Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   83.322358] ==================================================================
[   83.329470] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   83.336501] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   83.343964] 
[   83.345446] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.345500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.345517] Hardware name: WinLink E850-96 board (DT)
[   83.345537] Call trace:
[   83.345550]  show_stack+0x20/0x38 (C)
[   83.345580]  dump_stack_lvl+0x8c/0xd0
[   83.345614]  print_report+0x118/0x5d0
[   83.345640]  kasan_report+0xdc/0x128
[   83.345665]  kasan_check_range+0x100/0x1a8
[   83.345698]  __kasan_check_read+0x20/0x30
[   83.345727]  copy_user_test_oob+0x4a0/0xec8
[   83.345761]  kunit_try_run_case+0x170/0x3f0
[   83.345795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.345828]  kthread+0x328/0x630
[   83.345856]  ret_from_fork+0x10/0x20
[   83.345888] 
[   83.412800] Allocated by task 366:
[   83.416185]  kasan_save_stack+0x3c/0x68
[   83.420005]  kasan_save_track+0x20/0x40
[   83.423824]  kasan_save_alloc_info+0x40/0x58
[   83.428078]  __kasan_kmalloc+0xd4/0xd8
[   83.431810]  __kmalloc_noprof+0x198/0x4c8
[   83.435803]  kunit_kmalloc_array+0x34/0x88
[   83.439883]  copy_user_test_oob+0xac/0xec8
[   83.443963]  kunit_try_run_case+0x170/0x3f0
[   83.448129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.453598]  kthread+0x328/0x630
[   83.456810]  ret_from_fork+0x10/0x20
[   83.460369] 
[   83.461846] The buggy address belongs to the object at ffff000800de4900
[   83.461846]  which belongs to the cache kmalloc-128 of size 128
[   83.474345] The buggy address is located 0 bytes inside of
[   83.474345]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   83.486757] 
[   83.488235] The buggy address belongs to the physical page:
[   83.493792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   83.501775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.509413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.516357] page_type: f5(slab)
[   83.519490] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.527215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.534941] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.542753] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.550565] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   83.558377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.566183] page dumped because: kasan: bad access detected
[   83.571738] 
[   83.573214] Memory state around the buggy address:
[   83.577992]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.585197]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.592402] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.599603]                                                                 ^
[   83.606724]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.613929]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.621130] ==================================================================
[   81.786197] ==================================================================
[   81.798593] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   81.805621] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   81.813171] 
[   81.814659] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   81.814721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.814740] Hardware name: WinLink E850-96 board (DT)
[   81.814763] Call trace:
[   81.814777]  show_stack+0x20/0x38 (C)
[   81.814817]  dump_stack_lvl+0x8c/0xd0
[   81.814854]  print_report+0x118/0x5d0
[   81.814884]  kasan_report+0xdc/0x128
[   81.814911]  kasan_check_range+0x100/0x1a8
[   81.814944]  __kasan_check_write+0x20/0x30
[   81.814978]  copy_user_test_oob+0x234/0xec8
[   81.815014]  kunit_try_run_case+0x170/0x3f0
[   81.815045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.815082]  kthread+0x328/0x630
[   81.815111]  ret_from_fork+0x10/0x20
[   81.815147] 
[   81.882096] Allocated by task 366:
[   81.885480]  kasan_save_stack+0x3c/0x68
[   81.889298]  kasan_save_track+0x20/0x40
[   81.893118]  kasan_save_alloc_info+0x40/0x58
[   81.897371]  __kasan_kmalloc+0xd4/0xd8
[   81.901104]  __kmalloc_noprof+0x198/0x4c8
[   81.905097]  kunit_kmalloc_array+0x34/0x88
[   81.909178]  copy_user_test_oob+0xac/0xec8
[   81.913256]  kunit_try_run_case+0x170/0x3f0
[   81.917423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.922892]  kthread+0x328/0x630
[   81.926104]  ret_from_fork+0x10/0x20
[   81.929662] 
[   81.931140] The buggy address belongs to the object at ffff000800de4900
[   81.931140]  which belongs to the cache kmalloc-128 of size 128
[   81.943641] The buggy address is located 0 bytes inside of
[   81.943641]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   81.956051] 
[   81.957531] The buggy address belongs to the physical page:
[   81.963087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   81.971070] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.978711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.985652] page_type: f5(slab)
[   81.988789] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.996509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.004238] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.012046] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.019859] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.027671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.035478] page dumped because: kasan: bad access detected
[   82.041032] 
[   82.042508] Memory state around the buggy address:
[   82.047289]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.054492]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.061695] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.068896]                                                                 ^
[   82.076018]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.083224]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.090426] ==================================================================
[   82.710049] ==================================================================
[   82.717152] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   82.724183] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   82.731647] 
[   82.733131] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   82.733183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.733200] Hardware name: WinLink E850-96 board (DT)
[   82.733222] Call trace:
[   82.733234]  show_stack+0x20/0x38 (C)
[   82.733269]  dump_stack_lvl+0x8c/0xd0
[   82.733304]  print_report+0x118/0x5d0
[   82.733332]  kasan_report+0xdc/0x128
[   82.733358]  kasan_check_range+0x100/0x1a8
[   82.733388]  __kasan_check_read+0x20/0x30
[   82.733417]  copy_user_test_oob+0x3c8/0xec8
[   82.733451]  kunit_try_run_case+0x170/0x3f0
[   82.733482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.733516]  kthread+0x328/0x630
[   82.733542]  ret_from_fork+0x10/0x20
[   82.733572] 
[   82.800483] Allocated by task 366:
[   82.803869]  kasan_save_stack+0x3c/0x68
[   82.807688]  kasan_save_track+0x20/0x40
[   82.811507]  kasan_save_alloc_info+0x40/0x58
[   82.815760]  __kasan_kmalloc+0xd4/0xd8
[   82.819493]  __kmalloc_noprof+0x198/0x4c8
[   82.823486]  kunit_kmalloc_array+0x34/0x88
[   82.827566]  copy_user_test_oob+0xac/0xec8
[   82.831646]  kunit_try_run_case+0x170/0x3f0
[   82.835812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.841281]  kthread+0x328/0x630
[   82.844493]  ret_from_fork+0x10/0x20
[   82.848052] 
[   82.849529] The buggy address belongs to the object at ffff000800de4900
[   82.849529]  which belongs to the cache kmalloc-128 of size 128
[   82.862028] The buggy address is located 0 bytes inside of
[   82.862028]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   82.874440] 
[   82.875918] The buggy address belongs to the physical page:
[   82.881475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   82.889457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.897096] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.904040] page_type: f5(slab)
[   82.907175] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.914898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.922624] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.930435] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.938248] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.946060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.953865] page dumped because: kasan: bad access detected
[   82.959421] 
[   82.960897] Memory state around the buggy address:
[   82.965679]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.972880]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.980085] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.987286]                                                                 ^
[   82.994407]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.001612]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.008813] ==================================================================
[   82.097926] ==================================================================
[   82.104841] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   82.111865] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   82.119330] 
[   82.120815] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   82.120870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.120891] Hardware name: WinLink E850-96 board (DT)
[   82.120911] Call trace:
[   82.120926]  show_stack+0x20/0x38 (C)
[   82.120963]  dump_stack_lvl+0x8c/0xd0
[   82.121000]  print_report+0x118/0x5d0
[   82.121030]  kasan_report+0xdc/0x128
[   82.121059]  kasan_check_range+0x100/0x1a8
[   82.121090]  __kasan_check_read+0x20/0x30
[   82.121121]  copy_user_test_oob+0x728/0xec8
[   82.121155]  kunit_try_run_case+0x170/0x3f0
[   82.121187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.121225]  kthread+0x328/0x630
[   82.121254]  ret_from_fork+0x10/0x20
[   82.121290] 
[   82.188167] Allocated by task 366:
[   82.191554]  kasan_save_stack+0x3c/0x68
[   82.195372]  kasan_save_track+0x20/0x40
[   82.199190]  kasan_save_alloc_info+0x40/0x58
[   82.203443]  __kasan_kmalloc+0xd4/0xd8
[   82.207176]  __kmalloc_noprof+0x198/0x4c8
[   82.211169]  kunit_kmalloc_array+0x34/0x88
[   82.215248]  copy_user_test_oob+0xac/0xec8
[   82.219328]  kunit_try_run_case+0x170/0x3f0
[   82.223495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.228964]  kthread+0x328/0x630
[   82.232175]  ret_from_fork+0x10/0x20
[   82.235735] 
[   82.237211] The buggy address belongs to the object at ffff000800de4900
[   82.237211]  which belongs to the cache kmalloc-128 of size 128
[   82.249711] The buggy address is located 0 bytes inside of
[   82.249711]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   82.262123] 
[   82.263602] The buggy address belongs to the physical page:
[   82.269159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   82.277142] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.284781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.291724] page_type: f5(slab)
[   82.294860] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.302580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.310308] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.318118] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.325931] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.333743] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.341550] page dumped because: kasan: bad access detected
[   82.347104] 
[   82.348580] Memory state around the buggy address:
[   82.353359]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.360563]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.367768] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.374968]                                                                 ^
[   82.382090]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.389294]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.396496] ==================================================================
[   82.404010] ==================================================================
[   82.410910] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   82.417938] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   82.425488] 
[   82.426973] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   82.427033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.427051] Hardware name: WinLink E850-96 board (DT)
[   82.427073] Call trace:
[   82.427087]  show_stack+0x20/0x38 (C)
[   82.427121]  dump_stack_lvl+0x8c/0xd0
[   82.427158]  print_report+0x118/0x5d0
[   82.427186]  kasan_report+0xdc/0x128
[   82.427211]  kasan_check_range+0x100/0x1a8
[   82.427242]  __kasan_check_write+0x20/0x30
[   82.427271]  copy_user_test_oob+0x35c/0xec8
[   82.427306]  kunit_try_run_case+0x170/0x3f0
[   82.427338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.427373]  kthread+0x328/0x630
[   82.427401]  ret_from_fork+0x10/0x20
[   82.427436] 
[   82.494414] Allocated by task 366:
[   82.497800]  kasan_save_stack+0x3c/0x68
[   82.501616]  kasan_save_track+0x20/0x40
[   82.505435]  kasan_save_alloc_info+0x40/0x58
[   82.509689]  __kasan_kmalloc+0xd4/0xd8
[   82.513421]  __kmalloc_noprof+0x198/0x4c8
[   82.517414]  kunit_kmalloc_array+0x34/0x88
[   82.521494]  copy_user_test_oob+0xac/0xec8
[   82.525574]  kunit_try_run_case+0x170/0x3f0
[   82.529740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.535209]  kthread+0x328/0x630
[   82.538421]  ret_from_fork+0x10/0x20
[   82.541979] 
[   82.543457] The buggy address belongs to the object at ffff000800de4900
[   82.543457]  which belongs to the cache kmalloc-128 of size 128
[   82.555955] The buggy address is located 0 bytes inside of
[   82.555955]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   82.568368] 
[   82.569847] The buggy address belongs to the physical page:
[   82.575404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   82.583387] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.591027] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.597970] page_type: f5(slab)
[   82.601107] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.608826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.616552] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.624363] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.632176] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.639988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.647795] page dumped because: kasan: bad access detected
[   82.653349] 
[   82.654825] Memory state around the buggy address:
[   82.659606]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.666810]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.674012] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.681214]                                                                 ^
[   82.688335]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.695541]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.702743] ==================================================================
[   83.016199] ==================================================================
[   83.023225] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   83.030256] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   83.037806] 
[   83.039289] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.039341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.039360] Hardware name: WinLink E850-96 board (DT)
[   83.039379] Call trace:
[   83.039392]  show_stack+0x20/0x38 (C)
[   83.039425]  dump_stack_lvl+0x8c/0xd0
[   83.039460]  print_report+0x118/0x5d0
[   83.039486]  kasan_report+0xdc/0x128
[   83.039513]  kasan_check_range+0x100/0x1a8
[   83.039543]  __kasan_check_write+0x20/0x30
[   83.039572]  copy_user_test_oob+0x434/0xec8
[   83.039606]  kunit_try_run_case+0x170/0x3f0
[   83.039637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.039675]  kthread+0x328/0x630
[   83.039703]  ret_from_fork+0x10/0x20
[   83.039735] 
[   83.106728] Allocated by task 366:
[   83.110117]  kasan_save_stack+0x3c/0x68
[   83.113933]  kasan_save_track+0x20/0x40
[   83.117752]  kasan_save_alloc_info+0x40/0x58
[   83.122006]  __kasan_kmalloc+0xd4/0xd8
[   83.125738]  __kmalloc_noprof+0x198/0x4c8
[   83.129731]  kunit_kmalloc_array+0x34/0x88
[   83.133811]  copy_user_test_oob+0xac/0xec8
[   83.137891]  kunit_try_run_case+0x170/0x3f0
[   83.142057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.147526]  kthread+0x328/0x630
[   83.150738]  ret_from_fork+0x10/0x20
[   83.154297] 
[   83.155774] The buggy address belongs to the object at ffff000800de4900
[   83.155774]  which belongs to the cache kmalloc-128 of size 128
[   83.168274] The buggy address is located 0 bytes inside of
[   83.168274]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   83.180685] 
[   83.182163] The buggy address belongs to the physical page:
[   83.187721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   83.195704] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.203341] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.210286] page_type: f5(slab)
[   83.213419] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.221143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.228870] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.236681] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.244494] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   83.252305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.260112] page dumped because: kasan: bad access detected
[   83.265667] 
[   83.267142] Memory state around the buggy address:
[   83.271920]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.279125]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.286330] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.293531]                                                                 ^
[   83.300652]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.307857]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.315058] ==================================================================

[   33.718299] ==================================================================
[   33.718380] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.718522] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.718576] 
[   33.718639] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.719150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.719217] Hardware name: linux,dummy-virt (DT)
[   33.719549] Call trace:
[   33.719659]  show_stack+0x20/0x38 (C)
[   33.719930]  dump_stack_lvl+0x8c/0xd0
[   33.719984]  print_report+0x118/0x5d0
[   33.720747]  kasan_report+0xdc/0x128
[   33.720822]  kasan_check_range+0x100/0x1a8
[   33.720872]  __kasan_check_read+0x20/0x30
[   33.720922]  copy_user_test_oob+0x728/0xec8
[   33.721500]  kunit_try_run_case+0x170/0x3f0
[   33.721676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.721742]  kthread+0x328/0x630
[   33.721803]  ret_from_fork+0x10/0x20
[   33.722133] 
[   33.722157] Allocated by task 317:
[   33.722187]  kasan_save_stack+0x3c/0x68
[   33.722390]  kasan_save_track+0x20/0x40
[   33.722576]  kasan_save_alloc_info+0x40/0x58
[   33.722759]  __kasan_kmalloc+0xd4/0xd8
[   33.722993]  __kmalloc_noprof+0x198/0x4c8
[   33.723079]  kunit_kmalloc_array+0x34/0x88
[   33.723173]  copy_user_test_oob+0xac/0xec8
[   33.723344]  kunit_try_run_case+0x170/0x3f0
[   33.723386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.723764]  kthread+0x328/0x630
[   33.724096]  ret_from_fork+0x10/0x20
[   33.724269] 
[   33.724412] The buggy address belongs to the object at fff00000c64f9600
[   33.724412]  which belongs to the cache kmalloc-128 of size 128
[   33.724815] The buggy address is located 0 bytes inside of
[   33.724815]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.725100] 
[   33.725180] The buggy address belongs to the physical page:
[   33.725378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.725501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.725567] page_type: f5(slab)
[   33.725684] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.725860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.726110] page dumped because: kasan: bad access detected
[   33.726166] 
[   33.726187] Memory state around the buggy address:
[   33.726232]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.726446]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.726640] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.726880]                                                                 ^
[   33.727022]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.727343]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.727394] ==================================================================
[   33.696278] ==================================================================
[   33.699258] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.699379] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.699445] 
[   33.699498] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.699589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.699618] Hardware name: linux,dummy-virt (DT)
[   33.699653] Call trace:
[   33.699682]  show_stack+0x20/0x38 (C)
[   33.699739]  dump_stack_lvl+0x8c/0xd0
[   33.699795]  print_report+0x118/0x5d0
[   33.699840]  kasan_report+0xdc/0x128
[   33.699888]  kasan_check_range+0x100/0x1a8
[   33.699939]  __kasan_check_write+0x20/0x30
[   33.699986]  copy_user_test_oob+0x234/0xec8
[   33.700037]  kunit_try_run_case+0x170/0x3f0
[   33.700089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.700146]  kthread+0x328/0x630
[   33.700193]  ret_from_fork+0x10/0x20
[   33.700246] 
[   33.700269] Allocated by task 317:
[   33.700300]  kasan_save_stack+0x3c/0x68
[   33.700348]  kasan_save_track+0x20/0x40
[   33.700388]  kasan_save_alloc_info+0x40/0x58
[   33.700429]  __kasan_kmalloc+0xd4/0xd8
[   33.700480]  __kmalloc_noprof+0x198/0x4c8
[   33.700525]  kunit_kmalloc_array+0x34/0x88
[   33.700573]  copy_user_test_oob+0xac/0xec8
[   33.700615]  kunit_try_run_case+0x170/0x3f0
[   33.700665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.700710]  kthread+0x328/0x630
[   33.700807]  ret_from_fork+0x10/0x20
[   33.700948] 
[   33.701012] The buggy address belongs to the object at fff00000c64f9600
[   33.701012]  which belongs to the cache kmalloc-128 of size 128
[   33.701111] The buggy address is located 0 bytes inside of
[   33.701111]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.701544] 
[   33.701579] The buggy address belongs to the physical page:
[   33.701618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.701977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.702060] page_type: f5(slab)
[   33.702116] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.702175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.702218] page dumped because: kasan: bad access detected
[   33.702255] 
[   33.702276] Memory state around the buggy address:
[   33.702313]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.703001]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.703061] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.703103]                                                                 ^
[   33.703157]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.703410]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.703650] ==================================================================
[   33.741078] ==================================================================
[   33.741139] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.742025] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.742118] 
[   33.742166] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.742254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.742309] Hardware name: linux,dummy-virt (DT)
[   33.742343] Call trace:
[   33.742384]  show_stack+0x20/0x38 (C)
[   33.742661]  dump_stack_lvl+0x8c/0xd0
[   33.742917]  print_report+0x118/0x5d0
[   33.743410]  kasan_report+0xdc/0x128
[   33.743712]  kasan_check_range+0x100/0x1a8
[   33.744045]  __kasan_check_write+0x20/0x30
[   33.744494]  copy_user_test_oob+0x35c/0xec8
[   33.744673]  kunit_try_run_case+0x170/0x3f0
[   33.744723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.745276]  kthread+0x328/0x630
[   33.745363]  ret_from_fork+0x10/0x20
[   33.745416] 
[   33.745737] Allocated by task 317:
[   33.745791]  kasan_save_stack+0x3c/0x68
[   33.745839]  kasan_save_track+0x20/0x40
[   33.745891]  kasan_save_alloc_info+0x40/0x58
[   33.745931]  __kasan_kmalloc+0xd4/0xd8
[   33.746073]  __kmalloc_noprof+0x198/0x4c8
[   33.746121]  kunit_kmalloc_array+0x34/0x88
[   33.746183]  copy_user_test_oob+0xac/0xec8
[   33.746448]  kunit_try_run_case+0x170/0x3f0
[   33.746498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.746550]  kthread+0x328/0x630
[   33.746586]  ret_from_fork+0x10/0x20
[   33.746625] 
[   33.747053] The buggy address belongs to the object at fff00000c64f9600
[   33.747053]  which belongs to the cache kmalloc-128 of size 128
[   33.747141] The buggy address is located 0 bytes inside of
[   33.747141]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.747319] 
[   33.747517] The buggy address belongs to the physical page:
[   33.747554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.747613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.748041] page_type: f5(slab)
[   33.748095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.748165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.748362] page dumped because: kasan: bad access detected
[   33.748397] 
[   33.748418] Memory state around the buggy address:
[   33.748462]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.748511]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.748557] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.748598]                                                                 ^
[   33.748924]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.748988]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.749028] ==================================================================
[   33.774196] ==================================================================
[   33.774258] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.774750] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.775020] 
[   33.775227] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.775359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.775824] Hardware name: linux,dummy-virt (DT)
[   33.775875] Call trace:
[   33.775899]  show_stack+0x20/0x38 (C)
[   33.775953]  dump_stack_lvl+0x8c/0xd0
[   33.776144]  print_report+0x118/0x5d0
[   33.776347]  kasan_report+0xdc/0x128
[   33.776516]  kasan_check_range+0x100/0x1a8
[   33.776663]  __kasan_check_read+0x20/0x30
[   33.776899]  copy_user_test_oob+0x4a0/0xec8
[   33.776976]  kunit_try_run_case+0x170/0x3f0
[   33.777109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.777167]  kthread+0x328/0x630
[   33.777210]  ret_from_fork+0x10/0x20
[   33.777925] 
[   33.777969] Allocated by task 317:
[   33.778088]  kasan_save_stack+0x3c/0x68
[   33.778137]  kasan_save_track+0x20/0x40
[   33.778181]  kasan_save_alloc_info+0x40/0x58
[   33.778236]  __kasan_kmalloc+0xd4/0xd8
[   33.778279]  __kmalloc_noprof+0x198/0x4c8
[   33.778321]  kunit_kmalloc_array+0x34/0x88
[   33.779133]  copy_user_test_oob+0xac/0xec8
[   33.779482]  kunit_try_run_case+0x170/0x3f0
[   33.779693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.779886]  kthread+0x328/0x630
[   33.779923]  ret_from_fork+0x10/0x20
[   33.780225] 
[   33.780520] The buggy address belongs to the object at fff00000c64f9600
[   33.780520]  which belongs to the cache kmalloc-128 of size 128
[   33.780808] The buggy address is located 0 bytes inside of
[   33.780808]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.781113] 
[   33.781138] The buggy address belongs to the physical page:
[   33.781457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.781736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.781806] page_type: f5(slab)
[   33.781847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.781901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.781943] page dumped because: kasan: bad access detected
[   33.781977] 
[   33.781998] Memory state around the buggy address:
[   33.782031]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.782076]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782257] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.782334]                                                                 ^
[   33.782467]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782514]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.782555] ==================================================================
[   33.750861] ==================================================================
[   33.750916] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.750969] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.751019] 
[   33.751716] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.752295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.752338] Hardware name: linux,dummy-virt (DT)
[   33.752371] Call trace:
[   33.752395]  show_stack+0x20/0x38 (C)
[   33.752764]  dump_stack_lvl+0x8c/0xd0
[   33.752870]  print_report+0x118/0x5d0
[   33.752918]  kasan_report+0xdc/0x128
[   33.753039]  kasan_check_range+0x100/0x1a8
[   33.753300]  __kasan_check_read+0x20/0x30
[   33.753651]  copy_user_test_oob+0x3c8/0xec8
[   33.753973]  kunit_try_run_case+0x170/0x3f0
[   33.754024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.754078]  kthread+0x328/0x630
[   33.754121]  ret_from_fork+0x10/0x20
[   33.754171] 
[   33.754191] Allocated by task 317:
[   33.754219]  kasan_save_stack+0x3c/0x68
[   33.754265]  kasan_save_track+0x20/0x40
[   33.754307]  kasan_save_alloc_info+0x40/0x58
[   33.754707]  __kasan_kmalloc+0xd4/0xd8
[   33.754887]  __kmalloc_noprof+0x198/0x4c8
[   33.754929]  kunit_kmalloc_array+0x34/0x88
[   33.754969]  copy_user_test_oob+0xac/0xec8
[   33.755256]  kunit_try_run_case+0x170/0x3f0
[   33.755596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.755670]  kthread+0x328/0x630
[   33.755977]  ret_from_fork+0x10/0x20
[   33.756186] 
[   33.756303] The buggy address belongs to the object at fff00000c64f9600
[   33.756303]  which belongs to the cache kmalloc-128 of size 128
[   33.756370] The buggy address is located 0 bytes inside of
[   33.756370]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.756724] 
[   33.757033] The buggy address belongs to the physical page:
[   33.757381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.757459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.757545] page_type: f5(slab)
[   33.757586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.758191] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.758649] page dumped because: kasan: bad access detected
[   33.758690] 
[   33.758711] Memory state around the buggy address:
[   33.758872]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.758921]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.759155] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.759554]                                                                 ^
[   33.759780]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.759999]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.760040] ==================================================================
[   33.761247] ==================================================================
[   33.761592] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.762019] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.762213] 
[   33.762248] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.762672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.762706] Hardware name: linux,dummy-virt (DT)
[   33.763051] Call trace:
[   33.763261]  show_stack+0x20/0x38 (C)
[   33.763479]  dump_stack_lvl+0x8c/0xd0
[   33.763542]  print_report+0x118/0x5d0
[   33.763864]  kasan_report+0xdc/0x128
[   33.764198]  kasan_check_range+0x100/0x1a8
[   33.764255]  __kasan_check_write+0x20/0x30
[   33.764376]  copy_user_test_oob+0x434/0xec8
[   33.764536]  kunit_try_run_case+0x170/0x3f0
[   33.765070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.765328]  kthread+0x328/0x630
[   33.765390]  ret_from_fork+0x10/0x20
[   33.765965] 
[   33.766246] Allocated by task 317:
[   33.766286]  kasan_save_stack+0x3c/0x68
[   33.766379]  kasan_save_track+0x20/0x40
[   33.766445]  kasan_save_alloc_info+0x40/0x58
[   33.766622]  __kasan_kmalloc+0xd4/0xd8
[   33.766667]  __kmalloc_noprof+0x198/0x4c8
[   33.766710]  kunit_kmalloc_array+0x34/0x88
[   33.767194]  copy_user_test_oob+0xac/0xec8
[   33.767474]  kunit_try_run_case+0x170/0x3f0
[   33.767772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.767867]  kthread+0x328/0x630
[   33.768001]  ret_from_fork+0x10/0x20
[   33.768048] 
[   33.768423] The buggy address belongs to the object at fff00000c64f9600
[   33.768423]  which belongs to the cache kmalloc-128 of size 128
[   33.768658] The buggy address is located 0 bytes inside of
[   33.768658]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.768788] 
[   33.768934] The buggy address belongs to the physical page:
[   33.769208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.769297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.769412] page_type: f5(slab)
[   33.769529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.769590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.770038] page dumped because: kasan: bad access detected
[   33.770263] 
[   33.770545] Memory state around the buggy address:
[   33.770600]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.770654]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.770705] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.771264]                                                                 ^
[   33.771332]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.771444]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.771783] ==================================================================

[   28.093282] ==================================================================
[   28.093820] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   28.094229] Write of size 121 at addr ffff8881060ab300 by task kunit_try_catch/333
[   28.094468] 
[   28.094567] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   28.094613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.094627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.094649] Call Trace:
[   28.094663]  <TASK>
[   28.094680]  dump_stack_lvl+0x73/0xb0
[   28.094708]  print_report+0xd1/0x610
[   28.094732]  ? __virt_addr_valid+0x1db/0x2d0
[   28.094756]  ? copy_user_test_oob+0x557/0x10f0
[   28.094779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.094806]  ? copy_user_test_oob+0x557/0x10f0
[   28.094830]  kasan_report+0x141/0x180
[   28.094853]  ? copy_user_test_oob+0x557/0x10f0
[   28.094881]  kasan_check_range+0x10c/0x1c0
[   28.094905]  __kasan_check_write+0x18/0x20
[   28.094929]  copy_user_test_oob+0x557/0x10f0
[   28.094955]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.094979]  ? finish_task_switch.isra.0+0x153/0x700
[   28.095001]  ? __switch_to+0x47/0xf80
[   28.095028]  ? __schedule+0x10cc/0x2b60
[   28.095049]  ? __pfx_read_tsc+0x10/0x10
[   28.095071]  ? ktime_get_ts64+0x86/0x230
[   28.095112]  kunit_try_run_case+0x1a5/0x480
[   28.095138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.095160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.095184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.095207]  ? __kthread_parkme+0x82/0x180
[   28.095228]  ? preempt_count_sub+0x50/0x80
[   28.095278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.095303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.095346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.095373]  kthread+0x337/0x6f0
[   28.095408]  ? trace_preempt_on+0x20/0xc0
[   28.095446]  ? __pfx_kthread+0x10/0x10
[   28.095481]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.095521]  ? calculate_sigpending+0x7b/0xa0
[   28.095586]  ? __pfx_kthread+0x10/0x10
[   28.095609]  ret_from_fork+0x116/0x1d0
[   28.095642]  ? __pfx_kthread+0x10/0x10
[   28.095683]  ret_from_fork_asm+0x1a/0x30
[   28.095734]  </TASK>
[   28.095748] 
[   28.103175] Allocated by task 333:
[   28.103324]  kasan_save_stack+0x45/0x70
[   28.103547]  kasan_save_track+0x18/0x40
[   28.103760]  kasan_save_alloc_info+0x3b/0x50
[   28.103954]  __kasan_kmalloc+0xb7/0xc0
[   28.104153]  __kmalloc_noprof+0x1c9/0x500
[   28.104345]  kunit_kmalloc_array+0x25/0x60
[   28.104553]  copy_user_test_oob+0xab/0x10f0
[   28.104832]  kunit_try_run_case+0x1a5/0x480
[   28.104968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.105134]  kthread+0x337/0x6f0
[   28.105317]  ret_from_fork+0x116/0x1d0
[   28.105497]  ret_from_fork_asm+0x1a/0x30
[   28.105712] 
[   28.105910] The buggy address belongs to the object at ffff8881060ab300
[   28.105910]  which belongs to the cache kmalloc-128 of size 128
[   28.106367] The buggy address is located 0 bytes inside of
[   28.106367]  allocated 120-byte region [ffff8881060ab300, ffff8881060ab378)
[   28.107045] 
[   28.107136] The buggy address belongs to the physical page:
[   28.107373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab
[   28.107657] flags: 0x200000000000000(node=0|zone=2)
[   28.107897] page_type: f5(slab)
[   28.108084] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.108388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.108714] page dumped because: kasan: bad access detected
[   28.108914] 
[   28.108976] Memory state around the buggy address:
[   28.109118]  ffff8881060ab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.109319]  ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.109519] >ffff8881060ab300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.109948]                                                                 ^
[   28.110245]  ffff8881060ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.110593]  ffff8881060ab400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.110958] ==================================================================
[   28.074002] ==================================================================
[   28.074454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   28.075013] Read of size 121 at addr ffff8881060ab300 by task kunit_try_catch/333
[   28.075321] 
[   28.075396] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   28.075441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.075455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.075475] Call Trace:
[   28.075489]  <TASK>
[   28.075504]  dump_stack_lvl+0x73/0xb0
[   28.075544]  print_report+0xd1/0x610
[   28.075569]  ? __virt_addr_valid+0x1db/0x2d0
[   28.075594]  ? copy_user_test_oob+0x4aa/0x10f0
[   28.075618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.075656]  ? copy_user_test_oob+0x4aa/0x10f0
[   28.075681]  kasan_report+0x141/0x180
[   28.075704]  ? copy_user_test_oob+0x4aa/0x10f0
[   28.075758]  kasan_check_range+0x10c/0x1c0
[   28.075783]  __kasan_check_read+0x15/0x20
[   28.075807]  copy_user_test_oob+0x4aa/0x10f0
[   28.075834]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.075857]  ? finish_task_switch.isra.0+0x153/0x700
[   28.075880]  ? __switch_to+0x47/0xf80
[   28.075907]  ? __schedule+0x10cc/0x2b60
[   28.075931]  ? __pfx_read_tsc+0x10/0x10
[   28.075952]  ? ktime_get_ts64+0x86/0x230
[   28.075993]  kunit_try_run_case+0x1a5/0x480
[   28.076018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.076054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.076090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.076128]  ? __kthread_parkme+0x82/0x180
[   28.076162]  ? preempt_count_sub+0x50/0x80
[   28.076212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.076250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.076291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.076331]  kthread+0x337/0x6f0
[   28.076352]  ? trace_preempt_on+0x20/0xc0
[   28.076376]  ? __pfx_kthread+0x10/0x10
[   28.076398]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.076423]  ? calculate_sigpending+0x7b/0xa0
[   28.076448]  ? __pfx_kthread+0x10/0x10
[   28.076471]  ret_from_fork+0x116/0x1d0
[   28.076491]  ? __pfx_kthread+0x10/0x10
[   28.076513]  ret_from_fork_asm+0x1a/0x30
[   28.076556]  </TASK>
[   28.076568] 
[   28.084862] Allocated by task 333:
[   28.085031]  kasan_save_stack+0x45/0x70
[   28.085223]  kasan_save_track+0x18/0x40
[   28.085405]  kasan_save_alloc_info+0x3b/0x50
[   28.085612]  __kasan_kmalloc+0xb7/0xc0
[   28.085926]  __kmalloc_noprof+0x1c9/0x500
[   28.086062]  kunit_kmalloc_array+0x25/0x60
[   28.086195]  copy_user_test_oob+0xab/0x10f0
[   28.086327]  kunit_try_run_case+0x1a5/0x480
[   28.086461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.086815]  kthread+0x337/0x6f0
[   28.086971]  ret_from_fork+0x116/0x1d0
[   28.087095]  ret_from_fork_asm+0x1a/0x30
[   28.087304] 
[   28.087395] The buggy address belongs to the object at ffff8881060ab300
[   28.087395]  which belongs to the cache kmalloc-128 of size 128
[   28.087924] The buggy address is located 0 bytes inside of
[   28.087924]  allocated 120-byte region [ffff8881060ab300, ffff8881060ab378)
[   28.088422] 
[   28.088508] The buggy address belongs to the physical page:
[   28.088754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab
[   28.089085] flags: 0x200000000000000(node=0|zone=2)
[   28.089317] page_type: f5(slab)
[   28.089467] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.089788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.090107] page dumped because: kasan: bad access detected
[   28.090346] 
[   28.090432] Memory state around the buggy address:
[   28.090681]  ffff8881060ab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.090932]  ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.091218] >ffff8881060ab300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.091528]                                                                 ^
[   28.091851]  ffff8881060ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.092175]  ffff8881060ab400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.092547] ==================================================================
[   28.111709] ==================================================================
[   28.112213] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   28.112596] Read of size 121 at addr ffff8881060ab300 by task kunit_try_catch/333
[   28.112848] 
[   28.112950] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   28.113000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.113013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.113035] Call Trace:
[   28.113052]  <TASK>
[   28.113068]  dump_stack_lvl+0x73/0xb0
[   28.113097]  print_report+0xd1/0x610
[   28.113121]  ? __virt_addr_valid+0x1db/0x2d0
[   28.113146]  ? copy_user_test_oob+0x604/0x10f0
[   28.113170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.113197]  ? copy_user_test_oob+0x604/0x10f0
[   28.113222]  kasan_report+0x141/0x180
[   28.113245]  ? copy_user_test_oob+0x604/0x10f0
[   28.113275]  kasan_check_range+0x10c/0x1c0
[   28.113299]  __kasan_check_read+0x15/0x20
[   28.113323]  copy_user_test_oob+0x604/0x10f0
[   28.113351]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.113375]  ? finish_task_switch.isra.0+0x153/0x700
[   28.113398]  ? __switch_to+0x47/0xf80
[   28.113426]  ? __schedule+0x10cc/0x2b60
[   28.113448]  ? __pfx_read_tsc+0x10/0x10
[   28.113470]  ? ktime_get_ts64+0x86/0x230
[   28.113495]  kunit_try_run_case+0x1a5/0x480
[   28.113519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.113551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.113575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.113599]  ? __kthread_parkme+0x82/0x180
[   28.113620]  ? preempt_count_sub+0x50/0x80
[   28.113644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.113668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.113695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.113723]  kthread+0x337/0x6f0
[   28.113743]  ? trace_preempt_on+0x20/0xc0
[   28.113768]  ? __pfx_kthread+0x10/0x10
[   28.113790]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.113816]  ? calculate_sigpending+0x7b/0xa0
[   28.113842]  ? __pfx_kthread+0x10/0x10
[   28.113864]  ret_from_fork+0x116/0x1d0
[   28.113885]  ? __pfx_kthread+0x10/0x10
[   28.113906]  ret_from_fork_asm+0x1a/0x30
[   28.113940]  </TASK>
[   28.113951] 
[   28.123020] Allocated by task 333:
[   28.123186]  kasan_save_stack+0x45/0x70
[   28.123389]  kasan_save_track+0x18/0x40
[   28.124691]  kasan_save_alloc_info+0x3b/0x50
[   28.124871]  __kasan_kmalloc+0xb7/0xc0
[   28.125004]  __kmalloc_noprof+0x1c9/0x500
[   28.125147]  kunit_kmalloc_array+0x25/0x60
[   28.125284]  copy_user_test_oob+0xab/0x10f0
[   28.125423]  kunit_try_run_case+0x1a5/0x480
[   28.125576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.125758]  kthread+0x337/0x6f0
[   28.125936]  ret_from_fork+0x116/0x1d0
[   28.126122]  ret_from_fork_asm+0x1a/0x30
[   28.126504] 
[   28.126719] The buggy address belongs to the object at ffff8881060ab300
[   28.126719]  which belongs to the cache kmalloc-128 of size 128
[   28.127587] The buggy address is located 0 bytes inside of
[   28.127587]  allocated 120-byte region [ffff8881060ab300, ffff8881060ab378)
[   28.128442] 
[   28.128570] The buggy address belongs to the physical page:
[   28.129075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab
[   28.129769] flags: 0x200000000000000(node=0|zone=2)
[   28.130078] page_type: f5(slab)
[   28.130195] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.130421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.130742] page dumped because: kasan: bad access detected
[   28.130964] 
[   28.131033] Memory state around the buggy address:
[   28.131268]  ffff8881060ab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.131512]  ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.131855] >ffff8881060ab300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.132166]                                                                 ^
[   28.132463]  ffff8881060ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.132709]  ffff8881060ab400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.133689] ==================================================================
[   28.056507] ==================================================================
[   28.056954] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   28.057288] Write of size 121 at addr ffff8881060ab300 by task kunit_try_catch/333
[   28.057611] 
[   28.057693] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   28.057761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.057775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.057798] Call Trace:
[   28.057811]  <TASK>
[   28.057827]  dump_stack_lvl+0x73/0xb0
[   28.057856]  print_report+0xd1/0x610
[   28.057880]  ? __virt_addr_valid+0x1db/0x2d0
[   28.057903]  ? copy_user_test_oob+0x3fd/0x10f0
[   28.057928]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.057955]  ? copy_user_test_oob+0x3fd/0x10f0
[   28.058000]  kasan_report+0x141/0x180
[   28.058024]  ? copy_user_test_oob+0x3fd/0x10f0
[   28.058053]  kasan_check_range+0x10c/0x1c0
[   28.058078]  __kasan_check_write+0x18/0x20
[   28.058102]  copy_user_test_oob+0x3fd/0x10f0
[   28.058128]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.058152]  ? finish_task_switch.isra.0+0x153/0x700
[   28.058175]  ? __switch_to+0x47/0xf80
[   28.058202]  ? __schedule+0x10cc/0x2b60
[   28.058243]  ? __pfx_read_tsc+0x10/0x10
[   28.058266]  ? ktime_get_ts64+0x86/0x230
[   28.058291]  kunit_try_run_case+0x1a5/0x480
[   28.058315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.058337]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.058360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.058400]  ? __kthread_parkme+0x82/0x180
[   28.058421]  ? preempt_count_sub+0x50/0x80
[   28.058445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.058469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.058502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.058541]  kthread+0x337/0x6f0
[   28.058562]  ? trace_preempt_on+0x20/0xc0
[   28.058586]  ? __pfx_kthread+0x10/0x10
[   28.058608]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.058643]  ? calculate_sigpending+0x7b/0xa0
[   28.058668]  ? __pfx_kthread+0x10/0x10
[   28.058691]  ret_from_fork+0x116/0x1d0
[   28.058711]  ? __pfx_kthread+0x10/0x10
[   28.058733]  ret_from_fork_asm+0x1a/0x30
[   28.058765]  </TASK>
[   28.058776] 
[   28.066009] Allocated by task 333:
[   28.066207]  kasan_save_stack+0x45/0x70
[   28.066406]  kasan_save_track+0x18/0x40
[   28.066632]  kasan_save_alloc_info+0x3b/0x50
[   28.066840]  __kasan_kmalloc+0xb7/0xc0
[   28.066969]  __kmalloc_noprof+0x1c9/0x500
[   28.067170]  kunit_kmalloc_array+0x25/0x60
[   28.067378]  copy_user_test_oob+0xab/0x10f0
[   28.067613]  kunit_try_run_case+0x1a5/0x480
[   28.067813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.068052]  kthread+0x337/0x6f0
[   28.068189]  ret_from_fork+0x116/0x1d0
[   28.068352]  ret_from_fork_asm+0x1a/0x30
[   28.068542] 
[   28.068639] The buggy address belongs to the object at ffff8881060ab300
[   28.068639]  which belongs to the cache kmalloc-128 of size 128
[   28.069132] The buggy address is located 0 bytes inside of
[   28.069132]  allocated 120-byte region [ffff8881060ab300, ffff8881060ab378)
[   28.069612] 
[   28.069705] The buggy address belongs to the physical page:
[   28.069895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab
[   28.070251] flags: 0x200000000000000(node=0|zone=2)
[   28.070439] page_type: f5(slab)
[   28.070613] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.070930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.071257] page dumped because: kasan: bad access detected
[   28.071445] 
[   28.071543] Memory state around the buggy address:
[   28.071817]  ffff8881060ab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.072131]  ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.072431] >ffff8881060ab300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.072697]                                                                 ^
[   28.072896]  ffff8881060ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.073202]  ffff8881060ab400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.073510] ==================================================================