135] 
[   78.474659] The buggy address belongs to the physical page:
[   78.480300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   78.488401] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   78.496151] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   78.503202] page_type: f5(slab)
[   78.506399] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.514242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.522080] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.530007] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.537934] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   78.545860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   78.553783] page dumped because: kasan: bad access detected
[   78.559424] 
[   78.560946] Memory state around the buggy address:
[   78.565799]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.573115]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.580431] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.587735]                                                                 ^
[   78.594954]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.602260]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.609574] ==================================================================
[   77.992867] ==================================================================
[   78.000190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   78.007332] Read of size 121 at addr ffff00008039fd00 by task kunit_try_catch/371
[   78.014906] 
[   78.016439] CPU: 7 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   78.016469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.016477] Hardware name: Thundercomm Dragonboard 845c (DT)
[   78.016490] Call trace:
[   78.016498]  show_stack+0x20/0x38 (C)
[   78.016516]  dump_stack_lvl+0x8c/0xd0
[   78.016535]  print_report+0x118/0x608
[   78.016554]  kasan_report+0xdc/0x128
[   78.016571]  kasan_check_range+0x100/0x1a8
[   78.016591]  __kasan_check_read+0x20/0x30
[   78.016606]  copy_user_test_oob+0x3c8/0xec8
[   78.016622]  kunit_try_run_case+0x170/0x3f0
[   78.016641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.016661]  kthread+0x328/0x630
[   78.016675]  ret_from_fork+0x10/0x20
[   78.016692] 
[   78.085709] Allocated by task 371:
[   78.089162]  kasan_save_stack+0x3c/0x68
[   78.093066]  kasan_save_track+0x20/0x40
[   78.096971]  kasan_save_alloc_info+0x40/0x58
[   78.101306]  __kasan_kmalloc+0xd4/0xd8
[   78.105122]  __kmalloc_noprof+0x198/0x4c8
[   78.109201]  kunit_kmalloc_array+0x34/0x88
[   78.113363]  copy_user_test_oob+0xac/0xec8
[   78.117525]  kunit_try_run_case+0x170/0x3f0
[   78.121776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.127340]  kthread+0x328/0x630
[   78.130624]  ret_from_fork+0x10/0x20
[   78.134257] 
[   78.135786] The buggy address belongs to the object at ffff00008039fd00
[   78.135786]  which belongs to the cache kmalloc-128 of size 128
[   78.148442] The buggy address is located 0 bytes inside of
[   78.148442]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   78.161013] 
[   78.162536] The buggy address belongs to the physical page:
[   78.168175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   78.176276] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   78.184029] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   78.191080] page_type: f5(slab)
[   78.194275] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.202117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.209957] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   78.217882] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.225809] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   78.233734] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   78.241656] page dumped because: kasan: bad access detected
[   78.247299] 
[   78.248829] Memory state around the buggy address:
[   78.253682]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.260995]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.268300] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.275604]                                                                 ^
[   78.282824]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.290138]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.297442] ==================================================================
[   77.048851] ==================================================================
[   77.062340] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   77.069487] Write of size 121 at addr ffff00008039fd00 by task kunit_try_catch/371
[   77.077159] 
[   77.078697] CPU: 0 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   77.078731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.078741] Hardware name: Thundercomm Dragonboard 845c (DT)
[   77.078756] Call trace:
[   77.078767]  show_stack+0x20/0x38 (C)
[   77.078787]  dump_stack_lvl+0x8c/0xd0
[   77.078810]  print_report+0x118/0x608
[   77.078831]  kasan_report+0xdc/0x128
[   77.078850]  kasan_check_range+0x100/0x1a8
[   77.078873]  __kasan_check_write+0x20/0x30
[   77.078893]  copy_user_test_oob+0x234/0xec8
[   77.078912]  kunit_try_run_case+0x170/0x3f0
[   77.078935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.078958]  kthread+0x328/0x630
[   77.078975]  ret_from_fork+0x10/0x20
[   77.078994] 
[   77.148153] Allocated by task 371:
[   77.151618]  kasan_save_stack+0x3c/0x68
[   77.155528]  kasan_save_track+0x20/0x40
[   77.159438]  kasan_save_alloc_info+0x40/0x58
[   77.163777]  __kasan_kmalloc+0xd4/0xd8
[   77.167599]  __kmalloc_noprof+0x198/0x4c8
[   77.171683]  kunit_kmalloc_array+0x34/0x88
[   77.175849]  copy_user_test_oob+0xac/0xec8
[   77.180015]  kunit_try_run_case+0x170/0x3f0
[   77.184268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.189842]  kthread+0x328/0x630
[   77.193133]  ret_from_fork+0x10/0x20
[   77.196771] 
[   77.198302] The buggy address belongs to the object at ffff00008039fd00
[   77.198302]  which belongs to the cache kmalloc-128 of size 128
[   77.210964] The buggy address is located 0 bytes inside of
[   77.210964]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   77.223543] 
[   77.225081] The buggy address belongs to the physical page:
[   77.230731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   77.238846] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   77.246604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   77.253661] page_type: f5(slab)
[   77.256865] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.264710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.272555] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   77.280485] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.288417] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   77.296348] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   77.304274] page dumped because: kasan: bad access detected
[   77.309925] 
[   77.311452] Memory state around the buggy address:
[   77.316313]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.323630]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.330947] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.338268]                                                                 ^
[   77.345503]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.352828]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.360149] ==================================================================

[ 1525.467090] ==================================================================
[ 1525.467113] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[ 1525.467150] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.467183] 
[ 1525.467198] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.467259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.467279] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.467302] Call trace:
[ 1525.467314]  show_stack+0x20/0x38 (C)
[ 1525.467351]  dump_stack_lvl+0x8c/0xd0
[ 1525.467390]  print_report+0x118/0x608
[ 1525.467431]  kasan_report+0xdc/0x128
[ 1525.467471]  kasan_check_range+0x100/0x1a8
[ 1525.467514]  __kasan_check_write+0x20/0x30
[ 1525.467550]  copy_user_test_oob+0x434/0xec8
[ 1525.467589]  kunit_try_run_case+0x170/0x3f0
[ 1525.467629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.467676]  kthread+0x328/0x630
[ 1525.467708]  ret_from_fork+0x10/0x20
[ 1525.467745] 
[ 1525.467755] Allocated by task 356:
[ 1525.467773]  kasan_save_stack+0x3c/0x68
[ 1525.467808]  kasan_save_track+0x20/0x40
[ 1525.467842]  kasan_save_alloc_info+0x40/0x58
[ 1525.467871]  __kasan_kmalloc+0xd4/0xd8
[ 1525.467904]  __kmalloc_noprof+0x198/0x4c8
[ 1525.467937]  kunit_kmalloc_array+0x34/0x88
[ 1525.467968]  copy_user_test_oob+0xac/0xec8
[ 1525.468002]  kunit_try_run_case+0x170/0x3f0
[ 1525.468034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.468074]  kthread+0x328/0x630
[ 1525.468098]  ret_from_fork+0x10/0x20
[ 1525.468127] 
[ 1525.468138] The buggy address belongs to the object at ffff000827f2f500
[ 1525.468138]  which belongs to the cache kmalloc-128 of size 128
[ 1525.468177] The buggy address is located 0 bytes inside of
[ 1525.468177]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.468221] 
[ 1525.468232] The buggy address belongs to the physical page:
[ 1525.468251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.468286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.468317] page_type: f5(slab)
[ 1525.468344] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.468380] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.468408] page dumped because: kasan: bad access detected
[ 1525.468427] 
[ 1525.468437] Memory state around the buggy address:
[ 1525.468457]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.468488]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.468519] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.468545]                                                                 ^
[ 1525.468572]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.468603]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.468629] ==================================================================
[ 1525.468686] ==================================================================
[ 1525.468712] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[ 1525.468748] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.468783] 
[ 1525.468798] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.468859] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.468879] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.468902] Call trace:
[ 1525.468914]  show_stack+0x20/0x38 (C)
[ 1525.468952]  dump_stack_lvl+0x8c/0xd0
[ 1525.468991]  print_report+0x118/0x608
[ 1525.469031]  kasan_report+0xdc/0x128
[ 1525.469072]  kasan_check_range+0x100/0x1a8
[ 1525.469115]  __kasan_check_read+0x20/0x30
[ 1525.469150]  copy_user_test_oob+0x4a0/0xec8
[ 1525.469191]  kunit_try_run_case+0x170/0x3f0
[ 1525.469231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.469278]  kthread+0x328/0x630
[ 1525.469309]  ret_from_fork+0x10/0x20
[ 1525.469346] 
[ 1525.469357] Allocated by task 356:
[ 1525.469375]  kasan_save_stack+0x3c/0x68
[ 1525.469410]  kasan_save_track+0x20/0x40
[ 1525.469442]  kasan_save_alloc_info+0x40/0x58
[ 1525.469471]  __kasan_kmalloc+0xd4/0xd8
[ 1525.469503]  __kmalloc_noprof+0x198/0x4c8
[ 1525.469536]  kunit_kmalloc_array+0x34/0x88
[ 1525.469568]  copy_user_test_oob+0xac/0xec8
[ 1525.469602]  kunit_try_run_case+0x170/0x3f0
[ 1525.469635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.469673]  kthread+0x328/0x630
[ 1525.469697]  ret_from_fork+0x10/0x20
[ 1525.469727] 
[ 1525.469738] The buggy address belongs to the object at ffff000827f2f500
[ 1525.469738]  which belongs to the cache kmalloc-128 of size 128
[ 1525.469778] The buggy address is located 0 bytes inside of
[ 1525.469778]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.469822] 
[ 1525.469833] The buggy address belongs to the physical page:
[ 1525.469851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.469886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.469918] page_type: f5(slab)
[ 1525.469944] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.469981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.470008] page dumped because: kasan: bad access detected
[ 1525.470028] 
[ 1525.470038] Memory state around the buggy address:
[ 1525.470059]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.470090]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.470120] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.470146]                                                                 ^
[ 1525.470173]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.470203]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.470229] ==================================================================
[ 1525.465519] ==================================================================
[ 1525.465545] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[ 1525.465582] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.465617] 
[ 1525.465632] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.465692] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.465712] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.465734] Call trace:
[ 1525.465747]  show_stack+0x20/0x38 (C)
[ 1525.465784]  dump_stack_lvl+0x8c/0xd0
[ 1525.465824]  print_report+0x118/0x608
[ 1525.465865]  kasan_report+0xdc/0x128
[ 1525.465904]  kasan_check_range+0x100/0x1a8
[ 1525.465948]  __kasan_check_read+0x20/0x30
[ 1525.465983]  copy_user_test_oob+0x3c8/0xec8
[ 1525.466023]  kunit_try_run_case+0x170/0x3f0
[ 1525.466063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.466109]  kthread+0x328/0x630
[ 1525.466141]  ret_from_fork+0x10/0x20
[ 1525.466179] 
[ 1525.466190] Allocated by task 356:
[ 1525.466208]  kasan_save_stack+0x3c/0x68
[ 1525.466242]  kasan_save_track+0x20/0x40
[ 1525.466275]  kasan_save_alloc_info+0x40/0x58
[ 1525.466304]  __kasan_kmalloc+0xd4/0xd8
[ 1525.466335]  __kmalloc_noprof+0x198/0x4c8
[ 1525.466369]  kunit_kmalloc_array+0x34/0x88
[ 1525.466401]  copy_user_test_oob+0xac/0xec8
[ 1525.466435]  kunit_try_run_case+0x170/0x3f0
[ 1525.466467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.466507]  kthread+0x328/0x630
[ 1525.466532]  ret_from_fork+0x10/0x20
[ 1525.466562] 
[ 1525.466572] The buggy address belongs to the object at ffff000827f2f500
[ 1525.466572]  which belongs to the cache kmalloc-128 of size 128
[ 1525.466611] The buggy address is located 0 bytes inside of
[ 1525.466611]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.466655] 
[ 1525.466666] The buggy address belongs to the physical page:
[ 1525.466684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.466720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.466751] page_type: f5(slab)
[ 1525.466777] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.466813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.466841] page dumped because: kasan: bad access detected
[ 1525.466862] 
[ 1525.466872] Memory state around the buggy address:
[ 1525.466891]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.466922]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.466952] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.466978]                                                                 ^
[ 1525.467006]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.467036]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.467062] ==================================================================
[ 1525.460458] ==================================================================
[ 1525.460487] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[ 1525.460527] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.460562] 
[ 1525.460577] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.460638] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.460658] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.460681] Call trace:
[ 1525.460693]  show_stack+0x20/0x38 (C)
[ 1525.460732]  dump_stack_lvl+0x8c/0xd0
[ 1525.460772]  print_report+0x118/0x608
[ 1525.460814]  kasan_report+0xdc/0x128
[ 1525.460854]  kasan_check_range+0x100/0x1a8
[ 1525.460898]  __kasan_check_write+0x20/0x30
[ 1525.460933]  copy_user_test_oob+0x234/0xec8
[ 1525.460973]  kunit_try_run_case+0x170/0x3f0
[ 1525.461013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.461060]  kthread+0x328/0x630
[ 1525.461092]  ret_from_fork+0x10/0x20
[ 1525.461131] 
[ 1525.461142] Allocated by task 356:
[ 1525.461160]  kasan_save_stack+0x3c/0x68
[ 1525.461196]  kasan_save_track+0x20/0x40
[ 1525.461229]  kasan_save_alloc_info+0x40/0x58
[ 1525.461258]  __kasan_kmalloc+0xd4/0xd8
[ 1525.461291]  __kmalloc_noprof+0x198/0x4c8
[ 1525.461324]  kunit_kmalloc_array+0x34/0x88
[ 1525.461357]  copy_user_test_oob+0xac/0xec8
[ 1525.461390]  kunit_try_run_case+0x170/0x3f0
[ 1525.461422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.461462]  kthread+0x328/0x630
[ 1525.461486]  ret_from_fork+0x10/0x20
[ 1525.461517] 
[ 1525.461528] The buggy address belongs to the object at ffff000827f2f500
[ 1525.461528]  which belongs to the cache kmalloc-128 of size 128
[ 1525.461568] The buggy address is located 0 bytes inside of
[ 1525.461568]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.461611] 
[ 1525.461621] The buggy address belongs to the physical page:
[ 1525.461641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.461676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.461709] page_type: f5(slab)
[ 1525.461735] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.461772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.461799] page dumped because: kasan: bad access detected
[ 1525.461819] 
[ 1525.461829] Memory state around the buggy address:
[ 1525.461850]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.461881]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.461911] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.461937]                                                                 ^
[ 1525.461964]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.461995]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.462021] ==================================================================
[ 1525.462121] ==================================================================
[ 1525.462146] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[ 1525.462183] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.462217] 
[ 1525.462233] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.462293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.462313] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.462335] Call trace:
[ 1525.462348]  show_stack+0x20/0x38 (C)
[ 1525.462385]  dump_stack_lvl+0x8c/0xd0
[ 1525.462425]  print_report+0x118/0x608
[ 1525.462466]  kasan_report+0xdc/0x128
[ 1525.462506]  kasan_check_range+0x100/0x1a8
[ 1525.462549]  __kasan_check_read+0x20/0x30
[ 1525.462585]  copy_user_test_oob+0x728/0xec8
[ 1525.462625]  kunit_try_run_case+0x170/0x3f0
[ 1525.462665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.462711]  kthread+0x328/0x630
[ 1525.462742]  ret_from_fork+0x10/0x20
[ 1525.462780] 
[ 1525.462791] Allocated by task 356:
[ 1525.462809]  kasan_save_stack+0x3c/0x68
[ 1525.462844]  kasan_save_track+0x20/0x40
[ 1525.462877]  kasan_save_alloc_info+0x40/0x58
[ 1525.462906]  __kasan_kmalloc+0xd4/0xd8
[ 1525.462938]  __kmalloc_noprof+0x198/0x4c8
[ 1525.462971]  kunit_kmalloc_array+0x34/0x88
[ 1525.463003]  copy_user_test_oob+0xac/0xec8
[ 1525.463037]  kunit_try_run_case+0x170/0x3f0
[ 1525.463069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.463109]  kthread+0x328/0x630
[ 1525.463134]  ret_from_fork+0x10/0x20
[ 1525.463164] 
[ 1525.463175] The buggy address belongs to the object at ffff000827f2f500
[ 1525.463175]  which belongs to the cache kmalloc-128 of size 128
[ 1525.463214] The buggy address is located 0 bytes inside of
[ 1525.463214]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.463258] 
[ 1525.463269] The buggy address belongs to the physical page:
[ 1525.463287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.463322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.463354] page_type: f5(slab)
[ 1525.463381] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.463417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.463444] page dumped because: kasan: bad access detected
[ 1525.463464] 
[ 1525.463474] Memory state around the buggy address:
[ 1525.463495]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.463526]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.463556] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.463581]                                                                 ^
[ 1525.463609]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.463640]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.463666] ==================================================================
[ 1525.463883] ==================================================================
[ 1525.463910] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[ 1525.463947] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.463983] 
[ 1525.463999] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.464059] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.464079] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.464101] Call trace:
[ 1525.464114]  show_stack+0x20/0x38 (C)
[ 1525.464151]  dump_stack_lvl+0x8c/0xd0
[ 1525.464191]  print_report+0x118/0x608
[ 1525.464232]  kasan_report+0xdc/0x128
[ 1525.464272]  kasan_check_range+0x100/0x1a8
[ 1525.464315]  __kasan_check_write+0x20/0x30
[ 1525.464351]  copy_user_test_oob+0x35c/0xec8
[ 1525.464391]  kunit_try_run_case+0x170/0x3f0
[ 1525.464431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.464477]  kthread+0x328/0x630
[ 1525.464509]  ret_from_fork+0x10/0x20
[ 1525.464547] 
[ 1525.464557] Allocated by task 356:
[ 1525.464575]  kasan_save_stack+0x3c/0x68
[ 1525.464609]  kasan_save_track+0x20/0x40
[ 1525.464643]  kasan_save_alloc_info+0x40/0x58
[ 1525.464672]  __kasan_kmalloc+0xd4/0xd8
[ 1525.464705]  __kmalloc_noprof+0x198/0x4c8
[ 1525.464738]  kunit_kmalloc_array+0x34/0x88
[ 1525.464770]  copy_user_test_oob+0xac/0xec8
[ 1525.464803]  kunit_try_run_case+0x170/0x3f0
[ 1525.464835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.464875]  kthread+0x328/0x630
[ 1525.464900]  ret_from_fork+0x10/0x20
[ 1525.464930] 
[ 1525.464940] The buggy address belongs to the object at ffff000827f2f500
[ 1525.464940]  which belongs to the cache kmalloc-128 of size 128
[ 1525.464979] The buggy address is located 0 bytes inside of
[ 1525.464979]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.465023] 
[ 1525.465034] The buggy address belongs to the physical page:
[ 1525.465052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.465087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.465120] page_type: f5(slab)
[ 1525.465146] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.465182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.465209] page dumped because: kasan: bad access detected
[ 1525.465229] 
[ 1525.465239] Memory state around the buggy address:
[ 1525.465260]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.465290]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.465321] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.465346]                                                                 ^
[ 1525.465373]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.465404]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.465430] ==================================================================

[   30.070853] ==================================================================
[   30.071014] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   30.071080] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.071362] 
[   30.071428] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.071523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.071553] Hardware name: linux,dummy-virt (DT)
[   30.071841] Call trace:
[   30.071904]  show_stack+0x20/0x38 (C)
[   30.072064]  dump_stack_lvl+0x8c/0xd0
[   30.072138]  print_report+0x118/0x608
[   30.072278]  kasan_report+0xdc/0x128
[   30.072373]  kasan_check_range+0x100/0x1a8
[   30.072442]  __kasan_check_write+0x20/0x30
[   30.072489]  copy_user_test_oob+0x434/0xec8
[   30.072542]  kunit_try_run_case+0x170/0x3f0
[   30.072902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.073017]  kthread+0x328/0x630
[   30.073352]  ret_from_fork+0x10/0x20
[   30.073525] 
[   30.073605] Allocated by task 297:
[   30.073729]  kasan_save_stack+0x3c/0x68
[   30.073818]  kasan_save_track+0x20/0x40
[   30.074161]  kasan_save_alloc_info+0x40/0x58
[   30.074283]  __kasan_kmalloc+0xd4/0xd8
[   30.074654]  __kmalloc_noprof+0x198/0x4c8
[   30.074981]  kunit_kmalloc_array+0x34/0x88
[   30.075102]  copy_user_test_oob+0xac/0xec8
[   30.075492]  kunit_try_run_case+0x170/0x3f0
[   30.075591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.075667]  kthread+0x328/0x630
[   30.075964]  ret_from_fork+0x10/0x20
[   30.076303] 
[   30.076447] The buggy address belongs to the object at fff00000c5773e00
[   30.076447]  which belongs to the cache kmalloc-128 of size 128
[   30.076611] The buggy address is located 0 bytes inside of
[   30.076611]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.076680] 
[   30.076727] The buggy address belongs to the physical page:
[   30.076768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.077112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.077173] page_type: f5(slab)
[   30.077265] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.077338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.077381] page dumped because: kasan: bad access detected
[   30.077421] 
[   30.077448] Memory state around the buggy address:
[   30.077491]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.077538]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077580] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.077629]                                                                 ^
[   30.077681]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077726]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077767] ==================================================================
[   30.037884] ==================================================================
[   30.037990] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   30.038381] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.038451] 
[   30.038594] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.038699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.038934] Hardware name: linux,dummy-virt (DT)
[   30.039070] Call trace:
[   30.039096]  show_stack+0x20/0x38 (C)
[   30.039151]  dump_stack_lvl+0x8c/0xd0
[   30.039216]  print_report+0x118/0x608
[   30.039320]  kasan_report+0xdc/0x128
[   30.039670]  kasan_check_range+0x100/0x1a8
[   30.039745]  __kasan_check_read+0x20/0x30
[   30.040127]  copy_user_test_oob+0x728/0xec8
[   30.040278]  kunit_try_run_case+0x170/0x3f0
[   30.040351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.040562]  kthread+0x328/0x630
[   30.040714]  ret_from_fork+0x10/0x20
[   30.040915] 
[   30.041201] Allocated by task 297:
[   30.041389]  kasan_save_stack+0x3c/0x68
[   30.041497]  kasan_save_track+0x20/0x40
[   30.041570]  kasan_save_alloc_info+0x40/0x58
[   30.041607]  __kasan_kmalloc+0xd4/0xd8
[   30.041888]  __kmalloc_noprof+0x198/0x4c8
[   30.042025]  kunit_kmalloc_array+0x34/0x88
[   30.042114]  copy_user_test_oob+0xac/0xec8
[   30.042413]  kunit_try_run_case+0x170/0x3f0
[   30.042486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.042633]  kthread+0x328/0x630
[   30.042683]  ret_from_fork+0x10/0x20
[   30.042733] 
[   30.042763] The buggy address belongs to the object at fff00000c5773e00
[   30.042763]  which belongs to the cache kmalloc-128 of size 128
[   30.043086] The buggy address is located 0 bytes inside of
[   30.043086]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.043246] 
[   30.043315] The buggy address belongs to the physical page:
[   30.043369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.043599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.043751] page_type: f5(slab)
[   30.044088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.044211] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.044285] page dumped because: kasan: bad access detected
[   30.044360] 
[   30.044383] Memory state around the buggy address:
[   30.044418]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.044466]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.044519] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.044697]                                                                 ^
[   30.044888]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.045207]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.045275] ==================================================================
[   30.021808] ==================================================================
[   30.021927] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   30.022271] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.022396] 
[   30.022548] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.022710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.022779] Hardware name: linux,dummy-virt (DT)
[   30.022843] Call trace:
[   30.023136]  show_stack+0x20/0x38 (C)
[   30.023207]  dump_stack_lvl+0x8c/0xd0
[   30.023356]  print_report+0x118/0x608
[   30.023418]  kasan_report+0xdc/0x128
[   30.023493]  kasan_check_range+0x100/0x1a8
[   30.023638]  __kasan_check_write+0x20/0x30
[   30.023701]  copy_user_test_oob+0x234/0xec8
[   30.023985]  kunit_try_run_case+0x170/0x3f0
[   30.024267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.024340]  kthread+0x328/0x630
[   30.024650]  ret_from_fork+0x10/0x20
[   30.024808] 
[   30.024899] Allocated by task 297:
[   30.024978]  kasan_save_stack+0x3c/0x68
[   30.025123]  kasan_save_track+0x20/0x40
[   30.025221]  kasan_save_alloc_info+0x40/0x58
[   30.025411]  __kasan_kmalloc+0xd4/0xd8
[   30.025450]  __kmalloc_noprof+0x198/0x4c8
[   30.025516]  kunit_kmalloc_array+0x34/0x88
[   30.025839]  copy_user_test_oob+0xac/0xec8
[   30.025923]  kunit_try_run_case+0x170/0x3f0
[   30.026099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.026255]  kthread+0x328/0x630
[   30.026355]  ret_from_fork+0x10/0x20
[   30.026747] 
[   30.026797] The buggy address belongs to the object at fff00000c5773e00
[   30.026797]  which belongs to the cache kmalloc-128 of size 128
[   30.026940] The buggy address is located 0 bytes inside of
[   30.026940]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.027044] 
[   30.027164] The buggy address belongs to the physical page:
[   30.027224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.027309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.027773] page_type: f5(slab)
[   30.027852] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.028135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.028402] page dumped because: kasan: bad access detected
[   30.028474] 
[   30.028623] Memory state around the buggy address:
[   30.028709]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.028809]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.028961] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.029144]                                                                 ^
[   30.029243]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.029303]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.029631] ==================================================================
[   30.063113] ==================================================================
[   30.063176] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   30.063229] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.063549] 
[   30.063601] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.063774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.063846] Hardware name: linux,dummy-virt (DT)
[   30.063904] Call trace:
[   30.064025]  show_stack+0x20/0x38 (C)
[   30.064141]  dump_stack_lvl+0x8c/0xd0
[   30.064361]  print_report+0x118/0x608
[   30.064544]  kasan_report+0xdc/0x128
[   30.064676]  kasan_check_range+0x100/0x1a8
[   30.064793]  __kasan_check_read+0x20/0x30
[   30.065038]  copy_user_test_oob+0x3c8/0xec8
[   30.065193]  kunit_try_run_case+0x170/0x3f0
[   30.065341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.065411]  kthread+0x328/0x630
[   30.065746]  ret_from_fork+0x10/0x20
[   30.066076] 
[   30.066128] Allocated by task 297:
[   30.066208]  kasan_save_stack+0x3c/0x68
[   30.066359]  kasan_save_track+0x20/0x40
[   30.066530]  kasan_save_alloc_info+0x40/0x58
[   30.066746]  __kasan_kmalloc+0xd4/0xd8
[   30.066812]  __kmalloc_noprof+0x198/0x4c8
[   30.067108]  kunit_kmalloc_array+0x34/0x88
[   30.067209]  copy_user_test_oob+0xac/0xec8
[   30.067635]  kunit_try_run_case+0x170/0x3f0
[   30.067738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.067794]  kthread+0x328/0x630
[   30.067829]  ret_from_fork+0x10/0x20
[   30.068165] 
[   30.068255] The buggy address belongs to the object at fff00000c5773e00
[   30.068255]  which belongs to the cache kmalloc-128 of size 128
[   30.068409] The buggy address is located 0 bytes inside of
[   30.068409]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.068634] 
[   30.068663] The buggy address belongs to the physical page:
[   30.068709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.068766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.068827] page_type: f5(slab)
[   30.068898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.068953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.069012] page dumped because: kasan: bad access detected
[   30.069069] 
[   30.069098] Memory state around the buggy address:
[   30.069143]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.069188]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069233] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.069271]                                                                 ^
[   30.069312]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069365]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.069416] ==================================================================
[   30.078605] ==================================================================
[   30.078659] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   30.079033] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.079112] 
[   30.079167] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.079286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.079331] Hardware name: linux,dummy-virt (DT)
[   30.079363] Call trace:
[   30.079388]  show_stack+0x20/0x38 (C)
[   30.079644]  dump_stack_lvl+0x8c/0xd0
[   30.079727]  print_report+0x118/0x608
[   30.079782]  kasan_report+0xdc/0x128
[   30.080048]  kasan_check_range+0x100/0x1a8
[   30.080241]  __kasan_check_read+0x20/0x30
[   30.080394]  copy_user_test_oob+0x4a0/0xec8
[   30.080513]  kunit_try_run_case+0x170/0x3f0
[   30.080726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.080787]  kthread+0x328/0x630
[   30.080835]  ret_from_fork+0x10/0x20
[   30.081220] 
[   30.081260] Allocated by task 297:
[   30.081336]  kasan_save_stack+0x3c/0x68
[   30.081429]  kasan_save_track+0x20/0x40
[   30.081608]  kasan_save_alloc_info+0x40/0x58
[   30.081789]  __kasan_kmalloc+0xd4/0xd8
[   30.081859]  __kmalloc_noprof+0x198/0x4c8
[   30.082317]  kunit_kmalloc_array+0x34/0x88
[   30.082374]  copy_user_test_oob+0xac/0xec8
[   30.082761]  kunit_try_run_case+0x170/0x3f0
[   30.082887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.083123]  kthread+0x328/0x630
[   30.083334]  ret_from_fork+0x10/0x20
[   30.083392] 
[   30.083746] The buggy address belongs to the object at fff00000c5773e00
[   30.083746]  which belongs to the cache kmalloc-128 of size 128
[   30.083826] The buggy address is located 0 bytes inside of
[   30.083826]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.084160] 
[   30.084365] The buggy address belongs to the physical page:
[   30.084413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.084630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.084931] page_type: f5(slab)
[   30.084983] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.085258] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.085304] page dumped because: kasan: bad access detected
[   30.085520] 
[   30.085598] Memory state around the buggy address:
[   30.085700]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.086070]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.086313] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.086414]                                                                 ^
[   30.086568]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.086772]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.087089] ==================================================================
[   30.055186] ==================================================================
[   30.055291] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   30.055366] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.055715] 
[   30.055773] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.055998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.056142] Hardware name: linux,dummy-virt (DT)
[   30.056243] Call trace:
[   30.056341]  show_stack+0x20/0x38 (C)
[   30.056436]  dump_stack_lvl+0x8c/0xd0
[   30.056493]  print_report+0x118/0x608
[   30.056541]  kasan_report+0xdc/0x128
[   30.056588]  kasan_check_range+0x100/0x1a8
[   30.056639]  __kasan_check_write+0x20/0x30
[   30.056886]  copy_user_test_oob+0x35c/0xec8
[   30.057139]  kunit_try_run_case+0x170/0x3f0
[   30.057259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.057426]  kthread+0x328/0x630
[   30.057519]  ret_from_fork+0x10/0x20
[   30.058173] 
[   30.058487] Allocated by task 297:
[   30.058561]  kasan_save_stack+0x3c/0x68
[   30.058664]  kasan_save_track+0x20/0x40
[   30.058705]  kasan_save_alloc_info+0x40/0x58
[   30.058777]  __kasan_kmalloc+0xd4/0xd8
[   30.058858]  __kmalloc_noprof+0x198/0x4c8
[   30.058933]  kunit_kmalloc_array+0x34/0x88
[   30.059282]  copy_user_test_oob+0xac/0xec8
[   30.059378]  kunit_try_run_case+0x170/0x3f0
[   30.059485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.059602]  kthread+0x328/0x630
[   30.059764]  ret_from_fork+0x10/0x20
[   30.059900] 
[   30.059952] The buggy address belongs to the object at fff00000c5773e00
[   30.059952]  which belongs to the cache kmalloc-128 of size 128
[   30.060037] The buggy address is located 0 bytes inside of
[   30.060037]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.060393] 
[   30.060435] The buggy address belongs to the physical page:
[   30.060506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.060580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.060634] page_type: f5(slab)
[   30.060683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.060738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.060781] page dumped because: kasan: bad access detected
[   30.060815] 
[   30.060836] Memory state around the buggy address:
[   30.060909]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.060967]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061019] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.061075]                                                                 ^
[   30.061127]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061174]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061216] ==================================================================

[   26.117100] ==================================================================
[   26.117454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   26.117786] Read of size 121 at addr ffff8881024e1b00 by task kunit_try_catch/314
[   26.118258] 
[   26.118373] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   26.118424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.118438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.118464] Call Trace:
[   26.118486]  <TASK>
[   26.118507]  dump_stack_lvl+0x73/0xb0
[   26.118537]  print_report+0xd1/0x650
[   26.118561]  ? __virt_addr_valid+0x1db/0x2d0
[   26.118586]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.118610]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.118638]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.118662]  kasan_report+0x141/0x180
[   26.118685]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.118713]  kasan_check_range+0x10c/0x1c0
[   26.118737]  __kasan_check_read+0x15/0x20
[   26.118761]  copy_user_test_oob+0x4aa/0x10f0
[   26.118787]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.118809]  ? finish_task_switch.isra.0+0x153/0x700
[   26.118833]  ? __switch_to+0x47/0xf50
[   26.118860]  ? __schedule+0x10cc/0x2b60
[   26.118885]  ? __pfx_read_tsc+0x10/0x10
[   26.118907]  ? ktime_get_ts64+0x86/0x230
[   26.118934]  kunit_try_run_case+0x1a5/0x480
[   26.118960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.118983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.119009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.119043]  ? __kthread_parkme+0x82/0x180
[   26.119065]  ? preempt_count_sub+0x50/0x80
[   26.119088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.119113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.119138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.119163]  kthread+0x337/0x6f0
[   26.119186]  ? trace_preempt_on+0x20/0xc0
[   26.119211]  ? __pfx_kthread+0x10/0x10
[   26.119245]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.119271]  ? calculate_sigpending+0x7b/0xa0
[   26.119298]  ? __pfx_kthread+0x10/0x10
[   26.119321]  ret_from_fork+0x116/0x1d0
[   26.119342]  ? __pfx_kthread+0x10/0x10
[   26.119365]  ret_from_fork_asm+0x1a/0x30
[   26.119398]  </TASK>
[   26.119410] 
[   26.126791] Allocated by task 314:
[   26.126913]  kasan_save_stack+0x45/0x70
[   26.127057]  kasan_save_track+0x18/0x40
[   26.127186]  kasan_save_alloc_info+0x3b/0x50
[   26.127406]  __kasan_kmalloc+0xb7/0xc0
[   26.127591]  __kmalloc_noprof+0x1c9/0x500
[   26.127789]  kunit_kmalloc_array+0x25/0x60
[   26.127992]  copy_user_test_oob+0xab/0x10f0
[   26.128199]  kunit_try_run_case+0x1a5/0x480
[   26.128415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.128646]  kthread+0x337/0x6f0
[   26.128799]  ret_from_fork+0x116/0x1d0
[   26.128972]  ret_from_fork_asm+0x1a/0x30
[   26.129156] 
[   26.129264] The buggy address belongs to the object at ffff8881024e1b00
[   26.129264]  which belongs to the cache kmalloc-128 of size 128
[   26.129699] The buggy address is located 0 bytes inside of
[   26.129699]  allocated 120-byte region [ffff8881024e1b00, ffff8881024e1b78)
[   26.130165] 
[   26.130269] The buggy address belongs to the physical page:
[   26.130522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1
[   26.130849] flags: 0x200000000000000(node=0|zone=2)
[   26.131010] page_type: f5(slab)
[   26.131134] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.131372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.131595] page dumped because: kasan: bad access detected
[   26.131857] 
[   26.131947] Memory state around the buggy address:
[   26.132367]  ffff8881024e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.132685]  ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.132994] >ffff8881024e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.133212]                                                                 ^
[   26.133535]  ffff8881024e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.133817]  ffff8881024e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.134099] ==================================================================
[   26.099920] ==================================================================
[   26.100318] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   26.100640] Write of size 121 at addr ffff8881024e1b00 by task kunit_try_catch/314
[   26.100921] 
[   26.101012] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   26.101088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.101102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.101129] Call Trace:
[   26.101150]  <TASK>
[   26.101173]  dump_stack_lvl+0x73/0xb0
[   26.101205]  print_report+0xd1/0x650
[   26.101240]  ? __virt_addr_valid+0x1db/0x2d0
[   26.101266]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.101291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.101318]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.101342]  kasan_report+0x141/0x180
[   26.101365]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.101393]  kasan_check_range+0x10c/0x1c0
[   26.101417]  __kasan_check_write+0x18/0x20
[   26.101442]  copy_user_test_oob+0x3fd/0x10f0
[   26.101468]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.101491]  ? finish_task_switch.isra.0+0x153/0x700
[   26.101514]  ? __switch_to+0x47/0xf50
[   26.101541]  ? __schedule+0x10cc/0x2b60
[   26.101567]  ? __pfx_read_tsc+0x10/0x10
[   26.101591]  ? ktime_get_ts64+0x86/0x230
[   26.101617]  kunit_try_run_case+0x1a5/0x480
[   26.101644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.101668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.101694]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.101720]  ? __kthread_parkme+0x82/0x180
[   26.101742]  ? preempt_count_sub+0x50/0x80
[   26.101765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.101790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.101815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.101839]  kthread+0x337/0x6f0
[   26.101861]  ? trace_preempt_on+0x20/0xc0
[   26.101885]  ? __pfx_kthread+0x10/0x10
[   26.101906]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.101930]  ? calculate_sigpending+0x7b/0xa0
[   26.101956]  ? __pfx_kthread+0x10/0x10
[   26.101978]  ret_from_fork+0x116/0x1d0
[   26.101998]  ? __pfx_kthread+0x10/0x10
[   26.102030]  ret_from_fork_asm+0x1a/0x30
[   26.102064]  </TASK>
[   26.102077] 
[   26.109060] Allocated by task 314:
[   26.109199]  kasan_save_stack+0x45/0x70
[   26.109360]  kasan_save_track+0x18/0x40
[   26.109488]  kasan_save_alloc_info+0x3b/0x50
[   26.109631]  __kasan_kmalloc+0xb7/0xc0
[   26.109954]  __kmalloc_noprof+0x1c9/0x500
[   26.110346]  kunit_kmalloc_array+0x25/0x60
[   26.110555]  copy_user_test_oob+0xab/0x10f0
[   26.110759]  kunit_try_run_case+0x1a5/0x480
[   26.110964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.111199]  kthread+0x337/0x6f0
[   26.111347]  ret_from_fork+0x116/0x1d0
[   26.111497]  ret_from_fork_asm+0x1a/0x30
[   26.111632] 
[   26.111698] The buggy address belongs to the object at ffff8881024e1b00
[   26.111698]  which belongs to the cache kmalloc-128 of size 128
[   26.112098] The buggy address is located 0 bytes inside of
[   26.112098]  allocated 120-byte region [ffff8881024e1b00, ffff8881024e1b78)
[   26.112640] 
[   26.112735] The buggy address belongs to the physical page:
[   26.112991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1
[   26.113340] flags: 0x200000000000000(node=0|zone=2)
[   26.113505] page_type: f5(slab)
[   26.113624] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.113847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.114099] page dumped because: kasan: bad access detected
[   26.114360] 
[   26.114456] Memory state around the buggy address:
[   26.114684]  ffff8881024e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.115075]  ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.115366] >ffff8881024e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.115617]                                                                 ^
[   26.115825]  ffff8881024e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.116293]  ffff8881024e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.116581] ==================================================================
[   26.152290] ==================================================================
[   26.152646] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   26.152928] Read of size 121 at addr ffff8881024e1b00 by task kunit_try_catch/314
[   26.153316] 
[   26.153410] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   26.153460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.154495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.154528] Call Trace:
[   26.154550]  <TASK>
[   26.154569]  dump_stack_lvl+0x73/0xb0
[   26.154600]  print_report+0xd1/0x650
[   26.154624]  ? __virt_addr_valid+0x1db/0x2d0
[   26.154649]  ? copy_user_test_oob+0x604/0x10f0
[   26.154672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.154700]  ? copy_user_test_oob+0x604/0x10f0
[   26.154724]  kasan_report+0x141/0x180
[   26.154747]  ? copy_user_test_oob+0x604/0x10f0
[   26.154775]  kasan_check_range+0x10c/0x1c0
[   26.154799]  __kasan_check_read+0x15/0x20
[   26.154824]  copy_user_test_oob+0x604/0x10f0
[   26.154850]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.154873]  ? finish_task_switch.isra.0+0x153/0x700
[   26.154900]  ? __switch_to+0x47/0xf50
[   26.154929]  ? __schedule+0x10cc/0x2b60
[   26.154955]  ? __pfx_read_tsc+0x10/0x10
[   26.154979]  ? ktime_get_ts64+0x86/0x230
[   26.155005]  kunit_try_run_case+0x1a5/0x480
[   26.155037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.155061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.155087]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.155114]  ? __kthread_parkme+0x82/0x180
[   26.155135]  ? preempt_count_sub+0x50/0x80
[   26.155160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.155185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.155209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.155246]  kthread+0x337/0x6f0
[   26.155266]  ? trace_preempt_on+0x20/0xc0
[   26.155290]  ? __pfx_kthread+0x10/0x10
[   26.155311]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.155336]  ? calculate_sigpending+0x7b/0xa0
[   26.155360]  ? __pfx_kthread+0x10/0x10
[   26.155382]  ret_from_fork+0x116/0x1d0
[   26.155403]  ? __pfx_kthread+0x10/0x10
[   26.155423]  ret_from_fork_asm+0x1a/0x30
[   26.155455]  </TASK>
[   26.155467] 
[   26.165390] Allocated by task 314:
[   26.165685]  kasan_save_stack+0x45/0x70
[   26.165918]  kasan_save_track+0x18/0x40
[   26.166327]  kasan_save_alloc_info+0x3b/0x50
[   26.166528]  __kasan_kmalloc+0xb7/0xc0
[   26.166694]  __kmalloc_noprof+0x1c9/0x500
[   26.166894]  kunit_kmalloc_array+0x25/0x60
[   26.167076]  copy_user_test_oob+0xab/0x10f0
[   26.167352]  kunit_try_run_case+0x1a5/0x480
[   26.167919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.168229]  kthread+0x337/0x6f0
[   26.168515]  ret_from_fork+0x116/0x1d0
[   26.168773]  ret_from_fork_asm+0x1a/0x30
[   26.169033] 
[   26.169129] The buggy address belongs to the object at ffff8881024e1b00
[   26.169129]  which belongs to the cache kmalloc-128 of size 128
[   26.169897] The buggy address is located 0 bytes inside of
[   26.169897]  allocated 120-byte region [ffff8881024e1b00, ffff8881024e1b78)
[   26.170571] 
[   26.170655] The buggy address belongs to the physical page:
[   26.171062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1
[   26.171509] flags: 0x200000000000000(node=0|zone=2)
[   26.171846] page_type: f5(slab)
[   26.172030] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.172691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.173209] page dumped because: kasan: bad access detected
[   26.173560] 
[   26.173803] Memory state around the buggy address:
[   26.174133]  ffff8881024e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.174454]  ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.174761] >ffff8881024e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.175364]                                                                 ^
[   26.175653]  ffff8881024e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.176089]  ffff8881024e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.176485] ==================================================================
[   26.134623] ==================================================================
[   26.135228] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   26.135511] Write of size 121 at addr ffff8881024e1b00 by task kunit_try_catch/314
[   26.135811] 
[   26.135894] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   26.135942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.135957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.135982] Call Trace:
[   26.136000]  <TASK>
[   26.136027]  dump_stack_lvl+0x73/0xb0
[   26.136055]  print_report+0xd1/0x650
[   26.136078]  ? __virt_addr_valid+0x1db/0x2d0
[   26.136115]  ? copy_user_test_oob+0x557/0x10f0
[   26.136139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.136165]  ? copy_user_test_oob+0x557/0x10f0
[   26.136189]  kasan_report+0x141/0x180
[   26.136212]  ? copy_user_test_oob+0x557/0x10f0
[   26.136251]  kasan_check_range+0x10c/0x1c0
[   26.136276]  __kasan_check_write+0x18/0x20
[   26.136299]  copy_user_test_oob+0x557/0x10f0
[   26.136325]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.136348]  ? finish_task_switch.isra.0+0x153/0x700
[   26.136371]  ? __switch_to+0x47/0xf50
[   26.136397]  ? __schedule+0x10cc/0x2b60
[   26.136422]  ? __pfx_read_tsc+0x10/0x10
[   26.136446]  ? ktime_get_ts64+0x86/0x230
[   26.136471]  kunit_try_run_case+0x1a5/0x480
[   26.136497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.136520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.136545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.136571]  ? __kthread_parkme+0x82/0x180
[   26.136592]  ? preempt_count_sub+0x50/0x80
[   26.136615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.136641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.136665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.136691]  kthread+0x337/0x6f0
[   26.136712]  ? trace_preempt_on+0x20/0xc0
[   26.136736]  ? __pfx_kthread+0x10/0x10
[   26.136757]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.136781]  ? calculate_sigpending+0x7b/0xa0
[   26.136806]  ? __pfx_kthread+0x10/0x10
[   26.136828]  ret_from_fork+0x116/0x1d0
[   26.136847]  ? __pfx_kthread+0x10/0x10
[   26.136869]  ret_from_fork_asm+0x1a/0x30
[   26.136901]  </TASK>
[   26.136913] 
[   26.143883] Allocated by task 314:
[   26.144054]  kasan_save_stack+0x45/0x70
[   26.144266]  kasan_save_track+0x18/0x40
[   26.144455]  kasan_save_alloc_info+0x3b/0x50
[   26.144679]  __kasan_kmalloc+0xb7/0xc0
[   26.144844]  __kmalloc_noprof+0x1c9/0x500
[   26.144982]  kunit_kmalloc_array+0x25/0x60
[   26.145120]  copy_user_test_oob+0xab/0x10f0
[   26.145271]  kunit_try_run_case+0x1a5/0x480
[   26.145412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.145580]  kthread+0x337/0x6f0
[   26.145700]  ret_from_fork+0x116/0x1d0
[   26.145888]  ret_from_fork_asm+0x1a/0x30
[   26.146166] 
[   26.146265] The buggy address belongs to the object at ffff8881024e1b00
[   26.146265]  which belongs to the cache kmalloc-128 of size 128
[   26.146795] The buggy address is located 0 bytes inside of
[   26.146795]  allocated 120-byte region [ffff8881024e1b00, ffff8881024e1b78)
[   26.147757] 
[   26.147831] The buggy address belongs to the physical page:
[   26.147999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1
[   26.148362] flags: 0x200000000000000(node=0|zone=2)
[   26.148591] page_type: f5(slab)
[   26.148750] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.149048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.149305] page dumped because: kasan: bad access detected
[   26.149480] 
[   26.149546] Memory state around the buggy address:
[   26.149700]  ffff8881024e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.149929]  ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.150382] >ffff8881024e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.150699]                                                                 ^
[   26.151016]  ffff8881024e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.151352]  ffff8881024e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.151562] ==================================================================