Hay
Date
July 22, 2025, 5:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.545615] ==================================================================
[   33.545667] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   33.545721] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.545774] 
[   33.546143] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.546379] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.546415] Hardware name: linux,dummy-virt (DT)
[   33.546465] Call trace:
[   33.546492]  show_stack+0x20/0x38 (C)
[   33.547050]  dump_stack_lvl+0x8c/0xd0
[   33.547135]  print_report+0x118/0x5e8
[   33.547182]  kasan_report+0xdc/0x128
[   33.547399]  kasan_check_range+0x100/0x1a8
[   33.547462]  __kasan_check_read+0x20/0x30
[   33.547539]  copy_user_test_oob+0x4a0/0xec8
[   33.547653]  kunit_try_run_case+0x170/0x3f0
[   33.547702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.547753]  kthread+0x328/0x630
[   33.547983]  ret_from_fork+0x10/0x20
[   33.548385] 
[   33.548422] Allocated by task 316:
[   33.548459]  kasan_save_stack+0x3c/0x68
[   33.548615]  kasan_save_track+0x20/0x40
[   33.548667]  kasan_save_alloc_info+0x40/0x58
[   33.548848]  __kasan_kmalloc+0xd4/0xd8
[   33.549420]  __kmalloc_noprof+0x198/0x4c8
[   33.549472]  kunit_kmalloc_array+0x34/0x88
[   33.549698]  copy_user_test_oob+0xac/0xec8
[   33.549989]  kunit_try_run_case+0x170/0x3f0
[   33.550373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.550850]  kthread+0x328/0x630
[   33.551091]  ret_from_fork+0x10/0x20
[   33.551181] 
[   33.551204] The buggy address belongs to the object at fff00000c922a400
[   33.551204]  which belongs to the cache kmalloc-128 of size 128
[   33.551751] The buggy address is located 0 bytes inside of
[   33.551751]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.552093] 
[   33.552138] The buggy address belongs to the physical page:
[   33.552451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.553048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.553242] page_type: f5(slab)
[   33.553724] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.553971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.554200] page dumped because: kasan: bad access detected
[   33.554261] 
[   33.554592] Memory state around the buggy address:
[   33.554743]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.554871]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555058] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.555143]                                                                 ^
[   33.555390]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555501]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555746] ==================================================================
[   33.534741] ==================================================================
[   33.535229] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   33.535312] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.535365] 
[   33.535678] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.535792] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.535893] Hardware name: linux,dummy-virt (DT)
[   33.535951] Call trace:
[   33.535976]  show_stack+0x20/0x38 (C)
[   33.536030]  dump_stack_lvl+0x8c/0xd0
[   33.536382]  print_report+0x118/0x5e8
[   33.536487]  kasan_report+0xdc/0x128
[   33.536541]  kasan_check_range+0x100/0x1a8
[   33.536587]  __kasan_check_write+0x20/0x30
[   33.537049]  copy_user_test_oob+0x434/0xec8
[   33.537198]  kunit_try_run_case+0x170/0x3f0
[   33.537392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.537594]  kthread+0x328/0x630
[   33.537664]  ret_from_fork+0x10/0x20
[   33.537922] 
[   33.538155] Allocated by task 316:
[   33.538251]  kasan_save_stack+0x3c/0x68
[   33.538406]  kasan_save_track+0x20/0x40
[   33.538449]  kasan_save_alloc_info+0x40/0x58
[   33.538673]  __kasan_kmalloc+0xd4/0xd8
[   33.538940]  __kmalloc_noprof+0x198/0x4c8
[   33.539009]  kunit_kmalloc_array+0x34/0x88
[   33.539245]  copy_user_test_oob+0xac/0xec8
[   33.539509]  kunit_try_run_case+0x170/0x3f0
[   33.539704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.539932]  kthread+0x328/0x630
[   33.540182]  ret_from_fork+0x10/0x20
[   33.540260] 
[   33.540503] The buggy address belongs to the object at fff00000c922a400
[   33.540503]  which belongs to the cache kmalloc-128 of size 128
[   33.540776] The buggy address is located 0 bytes inside of
[   33.540776]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.541275] 
[   33.541341] The buggy address belongs to the physical page:
[   33.541400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.541698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.541868] page_type: f5(slab)
[   33.542081] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.542229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.542381] page dumped because: kasan: bad access detected
[   33.542585] 
[   33.542771] Memory state around the buggy address:
[   33.542853]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.542903]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543471] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.543560]                                                                 ^
[   33.543846]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543983]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.544072] ==================================================================
[   33.524992] ==================================================================
[   33.525218] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   33.525417] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.525511] 
[   33.525564] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.525782] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.525945] Hardware name: linux,dummy-virt (DT)
[   33.526008] Call trace:
[   33.526191]  show_stack+0x20/0x38 (C)
[   33.526336]  dump_stack_lvl+0x8c/0xd0
[   33.526747]  print_report+0x118/0x5e8
[   33.526944]  kasan_report+0xdc/0x128
[   33.527022]  kasan_check_range+0x100/0x1a8
[   33.527153]  __kasan_check_read+0x20/0x30
[   33.527259]  copy_user_test_oob+0x3c8/0xec8
[   33.527309]  kunit_try_run_case+0x170/0x3f0
[   33.527853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.528159]  kthread+0x328/0x630
[   33.528267]  ret_from_fork+0x10/0x20
[   33.528439] 
[   33.528501] Allocated by task 316:
[   33.528537]  kasan_save_stack+0x3c/0x68
[   33.528718]  kasan_save_track+0x20/0x40
[   33.529010]  kasan_save_alloc_info+0x40/0x58
[   33.529304]  __kasan_kmalloc+0xd4/0xd8
[   33.529363]  __kmalloc_noprof+0x198/0x4c8
[   33.529994]  kunit_kmalloc_array+0x34/0x88
[   33.530109]  copy_user_test_oob+0xac/0xec8
[   33.530161]  kunit_try_run_case+0x170/0x3f0
[   33.530201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.530467]  kthread+0x328/0x630
[   33.530883]  ret_from_fork+0x10/0x20
[   33.531029] 
[   33.531252] The buggy address belongs to the object at fff00000c922a400
[   33.531252]  which belongs to the cache kmalloc-128 of size 128
[   33.531567] The buggy address is located 0 bytes inside of
[   33.531567]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.531874] 
[   33.531905] The buggy address belongs to the physical page:
[   33.531941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.531998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.532050] page_type: f5(slab)
[   33.532158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.532227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.532273] page dumped because: kasan: bad access detected
[   33.532304] 
[   33.532324] Memory state around the buggy address:
[   33.532359]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.532412]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.532465] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.532525]                                                                 ^
[   33.532567]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.532627]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.532667] ==================================================================
[   33.474100] ==================================================================
[   33.474204] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   33.474707] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.474809] 
[   33.474949] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.475647] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.475691] Hardware name: linux,dummy-virt (DT)
[   33.475747] Call trace:
[   33.475910]  show_stack+0x20/0x38 (C)
[   33.475997]  dump_stack_lvl+0x8c/0xd0
[   33.476406]  print_report+0x118/0x5e8
[   33.476469]  kasan_report+0xdc/0x128
[   33.476515]  kasan_check_range+0x100/0x1a8
[   33.476738]  __kasan_check_write+0x20/0x30
[   33.476930]  copy_user_test_oob+0x234/0xec8
[   33.477132]  kunit_try_run_case+0x170/0x3f0
[   33.477246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.477387]  kthread+0x328/0x630
[   33.477438]  ret_from_fork+0x10/0x20
[   33.477490] 
[   33.477513] Allocated by task 316:
[   33.477548]  kasan_save_stack+0x3c/0x68
[   33.478036]  kasan_save_track+0x20/0x40
[   33.478122]  kasan_save_alloc_info+0x40/0x58
[   33.478271]  __kasan_kmalloc+0xd4/0xd8
[   33.478353]  __kmalloc_noprof+0x198/0x4c8
[   33.478584]  kunit_kmalloc_array+0x34/0x88
[   33.478737]  copy_user_test_oob+0xac/0xec8
[   33.478883]  kunit_try_run_case+0x170/0x3f0
[   33.479036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.479133]  kthread+0x328/0x630
[   33.479254]  ret_from_fork+0x10/0x20
[   33.479303] 
[   33.479326] The buggy address belongs to the object at fff00000c922a400
[   33.479326]  which belongs to the cache kmalloc-128 of size 128
[   33.479608] The buggy address is located 0 bytes inside of
[   33.479608]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.479770] 
[   33.479868] The buggy address belongs to the physical page:
[   33.480457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.480651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.480952] page_type: f5(slab)
[   33.481041] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.481097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.481141] page dumped because: kasan: bad access detected
[   33.481196] 
[   33.481541] Memory state around the buggy address:
[   33.482098]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.482337]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.482387] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.482528]                                                                 ^
[   33.482845]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483064]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483158] ==================================================================
[   33.512330] ==================================================================
[   33.512728] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   33.512806] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.512911] 
[   33.512981] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.513456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.513557] Hardware name: linux,dummy-virt (DT)
[   33.513899] Call trace:
[   33.513937]  show_stack+0x20/0x38 (C)
[   33.514180]  dump_stack_lvl+0x8c/0xd0
[   33.514291]  print_report+0x118/0x5e8
[   33.514443]  kasan_report+0xdc/0x128
[   33.514869]  kasan_check_range+0x100/0x1a8
[   33.514934]  __kasan_check_write+0x20/0x30
[   33.515101]  copy_user_test_oob+0x35c/0xec8
[   33.515356]  kunit_try_run_case+0x170/0x3f0
[   33.515423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.515678]  kthread+0x328/0x630
[   33.516054]  ret_from_fork+0x10/0x20
[   33.516389] 
[   33.516641] Allocated by task 316:
[   33.516689]  kasan_save_stack+0x3c/0x68
[   33.516905]  kasan_save_track+0x20/0x40
[   33.517116]  kasan_save_alloc_info+0x40/0x58
[   33.517168]  __kasan_kmalloc+0xd4/0xd8
[   33.517206]  __kmalloc_noprof+0x198/0x4c8
[   33.517249]  kunit_kmalloc_array+0x34/0x88
[   33.517551]  copy_user_test_oob+0xac/0xec8
[   33.517789]  kunit_try_run_case+0x170/0x3f0
[   33.517878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518104]  kthread+0x328/0x630
[   33.518431]  ret_from_fork+0x10/0x20
[   33.518515] 
[   33.518538] The buggy address belongs to the object at fff00000c922a400
[   33.518538]  which belongs to the cache kmalloc-128 of size 128
[   33.518787] The buggy address is located 0 bytes inside of
[   33.518787]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.519159] 
[   33.519413] The buggy address belongs to the physical page:
[   33.519792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.520062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.520260] page_type: f5(slab)
[   33.520654] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.520963] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.521155] page dumped because: kasan: bad access detected
[   33.521391] 
[   33.521623] Memory state around the buggy address:
[   33.521692]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.521748]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522028] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.522262]                                                                 ^
[   33.522545]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522632]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522725] ==================================================================
[   33.490289] ==================================================================
[   33.490353] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   33.490876] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316
[   33.490982] 
[   33.491385] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.491774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.491889] Hardware name: linux,dummy-virt (DT)
[   33.491955] Call trace:
[   33.491983]  show_stack+0x20/0x38 (C)
[   33.492077]  dump_stack_lvl+0x8c/0xd0
[   33.492498]  print_report+0x118/0x5e8
[   33.492910]  kasan_report+0xdc/0x128
[   33.493007]  kasan_check_range+0x100/0x1a8
[   33.493075]  __kasan_check_read+0x20/0x30
[   33.493254]  copy_user_test_oob+0x728/0xec8
[   33.493435]  kunit_try_run_case+0x170/0x3f0
[   33.493779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.493919]  kthread+0x328/0x630
[   33.494114]  ret_from_fork+0x10/0x20
[   33.494610] 
[   33.494880] Allocated by task 316:
[   33.494965]  kasan_save_stack+0x3c/0x68
[   33.495013]  kasan_save_track+0x20/0x40
[   33.495252]  kasan_save_alloc_info+0x40/0x58
[   33.495441]  __kasan_kmalloc+0xd4/0xd8
[   33.495606]  __kmalloc_noprof+0x198/0x4c8
[   33.495939]  kunit_kmalloc_array+0x34/0x88
[   33.496350]  copy_user_test_oob+0xac/0xec8
[   33.496567]  kunit_try_run_case+0x170/0x3f0
[   33.496826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497030]  kthread+0x328/0x630
[   33.497138]  ret_from_fork+0x10/0x20
[   33.497327] 
[   33.497575] The buggy address belongs to the object at fff00000c922a400
[   33.497575]  which belongs to the cache kmalloc-128 of size 128
[   33.497784] The buggy address is located 0 bytes inside of
[   33.497784]  allocated 120-byte region [fff00000c922a400, fff00000c922a478)
[   33.498061] 
[   33.498128] The buggy address belongs to the physical page:
[   33.498201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.498296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498403] page_type: f5(slab)
[   33.498491] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.498699] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.499118] page dumped because: kasan: bad access detected
[   33.499217] 
[   33.499288] Memory state around the buggy address:
[   33.499426]  fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.499575]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499649] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.499690]                                                                 ^
[   33.499769]  fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499970]  fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500176] ==================================================================

[   29.349669] ==================================================================
[   29.349955] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   29.350201] Read of size 121 at addr ffff888104975500 by task kunit_try_catch/333
[   29.350530] 
[   29.350648] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.350698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.350712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.350734] Call Trace:
[   29.350751]  <TASK>
[   29.350768]  dump_stack_lvl+0x73/0xb0
[   29.350813]  print_report+0xd1/0x640
[   29.350850]  ? __virt_addr_valid+0x1db/0x2d0
[   29.350876]  ? copy_user_test_oob+0x4aa/0x10f0
[   29.350903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.350932]  ? copy_user_test_oob+0x4aa/0x10f0
[   29.350967]  kasan_report+0x141/0x180
[   29.350993]  ? copy_user_test_oob+0x4aa/0x10f0
[   29.351022]  kasan_check_range+0x10c/0x1c0
[   29.351049]  __kasan_check_read+0x15/0x20
[   29.351074]  copy_user_test_oob+0x4aa/0x10f0
[   29.351102]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.351127]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.351162]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.351192]  kunit_try_run_case+0x1a5/0x480
[   29.351218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.351244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.351271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.351298]  ? __kthread_parkme+0x82/0x180
[   29.351320]  ? preempt_count_sub+0x50/0x80
[   29.351344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.351370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.351395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.351421]  kthread+0x337/0x6f0
[   29.351443]  ? trace_preempt_on+0x20/0xc0
[   29.351467]  ? __pfx_kthread+0x10/0x10
[   29.351490]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.351515]  ? calculate_sigpending+0x7b/0xa0
[   29.351541]  ? __pfx_kthread+0x10/0x10
[   29.351564]  ret_from_fork+0x116/0x1d0
[   29.351586]  ? __pfx_kthread+0x10/0x10
[   29.351608]  ret_from_fork_asm+0x1a/0x30
[   29.351641]  </TASK>
[   29.351654] 
[   29.358366] Allocated by task 333:
[   29.358534]  kasan_save_stack+0x45/0x70
[   29.358761]  kasan_save_track+0x18/0x40
[   29.358931]  kasan_save_alloc_info+0x3b/0x50
[   29.359143]  __kasan_kmalloc+0xb7/0xc0
[   29.359329]  __kmalloc_noprof+0x1ca/0x510
[   29.359492]  kunit_kmalloc_array+0x25/0x60
[   29.359679]  copy_user_test_oob+0xab/0x10f0
[   29.359884]  kunit_try_run_case+0x1a5/0x480
[   29.360053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.360234]  kthread+0x337/0x6f0
[   29.360439]  ret_from_fork+0x116/0x1d0
[   29.360658]  ret_from_fork_asm+0x1a/0x30
[   29.360851] 
[   29.360925] The buggy address belongs to the object at ffff888104975500
[   29.360925]  which belongs to the cache kmalloc-128 of size 128
[   29.361512] The buggy address is located 0 bytes inside of
[   29.361512]  allocated 120-byte region [ffff888104975500, ffff888104975578)
[   29.362020] 
[   29.362115] The buggy address belongs to the physical page:
[   29.362345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104975
[   29.362589] flags: 0x200000000000000(node=0|zone=2)
[   29.362755] page_type: f5(slab)
[   29.362907] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.363326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.363665] page dumped because: kasan: bad access detected
[   29.363924] 
[   29.364016] Memory state around the buggy address:
[   29.364306]  ffff888104975400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.364583]  ffff888104975480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.364871] >ffff888104975500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.365196]                                                                 ^
[   29.365464]  ffff888104975580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.365757]  ffff888104975600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.366027] ==================================================================
[   29.385852] ==================================================================
[   29.386167] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   29.386742] Read of size 121 at addr ffff888104975500 by task kunit_try_catch/333
[   29.387605] 
[   29.387810] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.387877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.387892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.387923] Call Trace:
[   29.387940]  <TASK>
[   29.387955]  dump_stack_lvl+0x73/0xb0
[   29.387986]  print_report+0xd1/0x640
[   29.388011]  ? __virt_addr_valid+0x1db/0x2d0
[   29.388036]  ? copy_user_test_oob+0x604/0x10f0
[   29.388061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.388091]  ? copy_user_test_oob+0x604/0x10f0
[   29.388117]  kasan_report+0x141/0x180
[   29.388142]  ? copy_user_test_oob+0x604/0x10f0
[   29.388288]  kasan_check_range+0x10c/0x1c0
[   29.388322]  __kasan_check_read+0x15/0x20
[   29.388350]  copy_user_test_oob+0x604/0x10f0
[   29.388379]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.388405]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.388483]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.388515]  kunit_try_run_case+0x1a5/0x480
[   29.388542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.388567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.388594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.388622]  ? __kthread_parkme+0x82/0x180
[   29.388645]  ? preempt_count_sub+0x50/0x80
[   29.388671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.388697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.388722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.388748]  kthread+0x337/0x6f0
[   29.388769]  ? trace_preempt_on+0x20/0xc0
[   29.388793]  ? __pfx_kthread+0x10/0x10
[   29.388817]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.388852]  ? calculate_sigpending+0x7b/0xa0
[   29.388883]  ? __pfx_kthread+0x10/0x10
[   29.388906]  ret_from_fork+0x116/0x1d0
[   29.388928]  ? __pfx_kthread+0x10/0x10
[   29.388951]  ret_from_fork_asm+0x1a/0x30
[   29.388984]  </TASK>
[   29.388997] 
[   29.398262] Allocated by task 333:
[   29.398619]  kasan_save_stack+0x45/0x70
[   29.398799]  kasan_save_track+0x18/0x40
[   29.399132]  kasan_save_alloc_info+0x3b/0x50
[   29.399325]  __kasan_kmalloc+0xb7/0xc0
[   29.399524]  __kmalloc_noprof+0x1ca/0x510
[   29.399698]  kunit_kmalloc_array+0x25/0x60
[   29.399917]  copy_user_test_oob+0xab/0x10f0
[   29.400095]  kunit_try_run_case+0x1a5/0x480
[   29.400329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.400952]  kthread+0x337/0x6f0
[   29.401116]  ret_from_fork+0x116/0x1d0
[   29.401336]  ret_from_fork_asm+0x1a/0x30
[   29.401601] 
[   29.401928] The buggy address belongs to the object at ffff888104975500
[   29.401928]  which belongs to the cache kmalloc-128 of size 128
[   29.402481] The buggy address is located 0 bytes inside of
[   29.402481]  allocated 120-byte region [ffff888104975500, ffff888104975578)
[   29.403102] 
[   29.403265] The buggy address belongs to the physical page:
[   29.403582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104975
[   29.404034] flags: 0x200000000000000(node=0|zone=2)
[   29.404399] page_type: f5(slab)
[   29.404631] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.405080] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.405636] page dumped because: kasan: bad access detected
[   29.405942] 
[   29.406030] Memory state around the buggy address:
[   29.406213]  ffff888104975400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.406766]  ffff888104975480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.407051] >ffff888104975500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.407597]                                                                 ^
[   29.407985]  ffff888104975580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.408321]  ffff888104975600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.408733] ==================================================================
[   29.366541] ==================================================================
[   29.366859] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   29.367149] Write of size 121 at addr ffff888104975500 by task kunit_try_catch/333
[   29.367445] 
[   29.367559] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.367605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.367619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.367641] Call Trace:
[   29.367657]  <TASK>
[   29.367672]  dump_stack_lvl+0x73/0xb0
[   29.367700]  print_report+0xd1/0x640
[   29.367724]  ? __virt_addr_valid+0x1db/0x2d0
[   29.367750]  ? copy_user_test_oob+0x557/0x10f0
[   29.367775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.367803]  ? copy_user_test_oob+0x557/0x10f0
[   29.367840]  kasan_report+0x141/0x180
[   29.367865]  ? copy_user_test_oob+0x557/0x10f0
[   29.367895]  kasan_check_range+0x10c/0x1c0
[   29.367922]  __kasan_check_write+0x18/0x20
[   29.367948]  copy_user_test_oob+0x557/0x10f0
[   29.367975]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.367999]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.368035]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.368066]  kunit_try_run_case+0x1a5/0x480
[   29.368095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.368121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.368149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.368187]  ? __kthread_parkme+0x82/0x180
[   29.368209]  ? preempt_count_sub+0x50/0x80
[   29.368235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.368261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.368287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.368311]  kthread+0x337/0x6f0
[   29.368334]  ? trace_preempt_on+0x20/0xc0
[   29.368359]  ? __pfx_kthread+0x10/0x10
[   29.368382]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.368407]  ? calculate_sigpending+0x7b/0xa0
[   29.368435]  ? __pfx_kthread+0x10/0x10
[   29.368458]  ret_from_fork+0x116/0x1d0
[   29.368481]  ? __pfx_kthread+0x10/0x10
[   29.368503]  ret_from_fork_asm+0x1a/0x30
[   29.368536]  </TASK>
[   29.368548] 
[   29.375117] Allocated by task 333:
[   29.375464]  kasan_save_stack+0x45/0x70
[   29.375653]  kasan_save_track+0x18/0x40
[   29.375820]  kasan_save_alloc_info+0x3b/0x50
[   29.376025]  __kasan_kmalloc+0xb7/0xc0
[   29.376209]  __kmalloc_noprof+0x1ca/0x510
[   29.376352]  kunit_kmalloc_array+0x25/0x60
[   29.376498]  copy_user_test_oob+0xab/0x10f0
[   29.376646]  kunit_try_run_case+0x1a5/0x480
[   29.376799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.377072]  kthread+0x337/0x6f0
[   29.377312]  ret_from_fork+0x116/0x1d0
[   29.377507]  ret_from_fork_asm+0x1a/0x30
[   29.377716] 
[   29.377800] The buggy address belongs to the object at ffff888104975500
[   29.377800]  which belongs to the cache kmalloc-128 of size 128
[   29.378354] The buggy address is located 0 bytes inside of
[   29.378354]  allocated 120-byte region [ffff888104975500, ffff888104975578)
[   29.378720] 
[   29.378790] The buggy address belongs to the physical page:
[   29.378977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104975
[   29.379259] flags: 0x200000000000000(node=0|zone=2)
[   29.379489] page_type: f5(slab)
[   29.379654] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.380248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.380592] page dumped because: kasan: bad access detected
[   29.380851] 
[   29.380950] Memory state around the buggy address:
[   29.381876]  ffff888104975400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.383168]  ffff888104975480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.383458] >ffff888104975500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.383672]                                                                 ^
[   29.383923]  ffff888104975580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.384646]  ffff888104975600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.385129] ==================================================================
[   29.332530] ==================================================================
[   29.332820] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   29.333078] Write of size 121 at addr ffff888104975500 by task kunit_try_catch/333
[   29.333331] 
[   29.333518] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.333569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.333584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.333608] Call Trace:
[   29.333623]  <TASK>
[   29.333640]  dump_stack_lvl+0x73/0xb0
[   29.333669]  print_report+0xd1/0x640
[   29.333693]  ? __virt_addr_valid+0x1db/0x2d0
[   29.333719]  ? copy_user_test_oob+0x3fd/0x10f0
[   29.333743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.333772]  ? copy_user_test_oob+0x3fd/0x10f0
[   29.333798]  kasan_report+0x141/0x180
[   29.333823]  ? copy_user_test_oob+0x3fd/0x10f0
[   29.333865]  kasan_check_range+0x10c/0x1c0
[   29.333890]  __kasan_check_write+0x18/0x20
[   29.333916]  copy_user_test_oob+0x3fd/0x10f0
[   29.333944]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.333969]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.334005]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.334035]  kunit_try_run_case+0x1a5/0x480
[   29.334062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.334087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.334114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.334140]  ? __kthread_parkme+0x82/0x180
[   29.334162]  ? preempt_count_sub+0x50/0x80
[   29.334186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.334212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.334238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.334264]  kthread+0x337/0x6f0
[   29.334287]  ? trace_preempt_on+0x20/0xc0
[   29.334311]  ? __pfx_kthread+0x10/0x10
[   29.334335]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.334369]  ? calculate_sigpending+0x7b/0xa0
[   29.334395]  ? __pfx_kthread+0x10/0x10
[   29.334418]  ret_from_fork+0x116/0x1d0
[   29.334440]  ? __pfx_kthread+0x10/0x10
[   29.334462]  ret_from_fork_asm+0x1a/0x30
[   29.334495]  </TASK>
[   29.334508] 
[   29.341351] Allocated by task 333:
[   29.341500]  kasan_save_stack+0x45/0x70
[   29.341700]  kasan_save_track+0x18/0x40
[   29.341860]  kasan_save_alloc_info+0x3b/0x50
[   29.342073]  __kasan_kmalloc+0xb7/0xc0
[   29.342273]  __kmalloc_noprof+0x1ca/0x510
[   29.342462]  kunit_kmalloc_array+0x25/0x60
[   29.342633]  copy_user_test_oob+0xab/0x10f0
[   29.342843]  kunit_try_run_case+0x1a5/0x480
[   29.343023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.343264]  kthread+0x337/0x6f0
[   29.343402]  ret_from_fork+0x116/0x1d0
[   29.343536]  ret_from_fork_asm+0x1a/0x30
[   29.343683] 
[   29.343779] The buggy address belongs to the object at ffff888104975500
[   29.343779]  which belongs to the cache kmalloc-128 of size 128
[   29.344329] The buggy address is located 0 bytes inside of
[   29.344329]  allocated 120-byte region [ffff888104975500, ffff888104975578)
[   29.344935] 
[   29.345027] The buggy address belongs to the physical page:
[   29.345299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104975
[   29.345606] flags: 0x200000000000000(node=0|zone=2)
[   29.345816] page_type: f5(slab)
[   29.345960] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.346417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.346648] page dumped because: kasan: bad access detected
[   29.346821] 
[   29.346927] Memory state around the buggy address:
[   29.347153]  ffff888104975400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.347578]  ffff888104975480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.347800] >ffff888104975500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.348032]                                                                 ^
[   29.348453]  ffff888104975580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.348775]  ffff888104975600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.349107] ==================================================================