Hay
Date
July 3, 2025, 10:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.267499] ==================================================================
[   34.267912] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   34.268037] Read of size 121 at addr fff00000c5a89500 by task kunit_try_catch/317
[   34.268131] 
[   34.268221] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.268312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.268357] Hardware name: linux,dummy-virt (DT)
[   34.268863] Call trace:
[   34.269014]  show_stack+0x20/0x38 (C)
[   34.269408]  dump_stack_lvl+0x8c/0xd0
[   34.269537]  print_report+0x118/0x608
[   34.269593]  kasan_report+0xdc/0x128
[   34.269943]  kasan_check_range+0x100/0x1a8
[   34.270072]  __kasan_check_read+0x20/0x30
[   34.270571]  copy_user_test_oob+0x3c8/0xec8
[   34.270736]  kunit_try_run_case+0x170/0x3f0
[   34.270904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.270965]  kthread+0x328/0x630
[   34.271016]  ret_from_fork+0x10/0x20
[   34.271126] 
[   34.271149] Allocated by task 317:
[   34.271197]  kasan_save_stack+0x3c/0x68
[   34.271243]  kasan_save_track+0x20/0x40
[   34.271285]  kasan_save_alloc_info+0x40/0x58
[   34.271326]  __kasan_kmalloc+0xd4/0xd8
[   34.271366]  __kmalloc_noprof+0x198/0x4c8
[   34.271408]  kunit_kmalloc_array+0x34/0x88
[   34.271456]  copy_user_test_oob+0xac/0xec8
[   34.271499]  kunit_try_run_case+0x170/0x3f0
[   34.271555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.271605]  kthread+0x328/0x630
[   34.271641]  ret_from_fork+0x10/0x20
[   34.271682] 
[   34.271712] The buggy address belongs to the object at fff00000c5a89500
[   34.271712]  which belongs to the cache kmalloc-128 of size 128
[   34.271794] The buggy address is located 0 bytes inside of
[   34.271794]  allocated 120-byte region [fff00000c5a89500, fff00000c5a89578)
[   34.272087] 
[   34.272545] The buggy address belongs to the physical page:
[   34.272602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a89
[   34.272862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.273194] page_type: f5(slab)
[   34.273262] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.273617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.273761] page dumped because: kasan: bad access detected
[   34.273815] 
[   34.273872] Memory state around the buggy address:
[   34.274346]  fff00000c5a89400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.274545]  fff00000c5a89480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.275087] >fff00000c5a89500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.275254]                                                                 ^
[   34.275573]  fff00000c5a89580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.275714]  fff00000c5a89600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.275852] ==================================================================
[   34.226210] ==================================================================
[   34.226341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   34.226489] Write of size 121 at addr fff00000c5a89500 by task kunit_try_catch/317
[   34.226699] 
[   34.226753] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.227097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.227440] Hardware name: linux,dummy-virt (DT)
[   34.227506] Call trace:
[   34.227655]  show_stack+0x20/0x38 (C)
[   34.227747]  dump_stack_lvl+0x8c/0xd0
[   34.227899]  print_report+0x118/0x608
[   34.227993]  kasan_report+0xdc/0x128
[   34.228137]  kasan_check_range+0x100/0x1a8
[   34.228190]  __kasan_check_write+0x20/0x30
[   34.228239]  copy_user_test_oob+0x234/0xec8
[   34.228432]  kunit_try_run_case+0x170/0x3f0
[   34.228769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.228976]  kthread+0x328/0x630
[   34.229136]  ret_from_fork+0x10/0x20
[   34.229258] 
[   34.229280] Allocated by task 317:
[   34.229321]  kasan_save_stack+0x3c/0x68
[   34.229368]  kasan_save_track+0x20/0x40
[   34.229740]  kasan_save_alloc_info+0x40/0x58
[   34.229931]  __kasan_kmalloc+0xd4/0xd8
[   34.230139]  __kmalloc_noprof+0x198/0x4c8
[   34.230191]  kunit_kmalloc_array+0x34/0x88
[   34.230438]  copy_user_test_oob+0xac/0xec8
[   34.230901]  kunit_try_run_case+0x170/0x3f0
[   34.231071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.231377]  kthread+0x328/0x630
[   34.231458]  ret_from_fork+0x10/0x20
[   34.231604] 
[   34.231704] The buggy address belongs to the object at fff00000c5a89500
[   34.231704]  which belongs to the cache kmalloc-128 of size 128
[   34.231959] The buggy address is located 0 bytes inside of
[   34.231959]  allocated 120-byte region [fff00000c5a89500, fff00000c5a89578)
[   34.232302] 
[   34.232462] The buggy address belongs to the physical page:
[   34.232614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a89
[   34.232747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.232860] page_type: f5(slab)
[   34.232908] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.233239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.233440] page dumped because: kasan: bad access detected
[   34.233599] 
[   34.233775] Memory state around the buggy address:
[   34.233892]  fff00000c5a89400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.233942]  fff00000c5a89480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.234005] >fff00000c5a89500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.234324]                                                                 ^
[   34.234430]  fff00000c5a89580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.234532]  fff00000c5a89600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.234574] ==================================================================
[   34.243371] ==================================================================
[   34.243472] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   34.243763] Read of size 121 at addr fff00000c5a89500 by task kunit_try_catch/317
[   34.243860] 
[   34.243896] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.244070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.244104] Hardware name: linux,dummy-virt (DT)
[   34.244196] Call trace:
[   34.244529]  show_stack+0x20/0x38 (C)
[   34.244603]  dump_stack_lvl+0x8c/0xd0
[   34.244657]  print_report+0x118/0x608
[   34.244708]  kasan_report+0xdc/0x128
[   34.244780]  kasan_check_range+0x100/0x1a8
[   34.245116]  __kasan_check_read+0x20/0x30
[   34.245197]  copy_user_test_oob+0x728/0xec8
[   34.245279]  kunit_try_run_case+0x170/0x3f0
[   34.245599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.245696]  kthread+0x328/0x630
[   34.245741]  ret_from_fork+0x10/0x20
[   34.245817] 
[   34.245852] Allocated by task 317:
[   34.245919]  kasan_save_stack+0x3c/0x68
[   34.245992]  kasan_save_track+0x20/0x40
[   34.246033]  kasan_save_alloc_info+0x40/0x58
[   34.246074]  __kasan_kmalloc+0xd4/0xd8
[   34.246130]  __kmalloc_noprof+0x198/0x4c8
[   34.246171]  kunit_kmalloc_array+0x34/0x88
[   34.246213]  copy_user_test_oob+0xac/0xec8
[   34.246256]  kunit_try_run_case+0x170/0x3f0
[   34.246296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.246343]  kthread+0x328/0x630
[   34.246379]  ret_from_fork+0x10/0x20
[   34.246426] 
[   34.246457] The buggy address belongs to the object at fff00000c5a89500
[   34.246457]  which belongs to the cache kmalloc-128 of size 128
[   34.246525] The buggy address is located 0 bytes inside of
[   34.246525]  allocated 120-byte region [fff00000c5a89500, fff00000c5a89578)
[   34.246605] 
[   34.246628] The buggy address belongs to the physical page:
[   34.246671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a89
[   34.246728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.246794] page_type: f5(slab)
[   34.247069] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.247156] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.247568] page dumped because: kasan: bad access detected
[   34.247692] 
[   34.248113] Memory state around the buggy address:
[   34.248168]  fff00000c5a89400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.248498]  fff00000c5a89480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.248666] >fff00000c5a89500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.248730]                                                                 ^
[   34.248786]  fff00000c5a89580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.249055]  fff00000c5a89600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.249107] ==================================================================
[   34.278026] ==================================================================
[   34.278107] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   34.278192] Write of size 121 at addr fff00000c5a89500 by task kunit_try_catch/317
[   34.278337] 
[   34.278388] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.278483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.278850] Hardware name: linux,dummy-virt (DT)
[   34.278903] Call trace:
[   34.278929]  show_stack+0x20/0x38 (C)
[   34.279283]  dump_stack_lvl+0x8c/0xd0
[   34.279438]  print_report+0x118/0x608
[   34.279565]  kasan_report+0xdc/0x128
[   34.279851]  kasan_check_range+0x100/0x1a8
[   34.279923]  __kasan_check_write+0x20/0x30
[   34.279978]  copy_user_test_oob+0x434/0xec8
[   34.280338]  kunit_try_run_case+0x170/0x3f0
[   34.280460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.280539]  kthread+0x328/0x630
[   34.280744]  ret_from_fork+0x10/0x20
[   34.280940] 
[   34.280963] Allocated by task 317:
[   34.281002]  kasan_save_stack+0x3c/0x68
[   34.281357]  kasan_save_track+0x20/0x40
[   34.281438]  kasan_save_alloc_info+0x40/0x58
[   34.281759]  __kasan_kmalloc+0xd4/0xd8
[   34.282150]  __kmalloc_noprof+0x198/0x4c8
[   34.282230]  kunit_kmalloc_array+0x34/0x88
[   34.282412]  copy_user_test_oob+0xac/0xec8
[   34.282473]  kunit_try_run_case+0x170/0x3f0
[   34.282518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.282583]  kthread+0x328/0x630
[   34.282631]  ret_from_fork+0x10/0x20
[   34.282685] 
[   34.282720] The buggy address belongs to the object at fff00000c5a89500
[   34.282720]  which belongs to the cache kmalloc-128 of size 128
[   34.282802] The buggy address is located 0 bytes inside of
[   34.282802]  allocated 120-byte region [fff00000c5a89500, fff00000c5a89578)
[   34.282883] 
[   34.282916] The buggy address belongs to the physical page:
[   34.282957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a89
[   34.283021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.283072] page_type: f5(slab)
[   34.283120] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.283184] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.283237] page dumped because: kasan: bad access detected
[   34.283274] 
[   34.283318] Memory state around the buggy address:
[   34.283375]  fff00000c5a89400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.283420]  fff00000c5a89480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.283465] >fff00000c5a89500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.283514]                                                                 ^
[   34.283566]  fff00000c5a89580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.283610]  fff00000c5a89600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.283660] ==================================================================
[   34.258504] ==================================================================
[   34.258569] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   34.259035] Write of size 121 at addr fff00000c5a89500 by task kunit_try_catch/317
[   34.259264] 
[   34.259305] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.259396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.259425] Hardware name: linux,dummy-virt (DT)
[   34.259460] Call trace:
[   34.259484]  show_stack+0x20/0x38 (C)
[   34.259539]  dump_stack_lvl+0x8c/0xd0
[   34.259589]  print_report+0x118/0x608
[   34.259648]  kasan_report+0xdc/0x128
[   34.259696]  kasan_check_range+0x100/0x1a8
[   34.259747]  __kasan_check_write+0x20/0x30
[   34.259794]  copy_user_test_oob+0x35c/0xec8
[   34.259854]  kunit_try_run_case+0x170/0x3f0
[   34.259905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.259962]  kthread+0x328/0x630
[   34.260004]  ret_from_fork+0x10/0x20
[   34.260055] 
[   34.260086] Allocated by task 317:
[   34.260123]  kasan_save_stack+0x3c/0x68
[   34.260168]  kasan_save_track+0x20/0x40
[   34.260208]  kasan_save_alloc_info+0x40/0x58
[   34.260248]  __kasan_kmalloc+0xd4/0xd8
[   34.260289]  __kmalloc_noprof+0x198/0x4c8
[   34.260663]  kunit_kmalloc_array+0x34/0x88
[   34.260964]  copy_user_test_oob+0xac/0xec8
[   34.261264]  kunit_try_run_case+0x170/0x3f0
[   34.261430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.261515]  kthread+0x328/0x630
[   34.261551]  ret_from_fork+0x10/0x20
[   34.261598] 
[   34.261872] The buggy address belongs to the object at fff00000c5a89500
[   34.261872]  which belongs to the cache kmalloc-128 of size 128
[   34.262109] The buggy address is located 0 bytes inside of
[   34.262109]  allocated 120-byte region [fff00000c5a89500, fff00000c5a89578)
[   34.262523] 
[   34.262686] The buggy address belongs to the physical page:
[   34.263072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a89
[   34.263253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.263384] page_type: f5(slab)
[   34.263429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.263768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.263860] page dumped because: kasan: bad access detected
[   34.264170] 
[   34.264229] Memory state around the buggy address:
[   34.264325]  fff00000c5a89400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.264379]  fff00000c5a89480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.264613] >fff00000c5a89500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.264790]                                                                 ^
[   34.265144]  fff00000c5a89580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.265372]  fff00000c5a89600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.265431] ==================================================================
[   34.284608] ==================================================================
[   34.284677] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   34.285244] Read of size 121 at addr fff00000c5a89500 by task kunit_try_catch/317
[   34.285298] 
[   34.285363] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.285680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.285749] Hardware name: linux,dummy-virt (DT)
[   34.285892] Call trace:
[   34.285944]  show_stack+0x20/0x38 (C)
[   34.286333]  dump_stack_lvl+0x8c/0xd0
[   34.286422]  print_report+0x118/0x608
[   34.286554]  kasan_report+0xdc/0x128
[   34.286682]  kasan_check_range+0x100/0x1a8
[   34.286769]  __kasan_check_read+0x20/0x30
[   34.287141]  copy_user_test_oob+0x4a0/0xec8
[   34.287630]  kunit_try_run_case+0x170/0x3f0
[   34.287770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.287961]  kthread+0x328/0x630
[   34.288049]  ret_from_fork+0x10/0x20
[   34.288854] 
[   34.288895] Allocated by task 317:
[   34.288931]  kasan_save_stack+0x3c/0x68
[   34.289309]  kasan_save_track+0x20/0x40
[   34.289397]  kasan_save_alloc_info+0x40/0x58
[   34.289529]  __kasan_kmalloc+0xd4/0xd8
[   34.289686]  __kmalloc_noprof+0x198/0x4c8
[   34.289849]  kunit_kmalloc_array+0x34/0x88
[   34.289981]  copy_user_test_oob+0xac/0xec8
[   34.290099]  kunit_try_run_case+0x170/0x3f0
[   34.290219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.290272]  kthread+0x328/0x630
[   34.290308]  ret_from_fork+0x10/0x20
[   34.290613] 
[   34.290698] The buggy address belongs to the object at fff00000c5a89500
[   34.290698]  which belongs to the cache kmalloc-128 of size 128
[   34.291035] The buggy address is located 0 bytes inside of
[   34.291035]  allocated 120-byte region [fff00000c5a89500, fff00000c5a89578)
[   34.291195] 
[   34.291221] The buggy address belongs to the physical page:
[   34.291255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a89
[   34.291622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.291702] page_type: f5(slab)
[   34.292043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.292168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.292214] page dumped because: kasan: bad access detected
[   34.292358] 
[   34.292545] Memory state around the buggy address:
[   34.292925]  fff00000c5a89400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.293031]  fff00000c5a89480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.293110] >fff00000c5a89500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.293160]                                                                 ^
[   34.293206]  fff00000c5a89580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.293380]  fff00000c5a89600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.293577] ==================================================================

[   27.113168] ==================================================================
[   27.113823] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   27.114229] Read of size 121 at addr ffff888105ab1d00 by task kunit_try_catch/334
[   27.114517] 
[   27.114812] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   27.114861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.114876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.114986] Call Trace:
[   27.115002]  <TASK>
[   27.115018]  dump_stack_lvl+0x73/0xb0
[   27.115048]  print_report+0xd1/0x650
[   27.115072]  ? __virt_addr_valid+0x1db/0x2d0
[   27.115098]  ? copy_user_test_oob+0x4aa/0x10f0
[   27.115122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.115323]  ? copy_user_test_oob+0x4aa/0x10f0
[   27.115349]  kasan_report+0x141/0x180
[   27.115373]  ? copy_user_test_oob+0x4aa/0x10f0
[   27.115402]  kasan_check_range+0x10c/0x1c0
[   27.115427]  __kasan_check_read+0x15/0x20
[   27.115451]  copy_user_test_oob+0x4aa/0x10f0
[   27.115489]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.115514]  ? finish_task_switch.isra.0+0x153/0x700
[   27.115538]  ? __switch_to+0x47/0xf50
[   27.115564]  ? __schedule+0x10cc/0x2b60
[   27.115591]  ? __pfx_read_tsc+0x10/0x10
[   27.115614]  ? ktime_get_ts64+0x86/0x230
[   27.115639]  kunit_try_run_case+0x1a5/0x480
[   27.115665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.115690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.115712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.115739]  ? __kthread_parkme+0x82/0x180
[   27.115760]  ? preempt_count_sub+0x50/0x80
[   27.115785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.115811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.115836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.115862]  kthread+0x337/0x6f0
[   27.115883]  ? trace_preempt_on+0x20/0xc0
[   27.115907]  ? __pfx_kthread+0x10/0x10
[   27.115930]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.115955]  ? calculate_sigpending+0x7b/0xa0
[   27.115980]  ? __pfx_kthread+0x10/0x10
[   27.116003]  ret_from_fork+0x116/0x1d0
[   27.116024]  ? __pfx_kthread+0x10/0x10
[   27.116046]  ret_from_fork_asm+0x1a/0x30
[   27.116079]  </TASK>
[   27.116091] 
[   27.125354] Allocated by task 334:
[   27.125668]  kasan_save_stack+0x45/0x70
[   27.125844]  kasan_save_track+0x18/0x40
[   27.126093]  kasan_save_alloc_info+0x3b/0x50
[   27.126272]  __kasan_kmalloc+0xb7/0xc0
[   27.126616]  __kmalloc_noprof+0x1c9/0x500
[   27.126807]  kunit_kmalloc_array+0x25/0x60
[   27.127115]  copy_user_test_oob+0xab/0x10f0
[   27.127342]  kunit_try_run_case+0x1a5/0x480
[   27.127542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.127769]  kthread+0x337/0x6f0
[   27.127926]  ret_from_fork+0x116/0x1d0
[   27.128087]  ret_from_fork_asm+0x1a/0x30
[   27.128555] 
[   27.128650] The buggy address belongs to the object at ffff888105ab1d00
[   27.128650]  which belongs to the cache kmalloc-128 of size 128
[   27.129230] The buggy address is located 0 bytes inside of
[   27.129230]  allocated 120-byte region [ffff888105ab1d00, ffff888105ab1d78)
[   27.129903] 
[   27.130061] The buggy address belongs to the physical page:
[   27.130294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab1
[   27.130735] flags: 0x200000000000000(node=0|zone=2)
[   27.130972] page_type: f5(slab)
[   27.131279] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.131650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.132044] page dumped because: kasan: bad access detected
[   27.132294] 
[   27.132389] Memory state around the buggy address:
[   27.132594]  ffff888105ab1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.132881]  ffff888105ab1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.133170] >ffff888105ab1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.133451]                                                                 ^
[   27.133741]  ffff888105ab1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.134028]  ffff888105ab1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.134313] ==================================================================
[   27.157040] ==================================================================
[   27.157552] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   27.158013] Read of size 121 at addr ffff888105ab1d00 by task kunit_try_catch/334
[   27.158375] 
[   27.158489] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   27.158688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.158704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.158728] Call Trace:
[   27.158747]  <TASK>
[   27.158765]  dump_stack_lvl+0x73/0xb0
[   27.158798]  print_report+0xd1/0x650
[   27.158823]  ? __virt_addr_valid+0x1db/0x2d0
[   27.158848]  ? copy_user_test_oob+0x604/0x10f0
[   27.158872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.158899]  ? copy_user_test_oob+0x604/0x10f0
[   27.158924]  kasan_report+0x141/0x180
[   27.158947]  ? copy_user_test_oob+0x604/0x10f0
[   27.158976]  kasan_check_range+0x10c/0x1c0
[   27.159002]  __kasan_check_read+0x15/0x20
[   27.159026]  copy_user_test_oob+0x604/0x10f0
[   27.159053]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.159076]  ? finish_task_switch.isra.0+0x153/0x700
[   27.159099]  ? __switch_to+0x47/0xf50
[   27.159126]  ? __schedule+0x10cc/0x2b60
[   27.159153]  ? __pfx_read_tsc+0x10/0x10
[   27.159176]  ? ktime_get_ts64+0x86/0x230
[   27.159289]  kunit_try_run_case+0x1a5/0x480
[   27.159320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.159345]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.159368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.159396]  ? __kthread_parkme+0x82/0x180
[   27.159418]  ? preempt_count_sub+0x50/0x80
[   27.159442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.159485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.159510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.159537]  kthread+0x337/0x6f0
[   27.159560]  ? trace_preempt_on+0x20/0xc0
[   27.159585]  ? __pfx_kthread+0x10/0x10
[   27.159607]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.159633]  ? calculate_sigpending+0x7b/0xa0
[   27.159657]  ? __pfx_kthread+0x10/0x10
[   27.159681]  ret_from_fork+0x116/0x1d0
[   27.159701]  ? __pfx_kthread+0x10/0x10
[   27.159724]  ret_from_fork_asm+0x1a/0x30
[   27.159757]  </TASK>
[   27.159769] 
[   27.168971] Allocated by task 334:
[   27.169145]  kasan_save_stack+0x45/0x70
[   27.169474]  kasan_save_track+0x18/0x40
[   27.169625]  kasan_save_alloc_info+0x3b/0x50
[   27.169990]  __kasan_kmalloc+0xb7/0xc0
[   27.170284]  __kmalloc_noprof+0x1c9/0x500
[   27.170450]  kunit_kmalloc_array+0x25/0x60
[   27.170780]  copy_user_test_oob+0xab/0x10f0
[   27.171045]  kunit_try_run_case+0x1a5/0x480
[   27.171299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.171550]  kthread+0x337/0x6f0
[   27.171703]  ret_from_fork+0x116/0x1d0
[   27.171866]  ret_from_fork_asm+0x1a/0x30
[   27.172040] 
[   27.172115] The buggy address belongs to the object at ffff888105ab1d00
[   27.172115]  which belongs to the cache kmalloc-128 of size 128
[   27.172947] The buggy address is located 0 bytes inside of
[   27.172947]  allocated 120-byte region [ffff888105ab1d00, ffff888105ab1d78)
[   27.173639] 
[   27.173730] The buggy address belongs to the physical page:
[   27.173951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab1
[   27.174530] flags: 0x200000000000000(node=0|zone=2)
[   27.174813] page_type: f5(slab)
[   27.174941] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.175475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.175848] page dumped because: kasan: bad access detected
[   27.176081] 
[   27.176162] Memory state around the buggy address:
[   27.176558]  ffff888105ab1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.176854]  ffff888105ab1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.177140] >ffff888105ab1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.177699]                                                                 ^
[   27.178058]  ffff888105ab1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.178401]  ffff888105ab1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.178809] ==================================================================
[   27.091359] ==================================================================
[   27.091705] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   27.092120] Write of size 121 at addr ffff888105ab1d00 by task kunit_try_catch/334
[   27.092574] 
[   27.092671] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   27.092725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.092741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.092765] Call Trace:
[   27.092781]  <TASK>
[   27.092799]  dump_stack_lvl+0x73/0xb0
[   27.092829]  print_report+0xd1/0x650
[   27.092853]  ? __virt_addr_valid+0x1db/0x2d0
[   27.092878]  ? copy_user_test_oob+0x3fd/0x10f0
[   27.092902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.092929]  ? copy_user_test_oob+0x3fd/0x10f0
[   27.092954]  kasan_report+0x141/0x180
[   27.092976]  ? copy_user_test_oob+0x3fd/0x10f0
[   27.093006]  kasan_check_range+0x10c/0x1c0
[   27.093031]  __kasan_check_write+0x18/0x20
[   27.093055]  copy_user_test_oob+0x3fd/0x10f0
[   27.093082]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.093105]  ? finish_task_switch.isra.0+0x153/0x700
[   27.093130]  ? __switch_to+0x47/0xf50
[   27.093156]  ? __schedule+0x10cc/0x2b60
[   27.093183]  ? __pfx_read_tsc+0x10/0x10
[   27.093526]  ? ktime_get_ts64+0x86/0x230
[   27.093555]  kunit_try_run_case+0x1a5/0x480
[   27.093583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.093609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.093633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.093659]  ? __kthread_parkme+0x82/0x180
[   27.093682]  ? preempt_count_sub+0x50/0x80
[   27.093707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.093735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.093761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.093786]  kthread+0x337/0x6f0
[   27.093808]  ? trace_preempt_on+0x20/0xc0
[   27.093833]  ? __pfx_kthread+0x10/0x10
[   27.093868]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.093893]  ? calculate_sigpending+0x7b/0xa0
[   27.093918]  ? __pfx_kthread+0x10/0x10
[   27.093942]  ret_from_fork+0x116/0x1d0
[   27.093962]  ? __pfx_kthread+0x10/0x10
[   27.093985]  ret_from_fork_asm+0x1a/0x30
[   27.094017]  </TASK>
[   27.094030] 
[   27.103025] Allocated by task 334:
[   27.103273]  kasan_save_stack+0x45/0x70
[   27.103672]  kasan_save_track+0x18/0x40
[   27.103908]  kasan_save_alloc_info+0x3b/0x50
[   27.104104]  __kasan_kmalloc+0xb7/0xc0
[   27.104405]  __kmalloc_noprof+0x1c9/0x500
[   27.104619]  kunit_kmalloc_array+0x25/0x60
[   27.104911]  copy_user_test_oob+0xab/0x10f0
[   27.105184]  kunit_try_run_case+0x1a5/0x480
[   27.105435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.105740]  kthread+0x337/0x6f0
[   27.105877]  ret_from_fork+0x116/0x1d0
[   27.106063]  ret_from_fork_asm+0x1a/0x30
[   27.106415] 
[   27.106520] The buggy address belongs to the object at ffff888105ab1d00
[   27.106520]  which belongs to the cache kmalloc-128 of size 128
[   27.107120] The buggy address is located 0 bytes inside of
[   27.107120]  allocated 120-byte region [ffff888105ab1d00, ffff888105ab1d78)
[   27.107749] 
[   27.107842] The buggy address belongs to the physical page:
[   27.108067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab1
[   27.108586] flags: 0x200000000000000(node=0|zone=2)
[   27.108873] page_type: f5(slab)
[   27.109007] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.109450] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.109856] page dumped because: kasan: bad access detected
[   27.110084] 
[   27.110154] Memory state around the buggy address:
[   27.110359]  ffff888105ab1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.110665]  ffff888105ab1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.110956] >ffff888105ab1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.111240]                                                                 ^
[   27.111832]  ffff888105ab1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.112195]  ffff888105ab1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.112442] ==================================================================
[   27.135229] ==================================================================
[   27.135651] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   27.136029] Write of size 121 at addr ffff888105ab1d00 by task kunit_try_catch/334
[   27.136325] 
[   27.136405] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   27.136695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.136712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.136736] Call Trace:
[   27.136751]  <TASK>
[   27.136768]  dump_stack_lvl+0x73/0xb0
[   27.136799]  print_report+0xd1/0x650
[   27.136823]  ? __virt_addr_valid+0x1db/0x2d0
[   27.136847]  ? copy_user_test_oob+0x557/0x10f0
[   27.136871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.136900]  ? copy_user_test_oob+0x557/0x10f0
[   27.136926]  kasan_report+0x141/0x180
[   27.136949]  ? copy_user_test_oob+0x557/0x10f0
[   27.136978]  kasan_check_range+0x10c/0x1c0
[   27.137003]  __kasan_check_write+0x18/0x20
[   27.137028]  copy_user_test_oob+0x557/0x10f0
[   27.137055]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.137079]  ? finish_task_switch.isra.0+0x153/0x700
[   27.137102]  ? __switch_to+0x47/0xf50
[   27.137129]  ? __schedule+0x10cc/0x2b60
[   27.137155]  ? __pfx_read_tsc+0x10/0x10
[   27.137177]  ? ktime_get_ts64+0x86/0x230
[   27.137217]  kunit_try_run_case+0x1a5/0x480
[   27.137244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.137270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.137291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.137318]  ? __kthread_parkme+0x82/0x180
[   27.137340]  ? preempt_count_sub+0x50/0x80
[   27.137364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.137390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.137415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.137441]  kthread+0x337/0x6f0
[   27.137474]  ? trace_preempt_on+0x20/0xc0
[   27.137498]  ? __pfx_kthread+0x10/0x10
[   27.137521]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.137545]  ? calculate_sigpending+0x7b/0xa0
[   27.137571]  ? __pfx_kthread+0x10/0x10
[   27.137595]  ret_from_fork+0x116/0x1d0
[   27.137615]  ? __pfx_kthread+0x10/0x10
[   27.137638]  ret_from_fork_asm+0x1a/0x30
[   27.137670]  </TASK>
[   27.137683] 
[   27.146845] Allocated by task 334:
[   27.147135]  kasan_save_stack+0x45/0x70
[   27.147401]  kasan_save_track+0x18/0x40
[   27.147589]  kasan_save_alloc_info+0x3b/0x50
[   27.147785]  __kasan_kmalloc+0xb7/0xc0
[   27.147967]  __kmalloc_noprof+0x1c9/0x500
[   27.148138]  kunit_kmalloc_array+0x25/0x60
[   27.148634]  copy_user_test_oob+0xab/0x10f0
[   27.148811]  kunit_try_run_case+0x1a5/0x480
[   27.149017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.149377]  kthread+0x337/0x6f0
[   27.149669]  ret_from_fork+0x116/0x1d0
[   27.149814]  ret_from_fork_asm+0x1a/0x30
[   27.150083] 
[   27.150247] The buggy address belongs to the object at ffff888105ab1d00
[   27.150247]  which belongs to the cache kmalloc-128 of size 128
[   27.150874] The buggy address is located 0 bytes inside of
[   27.150874]  allocated 120-byte region [ffff888105ab1d00, ffff888105ab1d78)
[   27.151427] 
[   27.151605] The buggy address belongs to the physical page:
[   27.151855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab1
[   27.152179] flags: 0x200000000000000(node=0|zone=2)
[   27.152592] page_type: f5(slab)
[   27.152749] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.153164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.153545] page dumped because: kasan: bad access detected
[   27.153772] 
[   27.153876] Memory state around the buggy address:
[   27.154244]  ffff888105ab1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.154647]  ffff888105ab1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.154908] >ffff888105ab1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.155316]                                                                 ^
[   27.155637]  ffff888105ab1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.155936]  ffff888105ab1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.156226] ==================================================================