Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   82.434915] ==================================================================
[   82.441788] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   82.448814] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   82.456366] 
[   82.457851] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   82.457907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.457924] Hardware name: WinLink E850-96 board (DT)
[   82.457949] Call trace:
[   82.457964]  show_stack+0x20/0x38 (C)
[   82.458003]  dump_stack_lvl+0x8c/0xd0
[   82.458035]  print_report+0x118/0x5d0
[   82.458062]  kasan_report+0xdc/0x128
[   82.458089]  kasan_check_range+0x100/0x1a8
[   82.458116]  __kasan_check_write+0x20/0x30
[   82.458148]  copy_user_test_oob+0x35c/0xec8
[   82.458184]  kunit_try_run_case+0x170/0x3f0
[   82.458223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.458258]  kthread+0x328/0x630
[   82.458285]  ret_from_fork+0x10/0x20
[   82.458320] 
[   82.525288] Allocated by task 369:
[   82.528676]  kasan_save_stack+0x3c/0x68
[   82.532493]  kasan_save_track+0x20/0x40
[   82.536313]  kasan_save_alloc_info+0x40/0x58
[   82.540566]  __kasan_kmalloc+0xd4/0xd8
[   82.544299]  __kmalloc_noprof+0x198/0x4c8
[   82.548292]  kunit_kmalloc_array+0x34/0x88
[   82.552373]  copy_user_test_oob+0xac/0xec8
[   82.556453]  kunit_try_run_case+0x170/0x3f0
[   82.560618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.566087]  kthread+0x328/0x630
[   82.569298]  ret_from_fork+0x10/0x20
[   82.572857] 
[   82.574335] The buggy address belongs to the object at ffff000803b98000
[   82.574335]  which belongs to the cache kmalloc-128 of size 128
[   82.586835] The buggy address is located 0 bytes inside of
[   82.586835]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   82.599246] 
[   82.600724] The buggy address belongs to the physical page:
[   82.606280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.614266] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.621904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.628846] page_type: f5(slab)
[   82.631984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.639703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.647430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.655241] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.663054] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.670866] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.678672] page dumped because: kasan: bad access detected
[   82.684227] 
[   82.685703] Memory state around the buggy address:
[   82.690483]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.697685]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.704892] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.712091]                                                                 ^
[   82.719213]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.726418]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.733619] ==================================================================
[   83.047120] ==================================================================
[   83.054110] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   83.061133] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   83.068685] 
[   83.070166] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.070219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.070235] Hardware name: WinLink E850-96 board (DT)
[   83.070258] Call trace:
[   83.070273]  show_stack+0x20/0x38 (C)
[   83.070308]  dump_stack_lvl+0x8c/0xd0
[   83.070343]  print_report+0x118/0x5d0
[   83.070372]  kasan_report+0xdc/0x128
[   83.070401]  kasan_check_range+0x100/0x1a8
[   83.070431]  __kasan_check_write+0x20/0x30
[   83.070464]  copy_user_test_oob+0x434/0xec8
[   83.070500]  kunit_try_run_case+0x170/0x3f0
[   83.070538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.070572]  kthread+0x328/0x630
[   83.070605]  ret_from_fork+0x10/0x20
[   83.070638] 
[   83.137606] Allocated by task 369:
[   83.140993]  kasan_save_stack+0x3c/0x68
[   83.144811]  kasan_save_track+0x20/0x40
[   83.148630]  kasan_save_alloc_info+0x40/0x58
[   83.152883]  __kasan_kmalloc+0xd4/0xd8
[   83.156616]  __kmalloc_noprof+0x198/0x4c8
[   83.160609]  kunit_kmalloc_array+0x34/0x88
[   83.164690]  copy_user_test_oob+0xac/0xec8
[   83.168769]  kunit_try_run_case+0x170/0x3f0
[   83.172935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.178404]  kthread+0x328/0x630
[   83.181616]  ret_from_fork+0x10/0x20
[   83.185175] 
[   83.186652] The buggy address belongs to the object at ffff000803b98000
[   83.186652]  which belongs to the cache kmalloc-128 of size 128
[   83.199154] The buggy address is located 0 bytes inside of
[   83.199154]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   83.211564] 
[   83.213042] The buggy address belongs to the physical page:
[   83.218598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   83.226583] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.234221] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.241165] page_type: f5(slab)
[   83.244300] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.252022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.259747] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.267558] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.275372] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   83.283183] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.290989] page dumped because: kasan: bad access detected
[   83.296544] 
[   83.298020] Memory state around the buggy address:
[   83.302799]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.310003]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.317211] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.324409]                                                                 ^
[   83.331530]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.338735]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.345936] ==================================================================
[   83.353540] ==================================================================
[   83.360352] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   83.367377] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   83.374842] 
[   83.376325] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.376379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.376395] Hardware name: WinLink E850-96 board (DT)
[   83.376416] Call trace:
[   83.376430]  show_stack+0x20/0x38 (C)
[   83.376463]  dump_stack_lvl+0x8c/0xd0
[   83.376497]  print_report+0x118/0x5d0
[   83.376527]  kasan_report+0xdc/0x128
[   83.376554]  kasan_check_range+0x100/0x1a8
[   83.376586]  __kasan_check_read+0x20/0x30
[   83.376615]  copy_user_test_oob+0x4a0/0xec8
[   83.376647]  kunit_try_run_case+0x170/0x3f0
[   83.376685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.376723]  kthread+0x328/0x630
[   83.376754]  ret_from_fork+0x10/0x20
[   83.376787] 
[   83.443677] Allocated by task 369:
[   83.447066]  kasan_save_stack+0x3c/0x68
[   83.450882]  kasan_save_track+0x20/0x40
[   83.454702]  kasan_save_alloc_info+0x40/0x58
[   83.458955]  __kasan_kmalloc+0xd4/0xd8
[   83.462688]  __kmalloc_noprof+0x198/0x4c8
[   83.466681]  kunit_kmalloc_array+0x34/0x88
[   83.470762]  copy_user_test_oob+0xac/0xec8
[   83.474840]  kunit_try_run_case+0x170/0x3f0
[   83.479009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.484476]  kthread+0x328/0x630
[   83.487688]  ret_from_fork+0x10/0x20
[   83.491246] 
[   83.492723] The buggy address belongs to the object at ffff000803b98000
[   83.492723]  which belongs to the cache kmalloc-128 of size 128
[   83.505222] The buggy address is located 0 bytes inside of
[   83.505222]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   83.517635] 
[   83.519112] The buggy address belongs to the physical page:
[   83.524670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   83.532654] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.540293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.547235] page_type: f5(slab)
[   83.550372] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.558092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.565819] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.573630] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.581443] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   83.589255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.597061] page dumped because: kasan: bad access detected
[   83.602616] 
[   83.604092] Memory state around the buggy address:
[   83.608871]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.616075]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.623281] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.630480]                                                                 ^
[   83.637602]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.644807]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.652008] ==================================================================
[   81.817111] ==================================================================
[   81.829472] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   81.836498] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   81.844049] 
[   81.845536] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   81.845599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.845616] Hardware name: WinLink E850-96 board (DT)
[   81.845638] Call trace:
[   81.845654]  show_stack+0x20/0x38 (C)
[   81.845688]  dump_stack_lvl+0x8c/0xd0
[   81.845723]  print_report+0x118/0x5d0
[   81.845756]  kasan_report+0xdc/0x128
[   81.845786]  kasan_check_range+0x100/0x1a8
[   81.845820]  __kasan_check_write+0x20/0x30
[   81.845854]  copy_user_test_oob+0x234/0xec8
[   81.845888]  kunit_try_run_case+0x170/0x3f0
[   81.845930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.845964]  kthread+0x328/0x630
[   81.845996]  ret_from_fork+0x10/0x20
[   81.846034] 
[   81.912973] Allocated by task 369:
[   81.916359]  kasan_save_stack+0x3c/0x68
[   81.920176]  kasan_save_track+0x20/0x40
[   81.923996]  kasan_save_alloc_info+0x40/0x58
[   81.928249]  __kasan_kmalloc+0xd4/0xd8
[   81.931982]  __kmalloc_noprof+0x198/0x4c8
[   81.935975]  kunit_kmalloc_array+0x34/0x88
[   81.940056]  copy_user_test_oob+0xac/0xec8
[   81.944134]  kunit_try_run_case+0x170/0x3f0
[   81.948301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.953770]  kthread+0x328/0x630
[   81.956981]  ret_from_fork+0x10/0x20
[   81.960540] 
[   81.962017] The buggy address belongs to the object at ffff000803b98000
[   81.962017]  which belongs to the cache kmalloc-128 of size 128
[   81.974519] The buggy address is located 0 bytes inside of
[   81.974519]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   81.986928] 
[   81.988410] The buggy address belongs to the physical page:
[   81.993964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.001948] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.009588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.016531] page_type: f5(slab)
[   82.019668] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.027386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.035114] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.042924] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.050737] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.058549] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.066354] page dumped because: kasan: bad access detected
[   82.071910] 
[   82.073385] Memory state around the buggy address:
[   82.078167]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.085368]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.092575] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.099774]                                                                 ^
[   82.106896]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.114101]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.121303] ==================================================================
[   82.741040] ==================================================================
[   82.748033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   82.755060] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   82.762525] 
[   82.764009] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   82.764062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.764080] Hardware name: WinLink E850-96 board (DT)
[   82.764103] Call trace:
[   82.764118]  show_stack+0x20/0x38 (C)
[   82.764155]  dump_stack_lvl+0x8c/0xd0
[   82.764190]  print_report+0x118/0x5d0
[   82.764218]  kasan_report+0xdc/0x128
[   82.764244]  kasan_check_range+0x100/0x1a8
[   82.764274]  __kasan_check_read+0x20/0x30
[   82.764305]  copy_user_test_oob+0x3c8/0xec8
[   82.764341]  kunit_try_run_case+0x170/0x3f0
[   82.764379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.764414]  kthread+0x328/0x630
[   82.764443]  ret_from_fork+0x10/0x20
[   82.764479] 
[   82.831362] Allocated by task 369:
[   82.834749]  kasan_save_stack+0x3c/0x68
[   82.838565]  kasan_save_track+0x20/0x40
[   82.842385]  kasan_save_alloc_info+0x40/0x58
[   82.846638]  __kasan_kmalloc+0xd4/0xd8
[   82.850371]  __kmalloc_noprof+0x198/0x4c8
[   82.854363]  kunit_kmalloc_array+0x34/0x88
[   82.858445]  copy_user_test_oob+0xac/0xec8
[   82.862523]  kunit_try_run_case+0x170/0x3f0
[   82.866690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.872158]  kthread+0x328/0x630
[   82.875370]  ret_from_fork+0x10/0x20
[   82.878929] 
[   82.880406] The buggy address belongs to the object at ffff000803b98000
[   82.880406]  which belongs to the cache kmalloc-128 of size 128
[   82.892904] The buggy address is located 0 bytes inside of
[   82.892904]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   82.905318] 
[   82.906797] The buggy address belongs to the physical page:
[   82.912352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.920337] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.927976] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.934919] page_type: f5(slab)
[   82.938054] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.945775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.953501] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.961313] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.969126] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.976937] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.984744] page dumped because: kasan: bad access detected
[   82.990299] 
[   82.991775] Memory state around the buggy address:
[   82.996554]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.003757]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.010964] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.018163]                                                                 ^
[   83.025285]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.032490]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.039691] ==================================================================
[   82.128743] ==================================================================
[   82.135718] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   82.142743] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   82.150208] 
[   82.151692] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   82.151746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.151764] Hardware name: WinLink E850-96 board (DT)
[   82.151788] Call trace:
[   82.151801]  show_stack+0x20/0x38 (C)
[   82.151839]  dump_stack_lvl+0x8c/0xd0
[   82.151873]  print_report+0x118/0x5d0
[   82.151904]  kasan_report+0xdc/0x128
[   82.151932]  kasan_check_range+0x100/0x1a8
[   82.151964]  __kasan_check_read+0x20/0x30
[   82.151995]  copy_user_test_oob+0x728/0xec8
[   82.152029]  kunit_try_run_case+0x170/0x3f0
[   82.152069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.152104]  kthread+0x328/0x630
[   82.152136]  ret_from_fork+0x10/0x20
[   82.152174] 
[   82.219043] Allocated by task 369:
[   82.222432]  kasan_save_stack+0x3c/0x68
[   82.226248]  kasan_save_track+0x20/0x40
[   82.230068]  kasan_save_alloc_info+0x40/0x58
[   82.234321]  __kasan_kmalloc+0xd4/0xd8
[   82.238053]  __kmalloc_noprof+0x198/0x4c8
[   82.242046]  kunit_kmalloc_array+0x34/0x88
[   82.246126]  copy_user_test_oob+0xac/0xec8
[   82.250206]  kunit_try_run_case+0x170/0x3f0
[   82.254373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.259841]  kthread+0x328/0x630
[   82.263053]  ret_from_fork+0x10/0x20
[   82.266612] 
[   82.268089] The buggy address belongs to the object at ffff000803b98000
[   82.268089]  which belongs to the cache kmalloc-128 of size 128
[   82.280588] The buggy address is located 0 bytes inside of
[   82.280588]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   82.293000] 
[   82.294479] The buggy address belongs to the physical page:
[   82.300035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.308019] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.315659] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.322602] page_type: f5(slab)
[   82.325737] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.333458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.341184] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.348995] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.356809] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.364621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.372426] page dumped because: kasan: bad access detected
[   82.377981] 
[   82.379457] Memory state around the buggy address:
[   82.384239]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.391440]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.398646] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.405846]                                                                 ^
[   82.412968]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.420173]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.427374] ==================================================================

[   33.461115] ==================================================================
[   33.461842] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.462376] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.462468] 
[   33.462624] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.462745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.462853] Hardware name: linux,dummy-virt (DT)
[   33.462969] Call trace:
[   33.463018]  show_stack+0x20/0x38 (C)
[   33.463164]  dump_stack_lvl+0x8c/0xd0
[   33.463551]  print_report+0x118/0x5d0
[   33.463705]  kasan_report+0xdc/0x128
[   33.463791]  kasan_check_range+0x100/0x1a8
[   33.463965]  __kasan_check_write+0x20/0x30
[   33.464053]  copy_user_test_oob+0x234/0xec8
[   33.464365]  kunit_try_run_case+0x170/0x3f0
[   33.464473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.464528]  kthread+0x328/0x630
[   33.464873]  ret_from_fork+0x10/0x20
[   33.464965] 
[   33.465135] Allocated by task 316:
[   33.465203]  kasan_save_stack+0x3c/0x68
[   33.465347]  kasan_save_track+0x20/0x40
[   33.465441]  kasan_save_alloc_info+0x40/0x58
[   33.465513]  __kasan_kmalloc+0xd4/0xd8
[   33.465857]  __kmalloc_noprof+0x198/0x4c8
[   33.465957]  kunit_kmalloc_array+0x34/0x88
[   33.466094]  copy_user_test_oob+0xac/0xec8
[   33.466173]  kunit_try_run_case+0x170/0x3f0
[   33.466299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.466378]  kthread+0x328/0x630
[   33.466519]  ret_from_fork+0x10/0x20
[   33.466619] 
[   33.466643] The buggy address belongs to the object at fff00000c91a7600
[   33.466643]  which belongs to the cache kmalloc-128 of size 128
[   33.466726] The buggy address is located 0 bytes inside of
[   33.466726]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.467191] 
[   33.467254] The buggy address belongs to the physical page:
[   33.467617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.467800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.468093] page_type: f5(slab)
[   33.468162] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.468299] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.468372] page dumped because: kasan: bad access detected
[   33.468418] 
[   33.468448] Memory state around the buggy address:
[   33.468486]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.468539]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468594] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.468650]                                                                 ^
[   33.468693]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468739]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.468798] ==================================================================
[   33.511571] ==================================================================
[   33.511700] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.511773] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.511828] 
[   33.511899] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.511998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.512028] Hardware name: linux,dummy-virt (DT)
[   33.512061] Call trace:
[   33.512099]  show_stack+0x20/0x38 (C)
[   33.512150]  dump_stack_lvl+0x8c/0xd0
[   33.512209]  print_report+0x118/0x5d0
[   33.512254]  kasan_report+0xdc/0x128
[   33.512299]  kasan_check_range+0x100/0x1a8
[   33.512364]  __kasan_check_write+0x20/0x30
[   33.512413]  copy_user_test_oob+0x434/0xec8
[   33.512468]  kunit_try_run_case+0x170/0x3f0
[   33.512520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.512570]  kthread+0x328/0x630
[   33.512619]  ret_from_fork+0x10/0x20
[   33.512669] 
[   33.512689] Allocated by task 316:
[   33.512720]  kasan_save_stack+0x3c/0x68
[   33.512764]  kasan_save_track+0x20/0x40
[   33.512805]  kasan_save_alloc_info+0x40/0x58
[   33.512855]  __kasan_kmalloc+0xd4/0xd8
[   33.512903]  __kmalloc_noprof+0x198/0x4c8
[   33.512946]  kunit_kmalloc_array+0x34/0x88
[   33.512985]  copy_user_test_oob+0xac/0xec8
[   33.513025]  kunit_try_run_case+0x170/0x3f0
[   33.513075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.513118]  kthread+0x328/0x630
[   33.513151]  ret_from_fork+0x10/0x20
[   33.513189] 
[   33.513211] The buggy address belongs to the object at fff00000c91a7600
[   33.513211]  which belongs to the cache kmalloc-128 of size 128
[   33.513273] The buggy address is located 0 bytes inside of
[   33.513273]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.513659] 
[   33.513685] The buggy address belongs to the physical page:
[   33.514100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.514187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.514260] page_type: f5(slab)
[   33.514630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.514705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.514915] page dumped because: kasan: bad access detected
[   33.514955] 
[   33.515102] Memory state around the buggy address:
[   33.515368]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.515708]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.515762] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.515867]                                                                 ^
[   33.515913]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.515959]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.516270] ==================================================================
[   33.494013] ==================================================================
[   33.494092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.494175] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.494245] 
[   33.494288] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.494400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.494433] Hardware name: linux,dummy-virt (DT)
[   33.494471] Call trace:
[   33.494498]  show_stack+0x20/0x38 (C)
[   33.494555]  dump_stack_lvl+0x8c/0xd0
[   33.494606]  print_report+0x118/0x5d0
[   33.494653]  kasan_report+0xdc/0x128
[   33.494707]  kasan_check_range+0x100/0x1a8
[   33.494753]  __kasan_check_write+0x20/0x30
[   33.494801]  copy_user_test_oob+0x35c/0xec8
[   33.494849]  kunit_try_run_case+0x170/0x3f0
[   33.494903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.494964]  kthread+0x328/0x630
[   33.495008]  ret_from_fork+0x10/0x20
[   33.495073] 
[   33.495093] Allocated by task 316:
[   33.495133]  kasan_save_stack+0x3c/0x68
[   33.495191]  kasan_save_track+0x20/0x40
[   33.495235]  kasan_save_alloc_info+0x40/0x58
[   33.495274]  __kasan_kmalloc+0xd4/0xd8
[   33.495314]  __kmalloc_noprof+0x198/0x4c8
[   33.496222]  kunit_kmalloc_array+0x34/0x88
[   33.496398]  copy_user_test_oob+0xac/0xec8
[   33.496589]  kunit_try_run_case+0x170/0x3f0
[   33.496723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496820]  kthread+0x328/0x630
[   33.496880]  ret_from_fork+0x10/0x20
[   33.496937] 
[   33.497099] The buggy address belongs to the object at fff00000c91a7600
[   33.497099]  which belongs to the cache kmalloc-128 of size 128
[   33.497317] The buggy address is located 0 bytes inside of
[   33.497317]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.497699] 
[   33.497839] The buggy address belongs to the physical page:
[   33.497917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.498100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498161] page_type: f5(slab)
[   33.498371] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.498545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.498822] page dumped because: kasan: bad access detected
[   33.498992] 
[   33.499035] Memory state around the buggy address:
[   33.499110]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.499236]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499283] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.499525]                                                                 ^
[   33.499965]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500042]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500163] ==================================================================
[   33.476409] ==================================================================
[   33.476505] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.476582] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.476646] 
[   33.476684] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.476791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.476824] Hardware name: linux,dummy-virt (DT)
[   33.476867] Call trace:
[   33.476898]  show_stack+0x20/0x38 (C)
[   33.476949]  dump_stack_lvl+0x8c/0xd0
[   33.477004]  print_report+0x118/0x5d0
[   33.477050]  kasan_report+0xdc/0x128
[   33.477094]  kasan_check_range+0x100/0x1a8
[   33.477141]  __kasan_check_read+0x20/0x30
[   33.477187]  copy_user_test_oob+0x728/0xec8
[   33.477241]  kunit_try_run_case+0x170/0x3f0
[   33.477292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.477354]  kthread+0x328/0x630
[   33.478008]  ret_from_fork+0x10/0x20
[   33.478153] 
[   33.478195] Allocated by task 316:
[   33.478515]  kasan_save_stack+0x3c/0x68
[   33.478603]  kasan_save_track+0x20/0x40
[   33.478702]  kasan_save_alloc_info+0x40/0x58
[   33.478960]  __kasan_kmalloc+0xd4/0xd8
[   33.479132]  __kmalloc_noprof+0x198/0x4c8
[   33.479209]  kunit_kmalloc_array+0x34/0x88
[   33.479385]  copy_user_test_oob+0xac/0xec8
[   33.479617]  kunit_try_run_case+0x170/0x3f0
[   33.479916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.480036]  kthread+0x328/0x630
[   33.480214]  ret_from_fork+0x10/0x20
[   33.480260] 
[   33.480521] The buggy address belongs to the object at fff00000c91a7600
[   33.480521]  which belongs to the cache kmalloc-128 of size 128
[   33.480740] The buggy address is located 0 bytes inside of
[   33.480740]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.481011] 
[   33.481085] The buggy address belongs to the physical page:
[   33.481255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.481665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.481841] page_type: f5(slab)
[   33.482090] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.482218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.482275] page dumped because: kasan: bad access detected
[   33.482436] 
[   33.482630] Memory state around the buggy address:
[   33.482715]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.482843]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.482919] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.483239]                                                                 ^
[   33.483372]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483423]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483912] ==================================================================
[   33.517096] ==================================================================
[   33.517150] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.517493] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.517629] 
[   33.517711] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.517803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.517839] Hardware name: linux,dummy-virt (DT)
[   33.518024] Call trace:
[   33.518157]  show_stack+0x20/0x38 (C)
[   33.518297]  dump_stack_lvl+0x8c/0xd0
[   33.518402]  print_report+0x118/0x5d0
[   33.518731]  kasan_report+0xdc/0x128
[   33.518805]  kasan_check_range+0x100/0x1a8
[   33.518914]  __kasan_check_read+0x20/0x30
[   33.519068]  copy_user_test_oob+0x4a0/0xec8
[   33.519185]  kunit_try_run_case+0x170/0x3f0
[   33.519235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.519603]  kthread+0x328/0x630
[   33.519699]  ret_from_fork+0x10/0x20
[   33.520177] 
[   33.520263] Allocated by task 316:
[   33.520348]  kasan_save_stack+0x3c/0x68
[   33.520455]  kasan_save_track+0x20/0x40
[   33.520500]  kasan_save_alloc_info+0x40/0x58
[   33.520539]  __kasan_kmalloc+0xd4/0xd8
[   33.520735]  __kmalloc_noprof+0x198/0x4c8
[   33.520926]  kunit_kmalloc_array+0x34/0x88
[   33.521011]  copy_user_test_oob+0xac/0xec8
[   33.521186]  kunit_try_run_case+0x170/0x3f0
[   33.521389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.521540]  kthread+0x328/0x630
[   33.521630]  ret_from_fork+0x10/0x20
[   33.521746] 
[   33.521793] The buggy address belongs to the object at fff00000c91a7600
[   33.521793]  which belongs to the cache kmalloc-128 of size 128
[   33.521872] The buggy address is located 0 bytes inside of
[   33.521872]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.521951] 
[   33.522236] The buggy address belongs to the physical page:
[   33.522372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.522733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.522920] page_type: f5(slab)
[   33.522966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.523348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.523418] page dumped because: kasan: bad access detected
[   33.523471] 
[   33.523722] Memory state around the buggy address:
[   33.523916]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.524011]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.524217] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.524418]                                                                 ^
[   33.524731]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.524957]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.525138] ==================================================================
[   33.501215] ==================================================================
[   33.501304] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.501552] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.501798] 
[   33.501841] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.501938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.501966] Hardware name: linux,dummy-virt (DT)
[   33.502301] Call trace:
[   33.502737]  show_stack+0x20/0x38 (C)
[   33.502838]  dump_stack_lvl+0x8c/0xd0
[   33.502990]  print_report+0x118/0x5d0
[   33.503080]  kasan_report+0xdc/0x128
[   33.503132]  kasan_check_range+0x100/0x1a8
[   33.503409]  __kasan_check_read+0x20/0x30
[   33.503608]  copy_user_test_oob+0x3c8/0xec8
[   33.503805]  kunit_try_run_case+0x170/0x3f0
[   33.504009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.504165]  kthread+0x328/0x630
[   33.504253]  ret_from_fork+0x10/0x20
[   33.504642] 
[   33.504687] Allocated by task 316:
[   33.504737]  kasan_save_stack+0x3c/0x68
[   33.505067]  kasan_save_track+0x20/0x40
[   33.505283]  kasan_save_alloc_info+0x40/0x58
[   33.505465]  __kasan_kmalloc+0xd4/0xd8
[   33.505549]  __kmalloc_noprof+0x198/0x4c8
[   33.505630]  kunit_kmalloc_array+0x34/0x88
[   33.505743]  copy_user_test_oob+0xac/0xec8
[   33.505786]  kunit_try_run_case+0x170/0x3f0
[   33.505830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505872]  kthread+0x328/0x630
[   33.505908]  ret_from_fork+0x10/0x20
[   33.505947] 
[   33.505970] The buggy address belongs to the object at fff00000c91a7600
[   33.505970]  which belongs to the cache kmalloc-128 of size 128
[   33.506291] The buggy address is located 0 bytes inside of
[   33.506291]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.506776] 
[   33.506847] The buggy address belongs to the physical page:
[   33.507174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.507506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.507602] page_type: f5(slab)
[   33.507683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.507741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.507784] page dumped because: kasan: bad access detected
[   33.508104] 
[   33.508427] Memory state around the buggy address:
[   33.508507]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.508941]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.509270] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.509407]                                                                 ^
[   33.509499]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.509613]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.509654] ==================================================================

[   28.019893] ==================================================================
[   28.020211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   28.020525] Write of size 121 at addr ffff88810622c200 by task kunit_try_catch/335
[   28.020841] 
[   28.020962] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   28.021015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.021776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.021808] Call Trace:
[   28.021824]  <TASK>
[   28.021846]  dump_stack_lvl+0x73/0xb0
[   28.021880]  print_report+0xd1/0x610
[   28.021904]  ? __virt_addr_valid+0x1db/0x2d0
[   28.021930]  ? copy_user_test_oob+0x3fd/0x10f0
[   28.021954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.021984]  ? copy_user_test_oob+0x3fd/0x10f0
[   28.022009]  kasan_report+0x141/0x180
[   28.022032]  ? copy_user_test_oob+0x3fd/0x10f0
[   28.022061]  kasan_check_range+0x10c/0x1c0
[   28.022086]  __kasan_check_write+0x18/0x20
[   28.022111]  copy_user_test_oob+0x3fd/0x10f0
[   28.022138]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.022162]  ? finish_task_switch.isra.0+0x153/0x700
[   28.022187]  ? __switch_to+0x47/0xf80
[   28.022215]  ? __schedule+0x10cc/0x2b60
[   28.022239]  ? __pfx_read_tsc+0x10/0x10
[   28.022262]  ? ktime_get_ts64+0x86/0x230
[   28.022291]  kunit_try_run_case+0x1a5/0x480
[   28.022313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.022335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.022360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.022384]  ? __kthread_parkme+0x82/0x180
[   28.022507]  ? preempt_count_sub+0x50/0x80
[   28.022537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.022562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.022588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.022615]  kthread+0x337/0x6f0
[   28.022636]  ? trace_preempt_on+0x20/0xc0
[   28.022661]  ? __pfx_kthread+0x10/0x10
[   28.022684]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.022707]  ? calculate_sigpending+0x7b/0xa0
[   28.022745]  ? __pfx_kthread+0x10/0x10
[   28.022768]  ret_from_fork+0x116/0x1d0
[   28.022789]  ? __pfx_kthread+0x10/0x10
[   28.022811]  ret_from_fork_asm+0x1a/0x30
[   28.022842]  </TASK>
[   28.022854] 
[   28.031266] Allocated by task 335:
[   28.031390]  kasan_save_stack+0x45/0x70
[   28.031610]  kasan_save_track+0x18/0x40
[   28.031769]  kasan_save_alloc_info+0x3b/0x50
[   28.031911]  __kasan_kmalloc+0xb7/0xc0
[   28.032033]  __kmalloc_noprof+0x1c9/0x500
[   28.032167]  kunit_kmalloc_array+0x25/0x60
[   28.032297]  copy_user_test_oob+0xab/0x10f0
[   28.032478]  kunit_try_run_case+0x1a5/0x480
[   28.032691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.032894]  kthread+0x337/0x6f0
[   28.033012]  ret_from_fork+0x116/0x1d0
[   28.033148]  ret_from_fork_asm+0x1a/0x30
[   28.033341] 
[   28.033466] The buggy address belongs to the object at ffff88810622c200
[   28.033466]  which belongs to the cache kmalloc-128 of size 128
[   28.033945] The buggy address is located 0 bytes inside of
[   28.033945]  allocated 120-byte region [ffff88810622c200, ffff88810622c278)
[   28.034921] 
[   28.034998] The buggy address belongs to the physical page:
[   28.035419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c
[   28.035681] flags: 0x200000000000000(node=0|zone=2)
[   28.035880] page_type: f5(slab)
[   28.035998] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.036218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.036786] page dumped because: kasan: bad access detected
[   28.037056] 
[   28.037150] Memory state around the buggy address:
[   28.037375]  ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.037690]  ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.037907] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.038108]                                                                 ^
[   28.038308]  ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.038759]  ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.039073] ==================================================================
[   28.078459] ==================================================================
[   28.078853] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   28.079503] Read of size 121 at addr ffff88810622c200 by task kunit_try_catch/335
[   28.079829] 
[   28.079936] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   28.079988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.080002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.080026] Call Trace:
[   28.080045]  <TASK>
[   28.080063]  dump_stack_lvl+0x73/0xb0
[   28.080095]  print_report+0xd1/0x610
[   28.080118]  ? __virt_addr_valid+0x1db/0x2d0
[   28.080143]  ? copy_user_test_oob+0x604/0x10f0
[   28.080167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.080194]  ? copy_user_test_oob+0x604/0x10f0
[   28.080218]  kasan_report+0x141/0x180
[   28.080241]  ? copy_user_test_oob+0x604/0x10f0
[   28.080270]  kasan_check_range+0x10c/0x1c0
[   28.080294]  __kasan_check_read+0x15/0x20
[   28.080324]  copy_user_test_oob+0x604/0x10f0
[   28.080350]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.080374]  ? finish_task_switch.isra.0+0x153/0x700
[   28.080398]  ? __switch_to+0x47/0xf80
[   28.080578]  ? __schedule+0x10cc/0x2b60
[   28.080607]  ? __pfx_read_tsc+0x10/0x10
[   28.080629]  ? ktime_get_ts64+0x86/0x230
[   28.080655]  kunit_try_run_case+0x1a5/0x480
[   28.080680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.080751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.080778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.080803]  ? __kthread_parkme+0x82/0x180
[   28.080825]  ? preempt_count_sub+0x50/0x80
[   28.080849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.080872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.080898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.080924]  kthread+0x337/0x6f0
[   28.080945]  ? trace_preempt_on+0x20/0xc0
[   28.080970]  ? __pfx_kthread+0x10/0x10
[   28.080992]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.081014]  ? calculate_sigpending+0x7b/0xa0
[   28.081040]  ? __pfx_kthread+0x10/0x10
[   28.081063]  ret_from_fork+0x116/0x1d0
[   28.081083]  ? __pfx_kthread+0x10/0x10
[   28.081105]  ret_from_fork_asm+0x1a/0x30
[   28.081137]  </TASK>
[   28.081149] 
[   28.091708] Allocated by task 335:
[   28.091923]  kasan_save_stack+0x45/0x70
[   28.092218]  kasan_save_track+0x18/0x40
[   28.092527]  kasan_save_alloc_info+0x3b/0x50
[   28.092755]  __kasan_kmalloc+0xb7/0xc0
[   28.092926]  __kmalloc_noprof+0x1c9/0x500
[   28.093103]  kunit_kmalloc_array+0x25/0x60
[   28.093282]  copy_user_test_oob+0xab/0x10f0
[   28.093716]  kunit_try_run_case+0x1a5/0x480
[   28.094040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.094457]  kthread+0x337/0x6f0
[   28.094846]  ret_from_fork+0x116/0x1d0
[   28.095102]  ret_from_fork_asm+0x1a/0x30
[   28.095394] 
[   28.095506] The buggy address belongs to the object at ffff88810622c200
[   28.095506]  which belongs to the cache kmalloc-128 of size 128
[   28.096006] The buggy address is located 0 bytes inside of
[   28.096006]  allocated 120-byte region [ffff88810622c200, ffff88810622c278)
[   28.096749] 
[   28.096982] The buggy address belongs to the physical page:
[   28.097422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c
[   28.097930] flags: 0x200000000000000(node=0|zone=2)
[   28.098316] page_type: f5(slab)
[   28.098626] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.099105] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.099573] page dumped because: kasan: bad access detected
[   28.099903] 
[   28.100122] Memory state around the buggy address:
[   28.100473]  ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.100783]  ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.101079] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.101363]                                                                 ^
[   28.102072]  ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.102559]  ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.103068] ==================================================================
[   28.039673] ==================================================================
[   28.040220] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   28.040558] Read of size 121 at addr ffff88810622c200 by task kunit_try_catch/335
[   28.040807] 
[   28.040892] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   28.040944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.040958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.040981] Call Trace:
[   28.040998]  <TASK>
[   28.041015]  dump_stack_lvl+0x73/0xb0
[   28.041045]  print_report+0xd1/0x610
[   28.041070]  ? __virt_addr_valid+0x1db/0x2d0
[   28.041095]  ? copy_user_test_oob+0x4aa/0x10f0
[   28.041119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.041146]  ? copy_user_test_oob+0x4aa/0x10f0
[   28.041170]  kasan_report+0x141/0x180
[   28.041195]  ? copy_user_test_oob+0x4aa/0x10f0
[   28.041224]  kasan_check_range+0x10c/0x1c0
[   28.041248]  __kasan_check_read+0x15/0x20
[   28.041272]  copy_user_test_oob+0x4aa/0x10f0
[   28.041299]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.041323]  ? finish_task_switch.isra.0+0x153/0x700
[   28.041347]  ? __switch_to+0x47/0xf80
[   28.041374]  ? __schedule+0x10cc/0x2b60
[   28.041398]  ? __pfx_read_tsc+0x10/0x10
[   28.041433]  ? ktime_get_ts64+0x86/0x230
[   28.041461]  kunit_try_run_case+0x1a5/0x480
[   28.041483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.041506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.041531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.041557]  ? __kthread_parkme+0x82/0x180
[   28.041579]  ? preempt_count_sub+0x50/0x80
[   28.041603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.041626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.041653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.041680]  kthread+0x337/0x6f0
[   28.041702]  ? trace_preempt_on+0x20/0xc0
[   28.041727]  ? __pfx_kthread+0x10/0x10
[   28.041762]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.041785]  ? calculate_sigpending+0x7b/0xa0
[   28.041810]  ? __pfx_kthread+0x10/0x10
[   28.041833]  ret_from_fork+0x116/0x1d0
[   28.041853]  ? __pfx_kthread+0x10/0x10
[   28.041875]  ret_from_fork_asm+0x1a/0x30
[   28.041907]  </TASK>
[   28.041921] 
[   28.049073] Allocated by task 335:
[   28.049254]  kasan_save_stack+0x45/0x70
[   28.049447]  kasan_save_track+0x18/0x40
[   28.049634]  kasan_save_alloc_info+0x3b/0x50
[   28.049849]  __kasan_kmalloc+0xb7/0xc0
[   28.050037]  __kmalloc_noprof+0x1c9/0x500
[   28.050368]  kunit_kmalloc_array+0x25/0x60
[   28.050521]  copy_user_test_oob+0xab/0x10f0
[   28.050663]  kunit_try_run_case+0x1a5/0x480
[   28.050828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.051086]  kthread+0x337/0x6f0
[   28.051255]  ret_from_fork+0x116/0x1d0
[   28.051455]  ret_from_fork_asm+0x1a/0x30
[   28.051628] 
[   28.051721] The buggy address belongs to the object at ffff88810622c200
[   28.051721]  which belongs to the cache kmalloc-128 of size 128
[   28.052159] The buggy address is located 0 bytes inside of
[   28.052159]  allocated 120-byte region [ffff88810622c200, ffff88810622c278)
[   28.052684] 
[   28.052788] The buggy address belongs to the physical page:
[   28.052977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c
[   28.053213] flags: 0x200000000000000(node=0|zone=2)
[   28.053371] page_type: f5(slab)
[   28.053677] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.054028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.054297] page dumped because: kasan: bad access detected
[   28.054548] 
[   28.054611] Memory state around the buggy address:
[   28.054763]  ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.054965]  ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.055248] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.055747]                                                                 ^
[   28.056055]  ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.056375]  ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.056691] ==================================================================
[   28.057184] ==================================================================
[   28.057514] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   28.057811] Write of size 121 at addr ffff88810622c200 by task kunit_try_catch/335
[   28.058100] 
[   28.058204] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   28.058253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.058267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.058291] Call Trace:
[   28.058310]  <TASK>
[   28.058328]  dump_stack_lvl+0x73/0xb0
[   28.058358]  print_report+0xd1/0x610
[   28.058382]  ? __virt_addr_valid+0x1db/0x2d0
[   28.058417]  ? copy_user_test_oob+0x557/0x10f0
[   28.058443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.058471]  ? copy_user_test_oob+0x557/0x10f0
[   28.058495]  kasan_report+0x141/0x180
[   28.058519]  ? copy_user_test_oob+0x557/0x10f0
[   28.058548]  kasan_check_range+0x10c/0x1c0
[   28.058573]  __kasan_check_write+0x18/0x20
[   28.058597]  copy_user_test_oob+0x557/0x10f0
[   28.058623]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.058647]  ? finish_task_switch.isra.0+0x153/0x700
[   28.058671]  ? __switch_to+0x47/0xf80
[   28.058699]  ? __schedule+0x10cc/0x2b60
[   28.058723]  ? __pfx_read_tsc+0x10/0x10
[   28.058759]  ? ktime_get_ts64+0x86/0x230
[   28.058786]  kunit_try_run_case+0x1a5/0x480
[   28.058811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.058834]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.058860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.058884]  ? __kthread_parkme+0x82/0x180
[   28.058906]  ? preempt_count_sub+0x50/0x80
[   28.058931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.058954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.058980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.059007]  kthread+0x337/0x6f0
[   28.059027]  ? trace_preempt_on+0x20/0xc0
[   28.059053]  ? __pfx_kthread+0x10/0x10
[   28.059074]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.059097]  ? calculate_sigpending+0x7b/0xa0
[   28.059123]  ? __pfx_kthread+0x10/0x10
[   28.059145]  ret_from_fork+0x116/0x1d0
[   28.059165]  ? __pfx_kthread+0x10/0x10
[   28.059187]  ret_from_fork_asm+0x1a/0x30
[   28.059219]  </TASK>
[   28.059231] 
[   28.065915] Allocated by task 335:
[   28.066035]  kasan_save_stack+0x45/0x70
[   28.066310]  kasan_save_track+0x18/0x40
[   28.066590]  kasan_save_alloc_info+0x3b/0x50
[   28.066774]  __kasan_kmalloc+0xb7/0xc0
[   28.066938]  __kmalloc_noprof+0x1c9/0x500
[   28.067106]  kunit_kmalloc_array+0x25/0x60
[   28.067237]  copy_user_test_oob+0xab/0x10f0
[   28.067372]  kunit_try_run_case+0x1a5/0x480
[   28.067504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.069215]  kthread+0x337/0x6f0
[   28.069407]  ret_from_fork+0x116/0x1d0
[   28.069608]  ret_from_fork_asm+0x1a/0x30
[   28.069809] 
[   28.069889] The buggy address belongs to the object at ffff88810622c200
[   28.069889]  which belongs to the cache kmalloc-128 of size 128
[   28.070243] The buggy address is located 0 bytes inside of
[   28.070243]  allocated 120-byte region [ffff88810622c200, ffff88810622c278)
[   28.070886] 
[   28.071491] The buggy address belongs to the physical page:
[   28.071831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c
[   28.072190] flags: 0x200000000000000(node=0|zone=2)
[   28.072422] page_type: f5(slab)
[   28.072919] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.073381] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.073899] page dumped because: kasan: bad access detected
[   28.074303] 
[   28.074397] Memory state around the buggy address:
[   28.074779]  ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.075083]  ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.075373] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.075933]                                                                 ^
[   28.076550]  ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.076930]  ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.077229] ==================================================================