Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.454251] ==================================================================
[   20.454336] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   20.454511] Write of size 121 at addr fff00000c78e9d00 by task kunit_try_catch/285
[   20.454661] 
[   20.454712] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.454801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.455102] Hardware name: linux,dummy-virt (DT)
[   20.455148] Call trace:
[   20.455174]  show_stack+0x20/0x38 (C)
[   20.455236]  dump_stack_lvl+0x8c/0xd0
[   20.455287]  print_report+0x118/0x5d0
[   20.455337]  kasan_report+0xdc/0x128
[   20.455388]  kasan_check_range+0x100/0x1a8
[   20.455437]  __kasan_check_write+0x20/0x30
[   20.455527]  strncpy_from_user+0x3c/0x2a0
[   20.455582]  copy_user_test_oob+0x5c0/0xec8
[   20.455664]  kunit_try_run_case+0x170/0x3f0
[   20.455724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.455791]  kthread+0x328/0x630
[   20.455836]  ret_from_fork+0x10/0x20
[   20.455900] 
[   20.455921] Allocated by task 285:
[   20.455966]  kasan_save_stack+0x3c/0x68
[   20.456015]  kasan_save_track+0x20/0x40
[   20.456059]  kasan_save_alloc_info+0x40/0x58
[   20.456109]  __kasan_kmalloc+0xd4/0xd8
[   20.456154]  __kmalloc_noprof+0x198/0x4c8
[   20.456194]  kunit_kmalloc_array+0x34/0x88
[   20.456244]  copy_user_test_oob+0xac/0xec8
[   20.456283]  kunit_try_run_case+0x170/0x3f0
[   20.456323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.456368]  kthread+0x328/0x630
[   20.456402]  ret_from_fork+0x10/0x20
[   20.456440] 
[   20.456461] The buggy address belongs to the object at fff00000c78e9d00
[   20.456461]  which belongs to the cache kmalloc-128 of size 128
[   20.456522] The buggy address is located 0 bytes inside of
[   20.456522]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.456591] 
[   20.456624] The buggy address belongs to the physical page:
[   20.456662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.456717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.456773] page_type: f5(slab)
[   20.456822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.457968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.458033] page dumped because: kasan: bad access detected
[   20.458089] 
[   20.458110] Memory state around the buggy address:
[   20.458149]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.458618]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.459021] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.459207]                                                                 ^
[   20.459289]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.459736]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.459974] ==================================================================
[   20.466564] ==================================================================
[   20.466634] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   20.467362] Write of size 1 at addr fff00000c78e9d78 by task kunit_try_catch/285
[   20.467532] 
[   20.467641] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.467808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.467853] Hardware name: linux,dummy-virt (DT)
[   20.467901] Call trace:
[   20.468592]  show_stack+0x20/0x38 (C)
[   20.468830]  dump_stack_lvl+0x8c/0xd0
[   20.469092]  print_report+0x118/0x5d0
[   20.469480]  kasan_report+0xdc/0x128
[   20.469634]  __asan_report_store1_noabort+0x20/0x30
[   20.469819]  strncpy_from_user+0x270/0x2a0
[   20.470191]  copy_user_test_oob+0x5c0/0xec8
[   20.470364]  kunit_try_run_case+0x170/0x3f0
[   20.470540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.470759]  kthread+0x328/0x630
[   20.471099]  ret_from_fork+0x10/0x20
[   20.471207] 
[   20.471262] Allocated by task 285:
[   20.471501]  kasan_save_stack+0x3c/0x68
[   20.471665]  kasan_save_track+0x20/0x40
[   20.471712]  kasan_save_alloc_info+0x40/0x58
[   20.471755]  __kasan_kmalloc+0xd4/0xd8
[   20.471797]  __kmalloc_noprof+0x198/0x4c8
[   20.472048]  kunit_kmalloc_array+0x34/0x88
[   20.472250]  copy_user_test_oob+0xac/0xec8
[   20.472326]  kunit_try_run_case+0x170/0x3f0
[   20.472510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.472722]  kthread+0x328/0x630
[   20.472797]  ret_from_fork+0x10/0x20
[   20.472953] 
[   20.473063] The buggy address belongs to the object at fff00000c78e9d00
[   20.473063]  which belongs to the cache kmalloc-128 of size 128
[   20.473495] The buggy address is located 0 bytes to the right of
[   20.473495]  allocated 120-byte region [fff00000c78e9d00, fff00000c78e9d78)
[   20.473602] 
[   20.474034] The buggy address belongs to the physical page:
[   20.474124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.474241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.474523] page_type: f5(slab)
[   20.474630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.474869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.475065] page dumped because: kasan: bad access detected
[   20.475264] 
[   20.475389] Memory state around the buggy address:
[   20.475430]  fff00000c78e9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.475501]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.475548] >fff00000c78e9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.475919]                                                                 ^
[   20.476015]  fff00000c78e9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.476258]  fff00000c78e9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.476443] ==================================================================

[   19.925687] ==================================================================
[   19.926083] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   19.926387] Write of size 1 at addr fff00000c7a4ee78 by task kunit_try_catch/285
[   19.926450] 
[   19.926484] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.926576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.926604] Hardware name: linux,dummy-virt (DT)
[   19.926638] Call trace:
[   19.927178]  show_stack+0x20/0x38 (C)
[   19.927518]  dump_stack_lvl+0x8c/0xd0
[   19.927919]  print_report+0x118/0x5d0
[   19.928000]  kasan_report+0xdc/0x128
[   19.928068]  __asan_report_store1_noabort+0x20/0x30
[   19.928206]  strncpy_from_user+0x270/0x2a0
[   19.928269]  copy_user_test_oob+0x5c0/0xec8
[   19.928328]  kunit_try_run_case+0x170/0x3f0
[   19.928433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.928493]  kthread+0x328/0x630
[   19.928560]  ret_from_fork+0x10/0x20
[   19.929096] 
[   19.929129] Allocated by task 285:
[   19.929163]  kasan_save_stack+0x3c/0x68
[   19.929221]  kasan_save_track+0x20/0x40
[   19.929508]  kasan_save_alloc_info+0x40/0x58
[   19.929766]  __kasan_kmalloc+0xd4/0xd8
[   19.929975]  __kmalloc_noprof+0x198/0x4c8
[   19.930199]  kunit_kmalloc_array+0x34/0x88
[   19.930412]  copy_user_test_oob+0xac/0xec8
[   19.930498]  kunit_try_run_case+0x170/0x3f0
[   19.930740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.930932]  kthread+0x328/0x630
[   19.931273]  ret_from_fork+0x10/0x20
[   19.931479] 
[   19.931515] The buggy address belongs to the object at fff00000c7a4ee00
[   19.931515]  which belongs to the cache kmalloc-128 of size 128
[   19.931616] The buggy address is located 0 bytes to the right of
[   19.931616]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.931751] 
[   19.931776] The buggy address belongs to the physical page:
[   19.931827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.931885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.931943] page_type: f5(slab)
[   19.931988] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.932042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.932084] page dumped because: kasan: bad access detected
[   19.932119] 
[   19.932148] Memory state around the buggy address:
[   19.932197]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.932245]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932299] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.932362]                                                                 ^
[   19.932407]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932452]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.933160] ==================================================================
[   19.915869] ==================================================================
[   19.915923] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   19.915984] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.916038] 
[   19.916749] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.917062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.917238] Hardware name: linux,dummy-virt (DT)
[   19.917519] Call trace:
[   19.917958]  show_stack+0x20/0x38 (C)
[   19.918042]  dump_stack_lvl+0x8c/0xd0
[   19.918203]  print_report+0x118/0x5d0
[   19.918315]  kasan_report+0xdc/0x128
[   19.918704]  kasan_check_range+0x100/0x1a8
[   19.918791]  __kasan_check_write+0x20/0x30
[   19.918938]  strncpy_from_user+0x3c/0x2a0
[   19.919331]  copy_user_test_oob+0x5c0/0xec8
[   19.919517]  kunit_try_run_case+0x170/0x3f0
[   19.919599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.919662]  kthread+0x328/0x630
[   19.919706]  ret_from_fork+0x10/0x20
[   19.919769] 
[   19.919800] Allocated by task 285:
[   19.919841]  kasan_save_stack+0x3c/0x68
[   19.919886]  kasan_save_track+0x20/0x40
[   19.919926]  kasan_save_alloc_info+0x40/0x58
[   19.919967]  __kasan_kmalloc+0xd4/0xd8
[   19.920006]  __kmalloc_noprof+0x198/0x4c8
[   19.920054]  kunit_kmalloc_array+0x34/0x88
[   19.920102]  copy_user_test_oob+0xac/0xec8
[   19.920140]  kunit_try_run_case+0x170/0x3f0
[   19.920186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.920233]  kthread+0x328/0x630
[   19.920267]  ret_from_fork+0x10/0x20
[   19.920337] 
[   19.920368] The buggy address belongs to the object at fff00000c7a4ee00
[   19.920368]  which belongs to the cache kmalloc-128 of size 128
[   19.920439] The buggy address is located 0 bytes inside of
[   19.920439]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.920823] 
[   19.920857] The buggy address belongs to the physical page:
[   19.920978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.921168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.921468] page_type: f5(slab)
[   19.921544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.921862] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.922237] page dumped because: kasan: bad access detected
[   19.922306] 
[   19.922553] Memory state around the buggy address:
[   19.922702]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.922846]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923207] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.923393]                                                                 ^
[   19.923589]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923812]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923897] ==================================================================

[   19.534225] ==================================================================
[   19.534294] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   19.534354] Write of size 121 at addr fff00000c7716c00 by task kunit_try_catch/285
[   19.534409] 
[   19.534441] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.534524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.534554] Hardware name: linux,dummy-virt (DT)
[   19.534586] Call trace:
[   19.534618]  show_stack+0x20/0x38 (C)
[   19.534669]  dump_stack_lvl+0x8c/0xd0
[   19.534728]  print_report+0x118/0x5d0
[   19.534775]  kasan_report+0xdc/0x128
[   19.534824]  kasan_check_range+0x100/0x1a8
[   19.534874]  __kasan_check_write+0x20/0x30
[   19.534921]  strncpy_from_user+0x3c/0x2a0
[   19.534969]  copy_user_test_oob+0x5c0/0xec8
[   19.535018]  kunit_try_run_case+0x170/0x3f0
[   19.535068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535125]  kthread+0x328/0x630
[   19.535180]  ret_from_fork+0x10/0x20
[   19.535231] 
[   19.535259] Allocated by task 285:
[   19.535298]  kasan_save_stack+0x3c/0x68
[   19.535340]  kasan_save_track+0x20/0x40
[   19.535381]  kasan_save_alloc_info+0x40/0x58
[   19.535422]  __kasan_kmalloc+0xd4/0xd8
[   19.535461]  __kmalloc_noprof+0x198/0x4c8
[   19.535500]  kunit_kmalloc_array+0x34/0x88
[   19.535545]  copy_user_test_oob+0xac/0xec8
[   19.535583]  kunit_try_run_case+0x170/0x3f0
[   19.535628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535678]  kthread+0x328/0x630
[   19.535722]  ret_from_fork+0x10/0x20
[   19.535760] 
[   19.535781] The buggy address belongs to the object at fff00000c7716c00
[   19.535781]  which belongs to the cache kmalloc-128 of size 128
[   19.536682] The buggy address is located 0 bytes inside of
[   19.536682]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.536786] 
[   19.536895] The buggy address belongs to the physical page:
[   19.536940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.537021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.537088] page_type: f5(slab)
[   19.537571] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.537763] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.537932] page dumped because: kasan: bad access detected
[   19.538009] 
[   19.538129] Memory state around the buggy address:
[   19.538168]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.538214]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.538550] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.538800]                                                                 ^
[   19.538853]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.538937]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.539033] ==================================================================
[   19.539919] ==================================================================
[   19.539973] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   19.540025] Write of size 1 at addr fff00000c7716c78 by task kunit_try_catch/285
[   19.540078] 
[   19.540389] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.541585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.541840] Hardware name: linux,dummy-virt (DT)
[   19.541944] Call trace:
[   19.541981]  show_stack+0x20/0x38 (C)
[   19.542045]  dump_stack_lvl+0x8c/0xd0
[   19.542111]  print_report+0x118/0x5d0
[   19.542182]  kasan_report+0xdc/0x128
[   19.542239]  __asan_report_store1_noabort+0x20/0x30
[   19.542306]  strncpy_from_user+0x270/0x2a0
[   19.542365]  copy_user_test_oob+0x5c0/0xec8
[   19.542416]  kunit_try_run_case+0x170/0x3f0
[   19.542464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.542518]  kthread+0x328/0x630
[   19.542816]  ret_from_fork+0x10/0x20
[   19.543101] 
[   19.543241] Allocated by task 285:
[   19.543377]  kasan_save_stack+0x3c/0x68
[   19.543465]  kasan_save_track+0x20/0x40
[   19.543542]  kasan_save_alloc_info+0x40/0x58
[   19.543678]  __kasan_kmalloc+0xd4/0xd8
[   19.543731]  __kmalloc_noprof+0x198/0x4c8
[   19.543769]  kunit_kmalloc_array+0x34/0x88
[   19.543809]  copy_user_test_oob+0xac/0xec8
[   19.543847]  kunit_try_run_case+0x170/0x3f0
[   19.543890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.543937]  kthread+0x328/0x630
[   19.544136]  ret_from_fork+0x10/0x20
[   19.544210] 
[   19.544346] The buggy address belongs to the object at fff00000c7716c00
[   19.544346]  which belongs to the cache kmalloc-128 of size 128
[   19.544418] The buggy address is located 0 bytes to the right of
[   19.544418]  allocated 120-byte region [fff00000c7716c00, fff00000c7716c78)
[   19.544738] 
[   19.544778] The buggy address belongs to the physical page:
[   19.544920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.545019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.545115] page_type: f5(slab)
[   19.545269] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.545330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.545610] page dumped because: kasan: bad access detected
[   19.545749] 
[   19.545795] Memory state around the buggy address:
[   19.545858]  fff00000c7716b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.545916]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546183] >fff00000c7716c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.546268]                                                                 ^
[   19.546341]  fff00000c7716c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546631]  fff00000c7716d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546704] ==================================================================

[   16.086692] ==================================================================
[   16.087137] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   16.087558] Write of size 121 at addr ffff888102ae1400 by task kunit_try_catch/303
[   16.087856] 
[   16.087943] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.087991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.088003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.088025] Call Trace:
[   16.088041]  <TASK>
[   16.088057]  dump_stack_lvl+0x73/0xb0
[   16.088086]  print_report+0xd1/0x610
[   16.088110]  ? __virt_addr_valid+0x1db/0x2d0
[   16.088134]  ? strncpy_from_user+0x2e/0x1d0
[   16.088158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.088182]  ? strncpy_from_user+0x2e/0x1d0
[   16.088206]  kasan_report+0x141/0x180
[   16.088230]  ? strncpy_from_user+0x2e/0x1d0
[   16.088293]  kasan_check_range+0x10c/0x1c0
[   16.088318]  __kasan_check_write+0x18/0x20
[   16.088367]  strncpy_from_user+0x2e/0x1d0
[   16.088414]  ? __kasan_check_read+0x15/0x20
[   16.088454]  copy_user_test_oob+0x760/0x10f0
[   16.088510]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.088562]  ? finish_task_switch.isra.0+0x153/0x700
[   16.088589]  ? __switch_to+0x47/0xf50
[   16.088643]  ? __schedule+0x10cc/0x2b60
[   16.088671]  ? __pfx_read_tsc+0x10/0x10
[   16.088697]  ? ktime_get_ts64+0x86/0x230
[   16.088734]  kunit_try_run_case+0x1a5/0x480
[   16.088760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.088785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.088812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.088838]  ? __kthread_parkme+0x82/0x180
[   16.088859]  ? preempt_count_sub+0x50/0x80
[   16.088884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.088910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.088935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.088960]  kthread+0x337/0x6f0
[   16.089007]  ? trace_preempt_on+0x20/0xc0
[   16.089032]  ? __pfx_kthread+0x10/0x10
[   16.089056]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.089090]  ? calculate_sigpending+0x7b/0xa0
[   16.089116]  ? __pfx_kthread+0x10/0x10
[   16.089169]  ret_from_fork+0x116/0x1d0
[   16.089191]  ? __pfx_kthread+0x10/0x10
[   16.089211]  ret_from_fork_asm+0x1a/0x30
[   16.089256]  </TASK>
[   16.089268] 
[   16.097658] Allocated by task 303:
[   16.097805]  kasan_save_stack+0x45/0x70
[   16.098086]  kasan_save_track+0x18/0x40
[   16.098327]  kasan_save_alloc_info+0x3b/0x50
[   16.098576]  __kasan_kmalloc+0xb7/0xc0
[   16.098795]  __kmalloc_noprof+0x1c9/0x500
[   16.099009]  kunit_kmalloc_array+0x25/0x60
[   16.099228]  copy_user_test_oob+0xab/0x10f0
[   16.099463]  kunit_try_run_case+0x1a5/0x480
[   16.099708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.099973]  kthread+0x337/0x6f0
[   16.100093]  ret_from_fork+0x116/0x1d0
[   16.100224]  ret_from_fork_asm+0x1a/0x30
[   16.100360] 
[   16.100430] The buggy address belongs to the object at ffff888102ae1400
[   16.100430]  which belongs to the cache kmalloc-128 of size 128
[   16.100972] The buggy address is located 0 bytes inside of
[   16.100972]  allocated 120-byte region [ffff888102ae1400, ffff888102ae1478)
[   16.101561] 
[   16.101657] The buggy address belongs to the physical page:
[   16.101862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   16.102097] flags: 0x200000000000000(node=0|zone=2)
[   16.102327] page_type: f5(slab)
[   16.102551] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.102982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.103340] page dumped because: kasan: bad access detected
[   16.103635] 
[   16.103709] Memory state around the buggy address:
[   16.103874]  ffff888102ae1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.104233]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104564] >ffff888102ae1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.104886]                                                                 ^
[   16.105201]  ffff888102ae1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.105543]  ffff888102ae1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.105859] ==================================================================
[   16.106574] ==================================================================
[   16.107028] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   16.107349] Write of size 1 at addr ffff888102ae1478 by task kunit_try_catch/303
[   16.107672] 
[   16.107825] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.107896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.107908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.107940] Call Trace:
[   16.107956]  <TASK>
[   16.107971]  dump_stack_lvl+0x73/0xb0
[   16.107999]  print_report+0xd1/0x610
[   16.108041]  ? __virt_addr_valid+0x1db/0x2d0
[   16.108075]  ? strncpy_from_user+0x1a5/0x1d0
[   16.108098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.108133]  ? strncpy_from_user+0x1a5/0x1d0
[   16.108158]  kasan_report+0x141/0x180
[   16.108206]  ? strncpy_from_user+0x1a5/0x1d0
[   16.108236]  __asan_report_store1_noabort+0x1b/0x30
[   16.108289]  strncpy_from_user+0x1a5/0x1d0
[   16.108316]  copy_user_test_oob+0x760/0x10f0
[   16.108344]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.108367]  ? finish_task_switch.isra.0+0x153/0x700
[   16.108391]  ? __switch_to+0x47/0xf50
[   16.108417]  ? __schedule+0x10cc/0x2b60
[   16.108479]  ? __pfx_read_tsc+0x10/0x10
[   16.108501]  ? ktime_get_ts64+0x86/0x230
[   16.108527]  kunit_try_run_case+0x1a5/0x480
[   16.108575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.108624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.108675]  ? __kthread_parkme+0x82/0x180
[   16.108697]  ? preempt_count_sub+0x50/0x80
[   16.108721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.108782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.108832]  kthread+0x337/0x6f0
[   16.108853]  ? trace_preempt_on+0x20/0xc0
[   16.108877]  ? __pfx_kthread+0x10/0x10
[   16.108909]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.108931]  ? calculate_sigpending+0x7b/0xa0
[   16.108981]  ? __pfx_kthread+0x10/0x10
[   16.109004]  ret_from_fork+0x116/0x1d0
[   16.109023]  ? __pfx_kthread+0x10/0x10
[   16.109054]  ret_from_fork_asm+0x1a/0x30
[   16.109088]  </TASK>
[   16.109124] 
[   16.118542] Allocated by task 303:
[   16.118695]  kasan_save_stack+0x45/0x70
[   16.119406]  kasan_save_track+0x18/0x40
[   16.119718]  kasan_save_alloc_info+0x3b/0x50
[   16.119869]  __kasan_kmalloc+0xb7/0xc0
[   16.120002]  __kmalloc_noprof+0x1c9/0x500
[   16.120141]  kunit_kmalloc_array+0x25/0x60
[   16.120282]  copy_user_test_oob+0xab/0x10f0
[   16.120426]  kunit_try_run_case+0x1a5/0x480
[   16.120641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.121212]  kthread+0x337/0x6f0
[   16.121589]  ret_from_fork+0x116/0x1d0
[   16.121971]  ret_from_fork_asm+0x1a/0x30
[   16.122365] 
[   16.122593] The buggy address belongs to the object at ffff888102ae1400
[   16.122593]  which belongs to the cache kmalloc-128 of size 128
[   16.123780] The buggy address is located 0 bytes to the right of
[   16.123780]  allocated 120-byte region [ffff888102ae1400, ffff888102ae1478)
[   16.124912] 
[   16.125075] The buggy address belongs to the physical page:
[   16.125664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   16.126244] flags: 0x200000000000000(node=0|zone=2)
[   16.126403] page_type: f5(slab)
[   16.126553] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.127219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.127905] page dumped because: kasan: bad access detected
[   16.128392] 
[   16.128594] Memory state around the buggy address:
[   16.129025]  ffff888102ae1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.129244]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.129465] >ffff888102ae1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.130028]                                                                 ^
[   16.130684]  ffff888102ae1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.131296]  ffff888102ae1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.132134] ==================================================================

[   16.582811] ==================================================================
[   16.583499] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   16.583932] Write of size 1 at addr ffff8881029c5778 by task kunit_try_catch/302
[   16.584173] 
[   16.584268] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.584317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.584330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.584354] Call Trace:
[   16.584375]  <TASK>
[   16.584397]  dump_stack_lvl+0x73/0xb0
[   16.584427]  print_report+0xd1/0x610
[   16.584452]  ? __virt_addr_valid+0x1db/0x2d0
[   16.584477]  ? strncpy_from_user+0x1a5/0x1d0
[   16.584501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.584526]  ? strncpy_from_user+0x1a5/0x1d0
[   16.584550]  kasan_report+0x141/0x180
[   16.584573]  ? strncpy_from_user+0x1a5/0x1d0
[   16.584602]  __asan_report_store1_noabort+0x1b/0x30
[   16.584627]  strncpy_from_user+0x1a5/0x1d0
[   16.584654]  copy_user_test_oob+0x760/0x10f0
[   16.584682]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.584705]  ? finish_task_switch.isra.0+0x153/0x700
[   16.584729]  ? __switch_to+0x47/0xf50
[   16.584757]  ? __schedule+0x10cc/0x2b60
[   16.584780]  ? __pfx_read_tsc+0x10/0x10
[   16.584802]  ? ktime_get_ts64+0x86/0x230
[   16.584828]  kunit_try_run_case+0x1a5/0x480
[   16.584861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.584884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.584912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.584939]  ? __kthread_parkme+0x82/0x180
[   16.584965]  ? preempt_count_sub+0x50/0x80
[   16.584990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.585024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.585050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.585075]  kthread+0x337/0x6f0
[   16.585096]  ? trace_preempt_on+0x20/0xc0
[   16.585121]  ? __pfx_kthread+0x10/0x10
[   16.585143]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.585165]  ? calculate_sigpending+0x7b/0xa0
[   16.585191]  ? __pfx_kthread+0x10/0x10
[   16.585213]  ret_from_fork+0x116/0x1d0
[   16.585231]  ? __pfx_kthread+0x10/0x10
[   16.585252]  ret_from_fork_asm+0x1a/0x30
[   16.585285]  </TASK>
[   16.585296] 
[   16.592908] Allocated by task 302:
[   16.593063]  kasan_save_stack+0x45/0x70
[   16.593218]  kasan_save_track+0x18/0x40
[   16.593354]  kasan_save_alloc_info+0x3b/0x50
[   16.593532]  __kasan_kmalloc+0xb7/0xc0
[   16.593693]  __kmalloc_noprof+0x1c9/0x500
[   16.593898]  kunit_kmalloc_array+0x25/0x60
[   16.594115]  copy_user_test_oob+0xab/0x10f0
[   16.594323]  kunit_try_run_case+0x1a5/0x480
[   16.594557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.594814]  kthread+0x337/0x6f0
[   16.594987]  ret_from_fork+0x116/0x1d0
[   16.595185]  ret_from_fork_asm+0x1a/0x30
[   16.595380] 
[   16.595503] The buggy address belongs to the object at ffff8881029c5700
[   16.595503]  which belongs to the cache kmalloc-128 of size 128
[   16.596044] The buggy address is located 0 bytes to the right of
[   16.596044]  allocated 120-byte region [ffff8881029c5700, ffff8881029c5778)
[   16.596628] 
[   16.596731] The buggy address belongs to the physical page:
[   16.596976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   16.597229] flags: 0x200000000000000(node=0|zone=2)
[   16.597397] page_type: f5(slab)
[   16.597542] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.597774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.598001] page dumped because: kasan: bad access detected
[   16.598256] 
[   16.598348] Memory state around the buggy address:
[   16.598589]  ffff8881029c5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.598905]  ffff8881029c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599225] >ffff8881029c5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.599560]                                                                 ^
[   16.599866]  ffff8881029c5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.600147]  ffff8881029c5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.600362] ==================================================================
[   16.561855] ==================================================================
[   16.564407] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   16.564777] Write of size 121 at addr ffff8881029c5700 by task kunit_try_catch/302
[   16.565721] 
[   16.565855] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.565909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.565923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.565946] Call Trace:
[   16.565969]  <TASK>
[   16.565991]  dump_stack_lvl+0x73/0xb0
[   16.566039]  print_report+0xd1/0x610
[   16.566064]  ? __virt_addr_valid+0x1db/0x2d0
[   16.566089]  ? strncpy_from_user+0x2e/0x1d0
[   16.566115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.566139]  ? strncpy_from_user+0x2e/0x1d0
[   16.566164]  kasan_report+0x141/0x180
[   16.566187]  ? strncpy_from_user+0x2e/0x1d0
[   16.566217]  kasan_check_range+0x10c/0x1c0
[   16.566243]  __kasan_check_write+0x18/0x20
[   16.566262]  strncpy_from_user+0x2e/0x1d0
[   16.566286]  ? __kasan_check_read+0x15/0x20
[   16.566308]  copy_user_test_oob+0x760/0x10f0
[   16.566336]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.566361]  ? finish_task_switch.isra.0+0x153/0x700
[   16.566385]  ? __switch_to+0x47/0xf50
[   16.566412]  ? __schedule+0x10cc/0x2b60
[   16.566437]  ? __pfx_read_tsc+0x10/0x10
[   16.566460]  ? ktime_get_ts64+0x86/0x230
[   16.566485]  kunit_try_run_case+0x1a5/0x480
[   16.566511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.566535]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.566560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.566585]  ? __kthread_parkme+0x82/0x180
[   16.566607]  ? preempt_count_sub+0x50/0x80
[   16.566631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.566656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.566682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.566706]  kthread+0x337/0x6f0
[   16.566727]  ? trace_preempt_on+0x20/0xc0
[   16.566752]  ? __pfx_kthread+0x10/0x10
[   16.566774]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.566795]  ? calculate_sigpending+0x7b/0xa0
[   16.566820]  ? __pfx_kthread+0x10/0x10
[   16.566842]  ret_from_fork+0x116/0x1d0
[   16.566861]  ? __pfx_kthread+0x10/0x10
[   16.566881]  ret_from_fork_asm+0x1a/0x30
[   16.566914]  </TASK>
[   16.566925] 
[   16.574384] Allocated by task 302:
[   16.574598]  kasan_save_stack+0x45/0x70
[   16.574789]  kasan_save_track+0x18/0x40
[   16.574965]  kasan_save_alloc_info+0x3b/0x50
[   16.575160]  __kasan_kmalloc+0xb7/0xc0
[   16.575336]  __kmalloc_noprof+0x1c9/0x500
[   16.575556]  kunit_kmalloc_array+0x25/0x60
[   16.575741]  copy_user_test_oob+0xab/0x10f0
[   16.575917]  kunit_try_run_case+0x1a5/0x480
[   16.576123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.576330]  kthread+0x337/0x6f0
[   16.576539]  ret_from_fork+0x116/0x1d0
[   16.576705]  ret_from_fork_asm+0x1a/0x30
[   16.576884] 
[   16.576959] The buggy address belongs to the object at ffff8881029c5700
[   16.576959]  which belongs to the cache kmalloc-128 of size 128
[   16.577498] The buggy address is located 0 bytes inside of
[   16.577498]  allocated 120-byte region [ffff8881029c5700, ffff8881029c5778)
[   16.577950] 
[   16.578060] The buggy address belongs to the physical page:
[   16.578282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   16.578701] flags: 0x200000000000000(node=0|zone=2)
[   16.578893] page_type: f5(slab)
[   16.579073] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.579380] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.579689] page dumped because: kasan: bad access detected
[   16.579922] 
[   16.580017] Memory state around the buggy address:
[   16.580227]  ffff8881029c5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.580528]  ffff8881029c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.580748] >ffff8881029c5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.580970]                                                                 ^
[   16.581194]  ffff8881029c5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.581412]  ffff8881029c5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.581725] ==================================================================

[   16.275195] ==================================================================
[   16.275945] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   16.276650] Write of size 121 at addr ffff8881029b2200 by task kunit_try_catch/302
[   16.277079] 
[   16.277178] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.277221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.277233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.277255] Call Trace:
[   16.277269]  <TASK>
[   16.277286]  dump_stack_lvl+0x73/0xb0
[   16.277314]  print_report+0xd1/0x610
[   16.277337]  ? __virt_addr_valid+0x1db/0x2d0
[   16.277361]  ? strncpy_from_user+0x2e/0x1d0
[   16.277385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.277409]  ? strncpy_from_user+0x2e/0x1d0
[   16.277433]  kasan_report+0x141/0x180
[   16.277456]  ? strncpy_from_user+0x2e/0x1d0
[   16.277486]  kasan_check_range+0x10c/0x1c0
[   16.277511]  __kasan_check_write+0x18/0x20
[   16.277530]  strncpy_from_user+0x2e/0x1d0
[   16.277554]  ? __kasan_check_read+0x15/0x20
[   16.277576]  copy_user_test_oob+0x760/0x10f0
[   16.277616]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.277639]  ? finish_task_switch.isra.0+0x153/0x700
[   16.277663]  ? __switch_to+0x47/0xf50
[   16.277691]  ? __schedule+0x10cc/0x2b60
[   16.277714]  ? __pfx_read_tsc+0x10/0x10
[   16.277735]  ? ktime_get_ts64+0x86/0x230
[   16.277760]  kunit_try_run_case+0x1a5/0x480
[   16.277786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.277809]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.277835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.277859]  ? __kthread_parkme+0x82/0x180
[   16.277881]  ? preempt_count_sub+0x50/0x80
[   16.277917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.277942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.277967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.277992]  kthread+0x337/0x6f0
[   16.278011]  ? trace_preempt_on+0x20/0xc0
[   16.278036]  ? __pfx_kthread+0x10/0x10
[   16.278057]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.278081]  ? calculate_sigpending+0x7b/0xa0
[   16.278106]  ? __pfx_kthread+0x10/0x10
[   16.278139]  ret_from_fork+0x116/0x1d0
[   16.278158]  ? __pfx_kthread+0x10/0x10
[   16.278180]  ret_from_fork_asm+0x1a/0x30
[   16.278212]  </TASK>
[   16.278222] 
[   16.285733] Allocated by task 302:
[   16.285870]  kasan_save_stack+0x45/0x70
[   16.286135]  kasan_save_track+0x18/0x40
[   16.286336]  kasan_save_alloc_info+0x3b/0x50
[   16.286550]  __kasan_kmalloc+0xb7/0xc0
[   16.286742]  __kmalloc_noprof+0x1c9/0x500
[   16.286969]  kunit_kmalloc_array+0x25/0x60
[   16.287160]  copy_user_test_oob+0xab/0x10f0
[   16.287340]  kunit_try_run_case+0x1a5/0x480
[   16.287532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.287721]  kthread+0x337/0x6f0
[   16.287846]  ret_from_fork+0x116/0x1d0
[   16.288010]  ret_from_fork_asm+0x1a/0x30
[   16.288213] 
[   16.288313] The buggy address belongs to the object at ffff8881029b2200
[   16.288313]  which belongs to the cache kmalloc-128 of size 128
[   16.288841] The buggy address is located 0 bytes inside of
[   16.288841]  allocated 120-byte region [ffff8881029b2200, ffff8881029b2278)
[   16.289354] 
[   16.289430] The buggy address belongs to the physical page:
[   16.289660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   16.290021] flags: 0x200000000000000(node=0|zone=2)
[   16.290213] page_type: f5(slab)
[   16.290383] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.290679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.290996] page dumped because: kasan: bad access detected
[   16.291225] 
[   16.291305] Memory state around the buggy address:
[   16.291463]  ffff8881029b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.291680]  ffff8881029b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.291908] >ffff8881029b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.292279]                                                                 ^
[   16.292596]  ffff8881029b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.292923]  ffff8881029b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.293490] ==================================================================
[   16.293948] ==================================================================
[   16.294307] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   16.294777] Write of size 1 at addr ffff8881029b2278 by task kunit_try_catch/302
[   16.295034] 
[   16.295121] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.295164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.295175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.295197] Call Trace:
[   16.295213]  <TASK>
[   16.295229]  dump_stack_lvl+0x73/0xb0
[   16.295258]  print_report+0xd1/0x610
[   16.295280]  ? __virt_addr_valid+0x1db/0x2d0
[   16.295304]  ? strncpy_from_user+0x1a5/0x1d0
[   16.295328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.295352]  ? strncpy_from_user+0x1a5/0x1d0
[   16.295376]  kasan_report+0x141/0x180
[   16.295399]  ? strncpy_from_user+0x1a5/0x1d0
[   16.295428]  __asan_report_store1_noabort+0x1b/0x30
[   16.295462]  strncpy_from_user+0x1a5/0x1d0
[   16.295501]  copy_user_test_oob+0x760/0x10f0
[   16.295530]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.295570]  ? finish_task_switch.isra.0+0x153/0x700
[   16.295593]  ? __switch_to+0x47/0xf50
[   16.295620]  ? __schedule+0x10cc/0x2b60
[   16.295643]  ? __pfx_read_tsc+0x10/0x10
[   16.295664]  ? ktime_get_ts64+0x86/0x230
[   16.295689]  kunit_try_run_case+0x1a5/0x480
[   16.295715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.295738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.295763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.295787]  ? __kthread_parkme+0x82/0x180
[   16.295809]  ? preempt_count_sub+0x50/0x80
[   16.295833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.295857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.295882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.295919]  kthread+0x337/0x6f0
[   16.295939]  ? trace_preempt_on+0x20/0xc0
[   16.295964]  ? __pfx_kthread+0x10/0x10
[   16.295993]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.296014]  ? calculate_sigpending+0x7b/0xa0
[   16.296039]  ? __pfx_kthread+0x10/0x10
[   16.296062]  ret_from_fork+0x116/0x1d0
[   16.296081]  ? __pfx_kthread+0x10/0x10
[   16.296101]  ret_from_fork_asm+0x1a/0x30
[   16.296135]  </TASK>
[   16.296146] 
[   16.303708] Allocated by task 302:
[   16.303890]  kasan_save_stack+0x45/0x70
[   16.304092]  kasan_save_track+0x18/0x40
[   16.304291]  kasan_save_alloc_info+0x3b/0x50
[   16.304476]  __kasan_kmalloc+0xb7/0xc0
[   16.304650]  __kmalloc_noprof+0x1c9/0x500
[   16.304826]  kunit_kmalloc_array+0x25/0x60
[   16.304983]  copy_user_test_oob+0xab/0x10f0
[   16.305133]  kunit_try_run_case+0x1a5/0x480
[   16.305378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.305728]  kthread+0x337/0x6f0
[   16.305851]  ret_from_fork+0x116/0x1d0
[   16.306040]  ret_from_fork_asm+0x1a/0x30
[   16.306243] 
[   16.306339] The buggy address belongs to the object at ffff8881029b2200
[   16.306339]  which belongs to the cache kmalloc-128 of size 128
[   16.306839] The buggy address is located 0 bytes to the right of
[   16.306839]  allocated 120-byte region [ffff8881029b2200, ffff8881029b2278)
[   16.307372] 
[   16.307464] The buggy address belongs to the physical page:
[   16.307690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   16.308007] flags: 0x200000000000000(node=0|zone=2)
[   16.308220] page_type: f5(slab)
[   16.308376] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.308674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.308911] page dumped because: kasan: bad access detected
[   16.309141] 
[   16.309234] Memory state around the buggy address:
[   16.309612]  ffff8881029b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.309946]  ffff8881029b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.311680] >ffff8881029b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.311966]                                                                 ^
[   16.312285]  ffff8881029b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.312570]  ffff8881029b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.312881] ==================================================================