Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.225252] ==================================================================
[   22.225483] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   22.225554] Read of size 8 at addr fff00000c63b9278 by task kunit_try_catch/281
[   22.225684] 
[   22.225726] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.226003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.226177] Hardware name: linux,dummy-virt (DT)
[   22.226233] Call trace:
[   22.226362]  show_stack+0x20/0x38 (C)
[   22.226423]  dump_stack_lvl+0x8c/0xd0
[   22.226519]  print_report+0x118/0x608
[   22.226572]  kasan_report+0xdc/0x128
[   22.226657]  __asan_report_load8_noabort+0x20/0x30
[   22.227137]  copy_to_kernel_nofault+0x204/0x250
[   22.227420]  copy_to_kernel_nofault_oob+0x158/0x418
[   22.227540]  kunit_try_run_case+0x170/0x3f0
[   22.227703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.227893]  kthread+0x328/0x630
[   22.227977]  ret_from_fork+0x10/0x20
[   22.228028] 
[   22.228268] Allocated by task 281:
[   22.228445]  kasan_save_stack+0x3c/0x68
[   22.228646]  kasan_save_track+0x20/0x40
[   22.228805]  kasan_save_alloc_info+0x40/0x58
[   22.229004]  __kasan_kmalloc+0xd4/0xd8
[   22.229074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.229459]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.229689]  kunit_try_run_case+0x170/0x3f0
[   22.230045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.230107]  kthread+0x328/0x630
[   22.230458]  ret_from_fork+0x10/0x20
[   22.230594] 
[   22.230712] The buggy address belongs to the object at fff00000c63b9200
[   22.230712]  which belongs to the cache kmalloc-128 of size 128
[   22.231026] The buggy address is located 0 bytes to the right of
[   22.231026]  allocated 120-byte region [fff00000c63b9200, fff00000c63b9278)
[   22.231348] 
[   22.231408] The buggy address belongs to the physical page:
[   22.231523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.231645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.231724] page_type: f5(slab)
[   22.232234] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.232325] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.232434] page dumped because: kasan: bad access detected
[   22.232614] 
[   22.232729] Memory state around the buggy address:
[   22.232767]  fff00000c63b9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.232838]  fff00000c63b9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.233254] >fff00000c63b9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.233494]                                                                 ^
[   22.233572]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.233635]  fff00000c63b9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.233677] ==================================================================
[   22.235519] ==================================================================
[   22.235745] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   22.235835] Write of size 8 at addr fff00000c63b9278 by task kunit_try_catch/281
[   22.236003] 
[   22.236177] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.236295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.236332] Hardware name: linux,dummy-virt (DT)
[   22.236382] Call trace:
[   22.236769]  show_stack+0x20/0x38 (C)
[   22.236908]  dump_stack_lvl+0x8c/0xd0
[   22.237053]  print_report+0x118/0x608
[   22.237211]  kasan_report+0xdc/0x128
[   22.237327]  kasan_check_range+0x100/0x1a8
[   22.237667]  __kasan_check_write+0x20/0x30
[   22.237839]  copy_to_kernel_nofault+0x8c/0x250
[   22.238381]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   22.238825]  kunit_try_run_case+0x170/0x3f0
[   22.238944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.239034]  kthread+0x328/0x630
[   22.239117]  ret_from_fork+0x10/0x20
[   22.239507] 
[   22.239765] Allocated by task 281:
[   22.239942]  kasan_save_stack+0x3c/0x68
[   22.240022]  kasan_save_track+0x20/0x40
[   22.240061]  kasan_save_alloc_info+0x40/0x58
[   22.240111]  __kasan_kmalloc+0xd4/0xd8
[   22.240352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.240417]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.240603]  kunit_try_run_case+0x170/0x3f0
[   22.240916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.241037]  kthread+0x328/0x630
[   22.241147]  ret_from_fork+0x10/0x20
[   22.241210] 
[   22.241267] The buggy address belongs to the object at fff00000c63b9200
[   22.241267]  which belongs to the cache kmalloc-128 of size 128
[   22.241350] The buggy address is located 0 bytes to the right of
[   22.241350]  allocated 120-byte region [fff00000c63b9200, fff00000c63b9278)
[   22.241418] 
[   22.241439] The buggy address belongs to the physical page:
[   22.241482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b9
[   22.241553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.241611] page_type: f5(slab)
[   22.241652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.241705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.241758] page dumped because: kasan: bad access detected
[   22.241801] 
[   22.241820] Memory state around the buggy address:
[   22.241862]  fff00000c63b9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.241909]  fff00000c63b9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.241953] >fff00000c63b9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.241995]                                                                 ^
[   22.242037]  fff00000c63b9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.242082]  fff00000c63b9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.242131] ==================================================================

[   16.386563] ==================================================================
[   16.387236] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   16.387623] Read of size 8 at addr ffff888102675b78 by task kunit_try_catch/299
[   16.388014] 
[   16.388119] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.388172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.388186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.388210] Call Trace:
[   16.388224]  <TASK>
[   16.388245]  dump_stack_lvl+0x73/0xb0
[   16.388280]  print_report+0xd1/0x650
[   16.388306]  ? __virt_addr_valid+0x1db/0x2d0
[   16.388333]  ? copy_to_kernel_nofault+0x225/0x260
[   16.388370]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.388396]  ? copy_to_kernel_nofault+0x225/0x260
[   16.388421]  kasan_report+0x141/0x180
[   16.388444]  ? copy_to_kernel_nofault+0x225/0x260
[   16.388474]  __asan_report_load8_noabort+0x18/0x20
[   16.388501]  copy_to_kernel_nofault+0x225/0x260
[   16.388528]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   16.388554]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.388579]  ? finish_task_switch.isra.0+0x153/0x700
[   16.388616]  ? __schedule+0x10cc/0x2b60
[   16.388639]  ? trace_hardirqs_on+0x37/0xe0
[   16.388674]  ? __pfx_read_tsc+0x10/0x10
[   16.388698]  ? ktime_get_ts64+0x86/0x230
[   16.388725]  kunit_try_run_case+0x1a5/0x480
[   16.388753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.388778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.388804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.388829]  ? __kthread_parkme+0x82/0x180
[   16.388852]  ? preempt_count_sub+0x50/0x80
[   16.388877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.388903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.388940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.388966]  kthread+0x337/0x6f0
[   16.388987]  ? trace_preempt_on+0x20/0xc0
[   16.389011]  ? __pfx_kthread+0x10/0x10
[   16.389032]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.389056]  ? calculate_sigpending+0x7b/0xa0
[   16.389082]  ? __pfx_kthread+0x10/0x10
[   16.389105]  ret_from_fork+0x116/0x1d0
[   16.389124]  ? __pfx_kthread+0x10/0x10
[   16.389146]  ret_from_fork_asm+0x1a/0x30
[   16.389181]  </TASK>
[   16.389193] 
[   16.396866] Allocated by task 299:
[   16.396995]  kasan_save_stack+0x45/0x70
[   16.397325]  kasan_save_track+0x18/0x40
[   16.397535]  kasan_save_alloc_info+0x3b/0x50
[   16.397750]  __kasan_kmalloc+0xb7/0xc0
[   16.397884]  __kmalloc_cache_noprof+0x189/0x420
[   16.398111]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.398356]  kunit_try_run_case+0x1a5/0x480
[   16.398561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398818]  kthread+0x337/0x6f0
[   16.398942]  ret_from_fork+0x116/0x1d0
[   16.399116]  ret_from_fork_asm+0x1a/0x30
[   16.399444] 
[   16.399598] The buggy address belongs to the object at ffff888102675b00
[   16.399598]  which belongs to the cache kmalloc-128 of size 128
[   16.400131] The buggy address is located 0 bytes to the right of
[   16.400131]  allocated 120-byte region [ffff888102675b00, ffff888102675b78)
[   16.400575] 
[   16.400691] The buggy address belongs to the physical page:
[   16.400945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102675
[   16.401514] flags: 0x200000000000000(node=0|zone=2)
[   16.401753] page_type: f5(slab)
[   16.401908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.402272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.402619] page dumped because: kasan: bad access detected
[   16.402793] 
[   16.402877] Memory state around the buggy address:
[   16.403249]  ffff888102675a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.403609]  ffff888102675a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.403824] >ffff888102675b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.404036]                                                                 ^
[   16.404247]  ffff888102675b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.404697]  ffff888102675c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.405016] ==================================================================
[   16.405904] ==================================================================
[   16.406540] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   16.406864] Write of size 8 at addr ffff888102675b78 by task kunit_try_catch/299
[   16.407088] 
[   16.407174] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.407215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.407227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.407248] Call Trace:
[   16.407261]  <TASK>
[   16.407276]  dump_stack_lvl+0x73/0xb0
[   16.407306]  print_report+0xd1/0x650
[   16.407330]  ? __virt_addr_valid+0x1db/0x2d0
[   16.407355]  ? copy_to_kernel_nofault+0x99/0x260
[   16.407381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.407406]  ? copy_to_kernel_nofault+0x99/0x260
[   16.407431]  kasan_report+0x141/0x180
[   16.407454]  ? copy_to_kernel_nofault+0x99/0x260
[   16.407483]  kasan_check_range+0x10c/0x1c0
[   16.407508]  __kasan_check_write+0x18/0x20
[   16.407529]  copy_to_kernel_nofault+0x99/0x260
[   16.407555]  copy_to_kernel_nofault_oob+0x288/0x560
[   16.407581]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.407619]  ? finish_task_switch.isra.0+0x153/0x700
[   16.407645]  ? __schedule+0x10cc/0x2b60
[   16.407667]  ? trace_hardirqs_on+0x37/0xe0
[   16.407701]  ? __pfx_read_tsc+0x10/0x10
[   16.407724]  ? ktime_get_ts64+0x86/0x230
[   16.407750]  kunit_try_run_case+0x1a5/0x480
[   16.407776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.407801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.407826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.407852]  ? __kthread_parkme+0x82/0x180
[   16.407874]  ? preempt_count_sub+0x50/0x80
[   16.407898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.407924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.407961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.407988]  kthread+0x337/0x6f0
[   16.408017]  ? trace_preempt_on+0x20/0xc0
[   16.408041]  ? __pfx_kthread+0x10/0x10
[   16.408062]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.408086]  ? calculate_sigpending+0x7b/0xa0
[   16.408111]  ? __pfx_kthread+0x10/0x10
[   16.408134]  ret_from_fork+0x116/0x1d0
[   16.408154]  ? __pfx_kthread+0x10/0x10
[   16.408176]  ret_from_fork_asm+0x1a/0x30
[   16.408208]  </TASK>
[   16.408220] 
[   16.416825] Allocated by task 299:
[   16.416963]  kasan_save_stack+0x45/0x70
[   16.417196]  kasan_save_track+0x18/0x40
[   16.417387]  kasan_save_alloc_info+0x3b/0x50
[   16.417669]  __kasan_kmalloc+0xb7/0xc0
[   16.417920]  __kmalloc_cache_noprof+0x189/0x420
[   16.418155]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.418332]  kunit_try_run_case+0x1a5/0x480
[   16.418486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.418898]  kthread+0x337/0x6f0
[   16.419025]  ret_from_fork+0x116/0x1d0
[   16.419209]  ret_from_fork_asm+0x1a/0x30
[   16.419438] 
[   16.419562] The buggy address belongs to the object at ffff888102675b00
[   16.419562]  which belongs to the cache kmalloc-128 of size 128
[   16.420073] The buggy address is located 0 bytes to the right of
[   16.420073]  allocated 120-byte region [ffff888102675b00, ffff888102675b78)
[   16.420555] 
[   16.420641] The buggy address belongs to the physical page:
[   16.420855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102675
[   16.421300] flags: 0x200000000000000(node=0|zone=2)
[   16.421499] page_type: f5(slab)
[   16.421752] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.422059] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.422285] page dumped because: kasan: bad access detected
[   16.422454] 
[   16.422523] Memory state around the buggy address:
[   16.422687]  ffff888102675a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.422903]  ffff888102675a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.423117] >ffff888102675b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.423487]                                                                 ^
[   16.423960]  ffff888102675b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.424274]  ffff888102675c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.424709] ==================================================================