Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.441373] ==================================================================
[   20.441454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.441866] Read of size 121 at addr fff00000c78e9d00 by task kunit_try_catch/285
[   20.441944] 
[   20.442282] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.442398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.442623] Hardware name: linux,dummy-virt (DT)
[   20.442697] Call trace:
[   20.442874]  show_stack+0x20/0x38 (C)
[   20.442956]  dump_stack_lvl+0x8c/0xd0
[   20.443322]  print_report+0x118/0x5d0
[   20.443567]  kasan_report+0xdc/0x128
[   20.443628]  kasan_check_range+0x100/0x1a8
[   20.443694]  __kasan_check_read+0x20/0x30
[   20.444111]  copy_user_test_oob+0x4a0/0xec8
[   20.444425]  kunit_try_run_case+0x170/0x3f0
[   20.444674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.444822]  kthread+0x328/0x630
[   20.444941]  ret_from_fork+0x10/0x20
[   20.445462] 
[   20.445840] Allocated by task 285:
[   20.446056]  kasan_save_stack+0x3c/0x68
[   20.446237]  kasan_save_track+0x20/0x40
[   20.446336]  kasan_save_alloc_info+0x40/0x58
[   20.446490]  __kasan_kmalloc+0xd4/0xd8
[   20.446544]  __kmalloc_noprof+0x198/0x4c8
[   20.446877]  kunit_kmalloc_array+0x34/0x88
[   20.447212]  copy_user_test_oob+0xac/0xec8
[   20.447359]  kunit_try_run_case+0x170/0x3f0
[   20.447508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.447624]  kthread+0x328/0x630
[   20.447768]  ret_from_fork+0x10/0x20
[   20.447822] 
[   20.447859] The buggy address belongs to the object at fff00000c78e9d00
[   20.447859]  which belongs to the cache kmalloc-128 of size 128
[   20.448057] The buggy address is located 0 bytes inside of
[   20.448057]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.448132] 
[   20.448158] The buggy address belongs to the physical page:
[   20.448202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.448464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.448526] page_type: f5(slab)
[   20.448576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.448628] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.448682] page dumped because: kasan: bad access detected
[   20.448719] 
[   20.448757] Memory state around the buggy address:
[   20.448826]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.449158]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.449664] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.449802]                                                                 ^
[   20.449866]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.450359]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.450541] ==================================================================
[   20.410020] ==================================================================
[   20.410151] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.410340] Write of size 121 at addr fff00000c78e9d00 by task kunit_try_catch/285
[   20.410416] 
[   20.410462] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.410913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.410962] Hardware name: linux,dummy-virt (DT)
[   20.411010] Call trace:
[   20.411037]  show_stack+0x20/0x38 (C)
[   20.411335]  dump_stack_lvl+0x8c/0xd0
[   20.412375]  print_report+0x118/0x5d0
[   20.412444]  kasan_report+0xdc/0x128
[   20.412492]  kasan_check_range+0x100/0x1a8
[   20.412925]  __kasan_check_write+0x20/0x30
[   20.414063]  copy_user_test_oob+0x35c/0xec8
[   20.414226]  kunit_try_run_case+0x170/0x3f0
[   20.414362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.414620]  kthread+0x328/0x630
[   20.414823]  ret_from_fork+0x10/0x20
[   20.414971] 
[   20.415030] Allocated by task 285:
[   20.415062]  kasan_save_stack+0x3c/0x68
[   20.415267]  kasan_save_track+0x20/0x40
[   20.415340]  kasan_save_alloc_info+0x40/0x58
[   20.415418]  __kasan_kmalloc+0xd4/0xd8
[   20.415460]  __kmalloc_noprof+0x198/0x4c8
[   20.415512]  kunit_kmalloc_array+0x34/0x88
[   20.415570]  copy_user_test_oob+0xac/0xec8
[   20.415610]  kunit_try_run_case+0x170/0x3f0
[   20.415999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.416194]  kthread+0x328/0x630
[   20.416414]  ret_from_fork+0x10/0x20
[   20.417121] 
[   20.417157] The buggy address belongs to the object at fff00000c78e9d00
[   20.417157]  which belongs to the cache kmalloc-128 of size 128
[   20.417390] The buggy address is located 0 bytes inside of
[   20.417390]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.417664] 
[   20.417712] The buggy address belongs to the physical page:
[   20.417749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.417807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.417874] page_type: f5(slab)
[   20.417918] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.417999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.418053] page dumped because: kasan: bad access detected
[   20.418087] 
[   20.418109] Memory state around the buggy address:
[   20.418146]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.418195]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.418242] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.418285]                                                                 ^
[   20.418338]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.418385]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.418433] ==================================================================
[   20.430973] ==================================================================
[   20.431220] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.431449] Write of size 121 at addr fff00000c78e9d00 by task kunit_try_catch/285
[   20.431520] 
[   20.431563] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.431656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.432109] Hardware name: linux,dummy-virt (DT)
[   20.432433] Call trace:
[   20.432470]  show_stack+0x20/0x38 (C)
[   20.432866]  dump_stack_lvl+0x8c/0xd0
[   20.433117]  print_report+0x118/0x5d0
[   20.433425]  kasan_report+0xdc/0x128
[   20.433599]  kasan_check_range+0x100/0x1a8
[   20.434004]  __kasan_check_write+0x20/0x30
[   20.434123]  copy_user_test_oob+0x434/0xec8
[   20.434275]  kunit_try_run_case+0x170/0x3f0
[   20.434667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.435071]  kthread+0x328/0x630
[   20.435322]  ret_from_fork+0x10/0x20
[   20.435523] 
[   20.435655] Allocated by task 285:
[   20.435701]  kasan_save_stack+0x3c/0x68
[   20.435750]  kasan_save_track+0x20/0x40
[   20.435808]  kasan_save_alloc_info+0x40/0x58
[   20.435861]  __kasan_kmalloc+0xd4/0xd8
[   20.435902]  __kmalloc_noprof+0x198/0x4c8
[   20.436327]  kunit_kmalloc_array+0x34/0x88
[   20.436705]  copy_user_test_oob+0xac/0xec8
[   20.436922]  kunit_try_run_case+0x170/0x3f0
[   20.436971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.437254]  kthread+0x328/0x630
[   20.437412]  ret_from_fork+0x10/0x20
[   20.437658] 
[   20.437694] The buggy address belongs to the object at fff00000c78e9d00
[   20.437694]  which belongs to the cache kmalloc-128 of size 128
[   20.437945] The buggy address is located 0 bytes inside of
[   20.437945]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.438111] 
[   20.438140] The buggy address belongs to the physical page:
[   20.438177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.438235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.438291] page_type: f5(slab)
[   20.438336] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.438401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.438444] page dumped because: kasan: bad access detected
[   20.438498] 
[   20.438521] Memory state around the buggy address:
[   20.438569]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.438616]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.438663] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.438705]                                                                 ^
[   20.438750]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.438797]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.438853] ==================================================================
[   20.389930] ==================================================================
[   20.390216] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.390305] Read of size 121 at addr fff00000c78e9d00 by task kunit_try_catch/285
[   20.390375] 
[   20.390422] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.390512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.390541] Hardware name: linux,dummy-virt (DT)
[   20.390577] Call trace:
[   20.390604]  show_stack+0x20/0x38 (C)
[   20.390959]  dump_stack_lvl+0x8c/0xd0
[   20.391042]  print_report+0x118/0x5d0
[   20.391096]  kasan_report+0xdc/0x128
[   20.391466]  kasan_check_range+0x100/0x1a8
[   20.391545]  __kasan_check_read+0x20/0x30
[   20.391602]  copy_user_test_oob+0x728/0xec8
[   20.392106]  kunit_try_run_case+0x170/0x3f0
[   20.392215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.392518]  kthread+0x328/0x630
[   20.392750]  ret_from_fork+0x10/0x20
[   20.393281] 
[   20.393393] Allocated by task 285:
[   20.393473]  kasan_save_stack+0x3c/0x68
[   20.393837]  kasan_save_track+0x20/0x40
[   20.393956]  kasan_save_alloc_info+0x40/0x58
[   20.394054]  __kasan_kmalloc+0xd4/0xd8
[   20.394119]  __kmalloc_noprof+0x198/0x4c8
[   20.394327]  kunit_kmalloc_array+0x34/0x88
[   20.394391]  copy_user_test_oob+0xac/0xec8
[   20.394488]  kunit_try_run_case+0x170/0x3f0
[   20.394661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.394714]  kthread+0x328/0x630
[   20.394760]  ret_from_fork+0x10/0x20
[   20.394800] 
[   20.394838] The buggy address belongs to the object at fff00000c78e9d00
[   20.394838]  which belongs to the cache kmalloc-128 of size 128
[   20.394932] The buggy address is located 0 bytes inside of
[   20.394932]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.395007] 
[   20.395035] The buggy address belongs to the physical page:
[   20.395072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.395137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.395193] page_type: f5(slab)
[   20.395248] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.395883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.395944] page dumped because: kasan: bad access detected
[   20.395979] 
[   20.396000] Memory state around the buggy address:
[   20.396202]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.396333]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.396585] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.396774]                                                                 ^
[   20.396870]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.397110]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.397318] ==================================================================
[   20.366802] ==================================================================
[   20.367955] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.368175] Write of size 121 at addr fff00000c78e9d00 by task kunit_try_catch/285
[   20.368397] 
[   20.368525] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.368991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.369067] Hardware name: linux,dummy-virt (DT)
[   20.369156] Call trace:
[   20.369320]  show_stack+0x20/0x38 (C)
[   20.369421]  dump_stack_lvl+0x8c/0xd0
[   20.369787]  print_report+0x118/0x5d0
[   20.369908]  kasan_report+0xdc/0x128
[   20.369967]  kasan_check_range+0x100/0x1a8
[   20.370019]  __kasan_check_write+0x20/0x30
[   20.370068]  copy_user_test_oob+0x234/0xec8
[   20.370116]  kunit_try_run_case+0x170/0x3f0
[   20.370174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.370247]  kthread+0x328/0x630
[   20.370297]  ret_from_fork+0x10/0x20
[   20.370361] 
[   20.370398] Allocated by task 285:
[   20.370435]  kasan_save_stack+0x3c/0x68
[   20.370499]  kasan_save_track+0x20/0x40
[   20.370551]  kasan_save_alloc_info+0x40/0x58
[   20.370596]  __kasan_kmalloc+0xd4/0xd8
[   20.370644]  __kmalloc_noprof+0x198/0x4c8
[   20.370711]  kunit_kmalloc_array+0x34/0x88
[   20.370751]  copy_user_test_oob+0xac/0xec8
[   20.370792]  kunit_try_run_case+0x170/0x3f0
[   20.370833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.371438]  kthread+0x328/0x630
[   20.371995]  ret_from_fork+0x10/0x20
[   20.372056] 
[   20.372185] The buggy address belongs to the object at fff00000c78e9d00
[   20.372185]  which belongs to the cache kmalloc-128 of size 128
[   20.372831] The buggy address is located 0 bytes inside of
[   20.372831]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.373012] 
[   20.373041] The buggy address belongs to the physical page:
[   20.373144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.373723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.374207] page_type: f5(slab)
[   20.374366] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.374442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.374588] page dumped because: kasan: bad access detected
[   20.374647] 
[   20.374732] Memory state around the buggy address:
[   20.375476]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.375737]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.376177] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.376308]                                                                 ^
[   20.376527]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.376674]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.376942] ==================================================================
[   20.418972] ==================================================================
[   20.419028] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.419079] Read of size 121 at addr fff00000c78e9d00 by task kunit_try_catch/285
[   20.419133] 
[   20.419168] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.419254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.419284] Hardware name: linux,dummy-virt (DT)
[   20.420057] Call trace:
[   20.420102]  show_stack+0x20/0x38 (C)
[   20.420156]  dump_stack_lvl+0x8c/0xd0
[   20.420209]  print_report+0x118/0x5d0
[   20.420258]  kasan_report+0xdc/0x128
[   20.420762]  kasan_check_range+0x100/0x1a8
[   20.420999]  __kasan_check_read+0x20/0x30
[   20.421267]  copy_user_test_oob+0x3c8/0xec8
[   20.421717]  kunit_try_run_case+0x170/0x3f0
[   20.422030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.422151]  kthread+0x328/0x630
[   20.422239]  ret_from_fork+0x10/0x20
[   20.422296] 
[   20.422662] Allocated by task 285:
[   20.422887]  kasan_save_stack+0x3c/0x68
[   20.423059]  kasan_save_track+0x20/0x40
[   20.423247]  kasan_save_alloc_info+0x40/0x58
[   20.423565]  __kasan_kmalloc+0xd4/0xd8
[   20.423965]  __kmalloc_noprof+0x198/0x4c8
[   20.424168]  kunit_kmalloc_array+0x34/0x88
[   20.424225]  copy_user_test_oob+0xac/0xec8
[   20.424298]  kunit_try_run_case+0x170/0x3f0
[   20.424340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.424659]  kthread+0x328/0x630
[   20.425005]  ret_from_fork+0x10/0x20
[   20.425279] 
[   20.425325] The buggy address belongs to the object at fff00000c78e9d00
[   20.425325]  which belongs to the cache kmalloc-128 of size 128
[   20.425460] The buggy address is located 0 bytes inside of
[   20.425460]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.425605] 
[   20.425630] The buggy address belongs to the physical page:
[   20.426073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.426316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.426558] page_type: f5(slab)
[   20.426676] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.426911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.426960] page dumped because: kasan: bad access detected
[   20.427246] 
[   20.427373] Memory state around the buggy address:
[   20.427904]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.427968]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.428016] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.428067]                                                                 ^
[   20.428114]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.428443]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.428940] ==================================================================

[   19.894386] ==================================================================
[   19.894737] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.895093] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.895176] 
[   19.895424] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.895523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.895996] Hardware name: linux,dummy-virt (DT)
[   19.896048] Call trace:
[   19.896104]  show_stack+0x20/0x38 (C)
[   19.896168]  dump_stack_lvl+0x8c/0xd0
[   19.896526]  print_report+0x118/0x5d0
[   19.896642]  kasan_report+0xdc/0x128
[   19.897128]  kasan_check_range+0x100/0x1a8
[   19.897218]  __kasan_check_write+0x20/0x30
[   19.897429]  copy_user_test_oob+0x434/0xec8
[   19.897531]  kunit_try_run_case+0x170/0x3f0
[   19.897764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.898062]  kthread+0x328/0x630
[   19.898444]  ret_from_fork+0x10/0x20
[   19.898800] 
[   19.898847] Allocated by task 285:
[   19.899027]  kasan_save_stack+0x3c/0x68
[   19.899286]  kasan_save_track+0x20/0x40
[   19.899507]  kasan_save_alloc_info+0x40/0x58
[   19.899676]  __kasan_kmalloc+0xd4/0xd8
[   19.899742]  __kmalloc_noprof+0x198/0x4c8
[   19.899788]  kunit_kmalloc_array+0x34/0x88
[   19.900096]  copy_user_test_oob+0xac/0xec8
[   19.900335]  kunit_try_run_case+0x170/0x3f0
[   19.900502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.900594]  kthread+0x328/0x630
[   19.900694]  ret_from_fork+0x10/0x20
[   19.900823] 
[   19.900951] The buggy address belongs to the object at fff00000c7a4ee00
[   19.900951]  which belongs to the cache kmalloc-128 of size 128
[   19.901031] The buggy address is located 0 bytes inside of
[   19.901031]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.901484] 
[   19.901582] The buggy address belongs to the physical page:
[   19.901845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.902051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.902151] page_type: f5(slab)
[   19.902292] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.902429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.902474] page dumped because: kasan: bad access detected
[   19.902545] 
[   19.902819] Memory state around the buggy address:
[   19.902910]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.903120]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.903170] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.903555]                                                                 ^
[   19.903878]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904008]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904053] ==================================================================
[   19.878077] ==================================================================
[   19.878505] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.878573] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.878945] 
[   19.879040] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.879413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.879485] Hardware name: linux,dummy-virt (DT)
[   19.879631] Call trace:
[   19.879793]  show_stack+0x20/0x38 (C)
[   19.879855]  dump_stack_lvl+0x8c/0xd0
[   19.879965]  print_report+0x118/0x5d0
[   19.880018]  kasan_report+0xdc/0x128
[   19.880104]  kasan_check_range+0x100/0x1a8
[   19.880206]  __kasan_check_write+0x20/0x30
[   19.880483]  copy_user_test_oob+0x35c/0xec8
[   19.880722]  kunit_try_run_case+0x170/0x3f0
[   19.880952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.881286]  kthread+0x328/0x630
[   19.881419]  ret_from_fork+0x10/0x20
[   19.881594] 
[   19.881757] Allocated by task 285:
[   19.881793]  kasan_save_stack+0x3c/0x68
[   19.881876]  kasan_save_track+0x20/0x40
[   19.882186]  kasan_save_alloc_info+0x40/0x58
[   19.882543]  __kasan_kmalloc+0xd4/0xd8
[   19.882624]  __kmalloc_noprof+0x198/0x4c8
[   19.882757]  kunit_kmalloc_array+0x34/0x88
[   19.882842]  copy_user_test_oob+0xac/0xec8
[   19.882974]  kunit_try_run_case+0x170/0x3f0
[   19.883080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.883458]  kthread+0x328/0x630
[   19.883522]  ret_from_fork+0x10/0x20
[   19.883879] 
[   19.883939] The buggy address belongs to the object at fff00000c7a4ee00
[   19.883939]  which belongs to the cache kmalloc-128 of size 128
[   19.884053] The buggy address is located 0 bytes inside of
[   19.884053]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.884241] 
[   19.884297] The buggy address belongs to the physical page:
[   19.884393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.884460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.884552] page_type: f5(slab)
[   19.884908] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.884991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.885387] page dumped because: kasan: bad access detected
[   19.885701] 
[   19.885738] Memory state around the buggy address:
[   19.885778]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.885990]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886423] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.886660]                                                                 ^
[   19.886797]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886910]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886954] ==================================================================
[   19.906224] ==================================================================
[   19.906352] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   19.906425] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.906478] 
[   19.906679] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.907096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.907172] Hardware name: linux,dummy-virt (DT)
[   19.907247] Call trace:
[   19.907277]  show_stack+0x20/0x38 (C)
[   19.907522]  dump_stack_lvl+0x8c/0xd0
[   19.907675]  print_report+0x118/0x5d0
[   19.907967]  kasan_report+0xdc/0x128
[   19.908182]  kasan_check_range+0x100/0x1a8
[   19.908280]  __kasan_check_read+0x20/0x30
[   19.908530]  copy_user_test_oob+0x4a0/0xec8
[   19.908607]  kunit_try_run_case+0x170/0x3f0
[   19.908862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.909018]  kthread+0x328/0x630
[   19.909176]  ret_from_fork+0x10/0x20
[   19.909234] 
[   19.909266] Allocated by task 285:
[   19.909303]  kasan_save_stack+0x3c/0x68
[   19.909657]  kasan_save_track+0x20/0x40
[   19.909853]  kasan_save_alloc_info+0x40/0x58
[   19.909926]  __kasan_kmalloc+0xd4/0xd8
[   19.910145]  __kmalloc_noprof+0x198/0x4c8
[   19.910312]  kunit_kmalloc_array+0x34/0x88
[   19.910786]  copy_user_test_oob+0xac/0xec8
[   19.910967]  kunit_try_run_case+0x170/0x3f0
[   19.911201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.911458]  kthread+0x328/0x630
[   19.911573]  ret_from_fork+0x10/0x20
[   19.911697] 
[   19.911722] The buggy address belongs to the object at fff00000c7a4ee00
[   19.911722]  which belongs to the cache kmalloc-128 of size 128
[   19.911830] The buggy address is located 0 bytes inside of
[   19.911830]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.912205] 
[   19.912262] The buggy address belongs to the physical page:
[   19.912607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.912785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.912888] page_type: f5(slab)
[   19.913015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.913083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.913133] page dumped because: kasan: bad access detected
[   19.913478] 
[   19.913517] Memory state around the buggy address:
[   19.913572]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.913842]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913899] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.913941]                                                                 ^
[   19.914111]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.914175]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.914217] ==================================================================
[   19.887975] ==================================================================
[   19.888738] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.888821] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.889090] 
[   19.889266] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.889406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.889473] Hardware name: linux,dummy-virt (DT)
[   19.889508] Call trace:
[   19.889533]  show_stack+0x20/0x38 (C)
[   19.889904]  dump_stack_lvl+0x8c/0xd0
[   19.890117]  print_report+0x118/0x5d0
[   19.890418]  kasan_report+0xdc/0x128
[   19.890526]  kasan_check_range+0x100/0x1a8
[   19.890593]  __kasan_check_read+0x20/0x30
[   19.890639]  copy_user_test_oob+0x3c8/0xec8
[   19.890716]  kunit_try_run_case+0x170/0x3f0
[   19.890769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.890824]  kthread+0x328/0x630
[   19.890882]  ret_from_fork+0x10/0x20
[   19.890934] 
[   19.890955] Allocated by task 285:
[   19.890992]  kasan_save_stack+0x3c/0x68
[   19.891047]  kasan_save_track+0x20/0x40
[   19.891087]  kasan_save_alloc_info+0x40/0x58
[   19.891131]  __kasan_kmalloc+0xd4/0xd8
[   19.891170]  __kmalloc_noprof+0x198/0x4c8
[   19.891211]  kunit_kmalloc_array+0x34/0x88
[   19.891262]  copy_user_test_oob+0xac/0xec8
[   19.891315]  kunit_try_run_case+0x170/0x3f0
[   19.891391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.891446]  kthread+0x328/0x630
[   19.891489]  ret_from_fork+0x10/0x20
[   19.891526] 
[   19.891549] The buggy address belongs to the object at fff00000c7a4ee00
[   19.891549]  which belongs to the cache kmalloc-128 of size 128
[   19.891608] The buggy address is located 0 bytes inside of
[   19.891608]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.891682] 
[   19.891718] The buggy address belongs to the physical page:
[   19.891755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.891816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.891883] page_type: f5(slab)
[   19.891923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.891975] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.892017] page dumped because: kasan: bad access detected
[   19.892059] 
[   19.892095] Memory state around the buggy address:
[   19.892128]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.892180]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.892241] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.892281]                                                                 ^
[   19.892332]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.892896]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.893345] ==================================================================
[   19.861673] ==================================================================
[   19.861748] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.861809] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.861863] 
[   19.861904] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.861991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.862019] Hardware name: linux,dummy-virt (DT)
[   19.862055] Call trace:
[   19.862081]  show_stack+0x20/0x38 (C)
[   19.862134]  dump_stack_lvl+0x8c/0xd0
[   19.862182]  print_report+0x118/0x5d0
[   19.862229]  kasan_report+0xdc/0x128
[   19.862277]  kasan_check_range+0x100/0x1a8
[   19.862342]  __kasan_check_read+0x20/0x30
[   19.862387]  copy_user_test_oob+0x728/0xec8
[   19.862436]  kunit_try_run_case+0x170/0x3f0
[   19.862495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.862549]  kthread+0x328/0x630
[   19.862597]  ret_from_fork+0x10/0x20
[   19.862648] 
[   19.862680] Allocated by task 285:
[   19.862712]  kasan_save_stack+0x3c/0x68
[   19.862756]  kasan_save_track+0x20/0x40
[   19.862794]  kasan_save_alloc_info+0x40/0x58
[   19.862836]  __kasan_kmalloc+0xd4/0xd8
[   19.862873]  __kmalloc_noprof+0x198/0x4c8
[   19.862914]  kunit_kmalloc_array+0x34/0x88
[   19.862959]  copy_user_test_oob+0xac/0xec8
[   19.863000]  kunit_try_run_case+0x170/0x3f0
[   19.863039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863083]  kthread+0x328/0x630
[   19.863118]  ret_from_fork+0x10/0x20
[   19.863154] 
[   19.863176] The buggy address belongs to the object at fff00000c7a4ee00
[   19.863176]  which belongs to the cache kmalloc-128 of size 128
[   19.863245] The buggy address is located 0 bytes inside of
[   19.863245]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.863315] 
[   19.864877] The buggy address belongs to the physical page:
[   19.864951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.865121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.865285] page_type: f5(slab)
[   19.865699] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.865797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.865877] page dumped because: kasan: bad access detected
[   19.865930] 
[   19.866726] Memory state around the buggy address:
[   19.866772]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.866857]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.866913] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.866976]                                                                 ^
[   19.867046]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.867380]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.867643] ==================================================================
[   19.846697] ==================================================================
[   19.846808] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.846890] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.846944] 
[   19.847029] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.847214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.847272] Hardware name: linux,dummy-virt (DT)
[   19.847339] Call trace:
[   19.847449]  show_stack+0x20/0x38 (C)
[   19.847511]  dump_stack_lvl+0x8c/0xd0
[   19.847566]  print_report+0x118/0x5d0
[   19.847615]  kasan_report+0xdc/0x128
[   19.847901]  kasan_check_range+0x100/0x1a8
[   19.847972]  __kasan_check_write+0x20/0x30
[   19.848082]  copy_user_test_oob+0x234/0xec8
[   19.848143]  kunit_try_run_case+0x170/0x3f0
[   19.848205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.848266]  kthread+0x328/0x630
[   19.848312]  ret_from_fork+0x10/0x20
[   19.848377] 
[   19.848478] Allocated by task 285:
[   19.848529]  kasan_save_stack+0x3c/0x68
[   19.848760]  kasan_save_track+0x20/0x40
[   19.848977]  kasan_save_alloc_info+0x40/0x58
[   19.849210]  __kasan_kmalloc+0xd4/0xd8
[   19.849256]  __kmalloc_noprof+0x198/0x4c8
[   19.849595]  kunit_kmalloc_array+0x34/0x88
[   19.849706]  copy_user_test_oob+0xac/0xec8
[   19.850019]  kunit_try_run_case+0x170/0x3f0
[   19.850104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.850285]  kthread+0x328/0x630
[   19.850338]  ret_from_fork+0x10/0x20
[   19.850720] 
[   19.850761] The buggy address belongs to the object at fff00000c7a4ee00
[   19.850761]  which belongs to the cache kmalloc-128 of size 128
[   19.851137] The buggy address is located 0 bytes inside of
[   19.851137]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.851333] 
[   19.851401] The buggy address belongs to the physical page:
[   19.851456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.851593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.851765] page_type: f5(slab)
[   19.852157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.852226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.852272] page dumped because: kasan: bad access detected
[   19.852364] 
[   19.852512] Memory state around the buggy address:
[   19.852608]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.852691]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.852736] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.853105]                                                                 ^
[   19.853180]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853238]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853620] ==================================================================

[   19.490329] ==================================================================
[   19.490412] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.490467] Read of size 121 at addr fff00000c7716c00 by task kunit_try_catch/285
[   19.490880] 
[   19.490922] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.491038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.491085] Hardware name: linux,dummy-virt (DT)
[   19.491119] Call trace:
[   19.491146]  show_stack+0x20/0x38 (C)
[   19.491198]  dump_stack_lvl+0x8c/0xd0
[   19.491248]  print_report+0x118/0x5d0
[   19.491297]  kasan_report+0xdc/0x128
[   19.491528]  kasan_check_range+0x100/0x1a8
[   19.491600]  __kasan_check_read+0x20/0x30
[   19.491645]  copy_user_test_oob+0x728/0xec8
[   19.491692]  kunit_try_run_case+0x170/0x3f0
[   19.491754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.491818]  kthread+0x328/0x630
[   19.491861]  ret_from_fork+0x10/0x20
[   19.491909] 
[   19.492165] Allocated by task 285:
[   19.492272]  kasan_save_stack+0x3c/0x68
[   19.492321]  kasan_save_track+0x20/0x40
[   19.492362]  kasan_save_alloc_info+0x40/0x58
[   19.492404]  __kasan_kmalloc+0xd4/0xd8
[   19.492447]  __kmalloc_noprof+0x198/0x4c8
[   19.492488]  kunit_kmalloc_array+0x34/0x88
[   19.492528]  copy_user_test_oob+0xac/0xec8
[   19.492568]  kunit_try_run_case+0x170/0x3f0
[   19.492610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.492655]  kthread+0x328/0x630
[   19.492700]  ret_from_fork+0x10/0x20
[   19.492749] 
[   19.492770] The buggy address belongs to the object at fff00000c7716c00
[   19.492770]  which belongs to the cache kmalloc-128 of size 128
[   19.492926] The buggy address is located 0 bytes inside of
[   19.492926]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.493327] 
[   19.493411] The buggy address belongs to the physical page:
[   19.493449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.493513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.493632] page_type: f5(slab)
[   19.493674] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.493737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.493779] page dumped because: kasan: bad access detected
[   19.494024] 
[   19.494076] Memory state around the buggy address:
[   19.494124]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.494310]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.494401] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.494504]                                                                 ^
[   19.494546]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.494591]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.494678] ==================================================================
[   19.505162] ==================================================================
[   19.505244] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.505305] Write of size 121 at addr fff00000c7716c00 by task kunit_try_catch/285
[   19.505365] 
[   19.505402] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.505489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.505854] Hardware name: linux,dummy-virt (DT)
[   19.505922] Call trace:
[   19.505950]  show_stack+0x20/0x38 (C)
[   19.506094]  dump_stack_lvl+0x8c/0xd0
[   19.506179]  print_report+0x118/0x5d0
[   19.506252]  kasan_report+0xdc/0x128
[   19.506299]  kasan_check_range+0x100/0x1a8
[   19.506521]  __kasan_check_write+0x20/0x30
[   19.506668]  copy_user_test_oob+0x35c/0xec8
[   19.506742]  kunit_try_run_case+0x170/0x3f0
[   19.506858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.506962]  kthread+0x328/0x630
[   19.507045]  ret_from_fork+0x10/0x20
[   19.507216] 
[   19.507278] Allocated by task 285:
[   19.507410]  kasan_save_stack+0x3c/0x68
[   19.507460]  kasan_save_track+0x20/0x40
[   19.507511]  kasan_save_alloc_info+0x40/0x58
[   19.507560]  __kasan_kmalloc+0xd4/0xd8
[   19.507862]  __kmalloc_noprof+0x198/0x4c8
[   19.508023]  kunit_kmalloc_array+0x34/0x88
[   19.508103]  copy_user_test_oob+0xac/0xec8
[   19.508177]  kunit_try_run_case+0x170/0x3f0
[   19.508491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.508641]  kthread+0x328/0x630
[   19.508766]  ret_from_fork+0x10/0x20
[   19.508809] 
[   19.508831] The buggy address belongs to the object at fff00000c7716c00
[   19.508831]  which belongs to the cache kmalloc-128 of size 128
[   19.509052] The buggy address is located 0 bytes inside of
[   19.509052]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.509191] 
[   19.509252] The buggy address belongs to the physical page:
[   19.509538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.509623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.509775] page_type: f5(slab)
[   19.509855] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.509940] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.510110] page dumped because: kasan: bad access detected
[   19.510177] 
[   19.510484] Memory state around the buggy address:
[   19.510540]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.510660]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510749] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.511052]                                                                 ^
[   19.511182]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.511241]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.511282] ==================================================================
[   19.512231] ==================================================================
[   19.512307] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.512360] Read of size 121 at addr fff00000c7716c00 by task kunit_try_catch/285
[   19.512679] 
[   19.512760] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.512853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.512882] Hardware name: linux,dummy-virt (DT)
[   19.512917] Call trace:
[   19.513014]  show_stack+0x20/0x38 (C)
[   19.513071]  dump_stack_lvl+0x8c/0xd0
[   19.513118]  print_report+0x118/0x5d0
[   19.513166]  kasan_report+0xdc/0x128
[   19.513213]  kasan_check_range+0x100/0x1a8
[   19.513261]  __kasan_check_read+0x20/0x30
[   19.513320]  copy_user_test_oob+0x3c8/0xec8
[   19.513372]  kunit_try_run_case+0x170/0x3f0
[   19.513423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.513478]  kthread+0x328/0x630
[   19.513531]  ret_from_fork+0x10/0x20
[   19.513581] 
[   19.513609] Allocated by task 285:
[   19.513641]  kasan_save_stack+0x3c/0x68
[   19.513682]  kasan_save_track+0x20/0x40
[   19.514113]  kasan_save_alloc_info+0x40/0x58
[   19.514173]  __kasan_kmalloc+0xd4/0xd8
[   19.514460]  __kmalloc_noprof+0x198/0x4c8
[   19.514590]  kunit_kmalloc_array+0x34/0x88
[   19.514686]  copy_user_test_oob+0xac/0xec8
[   19.514761]  kunit_try_run_case+0x170/0x3f0
[   19.515092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.515298]  kthread+0x328/0x630
[   19.515378]  ret_from_fork+0x10/0x20
[   19.515522] 
[   19.515545] The buggy address belongs to the object at fff00000c7716c00
[   19.515545]  which belongs to the cache kmalloc-128 of size 128
[   19.515607] The buggy address is located 0 bytes inside of
[   19.515607]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.516011] 
[   19.516110] The buggy address belongs to the physical page:
[   19.516179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.516242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.516596] page_type: f5(slab)
[   19.516752] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.516834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.516916] page dumped because: kasan: bad access detected
[   19.517013] 
[   19.517074] Memory state around the buggy address:
[   19.517110]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.517156]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517490] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.517782]                                                                 ^
[   19.518008]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.518081]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.518123] ==================================================================
[   19.519167] ==================================================================
[   19.519222] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.519275] Write of size 121 at addr fff00000c7716c00 by task kunit_try_catch/285
[   19.519329] 
[   19.519363] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.519496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.519593] Hardware name: linux,dummy-virt (DT)
[   19.519740] Call trace:
[   19.519817]  show_stack+0x20/0x38 (C)
[   19.519895]  dump_stack_lvl+0x8c/0xd0
[   19.520223]  print_report+0x118/0x5d0
[   19.520386]  kasan_report+0xdc/0x128
[   19.520439]  kasan_check_range+0x100/0x1a8
[   19.520735]  __kasan_check_write+0x20/0x30
[   19.521064]  copy_user_test_oob+0x434/0xec8
[   19.521186]  kunit_try_run_case+0x170/0x3f0
[   19.521485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.521631]  kthread+0x328/0x630
[   19.521698]  ret_from_fork+0x10/0x20
[   19.521769] 
[   19.521808] Allocated by task 285:
[   19.521862]  kasan_save_stack+0x3c/0x68
[   19.521917]  kasan_save_track+0x20/0x40
[   19.521957]  kasan_save_alloc_info+0x40/0x58
[   19.521999]  __kasan_kmalloc+0xd4/0xd8
[   19.522041]  __kmalloc_noprof+0x198/0x4c8
[   19.522083]  kunit_kmalloc_array+0x34/0x88
[   19.522132]  copy_user_test_oob+0xac/0xec8
[   19.522172]  kunit_try_run_case+0x170/0x3f0
[   19.522212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522259]  kthread+0x328/0x630
[   19.522304]  ret_from_fork+0x10/0x20
[   19.522342] 
[   19.522379] The buggy address belongs to the object at fff00000c7716c00
[   19.522379]  which belongs to the cache kmalloc-128 of size 128
[   19.522447] The buggy address is located 0 bytes inside of
[   19.522447]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.522518] 
[   19.522550] The buggy address belongs to the physical page:
[   19.522600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.522653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.522848] page_type: f5(slab)
[   19.522903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.523049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.523232] page dumped because: kasan: bad access detected
[   19.523283] 
[   19.523705] Memory state around the buggy address:
[   19.523860]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.523933]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.524035] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.524329]                                                                 ^
[   19.524384]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.524693]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.525056] ==================================================================
[   19.526260] ==================================================================
[   19.526337] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   19.526389] Read of size 121 at addr fff00000c7716c00 by task kunit_try_catch/285
[   19.526450] 
[   19.526756] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.526862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.526958] Hardware name: linux,dummy-virt (DT)
[   19.527028] Call trace:
[   19.527075]  show_stack+0x20/0x38 (C)
[   19.527406]  dump_stack_lvl+0x8c/0xd0
[   19.527618]  print_report+0x118/0x5d0
[   19.527678]  kasan_report+0xdc/0x128
[   19.527766]  kasan_check_range+0x100/0x1a8
[   19.527819]  __kasan_check_read+0x20/0x30
[   19.527971]  copy_user_test_oob+0x4a0/0xec8
[   19.528046]  kunit_try_run_case+0x170/0x3f0
[   19.528361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.528436]  kthread+0x328/0x630
[   19.528769]  ret_from_fork+0x10/0x20
[   19.529151] 
[   19.529240] Allocated by task 285:
[   19.529311]  kasan_save_stack+0x3c/0x68
[   19.529369]  kasan_save_track+0x20/0x40
[   19.529516]  kasan_save_alloc_info+0x40/0x58
[   19.529614]  __kasan_kmalloc+0xd4/0xd8
[   19.529683]  __kmalloc_noprof+0x198/0x4c8
[   19.529835]  kunit_kmalloc_array+0x34/0x88
[   19.529879]  copy_user_test_oob+0xac/0xec8
[   19.529919]  kunit_try_run_case+0x170/0x3f0
[   19.529982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530229]  kthread+0x328/0x630
[   19.530274]  ret_from_fork+0x10/0x20
[   19.530577] 
[   19.530642] The buggy address belongs to the object at fff00000c7716c00
[   19.530642]  which belongs to the cache kmalloc-128 of size 128
[   19.530858] The buggy address is located 0 bytes inside of
[   19.530858]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.530960] 
[   19.531010] The buggy address belongs to the physical page:
[   19.531118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.531221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.531323] page_type: f5(slab)
[   19.531660] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.531835] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.531910] page dumped because: kasan: bad access detected
[   19.531975] 
[   19.532147] Memory state around the buggy address:
[   19.532346]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.532433]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.532506] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.532547]                                                                 ^
[   19.532598]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.532858]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.533044] ==================================================================
[   19.477622] ==================================================================
[   19.477749] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.477840] Write of size 121 at addr fff00000c7716c00 by task kunit_try_catch/285
[   19.477896] 
[   19.477945] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.478037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.478068] Hardware name: linux,dummy-virt (DT)
[   19.478105] Call trace:
[   19.478131]  show_stack+0x20/0x38 (C)
[   19.478187]  dump_stack_lvl+0x8c/0xd0
[   19.478265]  print_report+0x118/0x5d0
[   19.478409]  kasan_report+0xdc/0x128
[   19.478591]  kasan_check_range+0x100/0x1a8
[   19.478759]  __kasan_check_write+0x20/0x30
[   19.478874]  copy_user_test_oob+0x234/0xec8
[   19.478923]  kunit_try_run_case+0x170/0x3f0
[   19.478979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.479035]  kthread+0x328/0x630
[   19.479080]  ret_from_fork+0x10/0x20
[   19.479133] 
[   19.479231] Allocated by task 285:
[   19.479267]  kasan_save_stack+0x3c/0x68
[   19.479628]  kasan_save_track+0x20/0x40
[   19.479677]  kasan_save_alloc_info+0x40/0x58
[   19.479909]  __kasan_kmalloc+0xd4/0xd8
[   19.480176]  __kmalloc_noprof+0x198/0x4c8
[   19.480283]  kunit_kmalloc_array+0x34/0x88
[   19.480322]  copy_user_test_oob+0xac/0xec8
[   19.480364]  kunit_try_run_case+0x170/0x3f0
[   19.480406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.480451]  kthread+0x328/0x630
[   19.480486]  ret_from_fork+0x10/0x20
[   19.480524] 
[   19.480550] The buggy address belongs to the object at fff00000c7716c00
[   19.480550]  which belongs to the cache kmalloc-128 of size 128
[   19.480612] The buggy address is located 0 bytes inside of
[   19.480612]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.480675] 
[   19.480699] The buggy address belongs to the physical page:
[   19.480745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.480809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.480862] page_type: f5(slab)
[   19.480906] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.480959] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.481001] page dumped because: kasan: bad access detected
[   19.481035] 
[   19.481055] Memory state around the buggy address:
[   19.481090]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.481135]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.481180] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.481221]                                                                 ^
[   19.481264]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.481973]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.482102] ==================================================================

[   16.002553] ==================================================================
[   16.002903] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.003238] Write of size 121 at addr ffff888102ae1400 by task kunit_try_catch/303
[   16.003565] 
[   16.003683] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.003741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.003754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.003777] Call Trace:
[   16.003792]  <TASK>
[   16.003822]  dump_stack_lvl+0x73/0xb0
[   16.003854]  print_report+0xd1/0x610
[   16.003878]  ? __virt_addr_valid+0x1db/0x2d0
[   16.003903]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.003937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.003962]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.003987]  kasan_report+0x141/0x180
[   16.004020]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.004050]  kasan_check_range+0x10c/0x1c0
[   16.004077]  __kasan_check_write+0x18/0x20
[   16.004101]  copy_user_test_oob+0x3fd/0x10f0
[   16.004130]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.004153]  ? finish_task_switch.isra.0+0x153/0x700
[   16.004178]  ? __switch_to+0x47/0xf50
[   16.004206]  ? __schedule+0x10cc/0x2b60
[   16.004231]  ? __pfx_read_tsc+0x10/0x10
[   16.004252]  ? ktime_get_ts64+0x86/0x230
[   16.004278]  kunit_try_run_case+0x1a5/0x480
[   16.004314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.004339]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.004375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.004401]  ? __kthread_parkme+0x82/0x180
[   16.004430]  ? preempt_count_sub+0x50/0x80
[   16.004472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.004497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.004523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.004548]  kthread+0x337/0x6f0
[   16.004579]  ? trace_preempt_on+0x20/0xc0
[   16.004605]  ? __pfx_kthread+0x10/0x10
[   16.004627]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.004650]  ? calculate_sigpending+0x7b/0xa0
[   16.004678]  ? __pfx_kthread+0x10/0x10
[   16.004703]  ret_from_fork+0x116/0x1d0
[   16.004724]  ? __pfx_kthread+0x10/0x10
[   16.004747]  ret_from_fork_asm+0x1a/0x30
[   16.004781]  </TASK>
[   16.004796] 
[   16.012382] Allocated by task 303:
[   16.012567]  kasan_save_stack+0x45/0x70
[   16.012785]  kasan_save_track+0x18/0x40
[   16.012976]  kasan_save_alloc_info+0x3b/0x50
[   16.013189]  __kasan_kmalloc+0xb7/0xc0
[   16.013378]  __kmalloc_noprof+0x1c9/0x500
[   16.013584]  kunit_kmalloc_array+0x25/0x60
[   16.013783]  copy_user_test_oob+0xab/0x10f0
[   16.013931]  kunit_try_run_case+0x1a5/0x480
[   16.014139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.014398]  kthread+0x337/0x6f0
[   16.014635]  ret_from_fork+0x116/0x1d0
[   16.014802]  ret_from_fork_asm+0x1a/0x30
[   16.015005] 
[   16.015103] The buggy address belongs to the object at ffff888102ae1400
[   16.015103]  which belongs to the cache kmalloc-128 of size 128
[   16.015613] The buggy address is located 0 bytes inside of
[   16.015613]  allocated 120-byte region [ffff888102ae1400, ffff888102ae1478)
[   16.016120] 
[   16.016224] The buggy address belongs to the physical page:
[   16.016458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   16.016813] flags: 0x200000000000000(node=0|zone=2)
[   16.016988] page_type: f5(slab)
[   16.017116] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.017356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.017749] page dumped because: kasan: bad access detected
[   16.018000] 
[   16.018093] Memory state around the buggy address:
[   16.018315]  ffff888102ae1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.018787]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.019016] >ffff888102ae1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.019233]                                                                 ^
[   16.019518]  ffff888102ae1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.019858]  ffff888102ae1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.020192] ==================================================================
[   16.067109] ==================================================================
[   16.067574] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.067897] Read of size 121 at addr ffff888102ae1400 by task kunit_try_catch/303
[   16.068252] 
[   16.068390] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.068452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.068465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.068487] Call Trace:
[   16.068503]  <TASK>
[   16.068537]  dump_stack_lvl+0x73/0xb0
[   16.068576]  print_report+0xd1/0x610
[   16.068599]  ? __virt_addr_valid+0x1db/0x2d0
[   16.068623]  ? copy_user_test_oob+0x604/0x10f0
[   16.068660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.068685]  ? copy_user_test_oob+0x604/0x10f0
[   16.068736]  kasan_report+0x141/0x180
[   16.068761]  ? copy_user_test_oob+0x604/0x10f0
[   16.068791]  kasan_check_range+0x10c/0x1c0
[   16.068827]  __kasan_check_read+0x15/0x20
[   16.068847]  copy_user_test_oob+0x604/0x10f0
[   16.068899]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.068922]  ? finish_task_switch.isra.0+0x153/0x700
[   16.068957]  ? __switch_to+0x47/0xf50
[   16.068984]  ? __schedule+0x10cc/0x2b60
[   16.069033]  ? __pfx_read_tsc+0x10/0x10
[   16.069055]  ? ktime_get_ts64+0x86/0x230
[   16.069080]  kunit_try_run_case+0x1a5/0x480
[   16.069117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.069145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.069196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.069221]  ? __kthread_parkme+0x82/0x180
[   16.069270]  ? preempt_count_sub+0x50/0x80
[   16.069309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.069348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.069386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.069425]  kthread+0x337/0x6f0
[   16.069455]  ? trace_preempt_on+0x20/0xc0
[   16.069479]  ? __pfx_kthread+0x10/0x10
[   16.069500]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.069531]  ? calculate_sigpending+0x7b/0xa0
[   16.069565]  ? __pfx_kthread+0x10/0x10
[   16.069587]  ret_from_fork+0x116/0x1d0
[   16.069617]  ? __pfx_kthread+0x10/0x10
[   16.069638]  ret_from_fork_asm+0x1a/0x30
[   16.069671]  </TASK>
[   16.069683] 
[   16.078006] Allocated by task 303:
[   16.078158]  kasan_save_stack+0x45/0x70
[   16.078361]  kasan_save_track+0x18/0x40
[   16.078583]  kasan_save_alloc_info+0x3b/0x50
[   16.078814]  __kasan_kmalloc+0xb7/0xc0
[   16.079011]  __kmalloc_noprof+0x1c9/0x500
[   16.079235]  kunit_kmalloc_array+0x25/0x60
[   16.079458]  copy_user_test_oob+0xab/0x10f0
[   16.079709]  kunit_try_run_case+0x1a5/0x480
[   16.079929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.080195]  kthread+0x337/0x6f0
[   16.080367]  ret_from_fork+0x116/0x1d0
[   16.080543]  ret_from_fork_asm+0x1a/0x30
[   16.080792] 
[   16.080902] The buggy address belongs to the object at ffff888102ae1400
[   16.080902]  which belongs to the cache kmalloc-128 of size 128
[   16.081373] The buggy address is located 0 bytes inside of
[   16.081373]  allocated 120-byte region [ffff888102ae1400, ffff888102ae1478)
[   16.081910] 
[   16.082028] The buggy address belongs to the physical page:
[   16.082284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   16.082635] flags: 0x200000000000000(node=0|zone=2)
[   16.082890] page_type: f5(slab)
[   16.083056] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.083321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.083700] page dumped because: kasan: bad access detected
[   16.083965] 
[   16.084103] Memory state around the buggy address:
[   16.084276]  ffff888102ae1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.084713]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.084930] >ffff888102ae1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.085141]                                                                 ^
[   16.085347]  ffff888102ae1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.085690]  ffff888102ae1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.086011] ==================================================================
[   16.045856] ==================================================================
[   16.046703] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.047299] Write of size 121 at addr ffff888102ae1400 by task kunit_try_catch/303
[   16.047775] 
[   16.048167] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.048329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.048346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.048367] Call Trace:
[   16.048398]  <TASK>
[   16.048415]  dump_stack_lvl+0x73/0xb0
[   16.048458]  print_report+0xd1/0x610
[   16.048483]  ? __virt_addr_valid+0x1db/0x2d0
[   16.048506]  ? copy_user_test_oob+0x557/0x10f0
[   16.048531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.048593]  ? copy_user_test_oob+0x557/0x10f0
[   16.048619]  kasan_report+0x141/0x180
[   16.048642]  ? copy_user_test_oob+0x557/0x10f0
[   16.048673]  kasan_check_range+0x10c/0x1c0
[   16.048697]  __kasan_check_write+0x18/0x20
[   16.048717]  copy_user_test_oob+0x557/0x10f0
[   16.048744]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.048767]  ? finish_task_switch.isra.0+0x153/0x700
[   16.048792]  ? __switch_to+0x47/0xf50
[   16.048818]  ? __schedule+0x10cc/0x2b60
[   16.048842]  ? __pfx_read_tsc+0x10/0x10
[   16.048864]  ? ktime_get_ts64+0x86/0x230
[   16.048889]  kunit_try_run_case+0x1a5/0x480
[   16.048914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.048937]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.048962]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.048987]  ? __kthread_parkme+0x82/0x180
[   16.049009]  ? preempt_count_sub+0x50/0x80
[   16.049033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.049058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.049083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.049108]  kthread+0x337/0x6f0
[   16.049133]  ? trace_preempt_on+0x20/0xc0
[   16.049157]  ? __pfx_kthread+0x10/0x10
[   16.049178]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.049201]  ? calculate_sigpending+0x7b/0xa0
[   16.049226]  ? __pfx_kthread+0x10/0x10
[   16.049248]  ret_from_fork+0x116/0x1d0
[   16.049268]  ? __pfx_kthread+0x10/0x10
[   16.049289]  ret_from_fork_asm+0x1a/0x30
[   16.049323]  </TASK>
[   16.049333] 
[   16.057686] Allocated by task 303:
[   16.057913]  kasan_save_stack+0x45/0x70
[   16.058146]  kasan_save_track+0x18/0x40
[   16.058362]  kasan_save_alloc_info+0x3b/0x50
[   16.058607]  __kasan_kmalloc+0xb7/0xc0
[   16.058808]  __kmalloc_noprof+0x1c9/0x500
[   16.059032]  kunit_kmalloc_array+0x25/0x60
[   16.059251]  copy_user_test_oob+0xab/0x10f0
[   16.059512]  kunit_try_run_case+0x1a5/0x480
[   16.059767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.060167]  kthread+0x337/0x6f0
[   16.060372]  ret_from_fork+0x116/0x1d0
[   16.060571]  ret_from_fork_asm+0x1a/0x30
[   16.060867] 
[   16.060980] The buggy address belongs to the object at ffff888102ae1400
[   16.060980]  which belongs to the cache kmalloc-128 of size 128
[   16.061525] The buggy address is located 0 bytes inside of
[   16.061525]  allocated 120-byte region [ffff888102ae1400, ffff888102ae1478)
[   16.062004] 
[   16.062097] The buggy address belongs to the physical page:
[   16.062289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   16.062573] flags: 0x200000000000000(node=0|zone=2)
[   16.062837] page_type: f5(slab)
[   16.063008] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.063388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.063666] page dumped because: kasan: bad access detected
[   16.063840] 
[   16.063911] Memory state around the buggy address:
[   16.064091]  ffff888102ae1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.064455]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064934] >ffff888102ae1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.065366]                                                                 ^
[   16.065706]  ffff888102ae1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.065926]  ffff888102ae1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.066263] ==================================================================
[   16.020755] ==================================================================
[   16.021120] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.021742] Read of size 121 at addr ffff888102ae1400 by task kunit_try_catch/303
[   16.022054] 
[   16.022162] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.022205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.022217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.022239] Call Trace:
[   16.022254]  <TASK>
[   16.022271]  dump_stack_lvl+0x73/0xb0
[   16.022298]  print_report+0xd1/0x610
[   16.022322]  ? __virt_addr_valid+0x1db/0x2d0
[   16.022345]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.022370]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.022394]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.022419]  kasan_report+0x141/0x180
[   16.022456]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.022489]  kasan_check_range+0x10c/0x1c0
[   16.022514]  __kasan_check_read+0x15/0x20
[   16.022534]  copy_user_test_oob+0x4aa/0x10f0
[   16.022561]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.022595]  ? finish_task_switch.isra.0+0x153/0x700
[   16.022619]  ? __switch_to+0x47/0xf50
[   16.022647]  ? __schedule+0x10cc/0x2b60
[   16.022683]  ? __pfx_read_tsc+0x10/0x10
[   16.022715]  ? ktime_get_ts64+0x86/0x230
[   16.022741]  kunit_try_run_case+0x1a5/0x480
[   16.022775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.022799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.022824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.022849]  ? __kthread_parkme+0x82/0x180
[   16.022879]  ? preempt_count_sub+0x50/0x80
[   16.022904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.022929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.022965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.022990]  kthread+0x337/0x6f0
[   16.023010]  ? trace_preempt_on+0x20/0xc0
[   16.023042]  ? __pfx_kthread+0x10/0x10
[   16.023063]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.023086]  ? calculate_sigpending+0x7b/0xa0
[   16.023121]  ? __pfx_kthread+0x10/0x10
[   16.023144]  ret_from_fork+0x116/0x1d0
[   16.023163]  ? __pfx_kthread+0x10/0x10
[   16.023185]  ret_from_fork_asm+0x1a/0x30
[   16.023218]  </TASK>
[   16.023228] 
[   16.032395] Allocated by task 303:
[   16.032986]  kasan_save_stack+0x45/0x70
[   16.033204]  kasan_save_track+0x18/0x40
[   16.033380]  kasan_save_alloc_info+0x3b/0x50
[   16.033927]  __kasan_kmalloc+0xb7/0xc0
[   16.034138]  __kmalloc_noprof+0x1c9/0x500
[   16.034329]  kunit_kmalloc_array+0x25/0x60
[   16.034529]  copy_user_test_oob+0xab/0x10f0
[   16.035045]  kunit_try_run_case+0x1a5/0x480
[   16.035445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.035859]  kthread+0x337/0x6f0
[   16.036027]  ret_from_fork+0x116/0x1d0
[   16.036204]  ret_from_fork_asm+0x1a/0x30
[   16.036387] 
[   16.036488] The buggy address belongs to the object at ffff888102ae1400
[   16.036488]  which belongs to the cache kmalloc-128 of size 128
[   16.037577] The buggy address is located 0 bytes inside of
[   16.037577]  allocated 120-byte region [ffff888102ae1400, ffff888102ae1478)
[   16.038097] 
[   16.038192] The buggy address belongs to the physical page:
[   16.038422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   16.039143] flags: 0x200000000000000(node=0|zone=2)
[   16.039616] page_type: f5(slab)
[   16.039994] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.040474] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.041347] page dumped because: kasan: bad access detected
[   16.042016] 
[   16.042271] Memory state around the buggy address:
[   16.042522]  ffff888102ae1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.042819]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.043108] >ffff888102ae1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.043392]                                                                 ^
[   16.044086]  ffff888102ae1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.044559]  ffff888102ae1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.045152] ==================================================================

[   16.523968] ==================================================================
[   16.524484] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.524955] Write of size 121 at addr ffff8881029c5700 by task kunit_try_catch/302
[   16.525268] 
[   16.525381] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.525429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.525444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.525469] Call Trace:
[   16.525490]  <TASK>
[   16.525509]  dump_stack_lvl+0x73/0xb0
[   16.525540]  print_report+0xd1/0x610
[   16.525564]  ? __virt_addr_valid+0x1db/0x2d0
[   16.525589]  ? copy_user_test_oob+0x557/0x10f0
[   16.525613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.525637]  ? copy_user_test_oob+0x557/0x10f0
[   16.525662]  kasan_report+0x141/0x180
[   16.525684]  ? copy_user_test_oob+0x557/0x10f0
[   16.525713]  kasan_check_range+0x10c/0x1c0
[   16.525738]  __kasan_check_write+0x18/0x20
[   16.525757]  copy_user_test_oob+0x557/0x10f0
[   16.525783]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.525806]  ? finish_task_switch.isra.0+0x153/0x700
[   16.525831]  ? __switch_to+0x47/0xf50
[   16.525857]  ? __schedule+0x10cc/0x2b60
[   16.525880]  ? __pfx_read_tsc+0x10/0x10
[   16.525902]  ? ktime_get_ts64+0x86/0x230
[   16.525927]  kunit_try_run_case+0x1a5/0x480
[   16.525952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.525977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.526002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.526038]  ? __kthread_parkme+0x82/0x180
[   16.526060]  ? preempt_count_sub+0x50/0x80
[   16.526084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.526109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.526135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.526161]  kthread+0x337/0x6f0
[   16.526182]  ? trace_preempt_on+0x20/0xc0
[   16.526207]  ? __pfx_kthread+0x10/0x10
[   16.526228]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.526251]  ? calculate_sigpending+0x7b/0xa0
[   16.526277]  ? __pfx_kthread+0x10/0x10
[   16.526300]  ret_from_fork+0x116/0x1d0
[   16.526318]  ? __pfx_kthread+0x10/0x10
[   16.526339]  ret_from_fork_asm+0x1a/0x30
[   16.526371]  </TASK>
[   16.526383] 
[   16.533557] Allocated by task 302:
[   16.533728]  kasan_save_stack+0x45/0x70
[   16.533949]  kasan_save_track+0x18/0x40
[   16.534141]  kasan_save_alloc_info+0x3b/0x50
[   16.534360]  __kasan_kmalloc+0xb7/0xc0
[   16.534592]  __kmalloc_noprof+0x1c9/0x500
[   16.534799]  kunit_kmalloc_array+0x25/0x60
[   16.534990]  copy_user_test_oob+0xab/0x10f0
[   16.535191]  kunit_try_run_case+0x1a5/0x480
[   16.535382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.535699]  kthread+0x337/0x6f0
[   16.535836]  ret_from_fork+0x116/0x1d0
[   16.536049]  ret_from_fork_asm+0x1a/0x30
[   16.536206] 
[   16.536321] The buggy address belongs to the object at ffff8881029c5700
[   16.536321]  which belongs to the cache kmalloc-128 of size 128
[   16.536787] The buggy address is located 0 bytes inside of
[   16.536787]  allocated 120-byte region [ffff8881029c5700, ffff8881029c5778)
[   16.537213] 
[   16.537313] The buggy address belongs to the physical page:
[   16.537667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   16.538006] flags: 0x200000000000000(node=0|zone=2)
[   16.538243] page_type: f5(slab)
[   16.538410] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.538714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.538965] page dumped because: kasan: bad access detected
[   16.539249] 
[   16.539349] Memory state around the buggy address:
[   16.539575]  ffff8881029c5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.539905]  ffff8881029c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.540223] >ffff8881029c5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.540571]                                                                 ^
[   16.540776]  ffff8881029c5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.541095]  ffff8881029c5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.541383] ==================================================================
[   16.506182] ==================================================================
[   16.506624] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.506872] Read of size 121 at addr ffff8881029c5700 by task kunit_try_catch/302
[   16.507392] 
[   16.507513] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.507562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.507576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.507600] Call Trace:
[   16.507622]  <TASK>
[   16.507644]  dump_stack_lvl+0x73/0xb0
[   16.507684]  print_report+0xd1/0x610
[   16.507709]  ? __virt_addr_valid+0x1db/0x2d0
[   16.507740]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.507765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.507789]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.507814]  kasan_report+0x141/0x180
[   16.507836]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.507865]  kasan_check_range+0x10c/0x1c0
[   16.507890]  __kasan_check_read+0x15/0x20
[   16.507910]  copy_user_test_oob+0x4aa/0x10f0
[   16.507936]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.507960]  ? finish_task_switch.isra.0+0x153/0x700
[   16.507984]  ? __switch_to+0x47/0xf50
[   16.508023]  ? __schedule+0x10cc/0x2b60
[   16.508046]  ? __pfx_read_tsc+0x10/0x10
[   16.508068]  ? ktime_get_ts64+0x86/0x230
[   16.508094]  kunit_try_run_case+0x1a5/0x480
[   16.508120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.508144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.508169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.508194]  ? __kthread_parkme+0x82/0x180
[   16.508218]  ? preempt_count_sub+0x50/0x80
[   16.508242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.508266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.508292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.508317]  kthread+0x337/0x6f0
[   16.508337]  ? trace_preempt_on+0x20/0xc0
[   16.508362]  ? __pfx_kthread+0x10/0x10
[   16.508383]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.508406]  ? calculate_sigpending+0x7b/0xa0
[   16.508443]  ? __pfx_kthread+0x10/0x10
[   16.508465]  ret_from_fork+0x116/0x1d0
[   16.508485]  ? __pfx_kthread+0x10/0x10
[   16.508505]  ret_from_fork_asm+0x1a/0x30
[   16.508537]  </TASK>
[   16.508548] 
[   16.515793] Allocated by task 302:
[   16.516075]  kasan_save_stack+0x45/0x70
[   16.516274]  kasan_save_track+0x18/0x40
[   16.516450]  kasan_save_alloc_info+0x3b/0x50
[   16.516615]  __kasan_kmalloc+0xb7/0xc0
[   16.516873]  __kmalloc_noprof+0x1c9/0x500
[   16.517086]  kunit_kmalloc_array+0x25/0x60
[   16.517300]  copy_user_test_oob+0xab/0x10f0
[   16.517507]  kunit_try_run_case+0x1a5/0x480
[   16.517710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.517890]  kthread+0x337/0x6f0
[   16.518021]  ret_from_fork+0x116/0x1d0
[   16.518210]  ret_from_fork_asm+0x1a/0x30
[   16.518415] 
[   16.518577] The buggy address belongs to the object at ffff8881029c5700
[   16.518577]  which belongs to the cache kmalloc-128 of size 128
[   16.519061] The buggy address is located 0 bytes inside of
[   16.519061]  allocated 120-byte region [ffff8881029c5700, ffff8881029c5778)
[   16.519558] 
[   16.519657] The buggy address belongs to the physical page:
[   16.519874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   16.520158] flags: 0x200000000000000(node=0|zone=2)
[   16.520325] page_type: f5(slab)
[   16.520472] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.520807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.521129] page dumped because: kasan: bad access detected
[   16.521308] 
[   16.521401] Memory state around the buggy address:
[   16.521636]  ffff8881029c5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.521957]  ffff8881029c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.522249] >ffff8881029c5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.522588]                                                                 ^
[   16.522871]  ffff8881029c5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523164]  ffff8881029c5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523455] ==================================================================
[   16.487863] ==================================================================
[   16.488716] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.489060] Write of size 121 at addr ffff8881029c5700 by task kunit_try_catch/302
[   16.489362] 
[   16.489482] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.489534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.489547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.489570] Call Trace:
[   16.489591]  <TASK>
[   16.489613]  dump_stack_lvl+0x73/0xb0
[   16.489647]  print_report+0xd1/0x610
[   16.489671]  ? __virt_addr_valid+0x1db/0x2d0
[   16.489698]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.489723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.489747]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.489771]  kasan_report+0x141/0x180
[   16.489794]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.489822]  kasan_check_range+0x10c/0x1c0
[   16.489847]  __kasan_check_write+0x18/0x20
[   16.489867]  copy_user_test_oob+0x3fd/0x10f0
[   16.489894]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.489918]  ? finish_task_switch.isra.0+0x153/0x700
[   16.489941]  ? __switch_to+0x47/0xf50
[   16.489969]  ? __schedule+0x10cc/0x2b60
[   16.489992]  ? __pfx_read_tsc+0x10/0x10
[   16.490026]  ? ktime_get_ts64+0x86/0x230
[   16.490052]  kunit_try_run_case+0x1a5/0x480
[   16.490078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.490102]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.490128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.490152]  ? __kthread_parkme+0x82/0x180
[   16.490175]  ? preempt_count_sub+0x50/0x80
[   16.490199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.490224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.490249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.490274]  kthread+0x337/0x6f0
[   16.490296]  ? trace_preempt_on+0x20/0xc0
[   16.490321]  ? __pfx_kthread+0x10/0x10
[   16.490344]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.490366]  ? calculate_sigpending+0x7b/0xa0
[   16.490392]  ? __pfx_kthread+0x10/0x10
[   16.490414]  ret_from_fork+0x116/0x1d0
[   16.490446]  ? __pfx_kthread+0x10/0x10
[   16.490469]  ret_from_fork_asm+0x1a/0x30
[   16.490501]  </TASK>
[   16.490512] 
[   16.497589] Allocated by task 302:
[   16.497779]  kasan_save_stack+0x45/0x70
[   16.497973]  kasan_save_track+0x18/0x40
[   16.498172]  kasan_save_alloc_info+0x3b/0x50
[   16.498331]  __kasan_kmalloc+0xb7/0xc0
[   16.498546]  __kmalloc_noprof+0x1c9/0x500
[   16.498748]  kunit_kmalloc_array+0x25/0x60
[   16.498927]  copy_user_test_oob+0xab/0x10f0
[   16.499087]  kunit_try_run_case+0x1a5/0x480
[   16.499299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.499632]  kthread+0x337/0x6f0
[   16.499797]  ret_from_fork+0x116/0x1d0
[   16.499975]  ret_from_fork_asm+0x1a/0x30
[   16.500156] 
[   16.500256] The buggy address belongs to the object at ffff8881029c5700
[   16.500256]  which belongs to the cache kmalloc-128 of size 128
[   16.500687] The buggy address is located 0 bytes inside of
[   16.500687]  allocated 120-byte region [ffff8881029c5700, ffff8881029c5778)
[   16.501171] 
[   16.501269] The buggy address belongs to the physical page:
[   16.501544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   16.501795] flags: 0x200000000000000(node=0|zone=2)
[   16.501963] page_type: f5(slab)
[   16.502098] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.502329] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.502627] page dumped because: kasan: bad access detected
[   16.502873] 
[   16.502965] Memory state around the buggy address:
[   16.503195]  ffff8881029c5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.503518]  ffff8881029c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503902] >ffff8881029c5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.504126]                                                                 ^
[   16.504342]  ffff8881029c5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.504558]  ffff8881029c5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.505262] ==================================================================
[   16.542119] ==================================================================
[   16.542475] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.542966] Read of size 121 at addr ffff8881029c5700 by task kunit_try_catch/302
[   16.543368] 
[   16.543487] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.543538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.543551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.543574] Call Trace:
[   16.543595]  <TASK>
[   16.543616]  dump_stack_lvl+0x73/0xb0
[   16.543647]  print_report+0xd1/0x610
[   16.543672]  ? __virt_addr_valid+0x1db/0x2d0
[   16.543696]  ? copy_user_test_oob+0x604/0x10f0
[   16.543720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.543744]  ? copy_user_test_oob+0x604/0x10f0
[   16.543790]  kasan_report+0x141/0x180
[   16.543813]  ? copy_user_test_oob+0x604/0x10f0
[   16.543841]  kasan_check_range+0x10c/0x1c0
[   16.543866]  __kasan_check_read+0x15/0x20
[   16.543907]  copy_user_test_oob+0x604/0x10f0
[   16.543936]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.543961]  ? finish_task_switch.isra.0+0x153/0x700
[   16.543985]  ? __switch_to+0x47/0xf50
[   16.544022]  ? __schedule+0x10cc/0x2b60
[   16.544046]  ? __pfx_read_tsc+0x10/0x10
[   16.544084]  ? ktime_get_ts64+0x86/0x230
[   16.544110]  kunit_try_run_case+0x1a5/0x480
[   16.544150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.544186]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.544225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.544264]  ? __kthread_parkme+0x82/0x180
[   16.544300]  ? preempt_count_sub+0x50/0x80
[   16.544325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.544376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.544414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.544440]  kthread+0x337/0x6f0
[   16.544472]  ? trace_preempt_on+0x20/0xc0
[   16.544510]  ? __pfx_kthread+0x10/0x10
[   16.544544]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.544580]  ? calculate_sigpending+0x7b/0xa0
[   16.544619]  ? __pfx_kthread+0x10/0x10
[   16.544655]  ret_from_fork+0x116/0x1d0
[   16.544688]  ? __pfx_kthread+0x10/0x10
[   16.544721]  ret_from_fork_asm+0x1a/0x30
[   16.544767]  </TASK>
[   16.544790] 
[   16.552734] Allocated by task 302:
[   16.552928]  kasan_save_stack+0x45/0x70
[   16.553104]  kasan_save_track+0x18/0x40
[   16.553240]  kasan_save_alloc_info+0x3b/0x50
[   16.553386]  __kasan_kmalloc+0xb7/0xc0
[   16.553571]  __kmalloc_noprof+0x1c9/0x500
[   16.553788]  kunit_kmalloc_array+0x25/0x60
[   16.554001]  copy_user_test_oob+0xab/0x10f0
[   16.554224]  kunit_try_run_case+0x1a5/0x480
[   16.554424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.554670]  kthread+0x337/0x6f0
[   16.554834]  ret_from_fork+0x116/0x1d0
[   16.555024]  ret_from_fork_asm+0x1a/0x30
[   16.555216] 
[   16.555384] The buggy address belongs to the object at ffff8881029c5700
[   16.555384]  which belongs to the cache kmalloc-128 of size 128
[   16.555835] The buggy address is located 0 bytes inside of
[   16.555835]  allocated 120-byte region [ffff8881029c5700, ffff8881029c5778)
[   16.556190] 
[   16.556264] The buggy address belongs to the physical page:
[   16.556549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   16.556930] flags: 0x200000000000000(node=0|zone=2)
[   16.557183] page_type: f5(slab)
[   16.557357] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.557733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.558109] page dumped because: kasan: bad access detected
[   16.558319] 
[   16.558432] Memory state around the buggy address:
[   16.558667]  ffff8881029c5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.559005]  ffff8881029c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.559337] >ffff8881029c5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.559979]                                                                 ^
[   16.560294]  ffff8881029c5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.560852]  ffff8881029c5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.561112] ==================================================================

[   16.199456] ==================================================================
[   16.199820] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.200126] Write of size 121 at addr ffff8881029b2200 by task kunit_try_catch/302
[   16.200435] 
[   16.200548] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.200594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.200606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.200629] Call Trace:
[   16.200643]  <TASK>
[   16.200659]  dump_stack_lvl+0x73/0xb0
[   16.200689]  print_report+0xd1/0x610
[   16.200712]  ? __virt_addr_valid+0x1db/0x2d0
[   16.200736]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.200760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.200785]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.200809]  kasan_report+0x141/0x180
[   16.200832]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.200862]  kasan_check_range+0x10c/0x1c0
[   16.200886]  __kasan_check_write+0x18/0x20
[   16.200920]  copy_user_test_oob+0x3fd/0x10f0
[   16.200946]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.200970]  ? finish_task_switch.isra.0+0x153/0x700
[   16.201004]  ? __switch_to+0x47/0xf50
[   16.201032]  ? __schedule+0x10cc/0x2b60
[   16.201056]  ? __pfx_read_tsc+0x10/0x10
[   16.201077]  ? ktime_get_ts64+0x86/0x230
[   16.201102]  kunit_try_run_case+0x1a5/0x480
[   16.201128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.201151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.201176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.201202]  ? __kthread_parkme+0x82/0x180
[   16.201224]  ? preempt_count_sub+0x50/0x80
[   16.201248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.201273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.201300]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.201325]  kthread+0x337/0x6f0
[   16.201345]  ? trace_preempt_on+0x20/0xc0
[   16.201369]  ? __pfx_kthread+0x10/0x10
[   16.201390]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.201412]  ? calculate_sigpending+0x7b/0xa0
[   16.201438]  ? __pfx_kthread+0x10/0x10
[   16.201459]  ret_from_fork+0x116/0x1d0
[   16.201479]  ? __pfx_kthread+0x10/0x10
[   16.201499]  ret_from_fork_asm+0x1a/0x30
[   16.201533]  </TASK>
[   16.201544] 
[   16.208516] Allocated by task 302:
[   16.208676]  kasan_save_stack+0x45/0x70
[   16.208852]  kasan_save_track+0x18/0x40
[   16.209073]  kasan_save_alloc_info+0x3b/0x50
[   16.209226]  __kasan_kmalloc+0xb7/0xc0
[   16.209359]  __kmalloc_noprof+0x1c9/0x500
[   16.209561]  kunit_kmalloc_array+0x25/0x60
[   16.209778]  copy_user_test_oob+0xab/0x10f0
[   16.210011]  kunit_try_run_case+0x1a5/0x480
[   16.210222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.210451]  kthread+0x337/0x6f0
[   16.210613]  ret_from_fork+0x116/0x1d0
[   16.210804]  ret_from_fork_asm+0x1a/0x30
[   16.210986] 
[   16.211081] The buggy address belongs to the object at ffff8881029b2200
[   16.211081]  which belongs to the cache kmalloc-128 of size 128
[   16.211553] The buggy address is located 0 bytes inside of
[   16.211553]  allocated 120-byte region [ffff8881029b2200, ffff8881029b2278)
[   16.212049] 
[   16.212126] The buggy address belongs to the physical page:
[   16.212373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   16.212656] flags: 0x200000000000000(node=0|zone=2)
[   16.212824] page_type: f5(slab)
[   16.212959] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.213321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.213659] page dumped because: kasan: bad access detected
[   16.213878] 
[   16.213959] Memory state around the buggy address:
[   16.214353]  ffff8881029b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.214642]  ffff8881029b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.214931] >ffff8881029b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.215238]                                                                 ^
[   16.215470]  ffff8881029b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.215740]  ffff8881029b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.216112] ==================================================================
[   16.257689] ==================================================================
[   16.257965] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.258254] Read of size 121 at addr ffff8881029b2200 by task kunit_try_catch/302
[   16.258544] 
[   16.258681] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.258727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.258739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.258766] Call Trace:
[   16.258782]  <TASK>
[   16.258800]  dump_stack_lvl+0x73/0xb0
[   16.258829]  print_report+0xd1/0x610
[   16.258852]  ? __virt_addr_valid+0x1db/0x2d0
[   16.258876]  ? copy_user_test_oob+0x604/0x10f0
[   16.258911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.258935]  ? copy_user_test_oob+0x604/0x10f0
[   16.258960]  kasan_report+0x141/0x180
[   16.258983]  ? copy_user_test_oob+0x604/0x10f0
[   16.259012]  kasan_check_range+0x10c/0x1c0
[   16.259037]  __kasan_check_read+0x15/0x20
[   16.259057]  copy_user_test_oob+0x604/0x10f0
[   16.259084]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.259107]  ? finish_task_switch.isra.0+0x153/0x700
[   16.259131]  ? __switch_to+0x47/0xf50
[   16.259171]  ? __schedule+0x10cc/0x2b60
[   16.259194]  ? __pfx_read_tsc+0x10/0x10
[   16.259216]  ? ktime_get_ts64+0x86/0x230
[   16.259241]  kunit_try_run_case+0x1a5/0x480
[   16.259266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259289]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.259314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.259338]  ? __kthread_parkme+0x82/0x180
[   16.259361]  ? preempt_count_sub+0x50/0x80
[   16.259385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.259435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.259460]  kthread+0x337/0x6f0
[   16.259479]  ? trace_preempt_on+0x20/0xc0
[   16.259504]  ? __pfx_kthread+0x10/0x10
[   16.259525]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.259547]  ? calculate_sigpending+0x7b/0xa0
[   16.259573]  ? __pfx_kthread+0x10/0x10
[   16.259594]  ret_from_fork+0x116/0x1d0
[   16.259614]  ? __pfx_kthread+0x10/0x10
[   16.259635]  ret_from_fork_asm+0x1a/0x30
[   16.259667]  </TASK>
[   16.259679] 
[   16.266678] Allocated by task 302:
[   16.266874]  kasan_save_stack+0x45/0x70
[   16.267110]  kasan_save_track+0x18/0x40
[   16.267314]  kasan_save_alloc_info+0x3b/0x50
[   16.267494]  __kasan_kmalloc+0xb7/0xc0
[   16.267628]  __kmalloc_noprof+0x1c9/0x500
[   16.267827]  kunit_kmalloc_array+0x25/0x60
[   16.268112]  copy_user_test_oob+0xab/0x10f0
[   16.268326]  kunit_try_run_case+0x1a5/0x480
[   16.268533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.268788]  kthread+0x337/0x6f0
[   16.268953]  ret_from_fork+0x116/0x1d0
[   16.269157]  ret_from_fork_asm+0x1a/0x30
[   16.269313] 
[   16.269385] The buggy address belongs to the object at ffff8881029b2200
[   16.269385]  which belongs to the cache kmalloc-128 of size 128
[   16.269883] The buggy address is located 0 bytes inside of
[   16.269883]  allocated 120-byte region [ffff8881029b2200, ffff8881029b2278)
[   16.270386] 
[   16.270460] The buggy address belongs to the physical page:
[   16.270635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   16.270883] flags: 0x200000000000000(node=0|zone=2)
[   16.271125] page_type: f5(slab)
[   16.271293] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.271632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.272069] page dumped because: kasan: bad access detected
[   16.272320] 
[   16.272413] Memory state around the buggy address:
[   16.272600]  ffff8881029b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.272820]  ffff8881029b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.273049] >ffff8881029b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.273527]                                                                 ^
[   16.274052]  ffff8881029b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.274354]  ffff8881029b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.274569] ==================================================================
[   16.216631] ==================================================================
[   16.216959] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.217231] Read of size 121 at addr ffff8881029b2200 by task kunit_try_catch/302
[   16.217550] 
[   16.217660] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.217703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.217715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.217738] Call Trace:
[   16.217752]  <TASK>
[   16.217769]  dump_stack_lvl+0x73/0xb0
[   16.217797]  print_report+0xd1/0x610
[   16.217820]  ? __virt_addr_valid+0x1db/0x2d0
[   16.217844]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.217868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.217901]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.217927]  kasan_report+0x141/0x180
[   16.217949]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.217979]  kasan_check_range+0x10c/0x1c0
[   16.218004]  __kasan_check_read+0x15/0x20
[   16.218033]  copy_user_test_oob+0x4aa/0x10f0
[   16.218060]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.218084]  ? finish_task_switch.isra.0+0x153/0x700
[   16.218107]  ? __switch_to+0x47/0xf50
[   16.218134]  ? __schedule+0x10cc/0x2b60
[   16.218158]  ? __pfx_read_tsc+0x10/0x10
[   16.218180]  ? ktime_get_ts64+0x86/0x230
[   16.218205]  kunit_try_run_case+0x1a5/0x480
[   16.218230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.218254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.218278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.218303]  ? __kthread_parkme+0x82/0x180
[   16.218325]  ? preempt_count_sub+0x50/0x80
[   16.218349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.218374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.218399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.218424]  kthread+0x337/0x6f0
[   16.218444]  ? trace_preempt_on+0x20/0xc0
[   16.218469]  ? __pfx_kthread+0x10/0x10
[   16.218490]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.218512]  ? calculate_sigpending+0x7b/0xa0
[   16.218538]  ? __pfx_kthread+0x10/0x10
[   16.218560]  ret_from_fork+0x116/0x1d0
[   16.218579]  ? __pfx_kthread+0x10/0x10
[   16.218600]  ret_from_fork_asm+0x1a/0x30
[   16.218633]  </TASK>
[   16.218643] 
[   16.225615] Allocated by task 302:
[   16.225751]  kasan_save_stack+0x45/0x70
[   16.225906]  kasan_save_track+0x18/0x40
[   16.226104]  kasan_save_alloc_info+0x3b/0x50
[   16.226318]  __kasan_kmalloc+0xb7/0xc0
[   16.226505]  __kmalloc_noprof+0x1c9/0x500
[   16.226703]  kunit_kmalloc_array+0x25/0x60
[   16.226919]  copy_user_test_oob+0xab/0x10f0
[   16.227295]  kunit_try_run_case+0x1a5/0x480
[   16.227506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.227720]  kthread+0x337/0x6f0
[   16.227846]  ret_from_fork+0x116/0x1d0
[   16.227992]  ret_from_fork_asm+0x1a/0x30
[   16.228134] 
[   16.228207] The buggy address belongs to the object at ffff8881029b2200
[   16.228207]  which belongs to the cache kmalloc-128 of size 128
[   16.228864] The buggy address is located 0 bytes inside of
[   16.228864]  allocated 120-byte region [ffff8881029b2200, ffff8881029b2278)
[   16.229991] 
[   16.230076] The buggy address belongs to the physical page:
[   16.230307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   16.230549] flags: 0x200000000000000(node=0|zone=2)
[   16.230714] page_type: f5(slab)
[   16.230841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.231086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.231314] page dumped because: kasan: bad access detected
[   16.231488] 
[   16.231558] Memory state around the buggy address:
[   16.231718]  ffff8881029b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.231981]  ffff8881029b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.232312] >ffff8881029b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.232626]                                                                 ^
[   16.232952]  ffff8881029b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.233277]  ffff8881029b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.233596] ==================================================================
[   16.234126] ==================================================================
[   16.234473] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.235137] Write of size 121 at addr ffff8881029b2200 by task kunit_try_catch/302
[   16.235485] 
[   16.235599] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.235644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.235656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.235677] Call Trace:
[   16.235694]  <TASK>
[   16.235712]  dump_stack_lvl+0x73/0xb0
[   16.235740]  print_report+0xd1/0x610
[   16.235764]  ? __virt_addr_valid+0x1db/0x2d0
[   16.235788]  ? copy_user_test_oob+0x557/0x10f0
[   16.235812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.235836]  ? copy_user_test_oob+0x557/0x10f0
[   16.235861]  kasan_report+0x141/0x180
[   16.235884]  ? copy_user_test_oob+0x557/0x10f0
[   16.235926]  kasan_check_range+0x10c/0x1c0
[   16.235951]  __kasan_check_write+0x18/0x20
[   16.235971]  copy_user_test_oob+0x557/0x10f0
[   16.236009]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.236033]  ? finish_task_switch.isra.0+0x153/0x700
[   16.236056]  ? __switch_to+0x47/0xf50
[   16.236084]  ? __schedule+0x10cc/0x2b60
[   16.236107]  ? __pfx_read_tsc+0x10/0x10
[   16.236129]  ? ktime_get_ts64+0x86/0x230
[   16.236154]  kunit_try_run_case+0x1a5/0x480
[   16.236179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.236203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.236228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.236253]  ? __kthread_parkme+0x82/0x180
[   16.236274]  ? preempt_count_sub+0x50/0x80
[   16.236298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.236323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.236348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.236373]  kthread+0x337/0x6f0
[   16.236392]  ? trace_preempt_on+0x20/0xc0
[   16.236417]  ? __pfx_kthread+0x10/0x10
[   16.236438]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.236460]  ? calculate_sigpending+0x7b/0xa0
[   16.236486]  ? __pfx_kthread+0x10/0x10
[   16.236507]  ret_from_fork+0x116/0x1d0
[   16.236527]  ? __pfx_kthread+0x10/0x10
[   16.236548]  ret_from_fork_asm+0x1a/0x30
[   16.236581]  </TASK>
[   16.236592] 
[   16.243915] Allocated by task 302:
[   16.244193]  kasan_save_stack+0x45/0x70
[   16.244338]  kasan_save_track+0x18/0x40
[   16.244476]  kasan_save_alloc_info+0x3b/0x50
[   16.244627]  __kasan_kmalloc+0xb7/0xc0
[   16.244760]  __kmalloc_noprof+0x1c9/0x500
[   16.244913]  kunit_kmalloc_array+0x25/0x60
[   16.245238]  copy_user_test_oob+0xab/0x10f0
[   16.245447]  kunit_try_run_case+0x1a5/0x480
[   16.245655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.245921]  kthread+0x337/0x6f0
[   16.246239]  ret_from_fork+0x116/0x1d0
[   16.246427]  ret_from_fork_asm+0x1a/0x30
[   16.246628] 
[   16.246723] The buggy address belongs to the object at ffff8881029b2200
[   16.246723]  which belongs to the cache kmalloc-128 of size 128
[   16.247238] The buggy address is located 0 bytes inside of
[   16.247238]  allocated 120-byte region [ffff8881029b2200, ffff8881029b2278)
[   16.247626] 
[   16.247698] The buggy address belongs to the physical page:
[   16.247872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   16.250293] flags: 0x200000000000000(node=0|zone=2)
[   16.250723] page_type: f5(slab)
[   16.251065] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.251717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.252486] page dumped because: kasan: bad access detected
[   16.252665] 
[   16.252737] Memory state around the buggy address:
[   16.252906]  ffff8881029b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.253480]  ffff8881029b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.254122] >ffff8881029b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.254726]                                                                 ^
[   16.255466]  ffff8881029b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256140]  ffff8881029b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256772] ==================================================================