Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.702927] ==================================================================
[   33.703053] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.703110] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.703417] 
[   33.703465] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.703572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.703982] Hardware name: linux,dummy-virt (DT)
[   33.704062] Call trace:
[   33.704175]  show_stack+0x20/0x38 (C)
[   33.704385]  dump_stack_lvl+0x8c/0xd0
[   33.704456]  print_report+0x118/0x5d0
[   33.704503]  kasan_report+0xdc/0x128
[   33.704711]  kasan_check_range+0x100/0x1a8
[   33.705131]  __kasan_check_read+0x20/0x30
[   33.705310]  copy_user_test_oob+0x3c8/0xec8
[   33.705482]  kunit_try_run_case+0x170/0x3f0
[   33.705714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.705953]  kthread+0x328/0x630
[   33.706159]  ret_from_fork+0x10/0x20
[   33.706346] 
[   33.706427] Allocated by task 316:
[   33.706586]  kasan_save_stack+0x3c/0x68
[   33.706656]  kasan_save_track+0x20/0x40
[   33.706723]  kasan_save_alloc_info+0x40/0x58
[   33.706765]  __kasan_kmalloc+0xd4/0xd8
[   33.706804]  __kmalloc_noprof+0x198/0x4c8
[   33.706846]  kunit_kmalloc_array+0x34/0x88
[   33.706928]  copy_user_test_oob+0xac/0xec8
[   33.706983]  kunit_try_run_case+0x170/0x3f0
[   33.707024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.707068]  kthread+0x328/0x630
[   33.707105]  ret_from_fork+0x10/0x20
[   33.707142] 
[   33.707166] The buggy address belongs to the object at fff00000c9bb7300
[   33.707166]  which belongs to the cache kmalloc-128 of size 128
[   33.707237] The buggy address is located 0 bytes inside of
[   33.707237]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.707314] 
[   33.707351] The buggy address belongs to the physical page:
[   33.707384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.707439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.707489] page_type: f5(slab)
[   33.707548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.707613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.707658] page dumped because: kasan: bad access detected
[   33.707702] 
[   33.707737] Memory state around the buggy address:
[   33.707772]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.708449]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.708537] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.708600]                                                                 ^
[   33.708668]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.708848]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.709250] ==================================================================
[   33.657947] ==================================================================
[   33.658064] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.658298] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.658354] 
[   33.658724] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.659147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.659678] Hardware name: linux,dummy-virt (DT)
[   33.659761] Call trace:
[   33.659842]  show_stack+0x20/0x38 (C)
[   33.660006]  dump_stack_lvl+0x8c/0xd0
[   33.660110]  print_report+0x118/0x5d0
[   33.660223]  kasan_report+0xdc/0x128
[   33.660523]  kasan_check_range+0x100/0x1a8
[   33.660795]  __kasan_check_write+0x20/0x30
[   33.660988]  copy_user_test_oob+0x234/0xec8
[   33.661044]  kunit_try_run_case+0x170/0x3f0
[   33.661247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.661492]  kthread+0x328/0x630
[   33.661607]  ret_from_fork+0x10/0x20
[   33.661761] 
[   33.661847] Allocated by task 316:
[   33.662107]  kasan_save_stack+0x3c/0x68
[   33.662324]  kasan_save_track+0x20/0x40
[   33.662396]  kasan_save_alloc_info+0x40/0x58
[   33.662437]  __kasan_kmalloc+0xd4/0xd8
[   33.662487]  __kmalloc_noprof+0x198/0x4c8
[   33.662542]  kunit_kmalloc_array+0x34/0x88
[   33.662584]  copy_user_test_oob+0xac/0xec8
[   33.662625]  kunit_try_run_case+0x170/0x3f0
[   33.662666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.662713]  kthread+0x328/0x630
[   33.662750]  ret_from_fork+0x10/0x20
[   33.662788] 
[   33.662811] The buggy address belongs to the object at fff00000c9bb7300
[   33.662811]  which belongs to the cache kmalloc-128 of size 128
[   33.662886] The buggy address is located 0 bytes inside of
[   33.662886]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.662956] 
[   33.662990] The buggy address belongs to the physical page:
[   33.663032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.663099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.663163] page_type: f5(slab)
[   33.663219] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.663282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.663353] page dumped because: kasan: bad access detected
[   33.663389] 
[   33.663418] Memory state around the buggy address:
[   33.663480]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.663538]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664132] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.664204]                                                                 ^
[   33.664314]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664536]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664891] ==================================================================
[   33.721614] ==================================================================
[   33.721669] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.721721] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.721774] 
[   33.722106] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.722357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.722822] Hardware name: linux,dummy-virt (DT)
[   33.723083] Call trace:
[   33.723338]  show_stack+0x20/0x38 (C)
[   33.723413]  dump_stack_lvl+0x8c/0xd0
[   33.723471]  print_report+0x118/0x5d0
[   33.723701]  kasan_report+0xdc/0x128
[   33.723766]  kasan_check_range+0x100/0x1a8
[   33.724010]  __kasan_check_read+0x20/0x30
[   33.724167]  copy_user_test_oob+0x4a0/0xec8
[   33.724274]  kunit_try_run_case+0x170/0x3f0
[   33.724625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.724783]  kthread+0x328/0x630
[   33.724972]  ret_from_fork+0x10/0x20
[   33.725140] 
[   33.725246] Allocated by task 316:
[   33.725335]  kasan_save_stack+0x3c/0x68
[   33.725739]  kasan_save_track+0x20/0x40
[   33.725799]  kasan_save_alloc_info+0x40/0x58
[   33.726015]  __kasan_kmalloc+0xd4/0xd8
[   33.726080]  __kmalloc_noprof+0x198/0x4c8
[   33.726263]  kunit_kmalloc_array+0x34/0x88
[   33.726394]  copy_user_test_oob+0xac/0xec8
[   33.726892]  kunit_try_run_case+0x170/0x3f0
[   33.726970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.727435]  kthread+0x328/0x630
[   33.727801]  ret_from_fork+0x10/0x20
[   33.727939] 
[   33.728036] The buggy address belongs to the object at fff00000c9bb7300
[   33.728036]  which belongs to the cache kmalloc-128 of size 128
[   33.728260] The buggy address is located 0 bytes inside of
[   33.728260]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.728341] 
[   33.728364] The buggy address belongs to the physical page:
[   33.728858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.729190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.729248] page_type: f5(slab)
[   33.729291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.729373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.729418] page dumped because: kasan: bad access detected
[   33.729453] 
[   33.729483] Memory state around the buggy address:
[   33.729531]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.729583]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.729641] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.729682]                                                                 ^
[   33.729727]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.729771]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.729814] ==================================================================
[   33.674145] ==================================================================
[   33.674454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.674599] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.674684] 
[   33.675584] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.675696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.675740] Hardware name: linux,dummy-virt (DT)
[   33.675775] Call trace:
[   33.676081]  show_stack+0x20/0x38 (C)
[   33.676186]  dump_stack_lvl+0x8c/0xd0
[   33.676284]  print_report+0x118/0x5d0
[   33.676580]  kasan_report+0xdc/0x128
[   33.676635]  kasan_check_range+0x100/0x1a8
[   33.676961]  __kasan_check_read+0x20/0x30
[   33.677218]  copy_user_test_oob+0x728/0xec8
[   33.677343]  kunit_try_run_case+0x170/0x3f0
[   33.677474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.677546]  kthread+0x328/0x630
[   33.677694]  ret_from_fork+0x10/0x20
[   33.677750] 
[   33.678090] Allocated by task 316:
[   33.678207]  kasan_save_stack+0x3c/0x68
[   33.678396]  kasan_save_track+0x20/0x40
[   33.678471]  kasan_save_alloc_info+0x40/0x58
[   33.678597]  __kasan_kmalloc+0xd4/0xd8
[   33.678673]  __kmalloc_noprof+0x198/0x4c8
[   33.678771]  kunit_kmalloc_array+0x34/0x88
[   33.678850]  copy_user_test_oob+0xac/0xec8
[   33.679004]  kunit_try_run_case+0x170/0x3f0
[   33.679202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.679348]  kthread+0x328/0x630
[   33.679489]  ret_from_fork+0x10/0x20
[   33.679539] 
[   33.679561] The buggy address belongs to the object at fff00000c9bb7300
[   33.679561]  which belongs to the cache kmalloc-128 of size 128
[   33.679691] The buggy address is located 0 bytes inside of
[   33.679691]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.679918] 
[   33.680242] The buggy address belongs to the physical page:
[   33.680651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.680735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.681049] page_type: f5(slab)
[   33.681157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.681314] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.681529] page dumped because: kasan: bad access detected
[   33.681824] 
[   33.681923] Memory state around the buggy address:
[   33.681964]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.682521]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.682686] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.682774]                                                                 ^
[   33.682823]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.682869]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.683194] ==================================================================
[   33.710766] ==================================================================
[   33.710839] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.710892] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.711240] 
[   33.711448] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.711804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.711865] Hardware name: linux,dummy-virt (DT)
[   33.712086] Call trace:
[   33.712169]  show_stack+0x20/0x38 (C)
[   33.712545]  dump_stack_lvl+0x8c/0xd0
[   33.712638]  print_report+0x118/0x5d0
[   33.712825]  kasan_report+0xdc/0x128
[   33.713030]  kasan_check_range+0x100/0x1a8
[   33.713215]  __kasan_check_write+0x20/0x30
[   33.713300]  copy_user_test_oob+0x434/0xec8
[   33.713546]  kunit_try_run_case+0x170/0x3f0
[   33.713798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.713938]  kthread+0x328/0x630
[   33.714057]  ret_from_fork+0x10/0x20
[   33.714130] 
[   33.714351] Allocated by task 316:
[   33.714427]  kasan_save_stack+0x3c/0x68
[   33.714634]  kasan_save_track+0x20/0x40
[   33.714845]  kasan_save_alloc_info+0x40/0x58
[   33.715033]  __kasan_kmalloc+0xd4/0xd8
[   33.715209]  __kmalloc_noprof+0x198/0x4c8
[   33.715393]  kunit_kmalloc_array+0x34/0x88
[   33.715437]  copy_user_test_oob+0xac/0xec8
[   33.715666]  kunit_try_run_case+0x170/0x3f0
[   33.716034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.716198]  kthread+0x328/0x630
[   33.716367]  ret_from_fork+0x10/0x20
[   33.716593] 
[   33.716638] The buggy address belongs to the object at fff00000c9bb7300
[   33.716638]  which belongs to the cache kmalloc-128 of size 128
[   33.716975] The buggy address is located 0 bytes inside of
[   33.716975]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.717059] 
[   33.717081] The buggy address belongs to the physical page:
[   33.717326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.717497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.717892] page_type: f5(slab)
[   33.717939] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.718247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.718358] page dumped because: kasan: bad access detected
[   33.718847] 
[   33.718876] Memory state around the buggy address:
[   33.719220]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.719317]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.719578] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.719764]                                                                 ^
[   33.720035]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.720306]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.720359] ==================================================================
[   33.693207] ==================================================================
[   33.693349] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.693414] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316
[   33.693744] 
[   33.693829] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.693926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.693976] Hardware name: linux,dummy-virt (DT)
[   33.694073] Call trace:
[   33.694099]  show_stack+0x20/0x38 (C)
[   33.694300]  dump_stack_lvl+0x8c/0xd0
[   33.694391]  print_report+0x118/0x5d0
[   33.694720]  kasan_report+0xdc/0x128
[   33.694802]  kasan_check_range+0x100/0x1a8
[   33.694855]  __kasan_check_write+0x20/0x30
[   33.694947]  copy_user_test_oob+0x35c/0xec8
[   33.695001]  kunit_try_run_case+0x170/0x3f0
[   33.695054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.695153]  kthread+0x328/0x630
[   33.695197]  ret_from_fork+0x10/0x20
[   33.695264] 
[   33.695566] Allocated by task 316:
[   33.695647]  kasan_save_stack+0x3c/0x68
[   33.695734]  kasan_save_track+0x20/0x40
[   33.695789]  kasan_save_alloc_info+0x40/0x58
[   33.695941]  __kasan_kmalloc+0xd4/0xd8
[   33.696027]  __kmalloc_noprof+0x198/0x4c8
[   33.696123]  kunit_kmalloc_array+0x34/0x88
[   33.696370]  copy_user_test_oob+0xac/0xec8
[   33.696571]  kunit_try_run_case+0x170/0x3f0
[   33.696718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.696947]  kthread+0x328/0x630
[   33.697127]  ret_from_fork+0x10/0x20
[   33.697319] 
[   33.697351] The buggy address belongs to the object at fff00000c9bb7300
[   33.697351]  which belongs to the cache kmalloc-128 of size 128
[   33.698024] The buggy address is located 0 bytes inside of
[   33.698024]  allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378)
[   33.698128] 
[   33.698183] The buggy address belongs to the physical page:
[   33.698237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7
[   33.698874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.699096] page_type: f5(slab)
[   33.699312] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.699463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.699649] page dumped because: kasan: bad access detected
[   33.699906] 
[   33.700066] Memory state around the buggy address:
[   33.700253]  fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.700319]  fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.700504] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.700893]                                                                 ^
[   33.700998]  fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.701131]  fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.701502] ==================================================================

[   27.243860] ==================================================================
[   27.244192] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   27.244552] Write of size 121 at addr ffff88810611db00 by task kunit_try_catch/334
[   27.245067] 
[   27.245189] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.245243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.245258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.245281] Call Trace:
[   27.245297]  <TASK>
[   27.245314]  dump_stack_lvl+0x73/0xb0
[   27.245356]  print_report+0xd1/0x610
[   27.245379]  ? __virt_addr_valid+0x1db/0x2d0
[   27.245404]  ? copy_user_test_oob+0x3fd/0x10f0
[   27.245428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.245455]  ? copy_user_test_oob+0x3fd/0x10f0
[   27.245480]  kasan_report+0x141/0x180
[   27.245503]  ? copy_user_test_oob+0x3fd/0x10f0
[   27.245532]  kasan_check_range+0x10c/0x1c0
[   27.245556]  __kasan_check_write+0x18/0x20
[   27.245581]  copy_user_test_oob+0x3fd/0x10f0
[   27.245751]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.245892]  ? finish_task_switch.isra.0+0x153/0x700
[   27.245917]  ? __switch_to+0x47/0xf80
[   27.245946]  ? __schedule+0x10c6/0x2b60
[   27.245969]  ? __pfx_read_tsc+0x10/0x10
[   27.245992]  ? ktime_get_ts64+0x86/0x230
[   27.246017]  kunit_try_run_case+0x1a5/0x480
[   27.246042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.246065]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.246089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.246113]  ? __kthread_parkme+0x82/0x180
[   27.246135]  ? preempt_count_sub+0x50/0x80
[   27.246158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.246183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.246211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.246238]  kthread+0x337/0x6f0
[   27.246260]  ? trace_preempt_on+0x20/0xc0
[   27.246285]  ? __pfx_kthread+0x10/0x10
[   27.246306]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.246340]  ? calculate_sigpending+0x7b/0xa0
[   27.246364]  ? __pfx_kthread+0x10/0x10
[   27.246387]  ret_from_fork+0x116/0x1d0
[   27.246406]  ? __pfx_kthread+0x10/0x10
[   27.246428]  ret_from_fork_asm+0x1a/0x30
[   27.246460]  </TASK>
[   27.246472] 
[   27.256669] Allocated by task 334:
[   27.256865]  kasan_save_stack+0x45/0x70
[   27.257059]  kasan_save_track+0x18/0x40
[   27.257246]  kasan_save_alloc_info+0x3b/0x50
[   27.257467]  __kasan_kmalloc+0xb7/0xc0
[   27.257646]  __kmalloc_noprof+0x1c9/0x500
[   27.258220]  kunit_kmalloc_array+0x25/0x60
[   27.258416]  copy_user_test_oob+0xab/0x10f0
[   27.258844]  kunit_try_run_case+0x1a5/0x480
[   27.259061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.259440]  kthread+0x337/0x6f0
[   27.259720]  ret_from_fork+0x116/0x1d0
[   27.259996]  ret_from_fork_asm+0x1a/0x30
[   27.260188] 
[   27.260266] The buggy address belongs to the object at ffff88810611db00
[   27.260266]  which belongs to the cache kmalloc-128 of size 128
[   27.260978] The buggy address is located 0 bytes inside of
[   27.260978]  allocated 120-byte region [ffff88810611db00, ffff88810611db78)
[   27.261637] 
[   27.261904] The buggy address belongs to the physical page:
[   27.262218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10611d
[   27.262577] flags: 0x200000000000000(node=0|zone=2)
[   27.262996] page_type: f5(slab)
[   27.263197] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.263656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.264184] page dumped because: kasan: bad access detected
[   27.264516] 
[   27.264610] Memory state around the buggy address:
[   27.264880]  ffff88810611da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.265356]  ffff88810611da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265673] >ffff88810611db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.266217]                                                                 ^
[   27.266542]  ffff88810611db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.267079]  ffff88810611dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.267460] ==================================================================
[   27.293011] ==================================================================
[   27.293678] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   27.295611] Write of size 121 at addr ffff88810611db00 by task kunit_try_catch/334
[   27.296482] 
[   27.296693] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.296747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.296773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.296797] Call Trace:
[   27.296818]  <TASK>
[   27.296835]  dump_stack_lvl+0x73/0xb0
[   27.296880]  print_report+0xd1/0x610
[   27.296903]  ? __virt_addr_valid+0x1db/0x2d0
[   27.296928]  ? copy_user_test_oob+0x557/0x10f0
[   27.296952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.296979]  ? copy_user_test_oob+0x557/0x10f0
[   27.297003]  kasan_report+0x141/0x180
[   27.297027]  ? copy_user_test_oob+0x557/0x10f0
[   27.297056]  kasan_check_range+0x10c/0x1c0
[   27.297091]  __kasan_check_write+0x18/0x20
[   27.297115]  copy_user_test_oob+0x557/0x10f0
[   27.297172]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.297196]  ? finish_task_switch.isra.0+0x153/0x700
[   27.297219]  ? __switch_to+0x47/0xf80
[   27.297245]  ? __schedule+0x10c6/0x2b60
[   27.297268]  ? __pfx_read_tsc+0x10/0x10
[   27.297293]  ? ktime_get_ts64+0x86/0x230
[   27.297321]  kunit_try_run_case+0x1a5/0x480
[   27.297362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.297385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.297409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.297433]  ? __kthread_parkme+0x82/0x180
[   27.297454]  ? preempt_count_sub+0x50/0x80
[   27.297478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.297502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.297529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.297559]  kthread+0x337/0x6f0
[   27.297580]  ? trace_preempt_on+0x20/0xc0
[   27.297603]  ? __pfx_kthread+0x10/0x10
[   27.297657]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.297678]  ? calculate_sigpending+0x7b/0xa0
[   27.297703]  ? __pfx_kthread+0x10/0x10
[   27.297735]  ret_from_fork+0x116/0x1d0
[   27.297756]  ? __pfx_kthread+0x10/0x10
[   27.297778]  ret_from_fork_asm+0x1a/0x30
[   27.297810]  </TASK>
[   27.297821] 
[   27.305649] Allocated by task 334:
[   27.305824]  kasan_save_stack+0x45/0x70
[   27.306023]  kasan_save_track+0x18/0x40
[   27.306334]  kasan_save_alloc_info+0x3b/0x50
[   27.306491]  __kasan_kmalloc+0xb7/0xc0
[   27.306659]  __kmalloc_noprof+0x1c9/0x500
[   27.306869]  kunit_kmalloc_array+0x25/0x60
[   27.307095]  copy_user_test_oob+0xab/0x10f0
[   27.307273]  kunit_try_run_case+0x1a5/0x480
[   27.307464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.307725]  kthread+0x337/0x6f0
[   27.307842]  ret_from_fork+0x116/0x1d0
[   27.307998]  ret_from_fork_asm+0x1a/0x30
[   27.308195] 
[   27.308309] The buggy address belongs to the object at ffff88810611db00
[   27.308309]  which belongs to the cache kmalloc-128 of size 128
[   27.308825] The buggy address is located 0 bytes inside of
[   27.308825]  allocated 120-byte region [ffff88810611db00, ffff88810611db78)
[   27.309340] 
[   27.309432] The buggy address belongs to the physical page:
[   27.309690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10611d
[   27.310019] flags: 0x200000000000000(node=0|zone=2)
[   27.310252] page_type: f5(slab)
[   27.310423] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.310753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.311073] page dumped because: kasan: bad access detected
[   27.311310] 
[   27.311390] Memory state around the buggy address:
[   27.311540]  ffff88810611da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.311752]  ffff88810611da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.311962] >ffff88810611db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.312266]                                                                 ^
[   27.312762]  ffff88810611db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.313080]  ffff88810611dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.313408] ==================================================================
[   27.313967] ==================================================================
[   27.314302] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   27.314599] Read of size 121 at addr ffff88810611db00 by task kunit_try_catch/334
[   27.315247] 
[   27.315882] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.315948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.316135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.316159] Call Trace:
[   27.316175]  <TASK>
[   27.316203]  dump_stack_lvl+0x73/0xb0
[   27.316237]  print_report+0xd1/0x610
[   27.316260]  ? __virt_addr_valid+0x1db/0x2d0
[   27.316285]  ? copy_user_test_oob+0x604/0x10f0
[   27.316309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.316348]  ? copy_user_test_oob+0x604/0x10f0
[   27.316372]  kasan_report+0x141/0x180
[   27.316394]  ? copy_user_test_oob+0x604/0x10f0
[   27.316424]  kasan_check_range+0x10c/0x1c0
[   27.316448]  __kasan_check_read+0x15/0x20
[   27.316473]  copy_user_test_oob+0x604/0x10f0
[   27.316498]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.316521]  ? finish_task_switch.isra.0+0x153/0x700
[   27.316544]  ? __switch_to+0x47/0xf80
[   27.316571]  ? __schedule+0x10c6/0x2b60
[   27.316593]  ? __pfx_read_tsc+0x10/0x10
[   27.316801]  ? ktime_get_ts64+0x86/0x230
[   27.316843]  kunit_try_run_case+0x1a5/0x480
[   27.316870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.316894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.316951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.316978]  ? __kthread_parkme+0x82/0x180
[   27.316999]  ? preempt_count_sub+0x50/0x80
[   27.317023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.317047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.317075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.317103]  kthread+0x337/0x6f0
[   27.317124]  ? trace_preempt_on+0x20/0xc0
[   27.317148]  ? __pfx_kthread+0x10/0x10
[   27.317169]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.317192]  ? calculate_sigpending+0x7b/0xa0
[   27.317216]  ? __pfx_kthread+0x10/0x10
[   27.317238]  ret_from_fork+0x116/0x1d0
[   27.317258]  ? __pfx_kthread+0x10/0x10
[   27.317279]  ret_from_fork_asm+0x1a/0x30
[   27.317310]  </TASK>
[   27.317333] 
[   27.328030] Allocated by task 334:
[   27.328369]  kasan_save_stack+0x45/0x70
[   27.328561]  kasan_save_track+0x18/0x40
[   27.328878]  kasan_save_alloc_info+0x3b/0x50
[   27.329364]  __kasan_kmalloc+0xb7/0xc0
[   27.329660]  __kmalloc_noprof+0x1c9/0x500
[   27.330067]  kunit_kmalloc_array+0x25/0x60
[   27.330432]  copy_user_test_oob+0xab/0x10f0
[   27.330904]  kunit_try_run_case+0x1a5/0x480
[   27.331182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.331609]  kthread+0x337/0x6f0
[   27.331890]  ret_from_fork+0x116/0x1d0
[   27.332090]  ret_from_fork_asm+0x1a/0x30
[   27.332266] 
[   27.332363] The buggy address belongs to the object at ffff88810611db00
[   27.332363]  which belongs to the cache kmalloc-128 of size 128
[   27.333197] The buggy address is located 0 bytes inside of
[   27.333197]  allocated 120-byte region [ffff88810611db00, ffff88810611db78)
[   27.334190] 
[   27.334461] The buggy address belongs to the physical page:
[   27.334916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10611d
[   27.335269] flags: 0x200000000000000(node=0|zone=2)
[   27.335500] page_type: f5(slab)
[   27.335701] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.336014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.336315] page dumped because: kasan: bad access detected
[   27.336935] 
[   27.337166] Memory state around the buggy address:
[   27.337667]  ffff88810611da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.338115]  ffff88810611da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.338623] >ffff88810611db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.339123]                                                                 ^
[   27.339436]  ffff88810611db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.339912]  ffff88810611dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.340190] ==================================================================
[   27.268431] ==================================================================
[   27.269042] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   27.269449] Read of size 121 at addr ffff88810611db00 by task kunit_try_catch/334
[   27.270139] 
[   27.270270] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.270347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.270361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.270385] Call Trace:
[   27.270404]  <TASK>
[   27.270421]  dump_stack_lvl+0x73/0xb0
[   27.270453]  print_report+0xd1/0x610
[   27.270476]  ? __virt_addr_valid+0x1db/0x2d0
[   27.270502]  ? copy_user_test_oob+0x4aa/0x10f0
[   27.270526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.270553]  ? copy_user_test_oob+0x4aa/0x10f0
[   27.270577]  kasan_report+0x141/0x180
[   27.270600]  ? copy_user_test_oob+0x4aa/0x10f0
[   27.270752]  kasan_check_range+0x10c/0x1c0
[   27.270778]  __kasan_check_read+0x15/0x20
[   27.270802]  copy_user_test_oob+0x4aa/0x10f0
[   27.270829]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.270852]  ? finish_task_switch.isra.0+0x153/0x700
[   27.270874]  ? __switch_to+0x47/0xf80
[   27.270901]  ? __schedule+0x10c6/0x2b60
[   27.270924]  ? __pfx_read_tsc+0x10/0x10
[   27.270947]  ? ktime_get_ts64+0x86/0x230
[   27.270975]  kunit_try_run_case+0x1a5/0x480
[   27.271000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.271024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.271049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.271074]  ? __kthread_parkme+0x82/0x180
[   27.271096]  ? preempt_count_sub+0x50/0x80
[   27.271120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.271144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.271172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.271202]  kthread+0x337/0x6f0
[   27.271222]  ? trace_preempt_on+0x20/0xc0
[   27.271246]  ? __pfx_kthread+0x10/0x10
[   27.271267]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.271289]  ? calculate_sigpending+0x7b/0xa0
[   27.271315]  ? __pfx_kthread+0x10/0x10
[   27.271348]  ret_from_fork+0x116/0x1d0
[   27.271368]  ? __pfx_kthread+0x10/0x10
[   27.271389]  ret_from_fork_asm+0x1a/0x30
[   27.271437]  </TASK>
[   27.271449] 
[   27.281268] Allocated by task 334:
[   27.281573]  kasan_save_stack+0x45/0x70
[   27.281935]  kasan_save_track+0x18/0x40
[   27.282231]  kasan_save_alloc_info+0x3b/0x50
[   27.282586]  __kasan_kmalloc+0xb7/0xc0
[   27.282750]  __kmalloc_noprof+0x1c9/0x500
[   27.282894]  kunit_kmalloc_array+0x25/0x60
[   27.283037]  copy_user_test_oob+0xab/0x10f0
[   27.283178]  kunit_try_run_case+0x1a5/0x480
[   27.283318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.283587]  kthread+0x337/0x6f0
[   27.283753]  ret_from_fork+0x116/0x1d0
[   27.283937]  ret_from_fork_asm+0x1a/0x30
[   27.284135] 
[   27.284228] The buggy address belongs to the object at ffff88810611db00
[   27.284228]  which belongs to the cache kmalloc-128 of size 128
[   27.284996] The buggy address is located 0 bytes inside of
[   27.284996]  allocated 120-byte region [ffff88810611db00, ffff88810611db78)
[   27.285809] 
[   27.286009] The buggy address belongs to the physical page:
[   27.286411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10611d
[   27.286858] flags: 0x200000000000000(node=0|zone=2)
[   27.287349] page_type: f5(slab)
[   27.287710] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.288078] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.288304] page dumped because: kasan: bad access detected
[   27.288481] 
[   27.288546] Memory state around the buggy address:
[   27.289004]  ffff88810611da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.289662]  ffff88810611da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.290235] >ffff88810611db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.290885]                                                                 ^
[   27.291469]  ffff88810611db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.291876]  ffff88810611dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.292089] ==================================================================