Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.300991] ==================================================================
[   20.301062] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.301134] Read of size 8 at addr fff00000c78e9c78 by task kunit_try_catch/281
[   20.301279] 
[   20.301323] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.301450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.301610] Hardware name: linux,dummy-virt (DT)
[   20.301647] Call trace:
[   20.301673]  show_stack+0x20/0x38 (C)
[   20.301728]  dump_stack_lvl+0x8c/0xd0
[   20.301780]  print_report+0x118/0x5d0
[   20.301954]  kasan_report+0xdc/0x128
[   20.302020]  __asan_report_load8_noabort+0x20/0x30
[   20.302075]  copy_to_kernel_nofault+0x204/0x250
[   20.302127]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.302180]  kunit_try_run_case+0x170/0x3f0
[   20.302231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.302287]  kthread+0x328/0x630
[   20.302332]  ret_from_fork+0x10/0x20
[   20.302411] 
[   20.302446] Allocated by task 281:
[   20.302482]  kasan_save_stack+0x3c/0x68
[   20.302535]  kasan_save_track+0x20/0x40
[   20.303532]  kasan_save_alloc_info+0x40/0x58
[   20.303606]  __kasan_kmalloc+0xd4/0xd8
[   20.303708]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.303800]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.303869]  kunit_try_run_case+0x170/0x3f0
[   20.303930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.304011]  kthread+0x328/0x630
[   20.304556]  ret_from_fork+0x10/0x20
[   20.304805] 
[   20.305000] The buggy address belongs to the object at fff00000c78e9c00
[   20.305000]  which belongs to the cache kmalloc-128 of size 128
[   20.305082] The buggy address is located 0 bytes to the right of
[   20.305082]  allocated 120-byte region [fff00000c78e9c00, fff00000c78e9c78)
[   20.305513] 
[   20.305617] The buggy address belongs to the physical page:
[   20.306067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.306566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.306783] page_type: f5(slab)
[   20.306889] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.307272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.307340] page dumped because: kasan: bad access detected
[   20.307508] 
[   20.307572] Memory state around the buggy address:
[   20.307613]  fff00000c78e9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.307667]  fff00000c78e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.307938] >fff00000c78e9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.308084]                                                                 ^
[   20.308210]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.308699]  fff00000c78e9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.308943] ==================================================================
[   20.310806] ==================================================================
[   20.310886] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.311119] Write of size 8 at addr fff00000c78e9c78 by task kunit_try_catch/281
[   20.311335] 
[   20.311838] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.311966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.311998] Hardware name: linux,dummy-virt (DT)
[   20.312286] Call trace:
[   20.312512]  show_stack+0x20/0x38 (C)
[   20.312692]  dump_stack_lvl+0x8c/0xd0
[   20.313109]  print_report+0x118/0x5d0
[   20.313279]  kasan_report+0xdc/0x128
[   20.313536]  kasan_check_range+0x100/0x1a8
[   20.313913]  __kasan_check_write+0x20/0x30
[   20.314453]  copy_to_kernel_nofault+0x8c/0x250
[   20.314523]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.314738]  kunit_try_run_case+0x170/0x3f0
[   20.315150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.315377]  kthread+0x328/0x630
[   20.315471]  ret_from_fork+0x10/0x20
[   20.315566] 
[   20.315590] Allocated by task 281:
[   20.315634]  kasan_save_stack+0x3c/0x68
[   20.315710]  kasan_save_track+0x20/0x40
[   20.315758]  kasan_save_alloc_info+0x40/0x58
[   20.315810]  __kasan_kmalloc+0xd4/0xd8
[   20.315859]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.315903]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.315943]  kunit_try_run_case+0x170/0x3f0
[   20.315984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.316029]  kthread+0x328/0x630
[   20.316083]  ret_from_fork+0x10/0x20
[   20.316125] 
[   20.316149] The buggy address belongs to the object at fff00000c78e9c00
[   20.316149]  which belongs to the cache kmalloc-128 of size 128
[   20.316464] The buggy address is located 0 bytes to the right of
[   20.316464]  allocated 120-byte region [fff00000c78e9c00, fff00000c78e9c78)
[   20.316696] 
[   20.316969] The buggy address belongs to the physical page:
[   20.317335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   20.317586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.317652] page_type: f5(slab)
[   20.318133] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.318386] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.318506] page dumped because: kasan: bad access detected
[   20.318658] 
[   20.318744] Memory state around the buggy address:
[   20.318827]  fff00000c78e9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.318897]  fff00000c78e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.319122] >fff00000c78e9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.319344]                                                                 ^
[   20.320172]  fff00000c78e9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.320245]  fff00000c78e9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.320315] ==================================================================

[   19.814922] ==================================================================
[   19.814995] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.815076] Read of size 8 at addr fff00000c7a4ed78 by task kunit_try_catch/281
[   19.815656] 
[   19.815925] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.816442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.816483] Hardware name: linux,dummy-virt (DT)
[   19.816587] Call trace:
[   19.816691]  show_stack+0x20/0x38 (C)
[   19.816752]  dump_stack_lvl+0x8c/0xd0
[   19.816825]  print_report+0x118/0x5d0
[   19.816882]  kasan_report+0xdc/0x128
[   19.816929]  __asan_report_load8_noabort+0x20/0x30
[   19.816999]  copy_to_kernel_nofault+0x204/0x250
[   19.817051]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.817099]  kunit_try_run_case+0x170/0x3f0
[   19.817359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.817524]  kthread+0x328/0x630
[   19.817640]  ret_from_fork+0x10/0x20
[   19.817714] 
[   19.817735] Allocated by task 281:
[   19.817767]  kasan_save_stack+0x3c/0x68
[   19.817848]  kasan_save_track+0x20/0x40
[   19.817971]  kasan_save_alloc_info+0x40/0x58
[   19.818064]  __kasan_kmalloc+0xd4/0xd8
[   19.818136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.818191]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.818284]  kunit_try_run_case+0x170/0x3f0
[   19.818338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.818421]  kthread+0x328/0x630
[   19.818478]  ret_from_fork+0x10/0x20
[   19.818518] 
[   19.818542] The buggy address belongs to the object at fff00000c7a4ed00
[   19.818542]  which belongs to the cache kmalloc-128 of size 128
[   19.818618] The buggy address is located 0 bytes to the right of
[   19.818618]  allocated 120-byte region [fff00000c7a4ed00, fff00000c7a4ed78)
[   19.818694] 
[   19.818717] The buggy address belongs to the physical page:
[   19.818779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.818840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.818892] page_type: f5(slab)
[   19.818938] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.818989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.819168] page dumped because: kasan: bad access detected
[   19.819233] 
[   19.819312] Memory state around the buggy address:
[   19.819443]  fff00000c7a4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.819525]  fff00000c7a4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819587] >fff00000c7a4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.819695]                                                                 ^
[   19.819798]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819882]  fff00000c7a4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819996] ==================================================================
[   19.820346] ==================================================================
[   19.820737] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.820812] Write of size 8 at addr fff00000c7a4ed78 by task kunit_try_catch/281
[   19.820866] 
[   19.820900] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.820982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.821011] Hardware name: linux,dummy-virt (DT)
[   19.821043] Call trace:
[   19.821069]  show_stack+0x20/0x38 (C)
[   19.821120]  dump_stack_lvl+0x8c/0xd0
[   19.821170]  print_report+0x118/0x5d0
[   19.821217]  kasan_report+0xdc/0x128
[   19.821267]  kasan_check_range+0x100/0x1a8
[   19.821317]  __kasan_check_write+0x20/0x30
[   19.821425]  copy_to_kernel_nofault+0x8c/0x250
[   19.821475]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.821535]  kunit_try_run_case+0x170/0x3f0
[   19.821582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.821636]  kthread+0x328/0x630
[   19.821680]  ret_from_fork+0x10/0x20
[   19.821728] 
[   19.821766] Allocated by task 281:
[   19.821796]  kasan_save_stack+0x3c/0x68
[   19.821839]  kasan_save_track+0x20/0x40
[   19.821877]  kasan_save_alloc_info+0x40/0x58
[   19.821925]  __kasan_kmalloc+0xd4/0xd8
[   19.821965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.822015]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.822056]  kunit_try_run_case+0x170/0x3f0
[   19.822103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.822154]  kthread+0x328/0x630
[   19.822190]  ret_from_fork+0x10/0x20
[   19.822226] 
[   19.822247] The buggy address belongs to the object at fff00000c7a4ed00
[   19.822247]  which belongs to the cache kmalloc-128 of size 128
[   19.822304] The buggy address is located 0 bytes to the right of
[   19.822304]  allocated 120-byte region [fff00000c7a4ed00, fff00000c7a4ed78)
[   19.822379] 
[   19.822409] The buggy address belongs to the physical page:
[   19.822444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.822505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.822554] page_type: f5(slab)
[   19.822593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.822645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.822687] page dumped because: kasan: bad access detected
[   19.822718] 
[   19.822748] Memory state around the buggy address:
[   19.822781]  fff00000c7a4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.822827]  fff00000c7a4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.822883] >fff00000c7a4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.822924]                                                                 ^
[   19.822966]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823011]  fff00000c7a4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823061] ==================================================================

[   19.440863] ==================================================================
[   19.440916] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.440966] Write of size 8 at addr fff00000c7716b78 by task kunit_try_catch/281
[   19.441017] 
[   19.441049] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.441132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.441163] Hardware name: linux,dummy-virt (DT)
[   19.441196] Call trace:
[   19.441422]  show_stack+0x20/0x38 (C)
[   19.441656]  dump_stack_lvl+0x8c/0xd0
[   19.441706]  print_report+0x118/0x5d0
[   19.441884]  kasan_report+0xdc/0x128
[   19.442148]  kasan_check_range+0x100/0x1a8
[   19.442202]  __kasan_check_write+0x20/0x30
[   19.442251]  copy_to_kernel_nofault+0x8c/0x250
[   19.442302]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.442352]  kunit_try_run_case+0x170/0x3f0
[   19.442401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.442453]  kthread+0x328/0x630
[   19.442503]  ret_from_fork+0x10/0x20
[   19.442783] 
[   19.442953] Allocated by task 281:
[   19.442988]  kasan_save_stack+0x3c/0x68
[   19.443034]  kasan_save_track+0x20/0x40
[   19.443073]  kasan_save_alloc_info+0x40/0x58
[   19.443115]  __kasan_kmalloc+0xd4/0xd8
[   19.443154]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.443195]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.444083]  kunit_try_run_case+0x170/0x3f0
[   19.444210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.444264]  kthread+0x328/0x630
[   19.444300]  ret_from_fork+0x10/0x20
[   19.444338] 
[   19.444361] The buggy address belongs to the object at fff00000c7716b00
[   19.444361]  which belongs to the cache kmalloc-128 of size 128
[   19.444420] The buggy address is located 0 bytes to the right of
[   19.444420]  allocated 120-byte region [fff00000c7716b00, fff00000c7716b78)
[   19.444486] 
[   19.444508] The buggy address belongs to the physical page:
[   19.444541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.444621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.444672] page_type: f5(slab)
[   19.444723] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.444775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.444818] page dumped because: kasan: bad access detected
[   19.444851] 
[   19.444871] Memory state around the buggy address:
[   19.444904]  fff00000c7716a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.444948]  fff00000c7716a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444992] >fff00000c7716b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.445033]                                                                 ^
[   19.445075]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445120]  fff00000c7716c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445160] ==================================================================
[   19.436812] ==================================================================
[   19.436887] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.436951] Read of size 8 at addr fff00000c7716b78 by task kunit_try_catch/281
[   19.437004] 
[   19.437054] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.437142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.437174] Hardware name: linux,dummy-virt (DT)
[   19.437217] Call trace:
[   19.437248]  show_stack+0x20/0x38 (C)
[   19.437300]  dump_stack_lvl+0x8c/0xd0
[   19.437357]  print_report+0x118/0x5d0
[   19.437406]  kasan_report+0xdc/0x128
[   19.437453]  __asan_report_load8_noabort+0x20/0x30
[   19.437514]  copy_to_kernel_nofault+0x204/0x250
[   19.437566]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.437615]  kunit_try_run_case+0x170/0x3f0
[   19.437679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.437745]  kthread+0x328/0x630
[   19.437788]  ret_from_fork+0x10/0x20
[   19.437836] 
[   19.437856] Allocated by task 281:
[   19.437889]  kasan_save_stack+0x3c/0x68
[   19.437930]  kasan_save_track+0x20/0x40
[   19.437970]  kasan_save_alloc_info+0x40/0x58
[   19.438010]  __kasan_kmalloc+0xd4/0xd8
[   19.438049]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.438091]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.438132]  kunit_try_run_case+0x170/0x3f0
[   19.438170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.438216]  kthread+0x328/0x630
[   19.438249]  ret_from_fork+0x10/0x20
[   19.438287] 
[   19.438604] The buggy address belongs to the object at fff00000c7716b00
[   19.438604]  which belongs to the cache kmalloc-128 of size 128
[   19.438774] The buggy address is located 0 bytes to the right of
[   19.438774]  allocated 120-byte region [fff00000c7716b00, fff00000c7716b78)
[   19.438865] 
[   19.439129] The buggy address belongs to the physical page:
[   19.439322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   19.439432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.439574] page_type: f5(slab)
[   19.439616] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.439668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.439710] page dumped because: kasan: bad access detected
[   19.439755] 
[   19.439851] Memory state around the buggy address:
[   19.439911]  fff00000c7716a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.439957]  fff00000c7716a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440001] >fff00000c7716b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.440042]                                                                 ^
[   19.440086]  fff00000c7716b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440131]  fff00000c7716c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440245] ==================================================================

[   15.884653] ==================================================================
[   15.885241] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   15.885600] Read of size 8 at addr ffff8881026efd78 by task kunit_try_catch/299
[   15.886260] 
[   15.886370] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.886420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.886434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.886470] Call Trace:
[   15.886483]  <TASK>
[   15.886503]  dump_stack_lvl+0x73/0xb0
[   15.886535]  print_report+0xd1/0x610
[   15.886562]  ? __virt_addr_valid+0x1db/0x2d0
[   15.886586]  ? copy_to_kernel_nofault+0x225/0x260
[   15.886612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.886654]  ? copy_to_kernel_nofault+0x225/0x260
[   15.886680]  kasan_report+0x141/0x180
[   15.886703]  ? copy_to_kernel_nofault+0x225/0x260
[   15.886733]  __asan_report_load8_noabort+0x18/0x20
[   15.886759]  copy_to_kernel_nofault+0x225/0x260
[   15.886786]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   15.886812]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.886837]  ? finish_task_switch.isra.0+0x153/0x700
[   15.886862]  ? __schedule+0x10cc/0x2b60
[   15.886885]  ? trace_hardirqs_on+0x37/0xe0
[   15.886919]  ? __pfx_read_tsc+0x10/0x10
[   15.886940]  ? ktime_get_ts64+0x86/0x230
[   15.886967]  kunit_try_run_case+0x1a5/0x480
[   15.886994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.887017]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.887042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.887067]  ? __kthread_parkme+0x82/0x180
[   15.887089]  ? preempt_count_sub+0x50/0x80
[   15.887114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.887139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.887164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.887190]  kthread+0x337/0x6f0
[   15.887209]  ? trace_preempt_on+0x20/0xc0
[   15.887233]  ? __pfx_kthread+0x10/0x10
[   15.887254]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.887277]  ? calculate_sigpending+0x7b/0xa0
[   15.887303]  ? __pfx_kthread+0x10/0x10
[   15.887325]  ret_from_fork+0x116/0x1d0
[   15.887344]  ? __pfx_kthread+0x10/0x10
[   15.887365]  ret_from_fork_asm+0x1a/0x30
[   15.887399]  </TASK>
[   15.887410] 
[   15.898516] Allocated by task 299:
[   15.899059]  kasan_save_stack+0x45/0x70
[   15.899404]  kasan_save_track+0x18/0x40
[   15.899712]  kasan_save_alloc_info+0x3b/0x50
[   15.900020]  __kasan_kmalloc+0xb7/0xc0
[   15.900307]  __kmalloc_cache_noprof+0x189/0x420
[   15.900697]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.900937]  kunit_try_run_case+0x1a5/0x480
[   15.901136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.901374]  kthread+0x337/0x6f0
[   15.901883]  ret_from_fork+0x116/0x1d0
[   15.902143]  ret_from_fork_asm+0x1a/0x30
[   15.902301] 
[   15.902616] The buggy address belongs to the object at ffff8881026efd00
[   15.902616]  which belongs to the cache kmalloc-128 of size 128
[   15.903248] The buggy address is located 0 bytes to the right of
[   15.903248]  allocated 120-byte region [ffff8881026efd00, ffff8881026efd78)
[   15.904020] 
[   15.904136] The buggy address belongs to the physical page:
[   15.904386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ef
[   15.904980] flags: 0x200000000000000(node=0|zone=2)
[   15.905316] page_type: f5(slab)
[   15.905589] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.906018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.906352] page dumped because: kasan: bad access detected
[   15.906758] 
[   15.906863] Memory state around the buggy address:
[   15.907239]  ffff8881026efc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.907691]  ffff8881026efc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.907961] >ffff8881026efd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.908282]                                                                 ^
[   15.908776]  ffff8881026efd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909071]  ffff8881026efe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909610] ==================================================================
[   15.910510] ==================================================================
[   15.911455] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   15.911970] Write of size 8 at addr ffff8881026efd78 by task kunit_try_catch/299
[   15.912696] 
[   15.912798] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.912847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.912859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.912883] Call Trace:
[   15.912902]  <TASK>
[   15.912922]  dump_stack_lvl+0x73/0xb0
[   15.912954]  print_report+0xd1/0x610
[   15.912978]  ? __virt_addr_valid+0x1db/0x2d0
[   15.913002]  ? copy_to_kernel_nofault+0x99/0x260
[   15.913026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.913050]  ? copy_to_kernel_nofault+0x99/0x260
[   15.913076]  kasan_report+0x141/0x180
[   15.913112]  ? copy_to_kernel_nofault+0x99/0x260
[   15.913297]  kasan_check_range+0x10c/0x1c0
[   15.913324]  __kasan_check_write+0x18/0x20
[   15.913344]  copy_to_kernel_nofault+0x99/0x260
[   15.913371]  copy_to_kernel_nofault_oob+0x288/0x560
[   15.913400]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.913448]  ? finish_task_switch.isra.0+0x153/0x700
[   15.913475]  ? __schedule+0x10cc/0x2b60
[   15.913500]  ? trace_hardirqs_on+0x37/0xe0
[   15.913534]  ? __pfx_read_tsc+0x10/0x10
[   15.913557]  ? ktime_get_ts64+0x86/0x230
[   15.913582]  kunit_try_run_case+0x1a5/0x480
[   15.913608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.913632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.913657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.913682]  ? __kthread_parkme+0x82/0x180
[   15.913704]  ? preempt_count_sub+0x50/0x80
[   15.913729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.913753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.913779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.913804]  kthread+0x337/0x6f0
[   15.913824]  ? trace_preempt_on+0x20/0xc0
[   15.913846]  ? __pfx_kthread+0x10/0x10
[   15.913868]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.913890]  ? calculate_sigpending+0x7b/0xa0
[   15.913916]  ? __pfx_kthread+0x10/0x10
[   15.913938]  ret_from_fork+0x116/0x1d0
[   15.913958]  ? __pfx_kthread+0x10/0x10
[   15.913979]  ret_from_fork_asm+0x1a/0x30
[   15.914013]  </TASK>
[   15.914025] 
[   15.925657] Allocated by task 299:
[   15.926067]  kasan_save_stack+0x45/0x70
[   15.926387]  kasan_save_track+0x18/0x40
[   15.926754]  kasan_save_alloc_info+0x3b/0x50
[   15.927016]  __kasan_kmalloc+0xb7/0xc0
[   15.927187]  __kmalloc_cache_noprof+0x189/0x420
[   15.927390]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.927856]  kunit_try_run_case+0x1a5/0x480
[   15.928109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.928453]  kthread+0x337/0x6f0
[   15.928743]  ret_from_fork+0x116/0x1d0
[   15.928881]  ret_from_fork_asm+0x1a/0x30
[   15.929239] 
[   15.929582] The buggy address belongs to the object at ffff8881026efd00
[   15.929582]  which belongs to the cache kmalloc-128 of size 128
[   15.930271] The buggy address is located 0 bytes to the right of
[   15.930271]  allocated 120-byte region [ffff8881026efd00, ffff8881026efd78)
[   15.931032] 
[   15.931135] The buggy address belongs to the physical page:
[   15.931568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ef
[   15.931922] flags: 0x200000000000000(node=0|zone=2)
[   15.932100] page_type: f5(slab)
[   15.932273] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.932564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.933000] page dumped because: kasan: bad access detected
[   15.933250] 
[   15.933369] Memory state around the buggy address:
[   15.933565]  ffff8881026efc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.933800]  ffff8881026efc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.934193] >ffff8881026efd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.934484]                                                                 ^
[   15.934714]  ffff8881026efd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.935148]  ffff8881026efe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.935479] ==================================================================

[   16.359514] ==================================================================
[   16.360352] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   16.361522] Read of size 8 at addr ffff888102b7db78 by task kunit_try_catch/298
[   16.362696] 
[   16.362926] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.362984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.362999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.363036] Call Trace:
[   16.363054]  <TASK>
[   16.363077]  dump_stack_lvl+0x73/0xb0
[   16.363118]  print_report+0xd1/0x610
[   16.363145]  ? __virt_addr_valid+0x1db/0x2d0
[   16.363172]  ? copy_to_kernel_nofault+0x225/0x260
[   16.363198]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.363222]  ? copy_to_kernel_nofault+0x225/0x260
[   16.363247]  kasan_report+0x141/0x180
[   16.363270]  ? copy_to_kernel_nofault+0x225/0x260
[   16.363299]  __asan_report_load8_noabort+0x18/0x20
[   16.363325]  copy_to_kernel_nofault+0x225/0x260
[   16.363351]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   16.363376]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.363401]  ? finish_task_switch.isra.0+0x153/0x700
[   16.363426]  ? __schedule+0x10cc/0x2b60
[   16.363450]  ? trace_hardirqs_on+0x37/0xe0
[   16.363484]  ? __pfx_read_tsc+0x10/0x10
[   16.363508]  ? ktime_get_ts64+0x86/0x230
[   16.363534]  kunit_try_run_case+0x1a5/0x480
[   16.363562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.363611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.363636]  ? __kthread_parkme+0x82/0x180
[   16.363659]  ? preempt_count_sub+0x50/0x80
[   16.363683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.363733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.363758]  kthread+0x337/0x6f0
[   16.363778]  ? trace_preempt_on+0x20/0xc0
[   16.363801]  ? __pfx_kthread+0x10/0x10
[   16.363822]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.363845]  ? calculate_sigpending+0x7b/0xa0
[   16.363871]  ? __pfx_kthread+0x10/0x10
[   16.363893]  ret_from_fork+0x116/0x1d0
[   16.363913]  ? __pfx_kthread+0x10/0x10
[   16.363933]  ret_from_fork_asm+0x1a/0x30
[   16.363967]  </TASK>
[   16.363979] 
[   16.376643] Allocated by task 298:
[   16.377032]  kasan_save_stack+0x45/0x70
[   16.377487]  kasan_save_track+0x18/0x40
[   16.377875]  kasan_save_alloc_info+0x3b/0x50
[   16.378147]  __kasan_kmalloc+0xb7/0xc0
[   16.378564]  __kmalloc_cache_noprof+0x189/0x420
[   16.378929]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.379406]  kunit_try_run_case+0x1a5/0x480
[   16.379720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.380275]  kthread+0x337/0x6f0
[   16.380608]  ret_from_fork+0x116/0x1d0
[   16.380880]  ret_from_fork_asm+0x1a/0x30
[   16.381321] 
[   16.381405] The buggy address belongs to the object at ffff888102b7db00
[   16.381405]  which belongs to the cache kmalloc-128 of size 128
[   16.382450] The buggy address is located 0 bytes to the right of
[   16.382450]  allocated 120-byte region [ffff888102b7db00, ffff888102b7db78)
[   16.383141] 
[   16.383256] The buggy address belongs to the physical page:
[   16.383772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   16.384525] flags: 0x200000000000000(node=0|zone=2)
[   16.384996] page_type: f5(slab)
[   16.385345] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.385996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.386565] page dumped because: kasan: bad access detected
[   16.387104] 
[   16.387276] Memory state around the buggy address:
[   16.387553]  ffff888102b7da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.388151]  ffff888102b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.388714] >ffff888102b7db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.388995]                                                                 ^
[   16.389860]  ffff888102b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.390492]  ffff888102b7dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.391129] ==================================================================
[   16.391833] ==================================================================
[   16.392149] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   16.393281] Write of size 8 at addr ffff888102b7db78 by task kunit_try_catch/298
[   16.394131] 
[   16.394321] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.394372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.394386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.394410] Call Trace:
[   16.394425]  <TASK>
[   16.394445]  dump_stack_lvl+0x73/0xb0
[   16.394480]  print_report+0xd1/0x610
[   16.394505]  ? __virt_addr_valid+0x1db/0x2d0
[   16.394629]  ? copy_to_kernel_nofault+0x99/0x260
[   16.394658]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.394682]  ? copy_to_kernel_nofault+0x99/0x260
[   16.394707]  kasan_report+0x141/0x180
[   16.394730]  ? copy_to_kernel_nofault+0x99/0x260
[   16.394759]  kasan_check_range+0x10c/0x1c0
[   16.394783]  __kasan_check_write+0x18/0x20
[   16.394803]  copy_to_kernel_nofault+0x99/0x260
[   16.394830]  copy_to_kernel_nofault_oob+0x288/0x560
[   16.394855]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.394879]  ? finish_task_switch.isra.0+0x153/0x700
[   16.394904]  ? __schedule+0x10cc/0x2b60
[   16.394928]  ? trace_hardirqs_on+0x37/0xe0
[   16.394960]  ? __pfx_read_tsc+0x10/0x10
[   16.394983]  ? ktime_get_ts64+0x86/0x230
[   16.395017]  kunit_try_run_case+0x1a5/0x480
[   16.395046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.395069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.395095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.395119]  ? __kthread_parkme+0x82/0x180
[   16.395141]  ? preempt_count_sub+0x50/0x80
[   16.395165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.395190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.395215]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.395240]  kthread+0x337/0x6f0
[   16.395261]  ? trace_preempt_on+0x20/0xc0
[   16.395283]  ? __pfx_kthread+0x10/0x10
[   16.395304]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.395326]  ? calculate_sigpending+0x7b/0xa0
[   16.395351]  ? __pfx_kthread+0x10/0x10
[   16.395373]  ret_from_fork+0x116/0x1d0
[   16.395392]  ? __pfx_kthread+0x10/0x10
[   16.395413]  ret_from_fork_asm+0x1a/0x30
[   16.395492]  </TASK>
[   16.395507] 
[   16.414262] Allocated by task 298:
[   16.414725]  kasan_save_stack+0x45/0x70
[   16.415190]  kasan_save_track+0x18/0x40
[   16.415551]  kasan_save_alloc_info+0x3b/0x50
[   16.415932]  __kasan_kmalloc+0xb7/0xc0
[   16.416383]  __kmalloc_cache_noprof+0x189/0x420
[   16.416622]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.417363]  kunit_try_run_case+0x1a5/0x480
[   16.417675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.417858]  kthread+0x337/0x6f0
[   16.417982]  ret_from_fork+0x116/0x1d0
[   16.418410]  ret_from_fork_asm+0x1a/0x30
[   16.418787] 
[   16.418949] The buggy address belongs to the object at ffff888102b7db00
[   16.418949]  which belongs to the cache kmalloc-128 of size 128
[   16.420145] The buggy address is located 0 bytes to the right of
[   16.420145]  allocated 120-byte region [ffff888102b7db00, ffff888102b7db78)
[   16.420729] 
[   16.420810] The buggy address belongs to the physical page:
[   16.420997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   16.422215] flags: 0x200000000000000(node=0|zone=2)
[   16.422775] page_type: f5(slab)
[   16.423218] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.423936] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.424517] page dumped because: kasan: bad access detected
[   16.424697] 
[   16.424769] Memory state around the buggy address:
[   16.424935]  ffff888102b7da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.425183]  ffff888102b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.425579] >ffff888102b7db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.425876]                                                                 ^
[   16.426157]  ffff888102b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.426875]  ffff888102b7dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.427184] ==================================================================

[   16.109163] ==================================================================
[   16.109944] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   16.110663] Write of size 8 at addr ffff888103abd078 by task kunit_try_catch/298
[   16.111409] 
[   16.111608] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.111654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.111667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.111690] Call Trace:
[   16.111703]  <TASK>
[   16.111719]  dump_stack_lvl+0x73/0xb0
[   16.111749]  print_report+0xd1/0x610
[   16.111773]  ? __virt_addr_valid+0x1db/0x2d0
[   16.111798]  ? copy_to_kernel_nofault+0x99/0x260
[   16.111822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.111846]  ? copy_to_kernel_nofault+0x99/0x260
[   16.111872]  kasan_report+0x141/0x180
[   16.111909]  ? copy_to_kernel_nofault+0x99/0x260
[   16.111940]  kasan_check_range+0x10c/0x1c0
[   16.111965]  __kasan_check_write+0x18/0x20
[   16.111985]  copy_to_kernel_nofault+0x99/0x260
[   16.112011]  copy_to_kernel_nofault_oob+0x288/0x560
[   16.112037]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.112061]  ? finish_task_switch.isra.0+0x153/0x700
[   16.112085]  ? __schedule+0x10cc/0x2b60
[   16.112107]  ? trace_hardirqs_on+0x37/0xe0
[   16.112140]  ? __pfx_read_tsc+0x10/0x10
[   16.112161]  ? ktime_get_ts64+0x86/0x230
[   16.112188]  kunit_try_run_case+0x1a5/0x480
[   16.112216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.112267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.112292]  ? __kthread_parkme+0x82/0x180
[   16.112315]  ? preempt_count_sub+0x50/0x80
[   16.112340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.112416]  kthread+0x337/0x6f0
[   16.112436]  ? trace_preempt_on+0x20/0xc0
[   16.112459]  ? __pfx_kthread+0x10/0x10
[   16.112480]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.112503]  ? calculate_sigpending+0x7b/0xa0
[   16.112547]  ? __pfx_kthread+0x10/0x10
[   16.112569]  ret_from_fork+0x116/0x1d0
[   16.112588]  ? __pfx_kthread+0x10/0x10
[   16.112609]  ret_from_fork_asm+0x1a/0x30
[   16.112642]  </TASK>
[   16.112654] 
[   16.126431] Allocated by task 298:
[   16.126768]  kasan_save_stack+0x45/0x70
[   16.127261]  kasan_save_track+0x18/0x40
[   16.127623]  kasan_save_alloc_info+0x3b/0x50
[   16.128123]  __kasan_kmalloc+0xb7/0xc0
[   16.128354]  __kmalloc_cache_noprof+0x189/0x420
[   16.128787]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.129070]  kunit_try_run_case+0x1a5/0x480
[   16.129497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.129973]  kthread+0x337/0x6f0
[   16.130127]  ret_from_fork+0x116/0x1d0
[   16.130279]  ret_from_fork_asm+0x1a/0x30
[   16.130425] 
[   16.130498] The buggy address belongs to the object at ffff888103abd000
[   16.130498]  which belongs to the cache kmalloc-128 of size 128
[   16.131609] The buggy address is located 0 bytes to the right of
[   16.131609]  allocated 120-byte region [ffff888103abd000, ffff888103abd078)
[   16.132886] 
[   16.133066] The buggy address belongs to the physical page:
[   16.133644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103abd
[   16.134410] flags: 0x200000000000000(node=0|zone=2)
[   16.134921] page_type: f5(slab)
[   16.135284] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.136008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.136863] page dumped because: kasan: bad access detected
[   16.137501] 
[   16.137703] Memory state around the buggy address:
[   16.138188]  ffff888103abcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.138817]  ffff888103abcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.139525] >ffff888103abd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.140056]                                                                 ^
[   16.140381]  ffff888103abd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.140605]  ffff888103abd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.141311] ==================================================================
[   16.079193] ==================================================================
[   16.079915] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   16.080950] Read of size 8 at addr ffff888103abd078 by task kunit_try_catch/298
[   16.082036] 
[   16.082177] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.082229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.082242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.082266] Call Trace:
[   16.082280]  <TASK>
[   16.082298]  dump_stack_lvl+0x73/0xb0
[   16.082387]  print_report+0xd1/0x610
[   16.082417]  ? __virt_addr_valid+0x1db/0x2d0
[   16.082541]  ? copy_to_kernel_nofault+0x225/0x260
[   16.082575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.082601]  ? copy_to_kernel_nofault+0x225/0x260
[   16.082626]  kasan_report+0x141/0x180
[   16.082651]  ? copy_to_kernel_nofault+0x225/0x260
[   16.082682]  __asan_report_load8_noabort+0x18/0x20
[   16.082708]  copy_to_kernel_nofault+0x225/0x260
[   16.082735]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   16.082767]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.082792]  ? finish_task_switch.isra.0+0x153/0x700
[   16.082818]  ? __schedule+0x10cc/0x2b60
[   16.082842]  ? trace_hardirqs_on+0x37/0xe0
[   16.082877]  ? __pfx_read_tsc+0x10/0x10
[   16.082911]  ? ktime_get_ts64+0x86/0x230
[   16.082938]  kunit_try_run_case+0x1a5/0x480
[   16.082964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.083038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.083067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.083092]  ? __kthread_parkme+0x82/0x180
[   16.083113]  ? preempt_count_sub+0x50/0x80
[   16.083138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.083163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.083188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.083213]  kthread+0x337/0x6f0
[   16.083233]  ? trace_preempt_on+0x20/0xc0
[   16.083256]  ? __pfx_kthread+0x10/0x10
[   16.083277]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.083300]  ? calculate_sigpending+0x7b/0xa0
[   16.083326]  ? __pfx_kthread+0x10/0x10
[   16.083348]  ret_from_fork+0x116/0x1d0
[   16.083369]  ? __pfx_kthread+0x10/0x10
[   16.083390]  ret_from_fork_asm+0x1a/0x30
[   16.083424]  </TASK>
[   16.083436] 
[   16.096664] Allocated by task 298:
[   16.096963]  kasan_save_stack+0x45/0x70
[   16.097251]  kasan_save_track+0x18/0x40
[   16.097390]  kasan_save_alloc_info+0x3b/0x50
[   16.097542]  __kasan_kmalloc+0xb7/0xc0
[   16.097689]  __kmalloc_cache_noprof+0x189/0x420
[   16.098073]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.098487]  kunit_try_run_case+0x1a5/0x480
[   16.098930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.099466]  kthread+0x337/0x6f0
[   16.099813]  ret_from_fork+0x116/0x1d0
[   16.100010]  ret_from_fork_asm+0x1a/0x30
[   16.100418] 
[   16.100603] The buggy address belongs to the object at ffff888103abd000
[   16.100603]  which belongs to the cache kmalloc-128 of size 128
[   16.101157] The buggy address is located 0 bytes to the right of
[   16.101157]  allocated 120-byte region [ffff888103abd000, ffff888103abd078)
[   16.101932] 
[   16.102034] The buggy address belongs to the physical page:
[   16.102212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103abd
[   16.102458] flags: 0x200000000000000(node=0|zone=2)
[   16.102877] page_type: f5(slab)
[   16.103014] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.103277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.103507] page dumped because: kasan: bad access detected
[   16.104056] 
[   16.104245] Memory state around the buggy address:
[   16.104705]  ffff888103abcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.105367]  ffff888103abcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.106086] >ffff888103abd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.106811]                                                                 ^
[   16.107510]  ffff888103abd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.107809]  ffff888103abd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.108050] ==================================================================