Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.455135] ==================================================================
[   23.455630] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   23.455814] Read of size 8 at addr fff00000c5942978 by task kunit_try_catch/282
[   23.456099] 
[   23.456301] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.456568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.456640] Hardware name: linux,dummy-virt (DT)
[   23.456722] Call trace:
[   23.456787]  show_stack+0x20/0x38 (C)
[   23.457304]  dump_stack_lvl+0x8c/0xd0
[   23.457577]  print_report+0x118/0x608
[   23.457982]  kasan_report+0xdc/0x128
[   23.458115]  __asan_report_load8_noabort+0x20/0x30
[   23.458215]  copy_to_kernel_nofault+0x204/0x250
[   23.458302]  copy_to_kernel_nofault_oob+0x158/0x418
[   23.458398]  kunit_try_run_case+0x170/0x3f0
[   23.458491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.458813]  kthread+0x328/0x630
[   23.459074]  ret_from_fork+0x10/0x20
[   23.459339] 
[   23.459411] Allocated by task 282:
[   23.459584]  kasan_save_stack+0x3c/0x68
[   23.459975]  kasan_save_track+0x20/0x40
[   23.460213]  kasan_save_alloc_info+0x40/0x58
[   23.460468]  __kasan_kmalloc+0xd4/0xd8
[   23.460597]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.460812]  copy_to_kernel_nofault_oob+0xc8/0x418
[   23.460921]  kunit_try_run_case+0x170/0x3f0
[   23.461218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.461501]  kthread+0x328/0x630
[   23.461781]  ret_from_fork+0x10/0x20
[   23.461894] 
[   23.461962] The buggy address belongs to the object at fff00000c5942900
[   23.461962]  which belongs to the cache kmalloc-128 of size 128
[   23.462110] The buggy address is located 0 bytes to the right of
[   23.462110]  allocated 120-byte region [fff00000c5942900, fff00000c5942978)
[   23.462320] 
[   23.462369] The buggy address belongs to the physical page:
[   23.462432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.462568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.462761] page_type: f5(slab)
[   23.463019] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.463296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.463399] page dumped because: kasan: bad access detected
[   23.463482] 
[   23.463524] Memory state around the buggy address:
[   23.463601]  fff00000c5942800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.464060]  fff00000c5942880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.464356] >fff00000c5942900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.464539]                                                                 ^
[   23.464840]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.464955]  fff00000c5942a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.465051] ==================================================================
[   23.465931] ==================================================================
[   23.466044] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   23.466158] Write of size 8 at addr fff00000c5942978 by task kunit_try_catch/282
[   23.466278] 
[   23.466673] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.467613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.467694] Hardware name: linux,dummy-virt (DT)
[   23.467766] Call trace:
[   23.467856]  show_stack+0x20/0x38 (C)
[   23.468139]  dump_stack_lvl+0x8c/0xd0
[   23.468628]  print_report+0x118/0x608
[   23.469237]  kasan_report+0xdc/0x128
[   23.469365]  kasan_check_range+0x100/0x1a8
[   23.469532]  __kasan_check_write+0x20/0x30
[   23.469747]  copy_to_kernel_nofault+0x8c/0x250
[   23.469879]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   23.469998]  kunit_try_run_case+0x170/0x3f0
[   23.470145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.470280]  kthread+0x328/0x630
[   23.470654]  ret_from_fork+0x10/0x20
[   23.470775] 
[   23.470909] Allocated by task 282:
[   23.470989]  kasan_save_stack+0x3c/0x68
[   23.471280]  kasan_save_track+0x20/0x40
[   23.471631]  kasan_save_alloc_info+0x40/0x58
[   23.471809]  __kasan_kmalloc+0xd4/0xd8
[   23.471915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.472091]  copy_to_kernel_nofault_oob+0xc8/0x418
[   23.472275]  kunit_try_run_case+0x170/0x3f0
[   23.472451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.472624]  kthread+0x328/0x630
[   23.472815]  ret_from_fork+0x10/0x20
[   23.472915] 
[   23.472962] The buggy address belongs to the object at fff00000c5942900
[   23.472962]  which belongs to the cache kmalloc-128 of size 128
[   23.473098] The buggy address is located 0 bytes to the right of
[   23.473098]  allocated 120-byte region [fff00000c5942900, fff00000c5942978)
[   23.473232] 
[   23.473272] The buggy address belongs to the physical page:
[   23.473328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   23.473437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.473553] page_type: f5(slab)
[   23.473925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.474188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.474403] page dumped because: kasan: bad access detected
[   23.474816] 
[   23.474975] Memory state around the buggy address:
[   23.475064]  fff00000c5942800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.475559]  fff00000c5942880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.475697] >fff00000c5942900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.475815]                                                                 ^
[   23.475937]  fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.476050]  fff00000c5942a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.476337] ==================================================================

[   16.717210] ==================================================================
[   16.718563] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   16.719356] Read of size 8 at addr ffff888102b92f78 by task kunit_try_catch/299
[   16.720224] 
[   16.720529] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.720591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.720604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.720627] Call Trace:
[   16.720642]  <TASK>
[   16.720663]  dump_stack_lvl+0x73/0xb0
[   16.720819]  print_report+0xd1/0x650
[   16.720855]  ? __virt_addr_valid+0x1db/0x2d0
[   16.720882]  ? copy_to_kernel_nofault+0x225/0x260
[   16.720909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.720934]  ? copy_to_kernel_nofault+0x225/0x260
[   16.720968]  kasan_report+0x141/0x180
[   16.720991]  ? copy_to_kernel_nofault+0x225/0x260
[   16.721021]  __asan_report_load8_noabort+0x18/0x20
[   16.721048]  copy_to_kernel_nofault+0x225/0x260
[   16.721075]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   16.721100]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.721125]  ? finish_task_switch.isra.0+0x153/0x700
[   16.721152]  ? __schedule+0x10cc/0x2b60
[   16.721176]  ? trace_hardirqs_on+0x37/0xe0
[   16.721210]  ? __pfx_read_tsc+0x10/0x10
[   16.721234]  ? ktime_get_ts64+0x86/0x230
[   16.721260]  kunit_try_run_case+0x1a5/0x480
[   16.721288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.721313]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.721339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.721365]  ? __kthread_parkme+0x82/0x180
[   16.721388]  ? preempt_count_sub+0x50/0x80
[   16.721412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.721438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.721464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.721492]  kthread+0x337/0x6f0
[   16.721513]  ? trace_preempt_on+0x20/0xc0
[   16.721537]  ? __pfx_kthread+0x10/0x10
[   16.721559]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.721582]  ? calculate_sigpending+0x7b/0xa0
[   16.721608]  ? __pfx_kthread+0x10/0x10
[   16.721631]  ret_from_fork+0x116/0x1d0
[   16.721683]  ? __pfx_kthread+0x10/0x10
[   16.721721]  ret_from_fork_asm+0x1a/0x30
[   16.721765]  </TASK>
[   16.721777] 
[   16.736137] Allocated by task 299:
[   16.736465]  kasan_save_stack+0x45/0x70
[   16.736822]  kasan_save_track+0x18/0x40
[   16.737041]  kasan_save_alloc_info+0x3b/0x50
[   16.737273]  __kasan_kmalloc+0xb7/0xc0
[   16.737406]  __kmalloc_cache_noprof+0x189/0x420
[   16.737564]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.737797]  kunit_try_run_case+0x1a5/0x480
[   16.738057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.738441]  kthread+0x337/0x6f0
[   16.738762]  ret_from_fork+0x116/0x1d0
[   16.738931]  ret_from_fork_asm+0x1a/0x30
[   16.739076] 
[   16.739149] The buggy address belongs to the object at ffff888102b92f00
[   16.739149]  which belongs to the cache kmalloc-128 of size 128
[   16.739630] The buggy address is located 0 bytes to the right of
[   16.739630]  allocated 120-byte region [ffff888102b92f00, ffff888102b92f78)
[   16.740144] 
[   16.740219] The buggy address belongs to the physical page:
[   16.740391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b92
[   16.741042] flags: 0x200000000000000(node=0|zone=2)
[   16.741307] page_type: f5(slab)
[   16.741473] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.741885] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.742148] page dumped because: kasan: bad access detected
[   16.742461] 
[   16.742579] Memory state around the buggy address:
[   16.742985]  ffff888102b92e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.743319]  ffff888102b92e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.743532] >ffff888102b92f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.744009]                                                                 ^
[   16.744295]  ffff888102b92f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.744557]  ffff888102b93000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.744999] ==================================================================
[   16.745449] ==================================================================
[   16.745808] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   16.746230] Write of size 8 at addr ffff888102b92f78 by task kunit_try_catch/299
[   16.746570] 
[   16.746657] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.746707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.746720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.746741] Call Trace:
[   16.746764]  <TASK>
[   16.746781]  dump_stack_lvl+0x73/0xb0
[   16.746810]  print_report+0xd1/0x650
[   16.746834]  ? __virt_addr_valid+0x1db/0x2d0
[   16.746857]  ? copy_to_kernel_nofault+0x99/0x260
[   16.746883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.746907]  ? copy_to_kernel_nofault+0x99/0x260
[   16.746932]  kasan_report+0x141/0x180
[   16.746955]  ? copy_to_kernel_nofault+0x99/0x260
[   16.746985]  kasan_check_range+0x10c/0x1c0
[   16.747018]  __kasan_check_write+0x18/0x20
[   16.747039]  copy_to_kernel_nofault+0x99/0x260
[   16.747065]  copy_to_kernel_nofault_oob+0x288/0x560
[   16.747091]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.747116]  ? finish_task_switch.isra.0+0x153/0x700
[   16.747151]  ? __schedule+0x10cc/0x2b60
[   16.747173]  ? trace_hardirqs_on+0x37/0xe0
[   16.747217]  ? __pfx_read_tsc+0x10/0x10
[   16.747238]  ? ktime_get_ts64+0x86/0x230
[   16.747262]  kunit_try_run_case+0x1a5/0x480
[   16.747287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.747312]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.747337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.747372]  ? __kthread_parkme+0x82/0x180
[   16.747393]  ? preempt_count_sub+0x50/0x80
[   16.747418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.747455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.747481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.747509]  kthread+0x337/0x6f0
[   16.747529]  ? trace_preempt_on+0x20/0xc0
[   16.747552]  ? __pfx_kthread+0x10/0x10
[   16.747574]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.747597]  ? calculate_sigpending+0x7b/0xa0
[   16.747622]  ? __pfx_kthread+0x10/0x10
[   16.747658]  ret_from_fork+0x116/0x1d0
[   16.747678]  ? __pfx_kthread+0x10/0x10
[   16.747699]  ret_from_fork_asm+0x1a/0x30
[   16.747731]  </TASK>
[   16.747741] 
[   16.758379] Allocated by task 299:
[   16.758518]  kasan_save_stack+0x45/0x70
[   16.758844]  kasan_save_track+0x18/0x40
[   16.759229]  kasan_save_alloc_info+0x3b/0x50
[   16.759766]  __kasan_kmalloc+0xb7/0xc0
[   16.760137]  __kmalloc_cache_noprof+0x189/0x420
[   16.760555]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.761077]  kunit_try_run_case+0x1a5/0x480
[   16.761232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.761403]  kthread+0x337/0x6f0
[   16.761521]  ret_from_fork+0x116/0x1d0
[   16.761769]  ret_from_fork_asm+0x1a/0x30
[   16.762151] 
[   16.762313] The buggy address belongs to the object at ffff888102b92f00
[   16.762313]  which belongs to the cache kmalloc-128 of size 128
[   16.763711] The buggy address is located 0 bytes to the right of
[   16.763711]  allocated 120-byte region [ffff888102b92f00, ffff888102b92f78)
[   16.764816] 
[   16.764892] The buggy address belongs to the physical page:
[   16.765062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b92
[   16.765295] flags: 0x200000000000000(node=0|zone=2)
[   16.765454] page_type: f5(slab)
[   16.765571] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.766244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.767015] page dumped because: kasan: bad access detected
[   16.767507] 
[   16.767738] Memory state around the buggy address:
[   16.768182]  ffff888102b92e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.769028]  ffff888102b92e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.769766] >ffff888102b92f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.770144]                                                                 ^
[   16.770353]  ffff888102b92f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.770566]  ffff888102b93000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.771181] ==================================================================