Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   64.917628] ==================================================================
[   64.924535] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   64.931559] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   64.939024] 
[   64.940510] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   64.940571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.940590] Hardware name: WinLink E850-96 board (DT)
[   64.940612] Call trace:
[   64.940626]  show_stack+0x20/0x38 (C)
[   64.940665]  dump_stack_lvl+0x8c/0xd0
[   64.940703]  print_report+0x118/0x608
[   64.940739]  kasan_report+0xdc/0x128
[   64.940775]  kasan_check_range+0x100/0x1a8
[   64.940813]  __kasan_check_read+0x20/0x30
[   64.940843]  copy_user_test_oob+0x728/0xec8
[   64.940877]  kunit_try_run_case+0x170/0x3f0
[   64.940913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.940954]  kthread+0x328/0x630
[   64.940986]  ret_from_fork+0x10/0x20
[   64.941024] 
[   65.006646] Allocated by task 332:
[   65.010031]  kasan_save_stack+0x3c/0x68
[   65.013849]  kasan_save_track+0x20/0x40
[   65.017668]  kasan_save_alloc_info+0x40/0x58
[   65.021922]  __kasan_kmalloc+0xd4/0xd8
[   65.025656]  __kmalloc_noprof+0x198/0x4c8
[   65.029648]  kunit_kmalloc_array+0x34/0x88
[   65.033727]  copy_user_test_oob+0xac/0xec8
[   65.037807]  kunit_try_run_case+0x170/0x3f0
[   65.041974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.047442]  kthread+0x328/0x630
[   65.050654]  ret_from_fork+0x10/0x20
[   65.054213] 
[   65.055690] The buggy address belongs to the object at ffff000800db1a00
[   65.055690]  which belongs to the cache kmalloc-128 of size 128
[   65.068190] The buggy address is located 0 bytes inside of
[   65.068190]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.080602] 
[   65.082080] The buggy address belongs to the physical page:
[   65.087638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   65.095622] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.103260] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.110202] page_type: f5(slab)
[   65.113338] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.121061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.128786] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.136597] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.144410] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   65.152222] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.160027] page dumped because: kasan: bad access detected
[   65.165583] 
[   65.167058] Memory state around the buggy address:
[   65.171839]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.179042]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.186247] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.193447]                                                                 ^
[   65.200569]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.207774]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.214974] ==================================================================
[   65.527348] ==================================================================
[   65.534418] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   65.541445] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   65.548911] 
[   65.550396] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   65.550452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.550472] Hardware name: WinLink E850-96 board (DT)
[   65.550493] Call trace:
[   65.550508]  show_stack+0x20/0x38 (C)
[   65.550542]  dump_stack_lvl+0x8c/0xd0
[   65.550581]  print_report+0x118/0x608
[   65.550616]  kasan_report+0xdc/0x128
[   65.550652]  kasan_check_range+0x100/0x1a8
[   65.550688]  __kasan_check_read+0x20/0x30
[   65.550717]  copy_user_test_oob+0x3c8/0xec8
[   65.550750]  kunit_try_run_case+0x170/0x3f0
[   65.550785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.550824]  kthread+0x328/0x630
[   65.550854]  ret_from_fork+0x10/0x20
[   65.550890] 
[   65.616531] Allocated by task 332:
[   65.619916]  kasan_save_stack+0x3c/0x68
[   65.623736]  kasan_save_track+0x20/0x40
[   65.627555]  kasan_save_alloc_info+0x40/0x58
[   65.631809]  __kasan_kmalloc+0xd4/0xd8
[   65.635542]  __kmalloc_noprof+0x198/0x4c8
[   65.639536]  kunit_kmalloc_array+0x34/0x88
[   65.643614]  copy_user_test_oob+0xac/0xec8
[   65.647694]  kunit_try_run_case+0x170/0x3f0
[   65.651860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.657329]  kthread+0x328/0x630
[   65.660541]  ret_from_fork+0x10/0x20
[   65.664100] 
[   65.665577] The buggy address belongs to the object at ffff000800db1a00
[   65.665577]  which belongs to the cache kmalloc-128 of size 128
[   65.678077] The buggy address is located 0 bytes inside of
[   65.678077]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.690488] 
[   65.691965] The buggy address belongs to the physical page:
[   65.697523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   65.705507] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.713145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.720090] page_type: f5(slab)
[   65.723226] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.730946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.738673] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.746484] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.754297] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   65.762109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.769914] page dumped because: kasan: bad access detected
[   65.775469] 
[   65.776946] Memory state around the buggy address:
[   65.781727]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.788928]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.796135] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.803334]                                                                 ^
[   65.810456]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.817660]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.824861] ==================================================================
[   65.832180] ==================================================================
[   65.839274] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   65.846302] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   65.853854] 
[   65.855339] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   65.855391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.855407] Hardware name: WinLink E850-96 board (DT)
[   65.855431] Call trace:
[   65.855447]  show_stack+0x20/0x38 (C)
[   65.855483]  dump_stack_lvl+0x8c/0xd0
[   65.855517]  print_report+0x118/0x608
[   65.855554]  kasan_report+0xdc/0x128
[   65.855588]  kasan_check_range+0x100/0x1a8
[   65.855625]  __kasan_check_write+0x20/0x30
[   65.855654]  copy_user_test_oob+0x434/0xec8
[   65.855689]  kunit_try_run_case+0x170/0x3f0
[   65.855727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.855764]  kthread+0x328/0x630
[   65.855791]  ret_from_fork+0x10/0x20
[   65.855828] 
[   65.921561] Allocated by task 332:
[   65.924946]  kasan_save_stack+0x3c/0x68
[   65.928766]  kasan_save_track+0x20/0x40
[   65.932585]  kasan_save_alloc_info+0x40/0x58
[   65.936840]  __kasan_kmalloc+0xd4/0xd8
[   65.940573]  __kmalloc_noprof+0x198/0x4c8
[   65.944564]  kunit_kmalloc_array+0x34/0x88
[   65.948644]  copy_user_test_oob+0xac/0xec8
[   65.952724]  kunit_try_run_case+0x170/0x3f0
[   65.956891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.962359]  kthread+0x328/0x630
[   65.965571]  ret_from_fork+0x10/0x20
[   65.969130] 
[   65.970605] The buggy address belongs to the object at ffff000800db1a00
[   65.970605]  which belongs to the cache kmalloc-128 of size 128
[   65.983107] The buggy address is located 0 bytes inside of
[   65.983107]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.995518] 
[   65.996996] The buggy address belongs to the physical page:
[   66.002553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   66.010536] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.018175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.025119] page_type: f5(slab)
[   66.028256] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.035976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.043702] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.051514] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.059327] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   66.067139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.074944] page dumped because: kasan: bad access detected
[   66.080499] 
[   66.081977] Memory state around the buggy address:
[   66.086758]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.093958]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.101164] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.108364]                                                                 ^
[   66.115486]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.122691]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.129891] ==================================================================
[   66.137286] ==================================================================
[   66.144306] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   66.151333] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   66.158797] 
[   66.160279] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   66.160333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.160353] Hardware name: WinLink E850-96 board (DT)
[   66.160374] Call trace:
[   66.160390]  show_stack+0x20/0x38 (C)
[   66.160426]  dump_stack_lvl+0x8c/0xd0
[   66.160463]  print_report+0x118/0x608
[   66.160497]  kasan_report+0xdc/0x128
[   66.160532]  kasan_check_range+0x100/0x1a8
[   66.160567]  __kasan_check_read+0x20/0x30
[   66.160597]  copy_user_test_oob+0x4a0/0xec8
[   66.160632]  kunit_try_run_case+0x170/0x3f0
[   66.160666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.160703]  kthread+0x328/0x630
[   66.160732]  ret_from_fork+0x10/0x20
[   66.160767] 
[   66.226418] Allocated by task 332:
[   66.229804]  kasan_save_stack+0x3c/0x68
[   66.233622]  kasan_save_track+0x20/0x40
[   66.237442]  kasan_save_alloc_info+0x40/0x58
[   66.241695]  __kasan_kmalloc+0xd4/0xd8
[   66.245428]  __kmalloc_noprof+0x198/0x4c8
[   66.249421]  kunit_kmalloc_array+0x34/0x88
[   66.253501]  copy_user_test_oob+0xac/0xec8
[   66.257581]  kunit_try_run_case+0x170/0x3f0
[   66.261747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.267216]  kthread+0x328/0x630
[   66.270428]  ret_from_fork+0x10/0x20
[   66.273987] 
[   66.275461] The buggy address belongs to the object at ffff000800db1a00
[   66.275461]  which belongs to the cache kmalloc-128 of size 128
[   66.287962] The buggy address is located 0 bytes inside of
[   66.287962]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   66.300375] 
[   66.301852] The buggy address belongs to the physical page:
[   66.307409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   66.315392] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.323033] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.329975] page_type: f5(slab)
[   66.333112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.340833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.348559] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.356370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.364183] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   66.371995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.379801] page dumped because: kasan: bad access detected
[   66.385356] 
[   66.386832] Memory state around the buggy address:
[   66.391612]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.398815]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.406020] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.413220]                                                                 ^
[   66.420342]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.427547]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.434748] ==================================================================
[   64.607043] ==================================================================
[   64.619503] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   64.626531] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   64.634080] 
[   64.635568] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   64.635622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.635641] Hardware name: WinLink E850-96 board (DT)
[   64.635662] Call trace:
[   64.635679]  show_stack+0x20/0x38 (C)
[   64.635721]  dump_stack_lvl+0x8c/0xd0
[   64.635761]  print_report+0x118/0x608
[   64.635800]  kasan_report+0xdc/0x128
[   64.635836]  kasan_check_range+0x100/0x1a8
[   64.635874]  __kasan_check_write+0x20/0x30
[   64.635904]  copy_user_test_oob+0x234/0xec8
[   64.635939]  kunit_try_run_case+0x170/0x3f0
[   64.635979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.636017]  kthread+0x328/0x630
[   64.636047]  ret_from_fork+0x10/0x20
[   64.636083] 
[   64.701790] Allocated by task 332:
[   64.705176]  kasan_save_stack+0x3c/0x68
[   64.708992]  kasan_save_track+0x20/0x40
[   64.712812]  kasan_save_alloc_info+0x40/0x58
[   64.717065]  __kasan_kmalloc+0xd4/0xd8
[   64.720799]  __kmalloc_noprof+0x198/0x4c8
[   64.724791]  kunit_kmalloc_array+0x34/0x88
[   64.728871]  copy_user_test_oob+0xac/0xec8
[   64.732952]  kunit_try_run_case+0x170/0x3f0
[   64.737117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.742586]  kthread+0x328/0x630
[   64.745798]  ret_from_fork+0x10/0x20
[   64.749356] 
[   64.750833] The buggy address belongs to the object at ffff000800db1a00
[   64.750833]  which belongs to the cache kmalloc-128 of size 128
[   64.763334] The buggy address is located 0 bytes inside of
[   64.763334]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   64.775745] 
[   64.777225] The buggy address belongs to the physical page:
[   64.782781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   64.790764] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.798403] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.805348] page_type: f5(slab)
[   64.808484] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.816203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.823931] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.831741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.839554] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   64.847365] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.855171] page dumped because: kasan: bad access detected
[   64.860726] 
[   64.862202] Memory state around the buggy address:
[   64.866983]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.874185]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.881391] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.888590]                                                                 ^
[   64.895712]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.902917]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.910121] ==================================================================
[   65.222469] ==================================================================
[   65.229394] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   65.236416] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   65.243967] 
[   65.245454] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   65.245518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.245538] Hardware name: WinLink E850-96 board (DT)
[   65.245562] Call trace:
[   65.245577]  show_stack+0x20/0x38 (C)
[   65.245613]  dump_stack_lvl+0x8c/0xd0
[   65.245650]  print_report+0x118/0x608
[   65.245687]  kasan_report+0xdc/0x128
[   65.245725]  kasan_check_range+0x100/0x1a8
[   65.245764]  __kasan_check_write+0x20/0x30
[   65.245797]  copy_user_test_oob+0x35c/0xec8
[   65.245831]  kunit_try_run_case+0x170/0x3f0
[   65.245867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.245908]  kthread+0x328/0x630
[   65.245937]  ret_from_fork+0x10/0x20
[   65.245974] 
[   65.311676] Allocated by task 332:
[   65.315061]  kasan_save_stack+0x3c/0x68
[   65.318879]  kasan_save_track+0x20/0x40
[   65.322698]  kasan_save_alloc_info+0x40/0x58
[   65.326952]  __kasan_kmalloc+0xd4/0xd8
[   65.330686]  __kmalloc_noprof+0x198/0x4c8
[   65.334678]  kunit_kmalloc_array+0x34/0x88
[   65.338757]  copy_user_test_oob+0xac/0xec8
[   65.342837]  kunit_try_run_case+0x170/0x3f0
[   65.347004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.352472]  kthread+0x328/0x630
[   65.355684]  ret_from_fork+0x10/0x20
[   65.359243] 
[   65.360720] The buggy address belongs to the object at ffff000800db1a00
[   65.360720]  which belongs to the cache kmalloc-128 of size 128
[   65.373221] The buggy address is located 0 bytes inside of
[   65.373221]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.385632] 
[   65.387110] The buggy address belongs to the physical page:
[   65.392668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   65.400651] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.408288] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.415232] page_type: f5(slab)
[   65.418369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.426090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.433817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.441627] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.449440] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   65.457252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.465057] page dumped because: kasan: bad access detected
[   65.470613] 
[   65.472088] Memory state around the buggy address:
[   65.476870]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.484072]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.491277] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.498477]                                                                 ^
[   65.505599]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.512804]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.520007] ==================================================================

[   30.663568] ==================================================================
[   30.663805] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   30.664009] Read of size 121 at addr fff00000c6431d00 by task kunit_try_catch/285
[   30.664154] 
[   30.664266] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.664619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.664836] Hardware name: linux,dummy-virt (DT)
[   30.665067] Call trace:
[   30.665240]  show_stack+0x20/0x38 (C)
[   30.665378]  dump_stack_lvl+0x8c/0xd0
[   30.665502]  print_report+0x118/0x608
[   30.665633]  kasan_report+0xdc/0x128
[   30.665960]  kasan_check_range+0x100/0x1a8
[   30.666116]  __kasan_check_read+0x20/0x30
[   30.666343]  copy_user_test_oob+0x728/0xec8
[   30.666488]  kunit_try_run_case+0x170/0x3f0
[   30.666784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.667103]  kthread+0x328/0x630
[   30.667264]  ret_from_fork+0x10/0x20
[   30.667494] 
[   30.667559] Allocated by task 285:
[   30.667642]  kasan_save_stack+0x3c/0x68
[   30.667762]  kasan_save_track+0x20/0x40
[   30.667874]  kasan_save_alloc_info+0x40/0x58
[   30.668092]  __kasan_kmalloc+0xd4/0xd8
[   30.668199]  __kmalloc_noprof+0x198/0x4c8
[   30.668330]  kunit_kmalloc_array+0x34/0x88
[   30.668523]  copy_user_test_oob+0xac/0xec8
[   30.668861]  kunit_try_run_case+0x170/0x3f0
[   30.669020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.669146]  kthread+0x328/0x630
[   30.669329]  ret_from_fork+0x10/0x20
[   30.669445] 
[   30.669505] The buggy address belongs to the object at fff00000c6431d00
[   30.669505]  which belongs to the cache kmalloc-128 of size 128
[   30.669841] The buggy address is located 0 bytes inside of
[   30.669841]  allocated 120-byte region [fff00000c6431d00, fff00000c6431d78)
[   30.670023] 
[   30.670075] The buggy address belongs to the physical page:
[   30.670152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431
[   30.671033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.671554] page_type: f5(slab)
[   30.671675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.671795] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.671903] page dumped because: kasan: bad access detected
[   30.672790] 
[   30.673086] Memory state around the buggy address:
[   30.673216]  fff00000c6431c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.673663]  fff00000c6431c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.674226] >fff00000c6431d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.674333]                                                                 ^
[   30.674439]  fff00000c6431d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.675216]  fff00000c6431e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.675583] ==================================================================
[   30.688039] ==================================================================
[   30.688164] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   30.688285] Write of size 121 at addr fff00000c6431d00 by task kunit_try_catch/285
[   30.688410] 
[   30.688489] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.688688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.688758] Hardware name: linux,dummy-virt (DT)
[   30.688837] Call trace:
[   30.688899]  show_stack+0x20/0x38 (C)
[   30.689044]  dump_stack_lvl+0x8c/0xd0
[   30.689170]  print_report+0x118/0x608
[   30.689301]  kasan_report+0xdc/0x128
[   30.689627]  kasan_check_range+0x100/0x1a8
[   30.689862]  __kasan_check_write+0x20/0x30
[   30.690023]  copy_user_test_oob+0x35c/0xec8
[   30.690173]  kunit_try_run_case+0x170/0x3f0
[   30.690330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.690493]  kthread+0x328/0x630
[   30.690654]  ret_from_fork+0x10/0x20
[   30.690828] 
[   30.690894] Allocated by task 285:
[   30.690995]  kasan_save_stack+0x3c/0x68
[   30.691181]  kasan_save_track+0x20/0x40
[   30.691388]  kasan_save_alloc_info+0x40/0x58
[   30.691566]  __kasan_kmalloc+0xd4/0xd8
[   30.691679]  __kmalloc_noprof+0x198/0x4c8
[   30.691780]  kunit_kmalloc_array+0x34/0x88
[   30.691879]  copy_user_test_oob+0xac/0xec8
[   30.692011]  kunit_try_run_case+0x170/0x3f0
[   30.692121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.692275]  kthread+0x328/0x630
[   30.692380]  ret_from_fork+0x10/0x20
[   30.692475] 
[   30.692562] The buggy address belongs to the object at fff00000c6431d00
[   30.692562]  which belongs to the cache kmalloc-128 of size 128
[   30.692704] The buggy address is located 0 bytes inside of
[   30.692704]  allocated 120-byte region [fff00000c6431d00, fff00000c6431d78)
[   30.692869] 
[   30.692924] The buggy address belongs to the physical page:
[   30.693026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431
[   30.693844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.694093] page_type: f5(slab)
[   30.694686] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.695203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.695645] page dumped because: kasan: bad access detected
[   30.696063] 
[   30.696127] Memory state around the buggy address:
[   30.696600]  fff00000c6431c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.696857]  fff00000c6431c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.697695] >fff00000c6431d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.698176]                                                                 ^
[   30.698379]  fff00000c6431d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.698517]  fff00000c6431e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.698687] ==================================================================
[   30.708082] ==================================================================
[   30.708187] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   30.708294] Write of size 121 at addr fff00000c6431d00 by task kunit_try_catch/285
[   30.708413] 
[   30.708481] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.708673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.708738] Hardware name: linux,dummy-virt (DT)
[   30.708816] Call trace:
[   30.708869]  show_stack+0x20/0x38 (C)
[   30.709825]  dump_stack_lvl+0x8c/0xd0
[   30.709990]  print_report+0x118/0x608
[   30.710104]  kasan_report+0xdc/0x128
[   30.710217]  kasan_check_range+0x100/0x1a8
[   30.710336]  __kasan_check_write+0x20/0x30
[   30.710453]  copy_user_test_oob+0x434/0xec8
[   30.710574]  kunit_try_run_case+0x170/0x3f0
[   30.710694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.710822]  kthread+0x328/0x630
[   30.711031]  ret_from_fork+0x10/0x20
[   30.711214] 
[   30.711271] Allocated by task 285:
[   30.711357]  kasan_save_stack+0x3c/0x68
[   30.713165]  kasan_save_track+0x20/0x40
[   30.713295]  kasan_save_alloc_info+0x40/0x58
[   30.713406]  __kasan_kmalloc+0xd4/0xd8
[   30.713503]  __kmalloc_noprof+0x198/0x4c8
[   30.713608]  kunit_kmalloc_array+0x34/0x88
[   30.713701]  copy_user_test_oob+0xac/0xec8
[   30.713806]  kunit_try_run_case+0x170/0x3f0
[   30.713908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.714061]  kthread+0x328/0x630
[   30.714170]  ret_from_fork+0x10/0x20
[   30.714271] 
[   30.714323] The buggy address belongs to the object at fff00000c6431d00
[   30.714323]  which belongs to the cache kmalloc-128 of size 128
[   30.714474] The buggy address is located 0 bytes inside of
[   30.714474]  allocated 120-byte region [fff00000c6431d00, fff00000c6431d78)
[   30.714636] 
[   30.714685] The buggy address belongs to the physical page:
[   30.714763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431
[   30.714907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.717829] page_type: f5(slab)
[   30.717928] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.718073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.718178] page dumped because: kasan: bad access detected
[   30.718263] 
[   30.718450] Memory state around the buggy address:
[   30.720752]  fff00000c6431c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.720873]  fff00000c6431c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.722254] >fff00000c6431d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.722953]                                                                 ^
[   30.723279]  fff00000c6431d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.724062]  fff00000c6431e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.724711] ==================================================================
[   30.700455] ==================================================================
[   30.700565] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   30.700677] Read of size 121 at addr fff00000c6431d00 by task kunit_try_catch/285
[   30.700796] 
[   30.700863] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.701607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.701689] Hardware name: linux,dummy-virt (DT)
[   30.701775] Call trace:
[   30.701834]  show_stack+0x20/0x38 (C)
[   30.701981]  dump_stack_lvl+0x8c/0xd0
[   30.702101]  print_report+0x118/0x608
[   30.702220]  kasan_report+0xdc/0x128
[   30.702347]  kasan_check_range+0x100/0x1a8
[   30.702475]  __kasan_check_read+0x20/0x30
[   30.702763]  copy_user_test_oob+0x3c8/0xec8
[   30.702925]  kunit_try_run_case+0x170/0x3f0
[   30.703318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.703472]  kthread+0x328/0x630
[   30.703589]  ret_from_fork+0x10/0x20
[   30.703716] 
[   30.703770] Allocated by task 285:
[   30.703854]  kasan_save_stack+0x3c/0x68
[   30.703987]  kasan_save_track+0x20/0x40
[   30.704104]  kasan_save_alloc_info+0x40/0x58
[   30.704221]  __kasan_kmalloc+0xd4/0xd8
[   30.704325]  __kmalloc_noprof+0x198/0x4c8
[   30.704437]  kunit_kmalloc_array+0x34/0x88
[   30.704537]  copy_user_test_oob+0xac/0xec8
[   30.704633]  kunit_try_run_case+0x170/0x3f0
[   30.704729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.704839]  kthread+0x328/0x630
[   30.704929]  ret_from_fork+0x10/0x20
[   30.705054] 
[   30.705138] The buggy address belongs to the object at fff00000c6431d00
[   30.705138]  which belongs to the cache kmalloc-128 of size 128
[   30.705296] The buggy address is located 0 bytes inside of
[   30.705296]  allocated 120-byte region [fff00000c6431d00, fff00000c6431d78)
[   30.705497] 
[   30.705559] The buggy address belongs to the physical page:
[   30.705637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431
[   30.705769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.705902] page_type: f5(slab)
[   30.706018] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.706149] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.706250] page dumped because: kasan: bad access detected
[   30.706336] 
[   30.706388] Memory state around the buggy address:
[   30.706474]  fff00000c6431c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.706590]  fff00000c6431c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.706698] >fff00000c6431d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.706801]                                                                 ^
[   30.707232]  fff00000c6431d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.707373]  fff00000c6431e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.707486] ==================================================================
[   30.726419] ==================================================================
[   30.727717] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   30.727870] Read of size 121 at addr fff00000c6431d00 by task kunit_try_catch/285
[   30.728036] 
[   30.728370] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.729753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.730002] Hardware name: linux,dummy-virt (DT)
[   30.730105] Call trace:
[   30.730254]  show_stack+0x20/0x38 (C)
[   30.730404]  dump_stack_lvl+0x8c/0xd0
[   30.730589]  print_report+0x118/0x608
[   30.730709]  kasan_report+0xdc/0x128
[   30.730830]  kasan_check_range+0x100/0x1a8
[   30.730980]  __kasan_check_read+0x20/0x30
[   30.731263]  copy_user_test_oob+0x4a0/0xec8
[   30.731651]  kunit_try_run_case+0x170/0x3f0
[   30.731871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.732035]  kthread+0x328/0x630
[   30.732158]  ret_from_fork+0x10/0x20
[   30.732422] 
[   30.732788] Allocated by task 285:
[   30.732887]  kasan_save_stack+0x3c/0x68
[   30.733530]  kasan_save_track+0x20/0x40
[   30.733846]  kasan_save_alloc_info+0x40/0x58
[   30.733999]  __kasan_kmalloc+0xd4/0xd8
[   30.734434]  __kmalloc_noprof+0x198/0x4c8
[   30.734553]  kunit_kmalloc_array+0x34/0x88
[   30.734652]  copy_user_test_oob+0xac/0xec8
[   30.734751]  kunit_try_run_case+0x170/0x3f0
[   30.734846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.735970]  kthread+0x328/0x630
[   30.736085]  ret_from_fork+0x10/0x20
[   30.736199] 
[   30.736251] The buggy address belongs to the object at fff00000c6431d00
[   30.736251]  which belongs to the cache kmalloc-128 of size 128
[   30.736396] The buggy address is located 0 bytes inside of
[   30.736396]  allocated 120-byte region [fff00000c6431d00, fff00000c6431d78)
[   30.737270] 
[   30.737343] The buggy address belongs to the physical page:
[   30.737438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431
[   30.737591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.737718] page_type: f5(slab)
[   30.737888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.738049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.738252] page dumped because: kasan: bad access detected
[   30.739342] 
[   30.739445] Memory state around the buggy address:
[   30.739537]  fff00000c6431c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.740149]  fff00000c6431c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.740274] >fff00000c6431d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.740375]                                                                 ^
[   30.740493]  fff00000c6431d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.740641]  fff00000c6431e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.740742] ==================================================================
[   30.641727] ==================================================================
[   30.641928] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   30.642129] Write of size 121 at addr fff00000c6431d00 by task kunit_try_catch/285
[   30.642257] 
[   30.642351] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.642561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.642629] Hardware name: linux,dummy-virt (DT)
[   30.642715] Call trace:
[   30.642794]  show_stack+0x20/0x38 (C)
[   30.642987]  dump_stack_lvl+0x8c/0xd0
[   30.643147]  print_report+0x118/0x608
[   30.643447]  kasan_report+0xdc/0x128
[   30.643606]  kasan_check_range+0x100/0x1a8
[   30.643753]  __kasan_check_write+0x20/0x30
[   30.643897]  copy_user_test_oob+0x234/0xec8
[   30.644098]  kunit_try_run_case+0x170/0x3f0
[   30.644281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.644437]  kthread+0x328/0x630
[   30.644567]  ret_from_fork+0x10/0x20
[   30.644697] 
[   30.644769] Allocated by task 285:
[   30.644870]  kasan_save_stack+0x3c/0x68
[   30.645154]  kasan_save_track+0x20/0x40
[   30.645277]  kasan_save_alloc_info+0x40/0x58
[   30.645502]  __kasan_kmalloc+0xd4/0xd8
[   30.645689]  __kmalloc_noprof+0x198/0x4c8
[   30.646668]  kunit_kmalloc_array+0x34/0x88
[   30.647033]  copy_user_test_oob+0xac/0xec8
[   30.647149]  kunit_try_run_case+0x170/0x3f0
[   30.647272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.647402]  kthread+0x328/0x630
[   30.647496]  ret_from_fork+0x10/0x20
[   30.647600] 
[   30.647970] The buggy address belongs to the object at fff00000c6431d00
[   30.647970]  which belongs to the cache kmalloc-128 of size 128
[   30.648608] The buggy address is located 0 bytes inside of
[   30.648608]  allocated 120-byte region [fff00000c6431d00, fff00000c6431d78)
[   30.648773] 
[   30.648868] The buggy address belongs to the physical page:
[   30.648993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431
[   30.649281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.649474] page_type: f5(slab)
[   30.649627] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.649970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.650093] page dumped because: kasan: bad access detected
[   30.650191] 
[   30.650503] Memory state around the buggy address:
[   30.650922]  fff00000c6431c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.651068]  fff00000c6431c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.651551] >fff00000c6431d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.651663]                                                                 ^
[   30.651793]  fff00000c6431d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652129]  fff00000c6431e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652422] ==================================================================

[   30.757031] ==================================================================
[   30.757827] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   30.758052] Write of size 121 at addr fff00000c7772a00 by task kunit_try_catch/285
[   30.758408] 
[   30.758534] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.758762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.758873] Hardware name: linux,dummy-virt (DT)
[   30.759060] Call trace:
[   30.759198]  show_stack+0x20/0x38 (C)
[   30.759451]  dump_stack_lvl+0x8c/0xd0
[   30.759620]  print_report+0x118/0x608
[   30.759756]  kasan_report+0xdc/0x128
[   30.759909]  kasan_check_range+0x100/0x1a8
[   30.760033]  __kasan_check_write+0x20/0x30
[   30.760167]  copy_user_test_oob+0x234/0xec8
[   30.760386]  kunit_try_run_case+0x170/0x3f0
[   30.760607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.760951]  kthread+0x328/0x630
[   30.761116]  ret_from_fork+0x10/0x20
[   30.761280] 
[   30.761340] Allocated by task 285:
[   30.761522]  kasan_save_stack+0x3c/0x68
[   30.761647]  kasan_save_track+0x20/0x40
[   30.761761]  kasan_save_alloc_info+0x40/0x58
[   30.761898]  __kasan_kmalloc+0xd4/0xd8
[   30.762001]  __kmalloc_noprof+0x198/0x4c8
[   30.762111]  kunit_kmalloc_array+0x34/0x88
[   30.762207]  copy_user_test_oob+0xac/0xec8
[   30.762310]  kunit_try_run_case+0x170/0x3f0
[   30.762410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.762527]  kthread+0x328/0x630
[   30.762657]  ret_from_fork+0x10/0x20
[   30.762753] 
[   30.762806] The buggy address belongs to the object at fff00000c7772a00
[   30.762806]  which belongs to the cache kmalloc-128 of size 128
[   30.762968] The buggy address is located 0 bytes inside of
[   30.762968]  allocated 120-byte region [fff00000c7772a00, fff00000c7772a78)
[   30.763125] 
[   30.763235] The buggy address belongs to the physical page:
[   30.763334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   30.763565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.763890] page_type: f5(slab)
[   30.764015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.764162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.764270] page dumped because: kasan: bad access detected
[   30.764595] 
[   30.764685] Memory state around the buggy address:
[   30.764777]  fff00000c7772900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.764911]  fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.765043] >fff00000c7772a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.765681]                                                                 ^
[   30.767024]  fff00000c7772a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.767151]  fff00000c7772b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.767230] ==================================================================
[   30.820378] ==================================================================
[   30.820552] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   30.820781] Read of size 121 at addr fff00000c7772a00 by task kunit_try_catch/285
[   30.820962] 
[   30.821092] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.821710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.821817] Hardware name: linux,dummy-virt (DT)
[   30.821922] Call trace:
[   30.821981]  show_stack+0x20/0x38 (C)
[   30.822103]  dump_stack_lvl+0x8c/0xd0
[   30.822233]  print_report+0x118/0x608
[   30.822358]  kasan_report+0xdc/0x128
[   30.822530]  kasan_check_range+0x100/0x1a8
[   30.822663]  __kasan_check_read+0x20/0x30
[   30.822801]  copy_user_test_oob+0x3c8/0xec8
[   30.823223]  kunit_try_run_case+0x170/0x3f0
[   30.823350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.823525]  kthread+0x328/0x630
[   30.823628]  ret_from_fork+0x10/0x20
[   30.823755] 
[   30.823813] Allocated by task 285:
[   30.823915]  kasan_save_stack+0x3c/0x68
[   30.824190]  kasan_save_track+0x20/0x40
[   30.824303]  kasan_save_alloc_info+0x40/0x58
[   30.824589]  __kasan_kmalloc+0xd4/0xd8
[   30.824694]  __kmalloc_noprof+0x198/0x4c8
[   30.824789]  kunit_kmalloc_array+0x34/0x88
[   30.824926]  copy_user_test_oob+0xac/0xec8
[   30.825054]  kunit_try_run_case+0x170/0x3f0
[   30.825168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.825483]  kthread+0x328/0x630
[   30.825767]  ret_from_fork+0x10/0x20
[   30.826102] 
[   30.826191] The buggy address belongs to the object at fff00000c7772a00
[   30.826191]  which belongs to the cache kmalloc-128 of size 128
[   30.826501] The buggy address is located 0 bytes inside of
[   30.826501]  allocated 120-byte region [fff00000c7772a00, fff00000c7772a78)
[   30.826754] 
[   30.826809] The buggy address belongs to the physical page:
[   30.826908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   30.827071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.827189] page_type: f5(slab)
[   30.827363] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.827526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.827720] page dumped because: kasan: bad access detected
[   30.827812] 
[   30.827920] Memory state around the buggy address:
[   30.828008]  fff00000c7772900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.828119]  fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.828234] >fff00000c7772a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.828385]                                                                 ^
[   30.828508]  fff00000c7772a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.828625]  fff00000c7772b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.829100] ==================================================================
[   30.806373] ==================================================================
[   30.806511] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   30.806632] Write of size 121 at addr fff00000c7772a00 by task kunit_try_catch/285
[   30.806758] 
[   30.806862] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.807068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.807140] Hardware name: linux,dummy-virt (DT)
[   30.807217] Call trace:
[   30.807274]  show_stack+0x20/0x38 (C)
[   30.807401]  dump_stack_lvl+0x8c/0xd0
[   30.807532]  print_report+0x118/0x608
[   30.807882]  kasan_report+0xdc/0x128
[   30.808217]  kasan_check_range+0x100/0x1a8
[   30.809482]  __kasan_check_write+0x20/0x30
[   30.809624]  copy_user_test_oob+0x35c/0xec8
[   30.810238]  kunit_try_run_case+0x170/0x3f0
[   30.810419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.810693]  kthread+0x328/0x630
[   30.810856]  ret_from_fork+0x10/0x20
[   30.811097] 
[   30.811153] Allocated by task 285:
[   30.811230]  kasan_save_stack+0x3c/0x68
[   30.811333]  kasan_save_track+0x20/0x40
[   30.811436]  kasan_save_alloc_info+0x40/0x58
[   30.811550]  __kasan_kmalloc+0xd4/0xd8
[   30.811652]  __kmalloc_noprof+0x198/0x4c8
[   30.811752]  kunit_kmalloc_array+0x34/0x88
[   30.811890]  copy_user_test_oob+0xac/0xec8
[   30.811997]  kunit_try_run_case+0x170/0x3f0
[   30.812094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.812204]  kthread+0x328/0x630
[   30.812321]  ret_from_fork+0x10/0x20
[   30.812422] 
[   30.812473] The buggy address belongs to the object at fff00000c7772a00
[   30.812473]  which belongs to the cache kmalloc-128 of size 128
[   30.812629] The buggy address is located 0 bytes inside of
[   30.812629]  allocated 120-byte region [fff00000c7772a00, fff00000c7772a78)
[   30.812827] 
[   30.812904] The buggy address belongs to the physical page:
[   30.812991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   30.813336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.813476] page_type: f5(slab)
[   30.813990] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.814159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.814282] page dumped because: kasan: bad access detected
[   30.814573] 
[   30.814688] Memory state around the buggy address:
[   30.814783]  fff00000c7772900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.815225]  fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.815341] >fff00000c7772a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.815597]                                                                 ^
[   30.815892]  fff00000c7772a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.816606]  fff00000c7772b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.816764] ==================================================================
[   30.850548] ==================================================================
[   30.850659] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   30.850877] Read of size 121 at addr fff00000c7772a00 by task kunit_try_catch/285
[   30.851117] 
[   30.851695] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.852829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.853189] Hardware name: linux,dummy-virt (DT)
[   30.853300] Call trace:
[   30.853376]  show_stack+0x20/0x38 (C)
[   30.853518]  dump_stack_lvl+0x8c/0xd0
[   30.854110]  print_report+0x118/0x608
[   30.854239]  kasan_report+0xdc/0x128
[   30.854678]  kasan_check_range+0x100/0x1a8
[   30.855333]  __kasan_check_read+0x20/0x30
[   30.855770]  copy_user_test_oob+0x4a0/0xec8
[   30.856145]  kunit_try_run_case+0x170/0x3f0
[   30.856468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.856933]  kthread+0x328/0x630
[   30.857686]  ret_from_fork+0x10/0x20
[   30.857818] 
[   30.858085] Allocated by task 285:
[   30.858226]  kasan_save_stack+0x3c/0x68
[   30.858932]  kasan_save_track+0x20/0x40
[   30.859059]  kasan_save_alloc_info+0x40/0x58
[   30.859186]  __kasan_kmalloc+0xd4/0xd8
[   30.859298]  __kmalloc_noprof+0x198/0x4c8
[   30.860196]  kunit_kmalloc_array+0x34/0x88
[   30.860302]  copy_user_test_oob+0xac/0xec8
[   30.860405]  kunit_try_run_case+0x170/0x3f0
[   30.861249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.861404]  kthread+0x328/0x630
[   30.861498]  ret_from_fork+0x10/0x20
[   30.861551] 
[   30.861582] The buggy address belongs to the object at fff00000c7772a00
[   30.861582]  which belongs to the cache kmalloc-128 of size 128
[   30.861656] The buggy address is located 0 bytes inside of
[   30.861656]  allocated 120-byte region [fff00000c7772a00, fff00000c7772a78)
[   30.861734] 
[   30.861762] The buggy address belongs to the physical page:
[   30.861808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   30.862707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.863206] page_type: f5(slab)
[   30.863325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.863669] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.864197] page dumped because: kasan: bad access detected
[   30.864295] 
[   30.864344] Memory state around the buggy address:
[   30.865165]  fff00000c7772900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.865654]  fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.865769] >fff00000c7772a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.866016]                                                                 ^
[   30.866162]  fff00000c7772a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866277]  fff00000c7772b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866379] ==================================================================
[   30.831356] ==================================================================
[   30.831607] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   30.831727] Write of size 121 at addr fff00000c7772a00 by task kunit_try_catch/285
[   30.831895] 
[   30.831972] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.832174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.832492] Hardware name: linux,dummy-virt (DT)
[   30.832736] Call trace:
[   30.832802]  show_stack+0x20/0x38 (C)
[   30.832950]  dump_stack_lvl+0x8c/0xd0
[   30.833073]  print_report+0x118/0x608
[   30.833196]  kasan_report+0xdc/0x128
[   30.833909]  kasan_check_range+0x100/0x1a8
[   30.834488]  __kasan_check_write+0x20/0x30
[   30.834831]  copy_user_test_oob+0x434/0xec8
[   30.835299]  kunit_try_run_case+0x170/0x3f0
[   30.835488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.836139]  kthread+0x328/0x630
[   30.836274]  ret_from_fork+0x10/0x20
[   30.836740] 
[   30.836877] Allocated by task 285:
[   30.837313]  kasan_save_stack+0x3c/0x68
[   30.837426]  kasan_save_track+0x20/0x40
[   30.837882]  kasan_save_alloc_info+0x40/0x58
[   30.838146]  __kasan_kmalloc+0xd4/0xd8
[   30.838307]  __kmalloc_noprof+0x198/0x4c8
[   30.838799]  kunit_kmalloc_array+0x34/0x88
[   30.839260]  copy_user_test_oob+0xac/0xec8
[   30.839398]  kunit_try_run_case+0x170/0x3f0
[   30.839912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.840425]  kthread+0x328/0x630
[   30.840574]  ret_from_fork+0x10/0x20
[   30.840830] 
[   30.840955] The buggy address belongs to the object at fff00000c7772a00
[   30.840955]  which belongs to the cache kmalloc-128 of size 128
[   30.841103] The buggy address is located 0 bytes inside of
[   30.841103]  allocated 120-byte region [fff00000c7772a00, fff00000c7772a78)
[   30.841492] 
[   30.842067] The buggy address belongs to the physical page:
[   30.842389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   30.842698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.843004] page_type: f5(slab)
[   30.843166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.843323] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.843758] page dumped because: kasan: bad access detected
[   30.844184] 
[   30.844289] Memory state around the buggy address:
[   30.844378]  fff00000c7772900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.844502]  fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.844613] >fff00000c7772a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.844734]                                                                 ^
[   30.844886]  fff00000c7772a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.845251]  fff00000c7772b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.845820] ==================================================================
[   30.776794] ==================================================================
[   30.776946] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   30.777062] Read of size 121 at addr fff00000c7772a00 by task kunit_try_catch/285
[   30.777223] 
[   30.777306] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.777596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.777678] Hardware name: linux,dummy-virt (DT)
[   30.777772] Call trace:
[   30.777881]  show_stack+0x20/0x38 (C)
[   30.778017]  dump_stack_lvl+0x8c/0xd0
[   30.778219]  print_report+0x118/0x608
[   30.778318]  kasan_report+0xdc/0x128
[   30.778711]  kasan_check_range+0x100/0x1a8
[   30.779339]  __kasan_check_read+0x20/0x30
[   30.779516]  copy_user_test_oob+0x728/0xec8
[   30.779879]  kunit_try_run_case+0x170/0x3f0
[   30.780831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.781099]  kthread+0x328/0x630
[   30.781801]  ret_from_fork+0x10/0x20
[   30.781971] 
[   30.782122] Allocated by task 285:
[   30.782229]  kasan_save_stack+0x3c/0x68
[   30.782510]  kasan_save_track+0x20/0x40
[   30.782634]  kasan_save_alloc_info+0x40/0x58
[   30.782779]  __kasan_kmalloc+0xd4/0xd8
[   30.782923]  __kmalloc_noprof+0x198/0x4c8
[   30.783028]  kunit_kmalloc_array+0x34/0x88
[   30.783129]  copy_user_test_oob+0xac/0xec8
[   30.783223]  kunit_try_run_case+0x170/0x3f0
[   30.783377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.783535]  kthread+0x328/0x630
[   30.783719]  ret_from_fork+0x10/0x20
[   30.783866] 
[   30.783924] The buggy address belongs to the object at fff00000c7772a00
[   30.783924]  which belongs to the cache kmalloc-128 of size 128
[   30.784067] The buggy address is located 0 bytes inside of
[   30.784067]  allocated 120-byte region [fff00000c7772a00, fff00000c7772a78)
[   30.784218] 
[   30.784269] The buggy address belongs to the physical page:
[   30.784347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   30.784484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.784825] page_type: f5(slab)
[   30.784957] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.785294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.785445] page dumped because: kasan: bad access detected
[   30.785559] 
[   30.785627] Memory state around the buggy address:
[   30.785857]  fff00000c7772900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.785979]  fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.786108] >fff00000c7772a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.786224]                                                                 ^
[   30.786868]  fff00000c7772a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.787155]  fff00000c7772b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.787517] ==================================================================

[   26.886032] ==================================================================
[   26.886789] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   26.887411] Read of size 121 at addr ffff8881039c8700 by task kunit_try_catch/303
[   26.888079] 
[   26.888398] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.888551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.888596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.888664] Call Trace:
[   26.888721]  <TASK>
[   26.888777]  dump_stack_lvl+0x73/0xb0
[   26.888878]  print_report+0xd1/0x650
[   26.888963]  ? __virt_addr_valid+0x1db/0x2d0
[   26.889043]  ? copy_user_test_oob+0x604/0x10f0
[   26.889118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.889199]  ? copy_user_test_oob+0x604/0x10f0
[   26.889330]  kasan_report+0x141/0x180
[   26.889407]  ? copy_user_test_oob+0x604/0x10f0
[   26.889519]  kasan_check_range+0x10c/0x1c0
[   26.889609]  __kasan_check_read+0x15/0x20
[   26.889698]  copy_user_test_oob+0x604/0x10f0
[   26.889786]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.889866]  ? finish_task_switch.isra.0+0x153/0x700
[   26.889947]  ? __switch_to+0x47/0xf50
[   26.890035]  ? __schedule+0x10cc/0x2b60
[   26.890113]  ? __pfx_read_tsc+0x10/0x10
[   26.890192]  ? ktime_get_ts64+0x86/0x230
[   26.890327]  kunit_try_run_case+0x1a5/0x480
[   26.890413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.890464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.890528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.890570]  ? __kthread_parkme+0x82/0x180
[   26.890601]  ? preempt_count_sub+0x50/0x80
[   26.890634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.890673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.890708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.890745]  kthread+0x337/0x6f0
[   26.890774]  ? trace_preempt_on+0x20/0xc0
[   26.890810]  ? __pfx_kthread+0x10/0x10
[   26.890842]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.890874]  ? calculate_sigpending+0x7b/0xa0
[   26.890910]  ? __pfx_kthread+0x10/0x10
[   26.890942]  ret_from_fork+0x116/0x1d0
[   26.890970]  ? __pfx_kthread+0x10/0x10
[   26.891001]  ret_from_fork_asm+0x1a/0x30
[   26.891044]  </TASK>
[   26.891062] 
[   26.909880] Allocated by task 303:
[   26.910359]  kasan_save_stack+0x45/0x70
[   26.910900]  kasan_save_track+0x18/0x40
[   26.911421]  kasan_save_alloc_info+0x3b/0x50
[   26.911980]  __kasan_kmalloc+0xb7/0xc0
[   26.912511]  __kmalloc_noprof+0x1c9/0x500
[   26.913013]  kunit_kmalloc_array+0x25/0x60
[   26.913413]  copy_user_test_oob+0xab/0x10f0
[   26.913945]  kunit_try_run_case+0x1a5/0x480
[   26.914618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.915194]  kthread+0x337/0x6f0
[   26.915718]  ret_from_fork+0x116/0x1d0
[   26.916141]  ret_from_fork_asm+0x1a/0x30
[   26.916642] 
[   26.916843] The buggy address belongs to the object at ffff8881039c8700
[   26.916843]  which belongs to the cache kmalloc-128 of size 128
[   26.918529] The buggy address is located 0 bytes inside of
[   26.918529]  allocated 120-byte region [ffff8881039c8700, ffff8881039c8778)
[   26.919947] 
[   26.920182] The buggy address belongs to the physical page:
[   26.920637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   26.921226] flags: 0x200000000000000(node=0|zone=2)
[   26.922367] page_type: f5(slab)
[   26.922649] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.923676] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.924225] page dumped because: kasan: bad access detected
[   26.924679] 
[   26.924851] Memory state around the buggy address:
[   26.925247]  ffff8881039c8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.926887]  ffff8881039c8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.927759] >ffff8881039c8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.928629]                                                                 ^
[   26.929745]  ffff8881039c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.930311]  ffff8881039c8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.930922] ==================================================================
[   26.793377] ==================================================================
[   26.794050] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   26.794871] Read of size 121 at addr ffff8881039c8700 by task kunit_try_catch/303
[   26.795565] 
[   26.795862] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.796041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.796086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.796158] Call Trace:
[   26.796262]  <TASK>
[   26.796350]  dump_stack_lvl+0x73/0xb0
[   26.796452]  print_report+0xd1/0x650
[   26.796555]  ? __virt_addr_valid+0x1db/0x2d0
[   26.796641]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.796722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.796806]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.796940]  kasan_report+0x141/0x180
[   26.797024]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.797109]  kasan_check_range+0x10c/0x1c0
[   26.797151]  __kasan_check_read+0x15/0x20
[   26.797182]  copy_user_test_oob+0x4aa/0x10f0
[   26.797243]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.797316]  ? finish_task_switch.isra.0+0x153/0x700
[   26.797355]  ? __switch_to+0x47/0xf50
[   26.797394]  ? __schedule+0x10cc/0x2b60
[   26.797428]  ? __pfx_read_tsc+0x10/0x10
[   26.797458]  ? ktime_get_ts64+0x86/0x230
[   26.797511]  kunit_try_run_case+0x1a5/0x480
[   26.797561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.797600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.797655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.797692]  ? __kthread_parkme+0x82/0x180
[   26.797721]  ? preempt_count_sub+0x50/0x80
[   26.797754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.797791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.797827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.797863]  kthread+0x337/0x6f0
[   26.797892]  ? trace_preempt_on+0x20/0xc0
[   26.797927]  ? __pfx_kthread+0x10/0x10
[   26.797957]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.797989]  ? calculate_sigpending+0x7b/0xa0
[   26.798024]  ? __pfx_kthread+0x10/0x10
[   26.798056]  ret_from_fork+0x116/0x1d0
[   26.798083]  ? __pfx_kthread+0x10/0x10
[   26.798113]  ret_from_fork_asm+0x1a/0x30
[   26.798156]  </TASK>
[   26.798172] 
[   26.819014] Allocated by task 303:
[   26.819436]  kasan_save_stack+0x45/0x70
[   26.820082]  kasan_save_track+0x18/0x40
[   26.820803]  kasan_save_alloc_info+0x3b/0x50
[   26.821382]  __kasan_kmalloc+0xb7/0xc0
[   26.821875]  __kmalloc_noprof+0x1c9/0x500
[   26.822116]  kunit_kmalloc_array+0x25/0x60
[   26.822469]  copy_user_test_oob+0xab/0x10f0
[   26.823287]  kunit_try_run_case+0x1a5/0x480
[   26.824178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.824690]  kthread+0x337/0x6f0
[   26.825102]  ret_from_fork+0x116/0x1d0
[   26.825566]  ret_from_fork_asm+0x1a/0x30
[   26.826089] 
[   26.826674] The buggy address belongs to the object at ffff8881039c8700
[   26.826674]  which belongs to the cache kmalloc-128 of size 128
[   26.827988] The buggy address is located 0 bytes inside of
[   26.827988]  allocated 120-byte region [ffff8881039c8700, ffff8881039c8778)
[   26.829271] 
[   26.829546] The buggy address belongs to the physical page:
[   26.830040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   26.830766] flags: 0x200000000000000(node=0|zone=2)
[   26.831309] page_type: f5(slab)
[   26.831716] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.832463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.833100] page dumped because: kasan: bad access detected
[   26.833688] 
[   26.834002] Memory state around the buggy address:
[   26.834487]  ffff8881039c8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.835112]  ffff8881039c8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.835784] >ffff8881039c8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.836472]                                                                 ^
[   26.837101]  ffff8881039c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.837788]  ffff8881039c8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.838478] ==================================================================
[   26.839840] ==================================================================
[   26.841304] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   26.841787] Write of size 121 at addr ffff8881039c8700 by task kunit_try_catch/303
[   26.842053] 
[   26.842171] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.842264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.842307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.842374] Call Trace:
[   26.842487]  <TASK>
[   26.842569]  dump_stack_lvl+0x73/0xb0
[   26.842662]  print_report+0xd1/0x650
[   26.842746]  ? __virt_addr_valid+0x1db/0x2d0
[   26.842831]  ? copy_user_test_oob+0x557/0x10f0
[   26.842963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.843288]  ? copy_user_test_oob+0x557/0x10f0
[   26.843375]  kasan_report+0x141/0x180
[   26.843493]  ? copy_user_test_oob+0x557/0x10f0
[   26.843610]  kasan_check_range+0x10c/0x1c0
[   26.843691]  __kasan_check_write+0x18/0x20
[   26.843761]  copy_user_test_oob+0x557/0x10f0
[   26.843807]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.843846]  ? finish_task_switch.isra.0+0x153/0x700
[   26.843884]  ? __switch_to+0x47/0xf50
[   26.843925]  ? __schedule+0x10cc/0x2b60
[   26.843960]  ? __pfx_read_tsc+0x10/0x10
[   26.843994]  ? ktime_get_ts64+0x86/0x230
[   26.844030]  kunit_try_run_case+0x1a5/0x480
[   26.844073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.844111]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.844147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.844184]  ? __kthread_parkme+0x82/0x180
[   26.844216]  ? preempt_count_sub+0x50/0x80
[   26.844300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.844344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.844384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.844422]  kthread+0x337/0x6f0
[   26.844452]  ? trace_preempt_on+0x20/0xc0
[   26.844489]  ? __pfx_kthread+0x10/0x10
[   26.844551]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.844587]  ? calculate_sigpending+0x7b/0xa0
[   26.844626]  ? __pfx_kthread+0x10/0x10
[   26.844659]  ret_from_fork+0x116/0x1d0
[   26.844689]  ? __pfx_kthread+0x10/0x10
[   26.844720]  ret_from_fork_asm+0x1a/0x30
[   26.844765]  </TASK>
[   26.844783] 
[   26.865209] Allocated by task 303:
[   26.866023]  kasan_save_stack+0x45/0x70
[   26.866620]  kasan_save_track+0x18/0x40
[   26.867478]  kasan_save_alloc_info+0x3b/0x50
[   26.867783]  __kasan_kmalloc+0xb7/0xc0
[   26.868043]  __kmalloc_noprof+0x1c9/0x500
[   26.868514]  kunit_kmalloc_array+0x25/0x60
[   26.868870]  copy_user_test_oob+0xab/0x10f0
[   26.870175]  kunit_try_run_case+0x1a5/0x480
[   26.870990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.871649]  kthread+0x337/0x6f0
[   26.872102]  ret_from_fork+0x116/0x1d0
[   26.872614]  ret_from_fork_asm+0x1a/0x30
[   26.873442] 
[   26.873692] The buggy address belongs to the object at ffff8881039c8700
[   26.873692]  which belongs to the cache kmalloc-128 of size 128
[   26.874546] The buggy address is located 0 bytes inside of
[   26.874546]  allocated 120-byte region [ffff8881039c8700, ffff8881039c8778)
[   26.875700] 
[   26.875897] The buggy address belongs to the physical page:
[   26.876628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   26.877321] flags: 0x200000000000000(node=0|zone=2)
[   26.877887] page_type: f5(slab)
[   26.878183] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.878908] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.879684] page dumped because: kasan: bad access detected
[   26.880196] 
[   26.880525] Memory state around the buggy address:
[   26.881082]  ffff8881039c8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.881753]  ffff8881039c8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.882205] >ffff8881039c8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.882912]                                                                 ^
[   26.883576]  ffff8881039c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.884164]  ffff8881039c8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.884703] ==================================================================
[   26.747308] ==================================================================
[   26.747947] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   26.748614] Write of size 121 at addr ffff8881039c8700 by task kunit_try_catch/303
[   26.749973] 
[   26.750273] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.750420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.750464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.750554] Call Trace:
[   26.750611]  <TASK>
[   26.750672]  dump_stack_lvl+0x73/0xb0
[   26.750775]  print_report+0xd1/0x650
[   26.750827]  ? __virt_addr_valid+0x1db/0x2d0
[   26.750864]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.750900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.750933]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.750968]  kasan_report+0x141/0x180
[   26.751001]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.751042]  kasan_check_range+0x10c/0x1c0
[   26.751079]  __kasan_check_write+0x18/0x20
[   26.751109]  copy_user_test_oob+0x3fd/0x10f0
[   26.751146]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.751183]  ? finish_task_switch.isra.0+0x153/0x700
[   26.751220]  ? __switch_to+0x47/0xf50
[   26.751309]  ? __schedule+0x10cc/0x2b60
[   26.751345]  ? __pfx_read_tsc+0x10/0x10
[   26.751377]  ? ktime_get_ts64+0x86/0x230
[   26.751412]  kunit_try_run_case+0x1a5/0x480
[   26.751452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.751488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.751555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.751591]  ? __kthread_parkme+0x82/0x180
[   26.751621]  ? preempt_count_sub+0x50/0x80
[   26.751654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.751691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.751728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.751764]  kthread+0x337/0x6f0
[   26.751793]  ? trace_preempt_on+0x20/0xc0
[   26.751830]  ? __pfx_kthread+0x10/0x10
[   26.751860]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.751892]  ? calculate_sigpending+0x7b/0xa0
[   26.751928]  ? __pfx_kthread+0x10/0x10
[   26.751961]  ret_from_fork+0x116/0x1d0
[   26.751988]  ? __pfx_kthread+0x10/0x10
[   26.752019]  ret_from_fork_asm+0x1a/0x30
[   26.752062]  </TASK>
[   26.752080] 
[   26.770027] Allocated by task 303:
[   26.770704]  kasan_save_stack+0x45/0x70
[   26.772306]  kasan_save_track+0x18/0x40
[   26.773399]  kasan_save_alloc_info+0x3b/0x50
[   26.774439]  __kasan_kmalloc+0xb7/0xc0
[   26.775109]  __kmalloc_noprof+0x1c9/0x500
[   26.775404]  kunit_kmalloc_array+0x25/0x60
[   26.775758]  copy_user_test_oob+0xab/0x10f0
[   26.776424]  kunit_try_run_case+0x1a5/0x480
[   26.777660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.778448]  kthread+0x337/0x6f0
[   26.778996]  ret_from_fork+0x116/0x1d0
[   26.779378]  ret_from_fork_asm+0x1a/0x30
[   26.780153] 
[   26.780456] The buggy address belongs to the object at ffff8881039c8700
[   26.780456]  which belongs to the cache kmalloc-128 of size 128
[   26.781369] The buggy address is located 0 bytes inside of
[   26.781369]  allocated 120-byte region [ffff8881039c8700, ffff8881039c8778)
[   26.782331] 
[   26.782644] The buggy address belongs to the physical page:
[   26.783532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   26.784044] flags: 0x200000000000000(node=0|zone=2)
[   26.784572] page_type: f5(slab)
[   26.784937] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.785707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.786305] page dumped because: kasan: bad access detected
[   26.786744] 
[   26.787000] Memory state around the buggy address:
[   26.787599]  ffff8881039c8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.788297]  ffff8881039c8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.788945] >ffff8881039c8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.789690]                                                                 ^
[   26.790375]  ffff8881039c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.790966]  ffff8881039c8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.791660] ==================================================================

[   25.180331] ==================================================================
[   25.181417] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   25.182071] Read of size 121 at addr ffff8881038d5f00 by task kunit_try_catch/303
[   25.183435] 
[   25.183894] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.184037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.184058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.184107] Call Trace:
[   25.184271]  <TASK>
[   25.184294]  dump_stack_lvl+0x73/0xb0
[   25.184340]  print_report+0xd1/0x650
[   25.184376]  ? __virt_addr_valid+0x1db/0x2d0
[   25.184409]  ? copy_user_test_oob+0x4aa/0x10f0
[   25.184445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.184479]  ? copy_user_test_oob+0x4aa/0x10f0
[   25.184514]  kasan_report+0x141/0x180
[   25.184547]  ? copy_user_test_oob+0x4aa/0x10f0
[   25.184587]  kasan_check_range+0x10c/0x1c0
[   25.184622]  __kasan_check_read+0x15/0x20
[   25.184650]  copy_user_test_oob+0x4aa/0x10f0
[   25.184688]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.184721]  ? finish_task_switch.isra.0+0x153/0x700
[   25.184754]  ? __switch_to+0x47/0xf50
[   25.184790]  ? __schedule+0x10cc/0x2b60
[   25.184822]  ? __pfx_read_tsc+0x10/0x10
[   25.184852]  ? ktime_get_ts64+0x86/0x230
[   25.184917]  kunit_try_run_case+0x1a5/0x480
[   25.184957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.184996]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.185030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.185065]  ? __kthread_parkme+0x82/0x180
[   25.185099]  ? preempt_count_sub+0x50/0x80
[   25.185172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.185212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.185247]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.185285]  kthread+0x337/0x6f0
[   25.185314]  ? trace_preempt_on+0x20/0xc0
[   25.185347]  ? __pfx_kthread+0x10/0x10
[   25.185378]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.185410]  ? calculate_sigpending+0x7b/0xa0
[   25.185445]  ? __pfx_kthread+0x10/0x10
[   25.185476]  ret_from_fork+0x116/0x1d0
[   25.185503]  ? __pfx_kthread+0x10/0x10
[   25.185533]  ret_from_fork_asm+0x1a/0x30
[   25.185575]  </TASK>
[   25.185590] 
[   25.205868] Allocated by task 303:
[   25.206946]  kasan_save_stack+0x45/0x70
[   25.207254]  kasan_save_track+0x18/0x40
[   25.208075]  kasan_save_alloc_info+0x3b/0x50
[   25.208507]  __kasan_kmalloc+0xb7/0xc0
[   25.209145]  __kmalloc_noprof+0x1c9/0x500
[   25.209710]  kunit_kmalloc_array+0x25/0x60
[   25.210368]  copy_user_test_oob+0xab/0x10f0
[   25.210792]  kunit_try_run_case+0x1a5/0x480
[   25.211467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.211999]  kthread+0x337/0x6f0
[   25.212732]  ret_from_fork+0x116/0x1d0
[   25.213066]  ret_from_fork_asm+0x1a/0x30
[   25.213859] 
[   25.214157] The buggy address belongs to the object at ffff8881038d5f00
[   25.214157]  which belongs to the cache kmalloc-128 of size 128
[   25.215474] The buggy address is located 0 bytes inside of
[   25.215474]  allocated 120-byte region [ffff8881038d5f00, ffff8881038d5f78)
[   25.216619] 
[   25.217149] The buggy address belongs to the physical page:
[   25.217525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5
[   25.218465] flags: 0x200000000000000(node=0|zone=2)
[   25.218917] page_type: f5(slab)
[   25.219693] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.220296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.221124] page dumped because: kasan: bad access detected
[   25.221811] 
[   25.222277] Memory state around the buggy address:
[   25.222770]  ffff8881038d5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.223594]  ffff8881038d5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.224195] >ffff8881038d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.224724]                                                                 ^
[   25.225671]  ffff8881038d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.226509]  ffff8881038d6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.227282] ==================================================================
[   25.276647] ==================================================================
[   25.277291] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   25.278895] Read of size 121 at addr ffff8881038d5f00 by task kunit_try_catch/303
[   25.280257] 
[   25.280472] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.280929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.280955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.280988] Call Trace:
[   25.281008]  <TASK>
[   25.281027]  dump_stack_lvl+0x73/0xb0
[   25.281072]  print_report+0xd1/0x650
[   25.281125]  ? __virt_addr_valid+0x1db/0x2d0
[   25.281174]  ? copy_user_test_oob+0x604/0x10f0
[   25.281212]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.281245]  ? copy_user_test_oob+0x604/0x10f0
[   25.281281]  kasan_report+0x141/0x180
[   25.281313]  ? copy_user_test_oob+0x604/0x10f0
[   25.281355]  kasan_check_range+0x10c/0x1c0
[   25.281390]  __kasan_check_read+0x15/0x20
[   25.281418]  copy_user_test_oob+0x604/0x10f0
[   25.281457]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.281492]  ? finish_task_switch.isra.0+0x153/0x700
[   25.281523]  ? __switch_to+0x47/0xf50
[   25.281560]  ? __schedule+0x10cc/0x2b60
[   25.281593]  ? __pfx_read_tsc+0x10/0x10
[   25.281623]  ? ktime_get_ts64+0x86/0x230
[   25.281656]  kunit_try_run_case+0x1a5/0x480
[   25.281694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.281730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.281765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.281800]  ? __kthread_parkme+0x82/0x180
[   25.281829]  ? preempt_count_sub+0x50/0x80
[   25.281862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.281924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.281961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.281999]  kthread+0x337/0x6f0
[   25.282027]  ? trace_preempt_on+0x20/0xc0
[   25.282062]  ? __pfx_kthread+0x10/0x10
[   25.282098]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.282171]  ? calculate_sigpending+0x7b/0xa0
[   25.282209]  ? __pfx_kthread+0x10/0x10
[   25.282241]  ret_from_fork+0x116/0x1d0
[   25.282284]  ? __pfx_kthread+0x10/0x10
[   25.282316]  ret_from_fork_asm+0x1a/0x30
[   25.282358]  </TASK>
[   25.282374] 
[   25.302148] Allocated by task 303:
[   25.302553]  kasan_save_stack+0x45/0x70
[   25.303105]  kasan_save_track+0x18/0x40
[   25.303483]  kasan_save_alloc_info+0x3b/0x50
[   25.303994]  __kasan_kmalloc+0xb7/0xc0
[   25.304696]  __kmalloc_noprof+0x1c9/0x500
[   25.305182]  kunit_kmalloc_array+0x25/0x60
[   25.305712]  copy_user_test_oob+0xab/0x10f0
[   25.306143]  kunit_try_run_case+0x1a5/0x480
[   25.306699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.307209]  kthread+0x337/0x6f0
[   25.307666]  ret_from_fork+0x116/0x1d0
[   25.308205]  ret_from_fork_asm+0x1a/0x30
[   25.308722] 
[   25.308994] The buggy address belongs to the object at ffff8881038d5f00
[   25.308994]  which belongs to the cache kmalloc-128 of size 128
[   25.309699] The buggy address is located 0 bytes inside of
[   25.309699]  allocated 120-byte region [ffff8881038d5f00, ffff8881038d5f78)
[   25.310744] 
[   25.311004] The buggy address belongs to the physical page:
[   25.311819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5
[   25.312658] flags: 0x200000000000000(node=0|zone=2)
[   25.313096] page_type: f5(slab)
[   25.313483] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.314415] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.315021] page dumped because: kasan: bad access detected
[   25.315395] 
[   25.315683] Memory state around the buggy address:
[   25.316190]  ffff8881038d5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.316969]  ffff8881038d5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.317666] >ffff8881038d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.318237]                                                                 ^
[   25.320907]  ffff8881038d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.321470]  ffff8881038d6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.321899] ==================================================================
[   25.134640] ==================================================================
[   25.135188] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   25.135819] Write of size 121 at addr ffff8881038d5f00 by task kunit_try_catch/303
[   25.136505] 
[   25.136771] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.136912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.136958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.137019] Call Trace:
[   25.137060]  <TASK>
[   25.137102]  dump_stack_lvl+0x73/0xb0
[   25.137230]  print_report+0xd1/0x650
[   25.137319]  ? __virt_addr_valid+0x1db/0x2d0
[   25.137398]  ? copy_user_test_oob+0x3fd/0x10f0
[   25.137477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.137600]  ? copy_user_test_oob+0x3fd/0x10f0
[   25.137690]  kasan_report+0x141/0x180
[   25.137806]  ? copy_user_test_oob+0x3fd/0x10f0
[   25.137926]  kasan_check_range+0x10c/0x1c0
[   25.138013]  __kasan_check_write+0x18/0x20
[   25.138089]  copy_user_test_oob+0x3fd/0x10f0
[   25.138194]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.138236]  ? finish_task_switch.isra.0+0x153/0x700
[   25.138283]  ? __switch_to+0x47/0xf50
[   25.138321]  ? __schedule+0x10cc/0x2b60
[   25.138355]  ? __pfx_read_tsc+0x10/0x10
[   25.138386]  ? ktime_get_ts64+0x86/0x230
[   25.138423]  kunit_try_run_case+0x1a5/0x480
[   25.138461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.138497]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.138533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.138568]  ? __kthread_parkme+0x82/0x180
[   25.138597]  ? preempt_count_sub+0x50/0x80
[   25.138630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.138667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.138703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.138738]  kthread+0x337/0x6f0
[   25.138768]  ? trace_preempt_on+0x20/0xc0
[   25.138802]  ? __pfx_kthread+0x10/0x10
[   25.138833]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.138867]  ? calculate_sigpending+0x7b/0xa0
[   25.138933]  ? __pfx_kthread+0x10/0x10
[   25.138968]  ret_from_fork+0x116/0x1d0
[   25.138994]  ? __pfx_kthread+0x10/0x10
[   25.139025]  ret_from_fork_asm+0x1a/0x30
[   25.139068]  </TASK>
[   25.139086] 
[   25.157214] Allocated by task 303:
[   25.157851]  kasan_save_stack+0x45/0x70
[   25.158249]  kasan_save_track+0x18/0x40
[   25.158903]  kasan_save_alloc_info+0x3b/0x50
[   25.159554]  __kasan_kmalloc+0xb7/0xc0
[   25.160018]  __kmalloc_noprof+0x1c9/0x500
[   25.160672]  kunit_kmalloc_array+0x25/0x60
[   25.161147]  copy_user_test_oob+0xab/0x10f0
[   25.161813]  kunit_try_run_case+0x1a5/0x480
[   25.162418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.162943]  kthread+0x337/0x6f0
[   25.163567]  ret_from_fork+0x116/0x1d0
[   25.163974]  ret_from_fork_asm+0x1a/0x30
[   25.164743] 
[   25.165001] The buggy address belongs to the object at ffff8881038d5f00
[   25.165001]  which belongs to the cache kmalloc-128 of size 128
[   25.166476] The buggy address is located 0 bytes inside of
[   25.166476]  allocated 120-byte region [ffff8881038d5f00, ffff8881038d5f78)
[   25.167762] 
[   25.168051] The buggy address belongs to the physical page:
[   25.168770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5
[   25.169748] flags: 0x200000000000000(node=0|zone=2)
[   25.170533] page_type: f5(slab)
[   25.170864] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.171666] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.172437] page dumped because: kasan: bad access detected
[   25.172981] 
[   25.173509] Memory state around the buggy address:
[   25.174221]  ffff8881038d5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.174745]  ffff8881038d5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.175560] >ffff8881038d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.176348]                                                                 ^
[   25.177176]  ffff8881038d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.177962]  ffff8881038d6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.178679] ==================================================================
[   25.228359] ==================================================================
[   25.229216] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   25.229924] Write of size 121 at addr ffff8881038d5f00 by task kunit_try_catch/303
[   25.231586] 
[   25.231754] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.231816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.231838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.231914] Call Trace:
[   25.231959]  <TASK>
[   25.232000]  dump_stack_lvl+0x73/0xb0
[   25.232336]  print_report+0xd1/0x650
[   25.232373]  ? __virt_addr_valid+0x1db/0x2d0
[   25.232409]  ? copy_user_test_oob+0x557/0x10f0
[   25.232444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.232476]  ? copy_user_test_oob+0x557/0x10f0
[   25.232511]  kasan_report+0x141/0x180
[   25.232543]  ? copy_user_test_oob+0x557/0x10f0
[   25.232586]  kasan_check_range+0x10c/0x1c0
[   25.232622]  __kasan_check_write+0x18/0x20
[   25.232650]  copy_user_test_oob+0x557/0x10f0
[   25.232689]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.232722]  ? finish_task_switch.isra.0+0x153/0x700
[   25.232755]  ? __switch_to+0x47/0xf50
[   25.232790]  ? __schedule+0x10cc/0x2b60
[   25.232823]  ? __pfx_read_tsc+0x10/0x10
[   25.232852]  ? ktime_get_ts64+0x86/0x230
[   25.232913]  kunit_try_run_case+0x1a5/0x480
[   25.232954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.232991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.233025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.233061]  ? __kthread_parkme+0x82/0x180
[   25.233090]  ? preempt_count_sub+0x50/0x80
[   25.233153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.233193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.233229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.233265]  kthread+0x337/0x6f0
[   25.233294]  ? trace_preempt_on+0x20/0xc0
[   25.233326]  ? __pfx_kthread+0x10/0x10
[   25.233357]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.233388]  ? calculate_sigpending+0x7b/0xa0
[   25.233423]  ? __pfx_kthread+0x10/0x10
[   25.233456]  ret_from_fork+0x116/0x1d0
[   25.233482]  ? __pfx_kthread+0x10/0x10
[   25.233513]  ret_from_fork_asm+0x1a/0x30
[   25.233556]  </TASK>
[   25.233574] 
[   25.254039] Allocated by task 303:
[   25.254925]  kasan_save_stack+0x45/0x70
[   25.255284]  kasan_save_track+0x18/0x40
[   25.255710]  kasan_save_alloc_info+0x3b/0x50
[   25.256558]  __kasan_kmalloc+0xb7/0xc0
[   25.256995]  __kmalloc_noprof+0x1c9/0x500
[   25.257768]  kunit_kmalloc_array+0x25/0x60
[   25.258397]  copy_user_test_oob+0xab/0x10f0
[   25.258847]  kunit_try_run_case+0x1a5/0x480
[   25.259589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.260253]  kthread+0x337/0x6f0
[   25.260798]  ret_from_fork+0x116/0x1d0
[   25.261365]  ret_from_fork_asm+0x1a/0x30
[   25.261749] 
[   25.261999] The buggy address belongs to the object at ffff8881038d5f00
[   25.261999]  which belongs to the cache kmalloc-128 of size 128
[   25.263496] The buggy address is located 0 bytes inside of
[   25.263496]  allocated 120-byte region [ffff8881038d5f00, ffff8881038d5f78)
[   25.264937] 
[   25.265120] The buggy address belongs to the physical page:
[   25.265495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5
[   25.266134] flags: 0x200000000000000(node=0|zone=2)
[   25.266928] page_type: f5(slab)
[   25.267669] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.268283] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.268838] page dumped because: kasan: bad access detected
[   25.269763] 
[   25.269943] Memory state around the buggy address:
[   25.270416]  ffff8881038d5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.271329]  ffff8881038d5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.272162] >ffff8881038d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.272934]                                                                 ^
[   25.273783]  ffff8881038d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.274720]  ffff8881038d6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.275231] ==================================================================

[   23.375622] ==================================================================
[   23.376277] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   23.376919] Read of size 121 at addr ffff00000c5d5400 by task kunit_try_catch/338
[   23.377598] 
[   23.377747] CPU: 5 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.377779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.377789] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.377800] Call trace:
[   23.377808]  show_stack+0x20/0x38 (C)
[   23.377829]  dump_stack_lvl+0x8c/0xd0
[   23.377851]  print_report+0x118/0x608
[   23.377874]  kasan_report+0xdc/0x128
[   23.377895]  kasan_check_range+0x100/0x1a8
[   23.377919]  __kasan_check_read+0x20/0x30
[   23.377937]  copy_user_test_oob+0x728/0xec8
[   23.377958]  kunit_try_run_case+0x170/0x3f0
[   23.377979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.378005]  kthread+0x328/0x630
[   23.378022]  ret_from_fork+0x10/0x20
[   23.378042] 
[   23.383863] Allocated by task 338:
[   23.384178]  kasan_save_stack+0x3c/0x68
[   23.384541]  kasan_save_track+0x20/0x40
[   23.384904]  kasan_save_alloc_info+0x40/0x58
[   23.385305]  __kasan_kmalloc+0xd4/0xd8
[   23.385660]  __kmalloc_noprof+0x198/0x4c8
[   23.386036]  kunit_kmalloc_array+0x34/0x88
[   23.386421]  copy_user_test_oob+0xac/0xec8
[   23.386804]  kunit_try_run_case+0x170/0x3f0
[   23.387196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.387705]  kthread+0x328/0x630
[   23.388009]  ret_from_fork+0x10/0x20
[   23.388347] 
[   23.388493] The buggy address belongs to the object at ffff00000c5d5400
[   23.388493]  which belongs to the cache kmalloc-128 of size 128
[   23.389609] The buggy address is located 0 bytes inside of
[   23.389609]  allocated 120-byte region [ffff00000c5d5400, ffff00000c5d5478)
[   23.390719] 
[   23.390866] The buggy address belongs to the physical page:
[   23.391371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc5d5
[   23.392080] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.392674] page_type: f5(slab)
[   23.392972] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.393673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.394368] page dumped because: kasan: bad access detected
[   23.394872] 
[   23.395017] Memory state around the buggy address:
[   23.395454]  ffff00000c5d5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.396106]  ffff00000c5d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.396759] >ffff00000c5d5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.397408]                                                                 ^
[   23.398053]  ffff00000c5d5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.398706]  ffff00000c5d5500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399355] ==================================================================
[   23.350394] ==================================================================
[   23.351609] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   23.352266] Write of size 121 at addr ffff00000c5d5400 by task kunit_try_catch/338
[   23.352955] 
[   23.353109] CPU: 5 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.353147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.353157] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.353170] Call trace:
[   23.353179]  show_stack+0x20/0x38 (C)
[   23.353204]  dump_stack_lvl+0x8c/0xd0
[   23.353231]  print_report+0x118/0x608
[   23.353255]  kasan_report+0xdc/0x128
[   23.353276]  kasan_check_range+0x100/0x1a8
[   23.353300]  __kasan_check_write+0x20/0x30
[   23.353318]  copy_user_test_oob+0x234/0xec8
[   23.353339]  kunit_try_run_case+0x170/0x3f0
[   23.353364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.353390]  kthread+0x328/0x630
[   23.353407]  ret_from_fork+0x10/0x20
[   23.353429] 
[   23.359260] Allocated by task 338:
[   23.359577]  kasan_save_stack+0x3c/0x68
[   23.359942]  kasan_save_track+0x20/0x40
[   23.360305]  kasan_save_alloc_info+0x40/0x58
[   23.360707]  __kasan_kmalloc+0xd4/0xd8
[   23.361060]  __kmalloc_noprof+0x198/0x4c8
[   23.361437]  kunit_kmalloc_array+0x34/0x88
[   23.361821]  copy_user_test_oob+0xac/0xec8
[   23.362205]  kunit_try_run_case+0x170/0x3f0
[   23.362597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.363105]  kthread+0x328/0x630
[   23.363409]  ret_from_fork+0x10/0x20
[   23.363747] 
[   23.363893] The buggy address belongs to the object at ffff00000c5d5400
[   23.363893]  which belongs to the cache kmalloc-128 of size 128
[   23.365010] The buggy address is located 0 bytes inside of
[   23.365010]  allocated 120-byte region [ffff00000c5d5400, ffff00000c5d5478)
[   23.366123] 
[   23.366269] The buggy address belongs to the physical page:
[   23.366775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc5d5
[   23.367485] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.368083] page_type: f5(slab)
[   23.368382] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.369084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.369779] page dumped because: kasan: bad access detected
[   23.370284] 
[   23.370430] Memory state around the buggy address:
[   23.370869]  ffff00000c5d5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.371522]  ffff00000c5d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.372175] >ffff00000c5d5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.372824]                                                                 ^
[   23.373468]  ffff00000c5d5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.374120]  ffff00000c5d5500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.374770] ==================================================================
[   23.472250] ==================================================================
[   23.472892] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   23.473518] Read of size 121 at addr ffff00000c5d5400 by task kunit_try_catch/338
[   23.474182] 
[   23.474322] CPU: 5 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.474338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.474343] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.474349] Call trace:
[   23.474353]  show_stack+0x20/0x38 (C)
[   23.474364]  dump_stack_lvl+0x8c/0xd0
[   23.474376]  print_report+0x118/0x608
[   23.474387]  kasan_report+0xdc/0x128
[   23.474398]  kasan_check_range+0x100/0x1a8
[   23.474410]  __kasan_check_read+0x20/0x30
[   23.474419]  copy_user_test_oob+0x4a0/0xec8
[   23.474430]  kunit_try_run_case+0x170/0x3f0
[   23.474441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.474454]  kthread+0x328/0x630
[   23.474463]  ret_from_fork+0x10/0x20
[   23.474473] 
[   23.480239] Allocated by task 338:
[   23.480544]  kasan_save_stack+0x3c/0x68
[   23.480889]  kasan_save_track+0x20/0x40
[   23.481236]  kasan_save_alloc_info+0x40/0x58
[   23.481621]  __kasan_kmalloc+0xd4/0xd8
[   23.481959]  __kmalloc_noprof+0x198/0x4c8
[   23.482321]  kunit_kmalloc_array+0x34/0x88
[   23.482689]  copy_user_test_oob+0xac/0xec8
[   23.483058]  kunit_try_run_case+0x170/0x3f0
[   23.483435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.483924]  kthread+0x328/0x630
[   23.484215]  ret_from_fork+0x10/0x20
[   23.484537] 
[   23.484675] The buggy address belongs to the object at ffff00000c5d5400
[   23.484675]  which belongs to the cache kmalloc-128 of size 128
[   23.485773] The buggy address is located 0 bytes inside of
[   23.485773]  allocated 120-byte region [ffff00000c5d5400, ffff00000c5d5478)
[   23.486864] 
[   23.487001] The buggy address belongs to the physical page:
[   23.487493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc5d5
[   23.488185] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.488765] page_type: f5(slab)
[   23.489048] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.489732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.490413] page dumped because: kasan: bad access detected
[   23.490906] 
[   23.491042] Memory state around the buggy address:
[   23.491468]  ffff00000c5d5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.492104]  ffff00000c5d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.492742] >ffff00000c5d5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.493379]                                                                 ^
[   23.494009]  ffff00000c5d5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.494646]  ffff00000c5d5500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.495282] ==================================================================
[   23.424511] ==================================================================
[   23.425162] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   23.425798] Read of size 121 at addr ffff00000c5d5400 by task kunit_try_catch/338
[   23.426471] 
[   23.426617] CPU: 5 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.426643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.426651] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.426660] Call trace:
[   23.426667]  show_stack+0x20/0x38 (C)
[   23.426684]  dump_stack_lvl+0x8c/0xd0
[   23.426702]  print_report+0x118/0x608
[   23.426721]  kasan_report+0xdc/0x128
[   23.426738]  kasan_check_range+0x100/0x1a8
[   23.426757]  __kasan_check_read+0x20/0x30
[   23.426772]  copy_user_test_oob+0x3c8/0xec8
[   23.426788]  kunit_try_run_case+0x170/0x3f0
[   23.426806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.426827]  kthread+0x328/0x630
[   23.426840]  ret_from_fork+0x10/0x20
[   23.426857] 
[   23.432642] Allocated by task 338:
[   23.432950]  kasan_save_stack+0x3c/0x68
[   23.433301]  kasan_save_track+0x20/0x40
[   23.433650]  kasan_save_alloc_info+0x40/0x58
[   23.434038]  __kasan_kmalloc+0xd4/0xd8
[   23.434381]  __kmalloc_noprof+0x198/0x4c8
[   23.434745]  kunit_kmalloc_array+0x34/0x88
[   23.435117]  copy_user_test_oob+0xac/0xec8
[   23.435489]  kunit_try_run_case+0x170/0x3f0
[   23.435868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.436362]  kthread+0x328/0x630
[   23.436656]  ret_from_fork+0x10/0x20
[   23.436982] 
[   23.437122] The buggy address belongs to the object at ffff00000c5d5400
[   23.437122]  which belongs to the cache kmalloc-128 of size 128
[   23.438224] The buggy address is located 0 bytes inside of
[   23.438224]  allocated 120-byte region [ffff00000c5d5400, ffff00000c5d5478)
[   23.439321] 
[   23.439460] The buggy address belongs to the physical page:
[   23.439955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc5d5
[   23.440651] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.441234] page_type: f5(slab)
[   23.441521] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.442209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.442893] page dumped because: kasan: bad access detected
[   23.443388] 
[   23.443528] Memory state around the buggy address:
[   23.443955]  ffff00000c5d5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.444597]  ffff00000c5d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.445237] >ffff00000c5d5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.445877]                                                                 ^
[   23.446510]  ffff00000c5d5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.447152]  ffff00000c5d5500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.447791] ==================================================================
[   23.448457] ==================================================================
[   23.449100] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   23.449730] Write of size 121 at addr ffff00000c5d5400 by task kunit_try_catch/338
[   23.450402] 
[   23.450543] CPU: 5 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.450562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.450568] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.450575] Call trace:
[   23.450579]  show_stack+0x20/0x38 (C)
[   23.450592]  dump_stack_lvl+0x8c/0xd0
[   23.450606]  print_report+0x118/0x608
[   23.450619]  kasan_report+0xdc/0x128
[   23.450631]  kasan_check_range+0x100/0x1a8
[   23.450644]  __kasan_check_write+0x20/0x30
[   23.450655]  copy_user_test_oob+0x434/0xec8
[   23.450667]  kunit_try_run_case+0x170/0x3f0
[   23.450681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.450695]  kthread+0x328/0x630
[   23.450705]  ret_from_fork+0x10/0x20
[   23.450717] 
[   23.456497] Allocated by task 338:
[   23.456803]  kasan_save_stack+0x3c/0x68
[   23.457151]  kasan_save_track+0x20/0x40
[   23.457499]  kasan_save_alloc_info+0x40/0x58
[   23.457886]  __kasan_kmalloc+0xd4/0xd8
[   23.458226]  __kmalloc_noprof+0x198/0x4c8
[   23.458589]  kunit_kmalloc_array+0x34/0x88
[   23.458960]  copy_user_test_oob+0xac/0xec8
[   23.459330]  kunit_try_run_case+0x170/0x3f0
[   23.459708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.460200]  kthread+0x328/0x630
[   23.460492]  ret_from_fork+0x10/0x20
[   23.460816] 
[   23.460954] The buggy address belongs to the object at ffff00000c5d5400
[   23.460954]  which belongs to the cache kmalloc-128 of size 128
[   23.462053] The buggy address is located 0 bytes inside of
[   23.462053]  allocated 120-byte region [ffff00000c5d5400, ffff00000c5d5478)
[   23.463147] 
[   23.463285] The buggy address belongs to the physical page:
[   23.463779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc5d5
[   23.464473] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.465053] page_type: f5(slab)
[   23.465338] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.466024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.466706] page dumped because: kasan: bad access detected
[   23.467199] 
[   23.467336] Memory state around the buggy address:
[   23.467763]  ffff00000c5d5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.468402]  ffff00000c5d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.469041] >ffff00000c5d5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.469678]                                                                 ^
[   23.470309]  ffff00000c5d5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.470948]  ffff00000c5d5500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.471585] ==================================================================
[   23.400222] ==================================================================
[   23.400880] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   23.401525] Write of size 121 at addr ffff00000c5d5400 by task kunit_try_catch/338
[   23.402209] 
[   23.402360] CPU: 5 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.402393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.402403] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.402414] Call trace:
[   23.402422]  show_stack+0x20/0x38 (C)
[   23.402443]  dump_stack_lvl+0x8c/0xd0
[   23.402466]  print_report+0x118/0x608
[   23.402489]  kasan_report+0xdc/0x128
[   23.402510]  kasan_check_range+0x100/0x1a8
[   23.402534]  __kasan_check_write+0x20/0x30
[   23.402552]  copy_user_test_oob+0x35c/0xec8
[   23.402573]  kunit_try_run_case+0x170/0x3f0
[   23.402596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.402621]  kthread+0x328/0x630
[   23.402638]  ret_from_fork+0x10/0x20
[   23.402659] 
[   23.408469] Allocated by task 338:
[   23.408781]  kasan_save_stack+0x3c/0x68
[   23.409137]  kasan_save_track+0x20/0x40
[   23.409494]  kasan_save_alloc_info+0x40/0x58
[   23.409889]  __kasan_kmalloc+0xd4/0xd8
[   23.410239]  __kmalloc_noprof+0x198/0x4c8
[   23.410610]  kunit_kmalloc_array+0x34/0x88
[   23.410988]  copy_user_test_oob+0xac/0xec8
[   23.411366]  kunit_try_run_case+0x170/0x3f0
[   23.411752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.412254]  kthread+0x328/0x630
[   23.412553]  ret_from_fork+0x10/0x20
[   23.412885] 
[   23.413028] The buggy address belongs to the object at ffff00000c5d5400
[   23.413028]  which belongs to the cache kmalloc-128 of size 128
[   23.414137] The buggy address is located 0 bytes inside of
[   23.414137]  allocated 120-byte region [ffff00000c5d5400, ffff00000c5d5478)
[   23.415241] 
[   23.415385] The buggy address belongs to the physical page:
[   23.415886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc5d5
[   23.416589] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.417179] page_type: f5(slab)
[   23.417473] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.418167] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.418857] page dumped because: kasan: bad access detected
[   23.419358] 
[   23.419500] Memory state around the buggy address:
[   23.419934]  ffff00000c5d5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.420581]  ffff00000c5d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.421228] >ffff00000c5d5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.421873]                                                                 ^
[   23.422511]  ffff00000c5d5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.423158]  ffff00000c5d5500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.423803] ==================================================================