Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.575330] ==================================================================
[   19.575408] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.575718] Read of size 8 at addr fff00000c7897a78 by task kunit_try_catch/281
[   19.575853] 
[   19.575898] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.576032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.576071] Hardware name: linux,dummy-virt (DT)
[   19.576138] Call trace:
[   19.576166]  show_stack+0x20/0x38 (C)
[   19.576472]  dump_stack_lvl+0x8c/0xd0
[   19.576625]  print_report+0x118/0x5d0
[   19.576736]  kasan_report+0xdc/0x128
[   19.576905]  __asan_report_load8_noabort+0x20/0x30
[   19.576975]  copy_to_kernel_nofault+0x204/0x250
[   19.577091]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.577250]  kunit_try_run_case+0x170/0x3f0
[   19.577327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577612]  kthread+0x328/0x630
[   19.577855]  ret_from_fork+0x10/0x20
[   19.577929] 
[   19.577954] Allocated by task 281:
[   19.578374]  kasan_save_stack+0x3c/0x68
[   19.578437]  kasan_save_track+0x20/0x40
[   19.578546]  kasan_save_alloc_info+0x40/0x58
[   19.578644]  __kasan_kmalloc+0xd4/0xd8
[   19.578796]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.578890]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.579026]  kunit_try_run_case+0x170/0x3f0
[   19.579117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.579295]  kthread+0x328/0x630
[   19.579594]  ret_from_fork+0x10/0x20
[   19.579730] 
[   19.579766] The buggy address belongs to the object at fff00000c7897a00
[   19.579766]  which belongs to the cache kmalloc-128 of size 128
[   19.579832] The buggy address is located 0 bytes to the right of
[   19.579832]  allocated 120-byte region [fff00000c7897a00, fff00000c7897a78)
[   19.579909] 
[   19.579932] The buggy address belongs to the physical page:
[   19.580082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.580150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.580309] page_type: f5(slab)
[   19.580465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.580591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.580708] page dumped because: kasan: bad access detected
[   19.580788] 
[   19.580925] Memory state around the buggy address:
[   19.581026]  fff00000c7897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.581392]  fff00000c7897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.581551] >fff00000c7897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.581658]                                                                 ^
[   19.581760]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.581810]  fff00000c7897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.581853] ==================================================================
[   19.583251] ==================================================================
[   19.583410] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.583477] Write of size 8 at addr fff00000c7897a78 by task kunit_try_catch/281
[   19.583555] 
[   19.583613] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.583828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.583879] Hardware name: linux,dummy-virt (DT)
[   19.583977] Call trace:
[   19.584057]  show_stack+0x20/0x38 (C)
[   19.584122]  dump_stack_lvl+0x8c/0xd0
[   19.584433]  print_report+0x118/0x5d0
[   19.584622]  kasan_report+0xdc/0x128
[   19.584676]  kasan_check_range+0x100/0x1a8
[   19.584736]  __kasan_check_write+0x20/0x30
[   19.584782]  copy_to_kernel_nofault+0x8c/0x250
[   19.584831]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.584882]  kunit_try_run_case+0x170/0x3f0
[   19.584974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.585048]  kthread+0x328/0x630
[   19.585092]  ret_from_fork+0x10/0x20
[   19.585164] 
[   19.585194] Allocated by task 281:
[   19.585224]  kasan_save_stack+0x3c/0x68
[   19.585271]  kasan_save_track+0x20/0x40
[   19.585324]  kasan_save_alloc_info+0x40/0x58
[   19.585376]  __kasan_kmalloc+0xd4/0xd8
[   19.585416]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.585465]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.585507]  kunit_try_run_case+0x170/0x3f0
[   19.585548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.585604]  kthread+0x328/0x630
[   19.585639]  ret_from_fork+0x10/0x20
[   19.585677] 
[   19.585706] The buggy address belongs to the object at fff00000c7897a00
[   19.585706]  which belongs to the cache kmalloc-128 of size 128
[   19.585777] The buggy address is located 0 bytes to the right of
[   19.585777]  allocated 120-byte region [fff00000c7897a00, fff00000c7897a78)
[   19.585860] 
[   19.585890] The buggy address belongs to the physical page:
[   19.585928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   19.586018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.586070] page_type: f5(slab)
[   19.586110] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.586182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.586795] page dumped because: kasan: bad access detected
[   19.586835] 
[   19.586856] Memory state around the buggy address:
[   19.586891]  fff00000c7897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.587154]  fff00000c7897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.587565] >fff00000c7897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.587648]                                                                 ^
[   19.587794]  fff00000c7897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.587898]  fff00000c7897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.588074] ==================================================================

[   16.740586] ==================================================================
[   16.741685] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   16.742257] Read of size 8 at addr ffff888103a67478 by task kunit_try_catch/298
[   16.742896] 
[   16.743160] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.743207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.743220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.743243] Call Trace:
[   16.743257]  <TASK>
[   16.743284]  dump_stack_lvl+0x73/0xb0
[   16.743317]  print_report+0xd1/0x610
[   16.743376]  ? __virt_addr_valid+0x1db/0x2d0
[   16.743401]  ? copy_to_kernel_nofault+0x225/0x260
[   16.743438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.743464]  ? copy_to_kernel_nofault+0x225/0x260
[   16.743489]  kasan_report+0x141/0x180
[   16.743512]  ? copy_to_kernel_nofault+0x225/0x260
[   16.743542]  __asan_report_load8_noabort+0x18/0x20
[   16.743569]  copy_to_kernel_nofault+0x225/0x260
[   16.743595]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   16.743622]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.743648]  ? finish_task_switch.isra.0+0x153/0x700
[   16.743674]  ? __schedule+0x10cc/0x2b60
[   16.743697]  ? trace_hardirqs_on+0x37/0xe0
[   16.743730]  ? __pfx_read_tsc+0x10/0x10
[   16.743752]  ? ktime_get_ts64+0x86/0x230
[   16.743778]  kunit_try_run_case+0x1a5/0x480
[   16.743805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.743829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.743855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.743880]  ? __kthread_parkme+0x82/0x180
[   16.743903]  ? preempt_count_sub+0x50/0x80
[   16.743927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.743953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.743979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.744066]  kthread+0x337/0x6f0
[   16.744087]  ? trace_preempt_on+0x20/0xc0
[   16.744112]  ? __pfx_kthread+0x10/0x10
[   16.744133]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.744157]  ? calculate_sigpending+0x7b/0xa0
[   16.744183]  ? __pfx_kthread+0x10/0x10
[   16.744206]  ret_from_fork+0x116/0x1d0
[   16.744226]  ? __pfx_kthread+0x10/0x10
[   16.744247]  ret_from_fork_asm+0x1a/0x30
[   16.744291]  </TASK>
[   16.744303] 
[   16.758775] Allocated by task 298:
[   16.759074]  kasan_save_stack+0x45/0x70
[   16.759465]  kasan_save_track+0x18/0x40
[   16.759605]  kasan_save_alloc_info+0x3b/0x50
[   16.759753]  __kasan_kmalloc+0xb7/0xc0
[   16.759885]  __kmalloc_cache_noprof+0x189/0x420
[   16.760077]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.760299]  kunit_try_run_case+0x1a5/0x480
[   16.760525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.760779]  kthread+0x337/0x6f0
[   16.760911]  ret_from_fork+0x116/0x1d0
[   16.761067]  ret_from_fork_asm+0x1a/0x30
[   16.761276] 
[   16.761374] The buggy address belongs to the object at ffff888103a67400
[   16.761374]  which belongs to the cache kmalloc-128 of size 128
[   16.761793] The buggy address is located 0 bytes to the right of
[   16.761793]  allocated 120-byte region [ffff888103a67400, ffff888103a67478)
[   16.762405] 
[   16.762521] The buggy address belongs to the physical page:
[   16.762773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a67
[   16.763234] flags: 0x200000000000000(node=0|zone=2)
[   16.763430] page_type: f5(slab)
[   16.763551] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.763883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.764284] page dumped because: kasan: bad access detected
[   16.764462] 
[   16.764557] Memory state around the buggy address:
[   16.764808]  ffff888103a67300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.765259]  ffff888103a67380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.765597] >ffff888103a67400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.765893]                                                                 ^
[   16.766291]  ffff888103a67480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.766610]  ffff888103a67500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.766921] ==================================================================
[   16.767742] ==================================================================
[   16.768172] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   16.768958] Write of size 8 at addr ffff888103a67478 by task kunit_try_catch/298
[   16.769526] 
[   16.769634] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.769689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.769711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.769733] Call Trace:
[   16.769746]  <TASK>
[   16.769761]  dump_stack_lvl+0x73/0xb0
[   16.769802]  print_report+0xd1/0x610
[   16.769826]  ? __virt_addr_valid+0x1db/0x2d0
[   16.769849]  ? copy_to_kernel_nofault+0x99/0x260
[   16.769875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.769900]  ? copy_to_kernel_nofault+0x99/0x260
[   16.769935]  kasan_report+0x141/0x180
[   16.769959]  ? copy_to_kernel_nofault+0x99/0x260
[   16.770023]  kasan_check_range+0x10c/0x1c0
[   16.770050]  __kasan_check_write+0x18/0x20
[   16.770071]  copy_to_kernel_nofault+0x99/0x260
[   16.770099]  copy_to_kernel_nofault_oob+0x288/0x560
[   16.770125]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.770150]  ? finish_task_switch.isra.0+0x153/0x700
[   16.770175]  ? __schedule+0x10cc/0x2b60
[   16.770198]  ? trace_hardirqs_on+0x37/0xe0
[   16.770230]  ? __pfx_read_tsc+0x10/0x10
[   16.770253]  ? ktime_get_ts64+0x86/0x230
[   16.770287]  kunit_try_run_case+0x1a5/0x480
[   16.770313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.770337]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.770410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.770461]  ? __kthread_parkme+0x82/0x180
[   16.770483]  ? preempt_count_sub+0x50/0x80
[   16.770507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.770534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.770569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.770596]  kthread+0x337/0x6f0
[   16.770617]  ? trace_preempt_on+0x20/0xc0
[   16.770651]  ? __pfx_kthread+0x10/0x10
[   16.770673]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.770695]  ? calculate_sigpending+0x7b/0xa0
[   16.770725]  ? __pfx_kthread+0x10/0x10
[   16.770747]  ret_from_fork+0x116/0x1d0
[   16.770767]  ? __pfx_kthread+0x10/0x10
[   16.770798]  ret_from_fork_asm+0x1a/0x30
[   16.770831]  </TASK>
[   16.770842] 
[   16.780869] Allocated by task 298:
[   16.781020]  kasan_save_stack+0x45/0x70
[   16.781172]  kasan_save_track+0x18/0x40
[   16.781320]  kasan_save_alloc_info+0x3b/0x50
[   16.781471]  __kasan_kmalloc+0xb7/0xc0
[   16.781605]  __kmalloc_cache_noprof+0x189/0x420
[   16.781764]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.781930]  kunit_try_run_case+0x1a5/0x480
[   16.782078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.782257]  kthread+0x337/0x6f0
[   16.784416]  ret_from_fork+0x116/0x1d0
[   16.785477]  ret_from_fork_asm+0x1a/0x30
[   16.786437] 
[   16.786551] The buggy address belongs to the object at ffff888103a67400
[   16.786551]  which belongs to the cache kmalloc-128 of size 128
[   16.787301] The buggy address is located 0 bytes to the right of
[   16.787301]  allocated 120-byte region [ffff888103a67400, ffff888103a67478)
[   16.788085] 
[   16.788287] The buggy address belongs to the physical page:
[   16.788517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a67
[   16.788878] flags: 0x200000000000000(node=0|zone=2)
[   16.789447] page_type: f5(slab)
[   16.789606] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.789970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.790685] page dumped because: kasan: bad access detected
[   16.791050] 
[   16.791148] Memory state around the buggy address:
[   16.791332]  ffff888103a67300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.791654]  ffff888103a67380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.791975] >ffff888103a67400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.792636]                                                                 ^
[   16.793155]  ffff888103a67480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793692]  ffff888103a67500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.794215] ==================================================================