Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   20.223415] ==================================================================
[   20.223473] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.223526] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.223578] 
[   20.223614] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.225209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.225255] Hardware name: linux,dummy-virt (DT)
[   20.225288] Call trace:
[   20.225348]  show_stack+0x20/0x38 (C)
[   20.225612]  dump_stack_lvl+0x8c/0xd0
[   20.225669]  print_report+0x118/0x608
[   20.225718]  kasan_report+0xdc/0x128
[   20.225762]  kasan_check_range+0x100/0x1a8
[   20.225811]  __kasan_check_read+0x20/0x30
[   20.226143]  copy_user_test_oob+0x3c8/0xec8
[   20.226206]  kunit_try_run_case+0x170/0x3f0
[   20.226701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.226913]  kthread+0x328/0x630
[   20.226960]  ret_from_fork+0x10/0x20
[   20.227023] 
[   20.227044] Allocated by task 286:
[   20.227592]  kasan_save_stack+0x3c/0x68
[   20.227659]  kasan_save_track+0x20/0x40
[   20.227699]  kasan_save_alloc_info+0x40/0x58
[   20.227749]  __kasan_kmalloc+0xd4/0xd8
[   20.227929]  __kmalloc_noprof+0x198/0x4c8
[   20.228299]  kunit_kmalloc_array+0x34/0x88
[   20.228408]  copy_user_test_oob+0xac/0xec8
[   20.228742]  kunit_try_run_case+0x170/0x3f0
[   20.229194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.229440]  kthread+0x328/0x630
[   20.229482]  ret_from_fork+0x10/0x20
[   20.229521] 
[   20.229543] The buggy address belongs to the object at fff00000c77ac300
[   20.229543]  which belongs to the cache kmalloc-128 of size 128
[   20.229656] The buggy address is located 0 bytes inside of
[   20.229656]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.230089] 
[   20.230321] The buggy address belongs to the physical page:
[   20.230569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.230695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.230748] page_type: f5(slab)
[   20.230962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.231038] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.231084] page dumped because: kasan: bad access detected
[   20.231194] 
[   20.231359] Memory state around the buggy address:
[   20.231400]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.231470]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.231858] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.232060]                                                                 ^
[   20.232121]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.232206]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.232248] ==================================================================
[   20.243668] ==================================================================
[   20.243722] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.243773] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.243827] 
[   20.243859] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.244674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.244730] Hardware name: linux,dummy-virt (DT)
[   20.244952] Call trace:
[   20.244987]  show_stack+0x20/0x38 (C)
[   20.245268]  dump_stack_lvl+0x8c/0xd0
[   20.245439]  print_report+0x118/0x608
[   20.245734]  kasan_report+0xdc/0x128
[   20.245791]  kasan_check_range+0x100/0x1a8
[   20.245922]  __kasan_check_read+0x20/0x30
[   20.246132]  copy_user_test_oob+0x4a0/0xec8
[   20.246184]  kunit_try_run_case+0x170/0x3f0
[   20.246513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.246568]  kthread+0x328/0x630
[   20.246851]  ret_from_fork+0x10/0x20
[   20.247340] 
[   20.247448] Allocated by task 286:
[   20.247491]  kasan_save_stack+0x3c/0x68
[   20.247535]  kasan_save_track+0x20/0x40
[   20.247575]  kasan_save_alloc_info+0x40/0x58
[   20.247624]  __kasan_kmalloc+0xd4/0xd8
[   20.247663]  __kmalloc_noprof+0x198/0x4c8
[   20.247937]  kunit_kmalloc_array+0x34/0x88
[   20.247991]  copy_user_test_oob+0xac/0xec8
[   20.248608]  kunit_try_run_case+0x170/0x3f0
[   20.248895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.249284]  kthread+0x328/0x630
[   20.249323]  ret_from_fork+0x10/0x20
[   20.249362] 
[   20.249763] The buggy address belongs to the object at fff00000c77ac300
[   20.249763]  which belongs to the cache kmalloc-128 of size 128
[   20.250036] The buggy address is located 0 bytes inside of
[   20.250036]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.250106] 
[   20.250129] The buggy address belongs to the physical page:
[   20.250160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.250220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.250382] page_type: f5(slab)
[   20.250644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.250994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.251042] page dumped because: kasan: bad access detected
[   20.251076] 
[   20.251096] Memory state around the buggy address:
[   20.251341]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.251601]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.251854] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.251900]                                                                 ^
[   20.252479]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.252814]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.252861] ==================================================================
[   20.234572] ==================================================================
[   20.234669] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.234723] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.234777] 
[   20.234814] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.234895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.234924] Hardware name: linux,dummy-virt (DT)
[   20.234987] Call trace:
[   20.235013]  show_stack+0x20/0x38 (C)
[   20.235295]  dump_stack_lvl+0x8c/0xd0
[   20.235359]  print_report+0x118/0x608
[   20.235408]  kasan_report+0xdc/0x128
[   20.235493]  kasan_check_range+0x100/0x1a8
[   20.235602]  __kasan_check_write+0x20/0x30
[   20.235670]  copy_user_test_oob+0x434/0xec8
[   20.236336]  kunit_try_run_case+0x170/0x3f0
[   20.236395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.236778]  kthread+0x328/0x630
[   20.237016]  ret_from_fork+0x10/0x20
[   20.237070] 
[   20.237091] Allocated by task 286:
[   20.237484]  kasan_save_stack+0x3c/0x68
[   20.237541]  kasan_save_track+0x20/0x40
[   20.237582]  kasan_save_alloc_info+0x40/0x58
[   20.237649]  __kasan_kmalloc+0xd4/0xd8
[   20.237688]  __kmalloc_noprof+0x198/0x4c8
[   20.237726]  kunit_kmalloc_array+0x34/0x88
[   20.237765]  copy_user_test_oob+0xac/0xec8
[   20.238250]  kunit_try_run_case+0x170/0x3f0
[   20.238490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.238631]  kthread+0x328/0x630
[   20.238669]  ret_from_fork+0x10/0x20
[   20.238708] 
[   20.238729] The buggy address belongs to the object at fff00000c77ac300
[   20.238729]  which belongs to the cache kmalloc-128 of size 128
[   20.238933] The buggy address is located 0 bytes inside of
[   20.238933]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.239010] 
[   20.239033] The buggy address belongs to the physical page:
[   20.239174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.239615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.239676] page_type: f5(slab)
[   20.239716] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.239768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.240140] page dumped because: kasan: bad access detected
[   20.240183] 
[   20.240203] Memory state around the buggy address:
[   20.240241]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.240507]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.240860] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.240967]                                                                 ^
[   20.241190]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.241236]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.241277] ==================================================================
[   20.168789] ==================================================================
[   20.168892] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.169714] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.170319] 
[   20.170385] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.170824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.171223] Hardware name: linux,dummy-virt (DT)
[   20.171264] Call trace:
[   20.171303]  show_stack+0x20/0x38 (C)
[   20.171920]  dump_stack_lvl+0x8c/0xd0
[   20.172002]  print_report+0x118/0x608
[   20.172280]  kasan_report+0xdc/0x128
[   20.172469]  kasan_check_range+0x100/0x1a8
[   20.172639]  __kasan_check_write+0x20/0x30
[   20.172724]  copy_user_test_oob+0x234/0xec8
[   20.172970]  kunit_try_run_case+0x170/0x3f0
[   20.173060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.173358]  kthread+0x328/0x630
[   20.173410]  ret_from_fork+0x10/0x20
[   20.173683] 
[   20.173745] Allocated by task 286:
[   20.173810]  kasan_save_stack+0x3c/0x68
[   20.174222]  kasan_save_track+0x20/0x40
[   20.174281]  kasan_save_alloc_info+0x40/0x58
[   20.174997]  __kasan_kmalloc+0xd4/0xd8
[   20.175054]  __kmalloc_noprof+0x198/0x4c8
[   20.175098]  kunit_kmalloc_array+0x34/0x88
[   20.177221]  copy_user_test_oob+0xac/0xec8
[   20.177320]  kunit_try_run_case+0x170/0x3f0
[   20.177373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.177555]  kthread+0x328/0x630
[   20.177941]  ret_from_fork+0x10/0x20
[   20.178002] 
[   20.178133] The buggy address belongs to the object at fff00000c77ac300
[   20.178133]  which belongs to the cache kmalloc-128 of size 128
[   20.178521] The buggy address is located 0 bytes inside of
[   20.178521]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.178719] 
[   20.178747] The buggy address belongs to the physical page:
[   20.178996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.179082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.179177] page_type: f5(slab)
[   20.179246] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.179528] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.179574] page dumped because: kasan: bad access detected
[   20.179611] 
[   20.179633] Memory state around the buggy address:
[   20.179671]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.179717]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179762] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.179803]                                                                 ^
[   20.179845]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179890]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179932] ==================================================================
[   20.212527] ==================================================================
[   20.213091] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.213151] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.213204] 
[   20.213765] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.213865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.213893] Hardware name: linux,dummy-virt (DT)
[   20.214202] Call trace:
[   20.214503]  show_stack+0x20/0x38 (C)
[   20.214830]  dump_stack_lvl+0x8c/0xd0
[   20.214879]  print_report+0x118/0x608
[   20.215073]  kasan_report+0xdc/0x128
[   20.215122]  kasan_check_range+0x100/0x1a8
[   20.215173]  __kasan_check_write+0x20/0x30
[   20.215390]  copy_user_test_oob+0x35c/0xec8
[   20.215967]  kunit_try_run_case+0x170/0x3f0
[   20.216039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.216518]  kthread+0x328/0x630
[   20.216564]  ret_from_fork+0x10/0x20
[   20.217021] 
[   20.217048] Allocated by task 286:
[   20.217079]  kasan_save_stack+0x3c/0x68
[   20.217126]  kasan_save_track+0x20/0x40
[   20.217166]  kasan_save_alloc_info+0x40/0x58
[   20.217208]  __kasan_kmalloc+0xd4/0xd8
[   20.217725]  __kmalloc_noprof+0x198/0x4c8
[   20.217766]  kunit_kmalloc_array+0x34/0x88
[   20.217902]  copy_user_test_oob+0xac/0xec8
[   20.217941]  kunit_try_run_case+0x170/0x3f0
[   20.218458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.218508]  kthread+0x328/0x630
[   20.218541]  ret_from_fork+0x10/0x20
[   20.219159] 
[   20.219189] The buggy address belongs to the object at fff00000c77ac300
[   20.219189]  which belongs to the cache kmalloc-128 of size 128
[   20.219361] The buggy address is located 0 bytes inside of
[   20.219361]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.219431] 
[   20.219452] The buggy address belongs to the physical page:
[   20.219494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.219553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.219972] page_type: f5(slab)
[   20.220034] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.220416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.220464] page dumped because: kasan: bad access detected
[   20.220499] 
[   20.220552] Memory state around the buggy address:
[   20.220664]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.220744]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.221157] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.221204]                                                                 ^
[   20.221249]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.221472]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.221821] ==================================================================
[   20.189854] ==================================================================
[   20.189916] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.191897] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.192051] 
[   20.192092] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.192200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.192227] Hardware name: linux,dummy-virt (DT)
[   20.192259] Call trace:
[   20.192283]  show_stack+0x20/0x38 (C)
[   20.192798]  dump_stack_lvl+0x8c/0xd0
[   20.192863]  print_report+0x118/0x608
[   20.192947]  kasan_report+0xdc/0x128
[   20.193424]  kasan_check_range+0x100/0x1a8
[   20.193806]  __kasan_check_read+0x20/0x30
[   20.193870]  copy_user_test_oob+0x728/0xec8
[   20.194187]  kunit_try_run_case+0x170/0x3f0
[   20.194308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.194365]  kthread+0x328/0x630
[   20.194407]  ret_from_fork+0x10/0x20
[   20.194878] 
[   20.194903] Allocated by task 286:
[   20.194934]  kasan_save_stack+0x3c/0x68
[   20.195165]  kasan_save_track+0x20/0x40
[   20.195440]  kasan_save_alloc_info+0x40/0x58
[   20.195867]  __kasan_kmalloc+0xd4/0xd8
[   20.195919]  __kmalloc_noprof+0x198/0x4c8
[   20.196075]  kunit_kmalloc_array+0x34/0x88
[   20.196151]  copy_user_test_oob+0xac/0xec8
[   20.196288]  kunit_try_run_case+0x170/0x3f0
[   20.196779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.197315]  kthread+0x328/0x630
[   20.197372]  ret_from_fork+0x10/0x20
[   20.197413] 
[   20.197758] The buggy address belongs to the object at fff00000c77ac300
[   20.197758]  which belongs to the cache kmalloc-128 of size 128
[   20.197918] The buggy address is located 0 bytes inside of
[   20.197918]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.198001] 
[   20.198129] The buggy address belongs to the physical page:
[   20.198164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.198239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.198903] page_type: f5(slab)
[   20.199070] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.199124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.199372] page dumped because: kasan: bad access detected
[   20.199413] 
[   20.199433] Memory state around the buggy address:
[   20.199602]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.199713]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.199759] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.200126]                                                                 ^
[   20.200518]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201032]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201528] ==================================================================

[   19.816740] ==================================================================
[   19.816831] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.816895] Read of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286
[   19.816957] 
[   19.816989] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.817076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.817105] Hardware name: linux,dummy-virt (DT)
[   19.817136] Call trace:
[   19.817160]  show_stack+0x20/0x38 (C)
[   19.817207]  dump_stack_lvl+0x8c/0xd0
[   19.817255]  print_report+0x118/0x608
[   19.817301]  kasan_report+0xdc/0x128
[   19.817348]  kasan_check_range+0x100/0x1a8
[   19.817402]  __kasan_check_read+0x20/0x30
[   19.817447]  copy_user_test_oob+0x3c8/0xec8
[   19.817495]  kunit_try_run_case+0x170/0x3f0
[   19.817543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.817597]  kthread+0x328/0x630
[   19.817638]  ret_from_fork+0x10/0x20
[   19.817685] 
[   19.817706] Allocated by task 286:
[   19.817735]  kasan_save_stack+0x3c/0x68
[   19.817778]  kasan_save_track+0x20/0x40
[   19.817816]  kasan_save_alloc_info+0x40/0x58
[   19.817865]  __kasan_kmalloc+0xd4/0xd8
[   19.817904]  __kmalloc_noprof+0x198/0x4c8
[   19.817952]  kunit_kmalloc_array+0x34/0x88
[   19.817992]  copy_user_test_oob+0xac/0xec8
[   19.818030]  kunit_try_run_case+0x170/0x3f0
[   19.818069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.818115]  kthread+0x328/0x630
[   19.818148]  ret_from_fork+0x10/0x20
[   19.818186] 
[   19.818206] The buggy address belongs to the object at fff00000c76c9300
[   19.818206]  which belongs to the cache kmalloc-128 of size 128
[   19.820961] The buggy address is located 0 bytes inside of
[   19.820961]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.821032] 
[   19.821058] The buggy address belongs to the physical page:
[   19.821091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.821145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.821191] page_type: f5(slab)
[   19.821230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.821282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.821325] page dumped because: kasan: bad access detected
[   19.821359] 
[   19.821379] Memory state around the buggy address:
[   19.821420]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.821464]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.821508] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.821548]                                                                 ^
[   19.821592]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.821636]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.821676] ==================================================================
[   19.835060] ==================================================================
[   19.835225] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   19.835280] Read of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286
[   19.835361] 
[   19.835574] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.835761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.835808] Hardware name: linux,dummy-virt (DT)
[   19.835839] Call trace:
[   19.835863]  show_stack+0x20/0x38 (C)
[   19.836032]  dump_stack_lvl+0x8c/0xd0
[   19.836088]  print_report+0x118/0x608
[   19.836136]  kasan_report+0xdc/0x128
[   19.836182]  kasan_check_range+0x100/0x1a8
[   19.836232]  __kasan_check_read+0x20/0x30
[   19.836291]  copy_user_test_oob+0x4a0/0xec8
[   19.836342]  kunit_try_run_case+0x170/0x3f0
[   19.836410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.836464]  kthread+0x328/0x630
[   19.836505]  ret_from_fork+0x10/0x20
[   19.836556] 
[   19.836819] Allocated by task 286:
[   19.836863]  kasan_save_stack+0x3c/0x68
[   19.836908]  kasan_save_track+0x20/0x40
[   19.836963]  kasan_save_alloc_info+0x40/0x58
[   19.837005]  __kasan_kmalloc+0xd4/0xd8
[   19.837042]  __kmalloc_noprof+0x198/0x4c8
[   19.838345]  kunit_kmalloc_array+0x34/0x88
[   19.838530]  copy_user_test_oob+0xac/0xec8
[   19.838731]  kunit_try_run_case+0x170/0x3f0
[   19.838933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.839064]  kthread+0x328/0x630
[   19.839122]  ret_from_fork+0x10/0x20
[   19.839204] 
[   19.839319] The buggy address belongs to the object at fff00000c76c9300
[   19.839319]  which belongs to the cache kmalloc-128 of size 128
[   19.839402] The buggy address is located 0 bytes inside of
[   19.839402]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.839550] 
[   19.839622] The buggy address belongs to the physical page:
[   19.839690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.839774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.839823] page_type: f5(slab)
[   19.839887] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.840245] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.840321] page dumped because: kasan: bad access detected
[   19.840483] 
[   19.840643] Memory state around the buggy address:
[   19.840699]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.840874]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.840938] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.841026]                                                                 ^
[   19.841126]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.841289]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.841338] ==================================================================
[   19.795992] ==================================================================
[   19.796057] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.796112] Read of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286
[   19.796167] 
[   19.796201] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.796314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.796351] Hardware name: linux,dummy-virt (DT)
[   19.796399] Call trace:
[   19.796438]  show_stack+0x20/0x38 (C)
[   19.796706]  dump_stack_lvl+0x8c/0xd0
[   19.797154]  print_report+0x118/0x608
[   19.797223]  kasan_report+0xdc/0x128
[   19.797346]  kasan_check_range+0x100/0x1a8
[   19.797399]  __kasan_check_read+0x20/0x30
[   19.797446]  copy_user_test_oob+0x728/0xec8
[   19.797525]  kunit_try_run_case+0x170/0x3f0
[   19.797604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.797676]  kthread+0x328/0x630
[   19.797718]  ret_from_fork+0x10/0x20
[   19.797952] 
[   19.798022] Allocated by task 286:
[   19.798119]  kasan_save_stack+0x3c/0x68
[   19.798185]  kasan_save_track+0x20/0x40
[   19.798242]  kasan_save_alloc_info+0x40/0x58
[   19.798437]  __kasan_kmalloc+0xd4/0xd8
[   19.798553]  __kmalloc_noprof+0x198/0x4c8
[   19.798631]  kunit_kmalloc_array+0x34/0x88
[   19.798705]  copy_user_test_oob+0xac/0xec8
[   19.798777]  kunit_try_run_case+0x170/0x3f0
[   19.798819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.798864]  kthread+0x328/0x630
[   19.798919]  ret_from_fork+0x10/0x20
[   19.798961] 
[   19.798985] The buggy address belongs to the object at fff00000c76c9300
[   19.798985]  which belongs to the cache kmalloc-128 of size 128
[   19.799168] The buggy address is located 0 bytes inside of
[   19.799168]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.799302] 
[   19.799341] The buggy address belongs to the physical page:
[   19.799459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.799533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.799620] page_type: f5(slab)
[   19.799799] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.799906] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.799986] page dumped because: kasan: bad access detected
[   19.800099] 
[   19.800151] Memory state around the buggy address:
[   19.800223]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.800335]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800423] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.800520]                                                                 ^
[   19.800565]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800610]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800879] ==================================================================
[   19.828288] ==================================================================
[   19.828665] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.828761] Write of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286
[   19.828869] 
[   19.828905] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.829101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.829150] Hardware name: linux,dummy-virt (DT)
[   19.829198] Call trace:
[   19.829276]  show_stack+0x20/0x38 (C)
[   19.829349]  dump_stack_lvl+0x8c/0xd0
[   19.829404]  print_report+0x118/0x608
[   19.829650]  kasan_report+0xdc/0x128
[   19.829718]  kasan_check_range+0x100/0x1a8
[   19.829769]  __kasan_check_write+0x20/0x30
[   19.829814]  copy_user_test_oob+0x434/0xec8
[   19.829924]  kunit_try_run_case+0x170/0x3f0
[   19.829977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.830095]  kthread+0x328/0x630
[   19.830147]  ret_from_fork+0x10/0x20
[   19.830200] 
[   19.830222] Allocated by task 286:
[   19.830530]  kasan_save_stack+0x3c/0x68
[   19.830620]  kasan_save_track+0x20/0x40
[   19.830730]  kasan_save_alloc_info+0x40/0x58
[   19.830807]  __kasan_kmalloc+0xd4/0xd8
[   19.831088]  __kmalloc_noprof+0x198/0x4c8
[   19.831186]  kunit_kmalloc_array+0x34/0x88
[   19.831314]  copy_user_test_oob+0xac/0xec8
[   19.831390]  kunit_try_run_case+0x170/0x3f0
[   19.831496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.831545]  kthread+0x328/0x630
[   19.831579]  ret_from_fork+0x10/0x20
[   19.831850] 
[   19.831903] The buggy address belongs to the object at fff00000c76c9300
[   19.831903]  which belongs to the cache kmalloc-128 of size 128
[   19.832046] The buggy address is located 0 bytes inside of
[   19.832046]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.832140] 
[   19.832375] The buggy address belongs to the physical page:
[   19.832439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.832496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.832570] page_type: f5(slab)
[   19.832610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.832675] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.832719] page dumped because: kasan: bad access detected
[   19.832753] 
[   19.832775] Memory state around the buggy address:
[   19.832819]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.832864]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.833284] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.833506]                                                                 ^
[   19.833557]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.833767]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.833884] ==================================================================
[   19.784188] ==================================================================
[   19.784300] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.784391] Write of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286
[   19.784447] 
[   19.784490] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.784578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.784608] Hardware name: linux,dummy-virt (DT)
[   19.784642] Call trace:
[   19.784668]  show_stack+0x20/0x38 (C)
[   19.784720]  dump_stack_lvl+0x8c/0xd0
[   19.784784]  print_report+0x118/0x608
[   19.784832]  kasan_report+0xdc/0x128
[   19.784879]  kasan_check_range+0x100/0x1a8
[   19.784941]  __kasan_check_write+0x20/0x30
[   19.785287]  copy_user_test_oob+0x234/0xec8
[   19.785377]  kunit_try_run_case+0x170/0x3f0
[   19.785448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.785502]  kthread+0x328/0x630
[   19.785559]  ret_from_fork+0x10/0x20
[   19.785762] 
[   19.785828] Allocated by task 286:
[   19.785865]  kasan_save_stack+0x3c/0x68
[   19.785929]  kasan_save_track+0x20/0x40
[   19.786264]  kasan_save_alloc_info+0x40/0x58
[   19.786494]  __kasan_kmalloc+0xd4/0xd8
[   19.786621]  __kmalloc_noprof+0x198/0x4c8
[   19.786694]  kunit_kmalloc_array+0x34/0x88
[   19.786741]  copy_user_test_oob+0xac/0xec8
[   19.786789]  kunit_try_run_case+0x170/0x3f0
[   19.787086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.787182]  kthread+0x328/0x630
[   19.787243]  ret_from_fork+0x10/0x20
[   19.787322] 
[   19.787387] The buggy address belongs to the object at fff00000c76c9300
[   19.787387]  which belongs to the cache kmalloc-128 of size 128
[   19.787463] The buggy address is located 0 bytes inside of
[   19.787463]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.787756] 
[   19.787802] The buggy address belongs to the physical page:
[   19.787907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.788005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.788278] page_type: f5(slab)
[   19.788356] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.788475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.788519] page dumped because: kasan: bad access detected
[   19.788673] 
[   19.788826] Memory state around the buggy address:
[   19.788893]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.789010]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.789089] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.789419]                                                                 ^
[   19.789482]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.789646]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.789837] ==================================================================
[   19.808780] ==================================================================
[   19.808966] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.809042] Write of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286
[   19.809156] 
[   19.809193] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.809413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.809468] Hardware name: linux,dummy-virt (DT)
[   19.809540] Call trace:
[   19.809568]  show_stack+0x20/0x38 (C)
[   19.809875]  dump_stack_lvl+0x8c/0xd0
[   19.809947]  print_report+0x118/0x608
[   19.810135]  kasan_report+0xdc/0x128
[   19.810220]  kasan_check_range+0x100/0x1a8
[   19.810335]  __kasan_check_write+0x20/0x30
[   19.810384]  copy_user_test_oob+0x35c/0xec8
[   19.810432]  kunit_try_run_case+0x170/0x3f0
[   19.810623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810770]  kthread+0x328/0x630
[   19.810845]  ret_from_fork+0x10/0x20
[   19.810985] 
[   19.811032] Allocated by task 286:
[   19.811088]  kasan_save_stack+0x3c/0x68
[   19.811368]  kasan_save_track+0x20/0x40
[   19.811547]  kasan_save_alloc_info+0x40/0x58
[   19.811694]  __kasan_kmalloc+0xd4/0xd8
[   19.811762]  __kmalloc_noprof+0x198/0x4c8
[   19.811940]  kunit_kmalloc_array+0x34/0x88
[   19.812017]  copy_user_test_oob+0xac/0xec8
[   19.812274]  kunit_try_run_case+0x170/0x3f0
[   19.812332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.812412]  kthread+0x328/0x630
[   19.812503]  ret_from_fork+0x10/0x20
[   19.812603] 
[   19.812842] The buggy address belongs to the object at fff00000c76c9300
[   19.812842]  which belongs to the cache kmalloc-128 of size 128
[   19.813020] The buggy address is located 0 bytes inside of
[   19.813020]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.813126] 
[   19.813281] The buggy address belongs to the physical page:
[   19.813401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.813504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.813635] page_type: f5(slab)
[   19.813703] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.813812] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.813889] page dumped because: kasan: bad access detected
[   19.813967] 
[   19.814005] Memory state around the buggy address:
[   19.814101]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.814147]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.814192] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.814238]                                                                 ^
[   19.814281]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.814564]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.814688] ==================================================================

[   18.063751] ==================================================================
[   18.064163] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   18.064683] Write of size 121 at addr ffff88810254dc00 by task kunit_try_catch/303
[   18.065189] 
[   18.065396] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.065466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.065484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.065513] Call Trace:
[   18.065534]  <TASK>
[   18.065557]  dump_stack_lvl+0x73/0xb0
[   18.065601]  print_report+0xd1/0x650
[   18.065660]  ? __virt_addr_valid+0x1db/0x2d0
[   18.065700]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.065743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.065785]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.065825]  kasan_report+0x141/0x180
[   18.065868]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.065930]  kasan_check_range+0x10c/0x1c0
[   18.065979]  __kasan_check_write+0x18/0x20
[   18.066021]  copy_user_test_oob+0x3fd/0x10f0
[   18.066092]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.066188]  ? finish_task_switch.isra.0+0x153/0x700
[   18.066239]  ? __switch_to+0x47/0xf50
[   18.066293]  ? __schedule+0x10cc/0x2b60
[   18.066339]  ? __pfx_read_tsc+0x10/0x10
[   18.066381]  ? ktime_get_ts64+0x86/0x230
[   18.066424]  kunit_try_run_case+0x1a5/0x480
[   18.066472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.066505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.066534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.066557]  ? __kthread_parkme+0x82/0x180
[   18.066577]  ? preempt_count_sub+0x50/0x80
[   18.066598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.066642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.066669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.066690]  kthread+0x337/0x6f0
[   18.066709]  ? trace_preempt_on+0x20/0xc0
[   18.066733]  ? __pfx_kthread+0x10/0x10
[   18.066753]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.066773]  ? calculate_sigpending+0x7b/0xa0
[   18.066795]  ? __pfx_kthread+0x10/0x10
[   18.066816]  ret_from_fork+0x116/0x1d0
[   18.066833]  ? __pfx_kthread+0x10/0x10
[   18.066853]  ret_from_fork_asm+0x1a/0x30
[   18.066882]  </TASK>
[   18.066896] 
[   18.076905] Allocated by task 303:
[   18.077263]  kasan_save_stack+0x45/0x70
[   18.077661]  kasan_save_track+0x18/0x40
[   18.078023]  kasan_save_alloc_info+0x3b/0x50
[   18.078393]  __kasan_kmalloc+0xb7/0xc0
[   18.078629]  __kmalloc_noprof+0x1c9/0x500
[   18.078783]  kunit_kmalloc_array+0x25/0x60
[   18.079064]  copy_user_test_oob+0xab/0x10f0
[   18.079513]  kunit_try_run_case+0x1a5/0x480
[   18.079747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.079971]  kthread+0x337/0x6f0
[   18.080518]  ret_from_fork+0x116/0x1d0
[   18.080818]  ret_from_fork_asm+0x1a/0x30
[   18.081041] 
[   18.081388] The buggy address belongs to the object at ffff88810254dc00
[   18.081388]  which belongs to the cache kmalloc-128 of size 128
[   18.082138] The buggy address is located 0 bytes inside of
[   18.082138]  allocated 120-byte region [ffff88810254dc00, ffff88810254dc78)
[   18.082777] 
[   18.082956] The buggy address belongs to the physical page:
[   18.083306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   18.083682] flags: 0x200000000000000(node=0|zone=2)
[   18.084014] page_type: f5(slab)
[   18.084311] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.084579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.085012] page dumped because: kasan: bad access detected
[   18.085589] 
[   18.085901] Memory state around the buggy address:
[   18.086100]  ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.086914]  ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.087474] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.087713]                                                                 ^
[   18.088535]  ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.088853]  ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.089691] ==================================================================
[   18.090352] ==================================================================
[   18.090766] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   18.091095] Read of size 121 at addr ffff88810254dc00 by task kunit_try_catch/303
[   18.091601] 
[   18.091857] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.091949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.091977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.092019] Call Trace:
[   18.092052]  <TASK>
[   18.092084]  dump_stack_lvl+0x73/0xb0
[   18.092185]  print_report+0xd1/0x650
[   18.092249]  ? __virt_addr_valid+0x1db/0x2d0
[   18.092295]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.092375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.092420]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.092459]  kasan_report+0x141/0x180
[   18.092498]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.092572]  kasan_check_range+0x10c/0x1c0
[   18.092632]  __kasan_check_read+0x15/0x20
[   18.092681]  copy_user_test_oob+0x4aa/0x10f0
[   18.092731]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.092792]  ? finish_task_switch.isra.0+0x153/0x700
[   18.092833]  ? __switch_to+0x47/0xf50
[   18.092896]  ? __schedule+0x10cc/0x2b60
[   18.092943]  ? __pfx_read_tsc+0x10/0x10
[   18.092984]  ? ktime_get_ts64+0x86/0x230
[   18.093033]  kunit_try_run_case+0x1a5/0x480
[   18.093081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.093139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.093165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.093187]  ? __kthread_parkme+0x82/0x180
[   18.093207]  ? preempt_count_sub+0x50/0x80
[   18.093228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.093250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.093273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.093294]  kthread+0x337/0x6f0
[   18.093313]  ? trace_preempt_on+0x20/0xc0
[   18.093336]  ? __pfx_kthread+0x10/0x10
[   18.093355]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.093375]  ? calculate_sigpending+0x7b/0xa0
[   18.093398]  ? __pfx_kthread+0x10/0x10
[   18.093418]  ret_from_fork+0x116/0x1d0
[   18.093435]  ? __pfx_kthread+0x10/0x10
[   18.093455]  ret_from_fork_asm+0x1a/0x30
[   18.093483]  </TASK>
[   18.093498] 
[   18.102962] Allocated by task 303:
[   18.103312]  kasan_save_stack+0x45/0x70
[   18.103647]  kasan_save_track+0x18/0x40
[   18.103935]  kasan_save_alloc_info+0x3b/0x50
[   18.104289]  __kasan_kmalloc+0xb7/0xc0
[   18.104597]  __kmalloc_noprof+0x1c9/0x500
[   18.104786]  kunit_kmalloc_array+0x25/0x60
[   18.105173]  copy_user_test_oob+0xab/0x10f0
[   18.105542]  kunit_try_run_case+0x1a5/0x480
[   18.105839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.106291]  kthread+0x337/0x6f0
[   18.106559]  ret_from_fork+0x116/0x1d0
[   18.106890]  ret_from_fork_asm+0x1a/0x30
[   18.107212] 
[   18.107415] The buggy address belongs to the object at ffff88810254dc00
[   18.107415]  which belongs to the cache kmalloc-128 of size 128
[   18.108003] The buggy address is located 0 bytes inside of
[   18.108003]  allocated 120-byte region [ffff88810254dc00, ffff88810254dc78)
[   18.108797] 
[   18.108946] The buggy address belongs to the physical page:
[   18.109366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   18.110012] flags: 0x200000000000000(node=0|zone=2)
[   18.110415] page_type: f5(slab)
[   18.110599] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.110872] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.111297] page dumped because: kasan: bad access detected
[   18.111752] 
[   18.111914] Memory state around the buggy address:
[   18.112378]  ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.112940]  ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113330] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.113815]                                                                 ^
[   18.114315]  ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.114577]  ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.115095] ==================================================================
[   18.115861] ==================================================================
[   18.116372] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   18.116889] Write of size 121 at addr ffff88810254dc00 by task kunit_try_catch/303
[   18.117380] 
[   18.117578] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.117694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.117722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.117789] Call Trace:
[   18.117821]  <TASK>
[   18.117868]  dump_stack_lvl+0x73/0xb0
[   18.117907]  print_report+0xd1/0x650
[   18.117940]  ? __virt_addr_valid+0x1db/0x2d0
[   18.117963]  ? copy_user_test_oob+0x557/0x10f0
[   18.117986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.118014]  ? copy_user_test_oob+0x557/0x10f0
[   18.118052]  kasan_report+0x141/0x180
[   18.118088]  ? copy_user_test_oob+0x557/0x10f0
[   18.118171]  kasan_check_range+0x10c/0x1c0
[   18.118242]  __kasan_check_write+0x18/0x20
[   18.118283]  copy_user_test_oob+0x557/0x10f0
[   18.118348]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.118390]  ? finish_task_switch.isra.0+0x153/0x700
[   18.118455]  ? __switch_to+0x47/0xf50
[   18.118509]  ? __schedule+0x10cc/0x2b60
[   18.118567]  ? __pfx_read_tsc+0x10/0x10
[   18.118606]  ? ktime_get_ts64+0x86/0x230
[   18.118688]  kunit_try_run_case+0x1a5/0x480
[   18.118750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.118791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.118835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.118878]  ? __kthread_parkme+0x82/0x180
[   18.118918]  ? preempt_count_sub+0x50/0x80
[   18.118964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.119010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.119053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.119076]  kthread+0x337/0x6f0
[   18.119106]  ? trace_preempt_on+0x20/0xc0
[   18.119175]  ? __pfx_kthread+0x10/0x10
[   18.119229]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.119277]  ? calculate_sigpending+0x7b/0xa0
[   18.119337]  ? __pfx_kthread+0x10/0x10
[   18.119398]  ret_from_fork+0x116/0x1d0
[   18.119436]  ? __pfx_kthread+0x10/0x10
[   18.119470]  ret_from_fork_asm+0x1a/0x30
[   18.119501]  </TASK>
[   18.119516] 
[   18.130722] Allocated by task 303:
[   18.130875]  kasan_save_stack+0x45/0x70
[   18.131039]  kasan_save_track+0x18/0x40
[   18.131183]  kasan_save_alloc_info+0x3b/0x50
[   18.131349]  __kasan_kmalloc+0xb7/0xc0
[   18.131501]  __kmalloc_noprof+0x1c9/0x500
[   18.131672]  kunit_kmalloc_array+0x25/0x60
[   18.131822]  copy_user_test_oob+0xab/0x10f0
[   18.131982]  kunit_try_run_case+0x1a5/0x480
[   18.132121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.132665]  kthread+0x337/0x6f0
[   18.132852]  ret_from_fork+0x116/0x1d0
[   18.133022]  ret_from_fork_asm+0x1a/0x30
[   18.133189] 
[   18.133342] The buggy address belongs to the object at ffff88810254dc00
[   18.133342]  which belongs to the cache kmalloc-128 of size 128
[   18.134136] The buggy address is located 0 bytes inside of
[   18.134136]  allocated 120-byte region [ffff88810254dc00, ffff88810254dc78)
[   18.135761] 
[   18.135883] The buggy address belongs to the physical page:
[   18.136052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   18.136791] flags: 0x200000000000000(node=0|zone=2)
[   18.138780] page_type: f5(slab)
[   18.138974] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.139684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.139915] page dumped because: kasan: bad access detected
[   18.140095] 
[   18.140210] Memory state around the buggy address:
[   18.140377]  ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.140737]  ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.141177] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.141657]                                                                 ^
[   18.142109]  ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.142532]  ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.142968] ==================================================================
[   18.144687] ==================================================================
[   18.145005] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   18.145764] Read of size 121 at addr ffff88810254dc00 by task kunit_try_catch/303
[   18.146132] 
[   18.146581] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.146666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.146693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.146733] Call Trace:
[   18.146765]  <TASK>
[   18.146902]  dump_stack_lvl+0x73/0xb0
[   18.146965]  print_report+0xd1/0x650
[   18.146991]  ? __virt_addr_valid+0x1db/0x2d0
[   18.147013]  ? copy_user_test_oob+0x604/0x10f0
[   18.147036]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.147060]  ? copy_user_test_oob+0x604/0x10f0
[   18.147081]  kasan_report+0x141/0x180
[   18.147114]  ? copy_user_test_oob+0x604/0x10f0
[   18.147147]  kasan_check_range+0x10c/0x1c0
[   18.147169]  __kasan_check_read+0x15/0x20
[   18.147188]  copy_user_test_oob+0x604/0x10f0
[   18.147212]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.147233]  ? finish_task_switch.isra.0+0x153/0x700
[   18.147255]  ? __switch_to+0x47/0xf50
[   18.147280]  ? __schedule+0x10cc/0x2b60
[   18.147301]  ? __pfx_read_tsc+0x10/0x10
[   18.147321]  ? ktime_get_ts64+0x86/0x230
[   18.147344]  kunit_try_run_case+0x1a5/0x480
[   18.147367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.147387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.147408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.147429]  ? __kthread_parkme+0x82/0x180
[   18.147449]  ? preempt_count_sub+0x50/0x80
[   18.147470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.147492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.147514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.147535]  kthread+0x337/0x6f0
[   18.147554]  ? trace_preempt_on+0x20/0xc0
[   18.147576]  ? __pfx_kthread+0x10/0x10
[   18.147596]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.147632]  ? calculate_sigpending+0x7b/0xa0
[   18.147658]  ? __pfx_kthread+0x10/0x10
[   18.147679]  ret_from_fork+0x116/0x1d0
[   18.147698]  ? __pfx_kthread+0x10/0x10
[   18.147717]  ret_from_fork_asm+0x1a/0x30
[   18.147746]  </TASK>
[   18.147760] 
[   18.158681] Allocated by task 303:
[   18.158971]  kasan_save_stack+0x45/0x70
[   18.159300]  kasan_save_track+0x18/0x40
[   18.159572]  kasan_save_alloc_info+0x3b/0x50
[   18.159791]  __kasan_kmalloc+0xb7/0xc0
[   18.160060]  __kmalloc_noprof+0x1c9/0x500
[   18.160403]  kunit_kmalloc_array+0x25/0x60
[   18.160731]  copy_user_test_oob+0xab/0x10f0
[   18.161060]  kunit_try_run_case+0x1a5/0x480
[   18.161319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.161597]  kthread+0x337/0x6f0
[   18.161985]  ret_from_fork+0x116/0x1d0
[   18.162346]  ret_from_fork_asm+0x1a/0x30
[   18.162661] 
[   18.162771] The buggy address belongs to the object at ffff88810254dc00
[   18.162771]  which belongs to the cache kmalloc-128 of size 128
[   18.163625] The buggy address is located 0 bytes inside of
[   18.163625]  allocated 120-byte region [ffff88810254dc00, ffff88810254dc78)
[   18.164319] 
[   18.164450] The buggy address belongs to the physical page:
[   18.164700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   18.165225] flags: 0x200000000000000(node=0|zone=2)
[   18.165714] page_type: f5(slab)
[   18.165979] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.166378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.166903] page dumped because: kasan: bad access detected
[   18.167196] 
[   18.167350] Memory state around the buggy address:
[   18.167553]  ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.167991]  ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.168500] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.168829]                                                                 ^
[   18.169255]  ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169573]  ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169904] ==================================================================

[   18.013712] ==================================================================
[   18.014905] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   18.015252] Read of size 121 at addr ffff8881031c0b00 by task kunit_try_catch/302
[   18.015560] 
[   18.015686] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.015733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.016139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.016164] Call Trace:
[   18.016184]  <TASK>
[   18.016204]  dump_stack_lvl+0x73/0xb0
[   18.016337]  print_report+0xd1/0x650
[   18.016364]  ? __virt_addr_valid+0x1db/0x2d0
[   18.016391]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.016418]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.016449]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.016477]  kasan_report+0x141/0x180
[   18.016503]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.016536]  kasan_check_range+0x10c/0x1c0
[   18.016564]  __kasan_check_read+0x15/0x20
[   18.016586]  copy_user_test_oob+0x4aa/0x10f0
[   18.016617]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.016646]  ? __kasan_check_write+0x18/0x20
[   18.016669]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.016696]  ? irqentry_exit+0x2a/0x60
[   18.016721]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.016751]  ? trace_hardirqs_on+0x37/0xe0
[   18.016777]  ? __pfx_read_tsc+0x10/0x10
[   18.016803]  ? ktime_get_ts64+0x86/0x230
[   18.016834]  kunit_try_run_case+0x1a5/0x480
[   18.016863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.016892]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.016919]  ? __kthread_parkme+0x82/0x180
[   18.016943]  ? preempt_count_sub+0x50/0x80
[   18.016970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.016998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.017025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.017064]  kthread+0x337/0x6f0
[   18.017088]  ? trace_preempt_on+0x20/0xc0
[   18.017115]  ? __pfx_kthread+0x10/0x10
[   18.017139]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.017163]  ? calculate_sigpending+0x7b/0xa0
[   18.017190]  ? __pfx_kthread+0x10/0x10
[   18.017215]  ret_from_fork+0x116/0x1d0
[   18.017237]  ? __pfx_kthread+0x10/0x10
[   18.017262]  ret_from_fork_asm+0x1a/0x30
[   18.017298]  </TASK>
[   18.017313] 
[   18.027410] Allocated by task 302:
[   18.027612]  kasan_save_stack+0x45/0x70
[   18.027833]  kasan_save_track+0x18/0x40
[   18.028205]  kasan_save_alloc_info+0x3b/0x50
[   18.028493]  __kasan_kmalloc+0xb7/0xc0
[   18.028647]  __kmalloc_noprof+0x1c9/0x500
[   18.028979]  kunit_kmalloc_array+0x25/0x60
[   18.029150]  copy_user_test_oob+0xab/0x10f0
[   18.029375]  kunit_try_run_case+0x1a5/0x480
[   18.029595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.030116]  kthread+0x337/0x6f0
[   18.030292]  ret_from_fork+0x116/0x1d0
[   18.030448]  ret_from_fork_asm+0x1a/0x30
[   18.030780] 
[   18.030877] The buggy address belongs to the object at ffff8881031c0b00
[   18.030877]  which belongs to the cache kmalloc-128 of size 128
[   18.031601] The buggy address is located 0 bytes inside of
[   18.031601]  allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78)
[   18.032315] 
[   18.032419] The buggy address belongs to the physical page:
[   18.032752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   18.033230] flags: 0x200000000000000(node=0|zone=2)
[   18.033487] page_type: f5(slab)
[   18.033666] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.034185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.034585] page dumped because: kasan: bad access detected
[   18.034902] 
[   18.035000] Memory state around the buggy address:
[   18.035337]  ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.035706]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.036225] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.036526]                                                                 ^
[   18.036933]  ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037310]  ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037693] ==================================================================
[   17.994128] ==================================================================
[   17.994466] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   17.994792] Write of size 121 at addr ffff8881031c0b00 by task kunit_try_catch/302
[   17.995149] 
[   17.995247] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.995297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.995310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.995334] Call Trace:
[   17.995349]  <TASK>
[   17.995369]  dump_stack_lvl+0x73/0xb0
[   17.995403]  print_report+0xd1/0x650
[   17.995429]  ? __virt_addr_valid+0x1db/0x2d0
[   17.995456]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.995483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.995513]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.995540]  kasan_report+0x141/0x180
[   17.995566]  ? copy_user_test_oob+0x3fd/0x10f0
[   17.995599]  kasan_check_range+0x10c/0x1c0
[   17.995626]  __kasan_check_write+0x18/0x20
[   17.995648]  copy_user_test_oob+0x3fd/0x10f0
[   17.995678]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.995707]  ? __kasan_check_write+0x18/0x20
[   17.995729]  ? queued_spin_lock_slowpath+0x116/0xb40
[   17.995756]  ? irqentry_exit+0x2a/0x60
[   17.995782]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.995810]  ? trace_hardirqs_on+0x37/0xe0
[   17.995838]  ? __pfx_read_tsc+0x10/0x10
[   17.995864]  ? ktime_get_ts64+0x86/0x230
[   17.995893]  kunit_try_run_case+0x1a5/0x480
[   17.995933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.995962]  ? queued_spin_lock_slowpath+0x116/0xb40
[   17.995989]  ? __kthread_parkme+0x82/0x180
[   17.996013]  ? preempt_count_sub+0x50/0x80
[   17.996042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.996081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.996108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.996135]  kthread+0x337/0x6f0
[   17.996159]  ? trace_preempt_on+0x20/0xc0
[   17.996185]  ? __pfx_kthread+0x10/0x10
[   17.996210]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.996236]  ? calculate_sigpending+0x7b/0xa0
[   17.996262]  ? __pfx_kthread+0x10/0x10
[   17.996288]  ret_from_fork+0x116/0x1d0
[   17.996310]  ? __pfx_kthread+0x10/0x10
[   17.996334]  ret_from_fork_asm+0x1a/0x30
[   17.996369]  </TASK>
[   17.996383] 
[   18.004429] Allocated by task 302:
[   18.004631]  kasan_save_stack+0x45/0x70
[   18.004854]  kasan_save_track+0x18/0x40
[   18.005036]  kasan_save_alloc_info+0x3b/0x50
[   18.005209]  __kasan_kmalloc+0xb7/0xc0
[   18.005404]  __kmalloc_noprof+0x1c9/0x500
[   18.005621]  kunit_kmalloc_array+0x25/0x60
[   18.005836]  copy_user_test_oob+0xab/0x10f0
[   18.006106]  kunit_try_run_case+0x1a5/0x480
[   18.006262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.006544]  kthread+0x337/0x6f0
[   18.006737]  ret_from_fork+0x116/0x1d0
[   18.006928]  ret_from_fork_asm+0x1a/0x30
[   18.007088] 
[   18.007167] The buggy address belongs to the object at ffff8881031c0b00
[   18.007167]  which belongs to the cache kmalloc-128 of size 128
[   18.007580] The buggy address is located 0 bytes inside of
[   18.007580]  allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78)
[   18.008153] 
[   18.008256] The buggy address belongs to the physical page:
[   18.008527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   18.008784] flags: 0x200000000000000(node=0|zone=2)
[   18.008960] page_type: f5(slab)
[   18.009113] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.009487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.009851] page dumped because: kasan: bad access detected
[   18.010139] 
[   18.010244] Memory state around the buggy address:
[   18.010523]  ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.010895]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.011207] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.011498]                                                                 ^
[   18.011766]  ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.012081]  ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.012498] ==================================================================
[   18.062348] ==================================================================
[   18.062636] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   18.063144] Read of size 121 at addr ffff8881031c0b00 by task kunit_try_catch/302
[   18.063960] 
[   18.064159] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.064209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.064222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.064355] Call Trace:
[   18.064375]  <TASK>
[   18.064393]  dump_stack_lvl+0x73/0xb0
[   18.064427]  print_report+0xd1/0x650
[   18.064455]  ? __virt_addr_valid+0x1db/0x2d0
[   18.064480]  ? copy_user_test_oob+0x604/0x10f0
[   18.064506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.064536]  ? copy_user_test_oob+0x604/0x10f0
[   18.064562]  kasan_report+0x141/0x180
[   18.064588]  ? copy_user_test_oob+0x604/0x10f0
[   18.064620]  kasan_check_range+0x10c/0x1c0
[   18.064646]  __kasan_check_read+0x15/0x20
[   18.064668]  copy_user_test_oob+0x604/0x10f0
[   18.064697]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.064740]  ? __kasan_check_write+0x18/0x20
[   18.064763]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.064789]  ? irqentry_exit+0x2a/0x60
[   18.064814]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.064841]  ? trace_hardirqs_on+0x37/0xe0
[   18.064867]  ? __pfx_read_tsc+0x10/0x10
[   18.064891]  ? ktime_get_ts64+0x86/0x230
[   18.064919]  kunit_try_run_case+0x1a5/0x480
[   18.064947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.064975]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.065000]  ? __kthread_parkme+0x82/0x180
[   18.065024]  ? preempt_count_sub+0x50/0x80
[   18.065063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.065090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.065116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.065141]  kthread+0x337/0x6f0
[   18.065164]  ? trace_preempt_on+0x20/0xc0
[   18.065188]  ? __pfx_kthread+0x10/0x10
[   18.065212]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.065236]  ? calculate_sigpending+0x7b/0xa0
[   18.065262]  ? __pfx_kthread+0x10/0x10
[   18.065287]  ret_from_fork+0x116/0x1d0
[   18.065308]  ? __pfx_kthread+0x10/0x10
[   18.065332]  ret_from_fork_asm+0x1a/0x30
[   18.065367]  </TASK>
[   18.065381] 
[   18.075407] Allocated by task 302:
[   18.075769]  kasan_save_stack+0x45/0x70
[   18.075949]  kasan_save_track+0x18/0x40
[   18.076157]  kasan_save_alloc_info+0x3b/0x50
[   18.076362]  __kasan_kmalloc+0xb7/0xc0
[   18.076532]  __kmalloc_noprof+0x1c9/0x500
[   18.076719]  kunit_kmalloc_array+0x25/0x60
[   18.077204]  copy_user_test_oob+0xab/0x10f0
[   18.077382]  kunit_try_run_case+0x1a5/0x480
[   18.077723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.077925]  kthread+0x337/0x6f0
[   18.078237]  ret_from_fork+0x116/0x1d0
[   18.078390]  ret_from_fork_asm+0x1a/0x30
[   18.078696] 
[   18.078829] The buggy address belongs to the object at ffff8881031c0b00
[   18.078829]  which belongs to the cache kmalloc-128 of size 128
[   18.079515] The buggy address is located 0 bytes inside of
[   18.079515]  allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78)
[   18.080146] 
[   18.080366] The buggy address belongs to the physical page:
[   18.080639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   18.081087] flags: 0x200000000000000(node=0|zone=2)
[   18.081394] page_type: f5(slab)
[   18.081581] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.082044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.082366] page dumped because: kasan: bad access detected
[   18.082697] 
[   18.082832] Memory state around the buggy address:
[   18.083163]  ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.083463]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.083909] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.084231]                                                                 ^
[   18.084615]  ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.084944]  ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.085399] ==================================================================
[   18.038441] ==================================================================
[   18.039110] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   18.039445] Write of size 121 at addr ffff8881031c0b00 by task kunit_try_catch/302
[   18.039973] 
[   18.040105] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.040154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.040168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.040191] Call Trace:
[   18.040212]  <TASK>
[   18.040381]  dump_stack_lvl+0x73/0xb0
[   18.040417]  print_report+0xd1/0x650
[   18.040442]  ? __virt_addr_valid+0x1db/0x2d0
[   18.040468]  ? copy_user_test_oob+0x557/0x10f0
[   18.040495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.040524]  ? copy_user_test_oob+0x557/0x10f0
[   18.040552]  kasan_report+0x141/0x180
[   18.040578]  ? copy_user_test_oob+0x557/0x10f0
[   18.040610]  kasan_check_range+0x10c/0x1c0
[   18.040637]  __kasan_check_write+0x18/0x20
[   18.040659]  copy_user_test_oob+0x557/0x10f0
[   18.040688]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.040716]  ? __kasan_check_write+0x18/0x20
[   18.040751]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.040779]  ? irqentry_exit+0x2a/0x60
[   18.040804]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.040831]  ? trace_hardirqs_on+0x37/0xe0
[   18.040858]  ? __pfx_read_tsc+0x10/0x10
[   18.040882]  ? ktime_get_ts64+0x86/0x230
[   18.040912]  kunit_try_run_case+0x1a5/0x480
[   18.040939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.040967]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.040993]  ? __kthread_parkme+0x82/0x180
[   18.041016]  ? preempt_count_sub+0x50/0x80
[   18.041043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.041081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.041107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.041133]  kthread+0x337/0x6f0
[   18.041155]  ? trace_preempt_on+0x20/0xc0
[   18.041180]  ? __pfx_kthread+0x10/0x10
[   18.041203]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.041227]  ? calculate_sigpending+0x7b/0xa0
[   18.041253]  ? __pfx_kthread+0x10/0x10
[   18.041281]  ret_from_fork+0x116/0x1d0
[   18.041302]  ? __pfx_kthread+0x10/0x10
[   18.041325]  ret_from_fork_asm+0x1a/0x30
[   18.041359]  </TASK>
[   18.041374] 
[   18.051222] Allocated by task 302:
[   18.051417]  kasan_save_stack+0x45/0x70
[   18.051757]  kasan_save_track+0x18/0x40
[   18.052075]  kasan_save_alloc_info+0x3b/0x50
[   18.052407]  __kasan_kmalloc+0xb7/0xc0
[   18.052585]  __kmalloc_noprof+0x1c9/0x500
[   18.052892]  kunit_kmalloc_array+0x25/0x60
[   18.053179]  copy_user_test_oob+0xab/0x10f0
[   18.053375]  kunit_try_run_case+0x1a5/0x480
[   18.053595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.054064]  kthread+0x337/0x6f0
[   18.054242]  ret_from_fork+0x116/0x1d0
[   18.054497]  ret_from_fork_asm+0x1a/0x30
[   18.054654] 
[   18.054759] The buggy address belongs to the object at ffff8881031c0b00
[   18.054759]  which belongs to the cache kmalloc-128 of size 128
[   18.055605] The buggy address is located 0 bytes inside of
[   18.055605]  allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78)
[   18.056208] 
[   18.056424] The buggy address belongs to the physical page:
[   18.056629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   18.057201] flags: 0x200000000000000(node=0|zone=2)
[   18.057443] page_type: f5(slab)
[   18.057721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.058171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.058514] page dumped because: kasan: bad access detected
[   18.058983] 
[   18.059092] Memory state around the buggy address:
[   18.059287]  ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.059755]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.060037] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.060467]                                                                 ^
[   18.060889]  ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.061290]  ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.061678] ==================================================================

[   78.275945] ==================================================================
[   78.283177] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   78.290317] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   78.297919] 
[   78.299420] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   78.299429] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   78.299432] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   78.299435] Call Trace:
[   78.299437]  <TASK>
[   78.299439]  dump_stack_lvl+0x73/0xb0
[   78.299443]  print_report+0xd1/0x650
[   78.299448]  ? __virt_addr_valid+0x1db/0x2d0
[   78.299452]  ? copy_user_test_oob+0x557/0x10f0
[   78.299456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   78.299461]  ? copy_user_test_oob+0x557/0x10f0
[   78.299466]  kasan_report+0x141/0x180
[   78.299470]  ? copy_user_test_oob+0x557/0x10f0
[   78.299476]  kasan_check_range+0x10c/0x1c0
[   78.299480]  __kasan_check_write+0x18/0x20
[   78.299484]  copy_user_test_oob+0x557/0x10f0
[   78.299489]  ? __pfx_copy_user_test_oob+0x10/0x10
[   78.299493]  ? finish_task_switch.isra.0+0x153/0x700
[   78.299498]  ? __switch_to+0x544/0xf50
[   78.299502]  ? __schedule+0x10cc/0x2b60
[   78.299507]  ? ktime_get_ts64+0x83/0x230
[   78.299511]  kunit_try_run_case+0x1a2/0x480
[   78.299516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.299520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   78.299525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   78.299529]  ? __kthread_parkme+0x82/0x180
[   78.299533]  ? preempt_count_sub+0x50/0x80
[   78.299537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.299542]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.299546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   78.299550]  kthread+0x334/0x6f0
[   78.299554]  ? trace_preempt_on+0x20/0xc0
[   78.299558]  ? __pfx_kthread+0x10/0x10
[   78.299562]  ? _raw_spin_unlock_irq+0x47/0x80
[   78.299566]  ? calculate_sigpending+0x7b/0xa0
[   78.299571]  ? __pfx_kthread+0x10/0x10
[   78.299575]  ret_from_fork+0x113/0x1d0
[   78.299578]  ? __pfx_kthread+0x10/0x10
[   78.299582]  ret_from_fork_asm+0x1a/0x30
[   78.299588]  </TASK>
[   78.299590] 
[   78.477467] Allocated by task 326:
[   78.480872]  kasan_save_stack+0x45/0x70
[   78.484712]  kasan_save_track+0x18/0x40
[   78.488558]  kasan_save_alloc_info+0x3b/0x50
[   78.492832]  __kasan_kmalloc+0xb7/0xc0
[   78.496584]  __kmalloc_noprof+0x1c9/0x500
[   78.500595]  kunit_kmalloc_array+0x25/0x60
[   78.504694]  copy_user_test_oob+0xab/0x10f0
[   78.508882]  kunit_try_run_case+0x1a2/0x480
[   78.513067]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.518466]  kthread+0x334/0x6f0
[   78.521699]  ret_from_fork+0x113/0x1d0
[   78.525451]  ret_from_fork_asm+0x1a/0x30
[   78.529399] 
[   78.530904] The buggy address belongs to the object at ffff8881066e9300
[   78.530904]  which belongs to the cache kmalloc-128 of size 128
[   78.543420] The buggy address is located 0 bytes inside of
[   78.543420]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   78.555856] 
[   78.557376] The buggy address belongs to the physical page:
[   78.562980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   78.570986] flags: 0x200000000000000(node=0|zone=2)
[   78.575867] page_type: f5(slab)
[   78.579012] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.586753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.594501] page dumped because: kasan: bad access detected
[   78.600072] 
[   78.601570] Memory state around the buggy address:
[   78.606377]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.613626]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.620846] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.628067]                                                                 ^
[   78.635199]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.642421]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.649646] ==================================================================
[   78.656888] ==================================================================
[   78.664120] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   78.671261] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   78.678746] 
[   78.680248] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   78.680257] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   78.680260] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   78.680263] Call Trace:
[   78.680265]  <TASK>
[   78.680267]  dump_stack_lvl+0x73/0xb0
[   78.680271]  print_report+0xd1/0x650
[   78.680275]  ? __virt_addr_valid+0x1db/0x2d0
[   78.680279]  ? copy_user_test_oob+0x604/0x10f0
[   78.680284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   78.680289]  ? copy_user_test_oob+0x604/0x10f0
[   78.680294]  kasan_report+0x141/0x180
[   78.680298]  ? copy_user_test_oob+0x604/0x10f0
[   78.680304]  kasan_check_range+0x10c/0x1c0
[   78.680308]  __kasan_check_read+0x15/0x20
[   78.680312]  copy_user_test_oob+0x604/0x10f0
[   78.680317]  ? __pfx_copy_user_test_oob+0x10/0x10
[   78.680321]  ? finish_task_switch.isra.0+0x153/0x700
[   78.680346]  ? __switch_to+0x544/0xf50
[   78.680351]  ? __schedule+0x10cc/0x2b60
[   78.680355]  ? ktime_get_ts64+0x83/0x230
[   78.680360]  kunit_try_run_case+0x1a2/0x480
[   78.680365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.680382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   78.680386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   78.680391]  ? __kthread_parkme+0x82/0x180
[   78.680394]  ? preempt_count_sub+0x50/0x80
[   78.680399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.680403]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.680408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   78.680412]  kthread+0x334/0x6f0
[   78.680416]  ? trace_preempt_on+0x20/0xc0
[   78.680420]  ? __pfx_kthread+0x10/0x10
[   78.680424]  ? _raw_spin_unlock_irq+0x47/0x80
[   78.680428]  ? calculate_sigpending+0x7b/0xa0
[   78.680433]  ? __pfx_kthread+0x10/0x10
[   78.680437]  ret_from_fork+0x113/0x1d0
[   78.680440]  ? __pfx_kthread+0x10/0x10
[   78.680444]  ret_from_fork_asm+0x1a/0x30
[   78.680450]  </TASK>
[   78.680452] 
[   78.858103] Allocated by task 326:
[   78.861510]  kasan_save_stack+0x45/0x70
[   78.865364]  kasan_save_track+0x18/0x40
[   78.869248]  kasan_save_alloc_info+0x3b/0x50
[   78.873522]  __kasan_kmalloc+0xb7/0xc0
[   78.877273]  __kmalloc_noprof+0x1c9/0x500
[   78.881287]  kunit_kmalloc_array+0x25/0x60
[   78.885393]  copy_user_test_oob+0xab/0x10f0
[   78.889581]  kunit_try_run_case+0x1a2/0x480
[   78.893767]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.899166]  kthread+0x334/0x6f0
[   78.902399]  ret_from_fork+0x113/0x1d0
[   78.906178]  ret_from_fork_asm+0x1a/0x30
[   78.910113] 
[   78.911610] The buggy address belongs to the object at ffff8881066e9300
[   78.911610]  which belongs to the cache kmalloc-128 of size 128
[   78.924119] The buggy address is located 0 bytes inside of
[   78.924119]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   78.936555] 
[   78.938052] The buggy address belongs to the physical page:
[   78.943627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   78.951634] flags: 0x200000000000000(node=0|zone=2)
[   78.956512] page_type: f5(slab)
[   78.959660] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.967430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.975173] page dumped because: kasan: bad access detected
[   78.980746] 
[   78.982245] Memory state around the buggy address:
[   78.987038]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.994266]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.001494] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.008714]                                                                 ^
[   79.015853]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.023073]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.030292] ==================================================================
[   77.895457] ==================================================================
[   77.902685] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   77.909819] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   77.917307] 
[   77.918808] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   77.918817] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   77.918820] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.918823] Call Trace:
[   77.918825]  <TASK>
[   77.918827]  dump_stack_lvl+0x73/0xb0
[   77.918831]  print_report+0xd1/0x650
[   77.918835]  ? __virt_addr_valid+0x1db/0x2d0
[   77.918840]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.918844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.918849]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.918854]  kasan_report+0x141/0x180
[   77.918858]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.918864]  kasan_check_range+0x10c/0x1c0
[   77.918869]  __kasan_check_read+0x15/0x20
[   77.918872]  copy_user_test_oob+0x4aa/0x10f0
[   77.918877]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.918882]  ? finish_task_switch.isra.0+0x153/0x700
[   77.918886]  ? __switch_to+0x544/0xf50
[   77.918891]  ? __schedule+0x10cc/0x2b60
[   77.918895]  ? ktime_get_ts64+0x83/0x230
[   77.918899]  kunit_try_run_case+0x1a2/0x480
[   77.918904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.918908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.918913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.918917]  ? __kthread_parkme+0x82/0x180
[   77.918921]  ? preempt_count_sub+0x50/0x80
[   77.918925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.918930]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.918934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.918939]  kthread+0x334/0x6f0
[   77.918942]  ? trace_preempt_on+0x20/0xc0
[   77.918947]  ? __pfx_kthread+0x10/0x10
[   77.918951]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.918955]  ? calculate_sigpending+0x7b/0xa0
[   77.918959]  ? __pfx_kthread+0x10/0x10
[   77.918963]  ret_from_fork+0x113/0x1d0
[   77.918967]  ? __pfx_kthread+0x10/0x10
[   77.918971]  ret_from_fork_asm+0x1a/0x30
[   77.918977]  </TASK>
[   77.918978] 
[   78.096618] Allocated by task 326:
[   78.100026]  kasan_save_stack+0x45/0x70
[   78.103874]  kasan_save_track+0x18/0x40
[   78.107720]  kasan_save_alloc_info+0x3b/0x50
[   78.111994]  __kasan_kmalloc+0xb7/0xc0
[   78.115746]  __kmalloc_noprof+0x1c9/0x500
[   78.119760]  kunit_kmalloc_array+0x25/0x60
[   78.123866]  copy_user_test_oob+0xab/0x10f0
[   78.128053]  kunit_try_run_case+0x1a2/0x480
[   78.132238]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.137639]  kthread+0x334/0x6f0
[   78.140872]  ret_from_fork+0x113/0x1d0
[   78.144623]  ret_from_fork_asm+0x1a/0x30
[   78.148549] 
[   78.150048] The buggy address belongs to the object at ffff8881066e9300
[   78.150048]  which belongs to the cache kmalloc-128 of size 128
[   78.162562] The buggy address is located 0 bytes inside of
[   78.162562]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   78.174990] 
[   78.176491] The buggy address belongs to the physical page:
[   78.182062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   78.190063] flags: 0x200000000000000(node=0|zone=2)
[   78.194942] page_type: f5(slab)
[   78.198090] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.205836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.213575] page dumped because: kasan: bad access detected
[   78.219147] 
[   78.220648] Memory state around the buggy address:
[   78.225439]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.232659]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.239878] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.247097]                                                                 ^
[   78.254231]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.261451]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.268678] ==================================================================
[   77.514557] ==================================================================
[   77.521788] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   77.528930] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   77.536503] 
[   77.538004] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   77.538013] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   77.538016] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.538019] Call Trace:
[   77.538021]  <TASK>
[   77.538023]  dump_stack_lvl+0x73/0xb0
[   77.538028]  print_report+0xd1/0x650
[   77.538032]  ? __virt_addr_valid+0x1db/0x2d0
[   77.538036]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.538041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.538046]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.538051]  kasan_report+0x141/0x180
[   77.538055]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.538061]  kasan_check_range+0x10c/0x1c0
[   77.538065]  __kasan_check_write+0x18/0x20
[   77.538069]  copy_user_test_oob+0x3fd/0x10f0
[   77.538074]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.538078]  ? finish_task_switch.isra.0+0x153/0x700
[   77.538083]  ? __switch_to+0x544/0xf50
[   77.538088]  ? __schedule+0x10cc/0x2b60
[   77.538092]  ? ktime_get_ts64+0x83/0x230
[   77.538096]  kunit_try_run_case+0x1a2/0x480
[   77.538101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.538106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.538110]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.538114]  ? __kthread_parkme+0x82/0x180
[   77.538118]  ? preempt_count_sub+0x50/0x80
[   77.538122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.538127]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.538131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.538136]  kthread+0x334/0x6f0
[   77.538140]  ? trace_preempt_on+0x20/0xc0
[   77.538144]  ? __pfx_kthread+0x10/0x10
[   77.538148]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.538152]  ? calculate_sigpending+0x7b/0xa0
[   77.538157]  ? __pfx_kthread+0x10/0x10
[   77.538161]  ret_from_fork+0x113/0x1d0
[   77.538164]  ? __pfx_kthread+0x10/0x10
[   77.538168]  ret_from_fork_asm+0x1a/0x30
[   77.538174]  </TASK>
[   77.538176] 
[   77.715980] Allocated by task 326:
[   77.719393]  kasan_save_stack+0x45/0x70
[   77.723236]  kasan_save_track+0x18/0x40
[   77.727072]  kasan_save_alloc_info+0x3b/0x50
[   77.731364]  __kasan_kmalloc+0xb7/0xc0
[   77.735167]  __kmalloc_noprof+0x1c9/0x500
[   77.739180]  kunit_kmalloc_array+0x25/0x60
[   77.743282]  copy_user_test_oob+0xab/0x10f0
[   77.747476]  kunit_try_run_case+0x1a2/0x480
[   77.751661]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.757062]  kthread+0x334/0x6f0
[   77.760294]  ret_from_fork+0x113/0x1d0
[   77.764045]  ret_from_fork_asm+0x1a/0x30
[   77.767971] 
[   77.769473] The buggy address belongs to the object at ffff8881066e9300
[   77.769473]  which belongs to the cache kmalloc-128 of size 128
[   77.781986] The buggy address is located 0 bytes inside of
[   77.781986]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   77.794419] 
[   77.795921] The buggy address belongs to the physical page:
[   77.801493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   77.809494] flags: 0x200000000000000(node=0|zone=2)
[   77.814386] page_type: f5(slab)
[   77.817564] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.825312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.833059] page dumped because: kasan: bad access detected
[   77.838631] 
[   77.840131] Memory state around the buggy address:
[   77.844922]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.852144]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.859382] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.866633]                                                                 ^
[   77.873764]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.880984]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.888203] ==================================================================