Hay
Date
July 2, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.347959] ==================================================================
[   21.348025] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.348081] Write of size 8 at addr fff00000c7041878 by task kunit_try_catch/281
[   21.348422] 
[   21.348481] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.348795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.348910] Hardware name: linux,dummy-virt (DT)
[   21.349041] Call trace:
[   21.349106]  show_stack+0x20/0x38 (C)
[   21.349164]  dump_stack_lvl+0x8c/0xd0
[   21.349507]  print_report+0x118/0x608
[   21.349705]  kasan_report+0xdc/0x128
[   21.349806]  kasan_check_range+0x100/0x1a8
[   21.350134]  __kasan_check_write+0x20/0x30
[   21.350450]  copy_to_kernel_nofault+0x8c/0x250
[   21.350673]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.350780]  kunit_try_run_case+0x170/0x3f0
[   21.350928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.350999]  kthread+0x328/0x630
[   21.351379]  ret_from_fork+0x10/0x20
[   21.351552] 
[   21.351866] Allocated by task 281:
[   21.352129]  kasan_save_stack+0x3c/0x68
[   21.352446]  kasan_save_track+0x20/0x40
[   21.352587]  kasan_save_alloc_info+0x40/0x58
[   21.352944]  __kasan_kmalloc+0xd4/0xd8
[   21.353102]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.353463]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.353633]  kunit_try_run_case+0x170/0x3f0
[   21.353712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.353965]  kthread+0x328/0x630
[   21.354240]  ret_from_fork+0x10/0x20
[   21.354290] 
[   21.354350] The buggy address belongs to the object at fff00000c7041800
[   21.354350]  which belongs to the cache kmalloc-128 of size 128
[   21.354710] The buggy address is located 0 bytes to the right of
[   21.354710]  allocated 120-byte region [fff00000c7041800, fff00000c7041878)
[   21.354788] 
[   21.355006] The buggy address belongs to the physical page:
[   21.355238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041
[   21.355384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.355633] page_type: f5(slab)
[   21.355846] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.355937] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.356141] page dumped because: kasan: bad access detected
[   21.356226] 
[   21.356247] Memory state around the buggy address:
[   21.356304]  fff00000c7041700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.356353]  fff00000c7041780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.356516] >fff00000c7041800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.356571]                                                                 ^
[   21.356636]  fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.356691]  fff00000c7041900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.356939] ==================================================================
[   21.335727] ==================================================================
[   21.335990] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.336111] Read of size 8 at addr fff00000c7041878 by task kunit_try_catch/281
[   21.336168] 
[   21.336239] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.336474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.336567] Hardware name: linux,dummy-virt (DT)
[   21.336756] Call trace:
[   21.336791]  show_stack+0x20/0x38 (C)
[   21.336910]  dump_stack_lvl+0x8c/0xd0
[   21.336964]  print_report+0x118/0x608
[   21.337015]  kasan_report+0xdc/0x128
[   21.337061]  __asan_report_load8_noabort+0x20/0x30
[   21.337421]  copy_to_kernel_nofault+0x204/0x250
[   21.337525]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.337692]  kunit_try_run_case+0x170/0x3f0
[   21.337790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.337927]  kthread+0x328/0x630
[   21.338286]  ret_from_fork+0x10/0x20
[   21.338445] 
[   21.338527] Allocated by task 281:
[   21.338698]  kasan_save_stack+0x3c/0x68
[   21.338793]  kasan_save_track+0x20/0x40
[   21.338863]  kasan_save_alloc_info+0x40/0x58
[   21.339090]  __kasan_kmalloc+0xd4/0xd8
[   21.339305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.339413]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.339482]  kunit_try_run_case+0x170/0x3f0
[   21.339626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.339717]  kthread+0x328/0x630
[   21.339756]  ret_from_fork+0x10/0x20
[   21.339827] 
[   21.340657] The buggy address belongs to the object at fff00000c7041800
[   21.340657]  which belongs to the cache kmalloc-128 of size 128
[   21.340753] The buggy address is located 0 bytes to the right of
[   21.340753]  allocated 120-byte region [fff00000c7041800, fff00000c7041878)
[   21.340866] 
[   21.340922] The buggy address belongs to the physical page:
[   21.341629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041
[   21.341912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.342002] page_type: f5(slab)
[   21.342077] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.342253] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.342327] page dumped because: kasan: bad access detected
[   21.342437] 
[   21.342509] Memory state around the buggy address:
[   21.342562]  fff00000c7041700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.342769]  fff00000c7041780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343079] >fff00000c7041800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.343295]                                                                 ^
[   21.343407]  fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343489]  fff00000c7041900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343595] ==================================================================

[   15.292733] ==================================================================
[   15.293612] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   15.294079] Read of size 8 at addr ffff888102c8b978 by task kunit_try_catch/300
[   15.294715] 
[   15.294937] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.294999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.295015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.295039] Call Trace:
[   15.295054]  <TASK>
[   15.295073]  dump_stack_lvl+0x73/0xb0
[   15.295107]  print_report+0xd1/0x650
[   15.295135]  ? __virt_addr_valid+0x1db/0x2d0
[   15.295161]  ? copy_to_kernel_nofault+0x225/0x260
[   15.295185]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.295209]  ? copy_to_kernel_nofault+0x225/0x260
[   15.295233]  kasan_report+0x141/0x180
[   15.295256]  ? copy_to_kernel_nofault+0x225/0x260
[   15.295284]  __asan_report_load8_noabort+0x18/0x20
[   15.295309]  copy_to_kernel_nofault+0x225/0x260
[   15.295334]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   15.295371]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.295395]  ? finish_task_switch.isra.0+0x153/0x700
[   15.295419]  ? __schedule+0x10cc/0x2b60
[   15.295442]  ? trace_hardirqs_on+0x37/0xe0
[   15.295475]  ? __pfx_read_tsc+0x10/0x10
[   15.295497]  ? ktime_get_ts64+0x86/0x230
[   15.295522]  kunit_try_run_case+0x1a5/0x480
[   15.295549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.295678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.295712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.295737]  ? __kthread_parkme+0x82/0x180
[   15.295760]  ? preempt_count_sub+0x50/0x80
[   15.295785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.295810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.295835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.295859]  kthread+0x337/0x6f0
[   15.295879]  ? trace_preempt_on+0x20/0xc0
[   15.295902]  ? __pfx_kthread+0x10/0x10
[   15.295924]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.295945]  ? calculate_sigpending+0x7b/0xa0
[   15.295970]  ? __pfx_kthread+0x10/0x10
[   15.295992]  ret_from_fork+0x116/0x1d0
[   15.296012]  ? __pfx_kthread+0x10/0x10
[   15.296033]  ret_from_fork_asm+0x1a/0x30
[   15.296065]  </TASK>
[   15.296079] 
[   15.308375] Allocated by task 300:
[   15.308962]  kasan_save_stack+0x45/0x70
[   15.309309]  kasan_save_track+0x18/0x40
[   15.309612]  kasan_save_alloc_info+0x3b/0x50
[   15.309924]  __kasan_kmalloc+0xb7/0xc0
[   15.310125]  __kmalloc_cache_noprof+0x189/0x420
[   15.310367]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.310585]  kunit_try_run_case+0x1a5/0x480
[   15.310774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.311441]  kthread+0x337/0x6f0
[   15.311855]  ret_from_fork+0x116/0x1d0
[   15.312047]  ret_from_fork_asm+0x1a/0x30
[   15.312313] 
[   15.312410] The buggy address belongs to the object at ffff888102c8b900
[   15.312410]  which belongs to the cache kmalloc-128 of size 128
[   15.313339] The buggy address is located 0 bytes to the right of
[   15.313339]  allocated 120-byte region [ffff888102c8b900, ffff888102c8b978)
[   15.314221] 
[   15.314310] The buggy address belongs to the physical page:
[   15.314550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b
[   15.315325] flags: 0x200000000000000(node=0|zone=2)
[   15.315784] page_type: f5(slab)
[   15.315966] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.316354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.316858] page dumped because: kasan: bad access detected
[   15.317236] 
[   15.317318] Memory state around the buggy address:
[   15.317801]  ffff888102c8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.318137]  ffff888102c8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.318441] >ffff888102c8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.319081]                                                                 ^
[   15.319389]  ffff888102c8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.319904]  ffff888102c8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.320391] ==================================================================
[   15.321257] ==================================================================
[   15.321566] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   15.323057] Write of size 8 at addr ffff888102c8b978 by task kunit_try_catch/300
[   15.323519] 
[   15.323832] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.324022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.324039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.324062] Call Trace:
[   15.324076]  <TASK>
[   15.324095]  dump_stack_lvl+0x73/0xb0
[   15.324129]  print_report+0xd1/0x650
[   15.324153]  ? __virt_addr_valid+0x1db/0x2d0
[   15.324178]  ? copy_to_kernel_nofault+0x99/0x260
[   15.324203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.324226]  ? copy_to_kernel_nofault+0x99/0x260
[   15.324250]  kasan_report+0x141/0x180
[   15.324273]  ? copy_to_kernel_nofault+0x99/0x260
[   15.324301]  kasan_check_range+0x10c/0x1c0
[   15.324325]  __kasan_check_write+0x18/0x20
[   15.324358]  copy_to_kernel_nofault+0x99/0x260
[   15.324384]  copy_to_kernel_nofault_oob+0x288/0x560
[   15.324409]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.324435]  ? finish_task_switch.isra.0+0x153/0x700
[   15.324458]  ? __schedule+0x10cc/0x2b60
[   15.324481]  ? trace_hardirqs_on+0x37/0xe0
[   15.324513]  ? __pfx_read_tsc+0x10/0x10
[   15.324535]  ? ktime_get_ts64+0x86/0x230
[   15.324560]  kunit_try_run_case+0x1a5/0x480
[   15.324597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324620]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.324644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.324668]  ? __kthread_parkme+0x82/0x180
[   15.324690]  ? preempt_count_sub+0x50/0x80
[   15.324713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.324761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.324786]  kthread+0x337/0x6f0
[   15.324805]  ? trace_preempt_on+0x20/0xc0
[   15.324828]  ? __pfx_kthread+0x10/0x10
[   15.324849]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.324871]  ? calculate_sigpending+0x7b/0xa0
[   15.324895]  ? __pfx_kthread+0x10/0x10
[   15.324917]  ret_from_fork+0x116/0x1d0
[   15.324936]  ? __pfx_kthread+0x10/0x10
[   15.324957]  ret_from_fork_asm+0x1a/0x30
[   15.324988]  </TASK>
[   15.325001] 
[   15.337810] Allocated by task 300:
[   15.338011]  kasan_save_stack+0x45/0x70
[   15.338210]  kasan_save_track+0x18/0x40
[   15.338401]  kasan_save_alloc_info+0x3b/0x50
[   15.338596]  __kasan_kmalloc+0xb7/0xc0
[   15.339187]  __kmalloc_cache_noprof+0x189/0x420
[   15.339636]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.340242]  kunit_try_run_case+0x1a5/0x480
[   15.340420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.340601]  kthread+0x337/0x6f0
[   15.340736]  ret_from_fork+0x116/0x1d0
[   15.340871]  ret_from_fork_asm+0x1a/0x30
[   15.341013] 
[   15.341085] The buggy address belongs to the object at ffff888102c8b900
[   15.341085]  which belongs to the cache kmalloc-128 of size 128
[   15.341455] The buggy address is located 0 bytes to the right of
[   15.341455]  allocated 120-byte region [ffff888102c8b900, ffff888102c8b978)
[   15.343958] 
[   15.344264] The buggy address belongs to the physical page:
[   15.345224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b
[   15.345930] flags: 0x200000000000000(node=0|zone=2)
[   15.346168] page_type: f5(slab)
[   15.346329] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.347057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.347360] page dumped because: kasan: bad access detected
[   15.348097] 
[   15.348281] Memory state around the buggy address:
[   15.348771]  ffff888102c8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.349582]  ffff888102c8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.350068] >ffff888102c8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.350770]                                                                 ^
[   15.351543]  ffff888102c8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.351976]  ffff888102c8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.352663] ==================================================================