Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   64.143983] ==================================================================
[   64.158190] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   64.165563] Read of size 8 at addr ffff000801adc978 by task kunit_try_catch/326
[   64.172854] 
[   64.174339] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   64.174398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.174416] Hardware name: WinLink E850-96 board (DT)
[   64.174438] Call trace:
[   64.174453]  show_stack+0x20/0x38 (C)
[   64.174491]  dump_stack_lvl+0x8c/0xd0
[   64.174524]  print_report+0x118/0x608
[   64.174556]  kasan_report+0xdc/0x128
[   64.174588]  __asan_report_load8_noabort+0x20/0x30
[   64.174627]  copy_to_kernel_nofault+0x204/0x250
[   64.174662]  copy_to_kernel_nofault_oob+0x158/0x418
[   64.174696]  kunit_try_run_case+0x170/0x3f0
[   64.174728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.174767]  kthread+0x328/0x630
[   64.174805]  ret_from_fork+0x10/0x20
[   64.174841] 
[   64.243599] Allocated by task 326:
[   64.246988]  kasan_save_stack+0x3c/0x68
[   64.250803]  kasan_save_track+0x20/0x40
[   64.254622]  kasan_save_alloc_info+0x40/0x58
[   64.258876]  __kasan_kmalloc+0xd4/0xd8
[   64.262609]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.267122]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.271897]  kunit_try_run_case+0x170/0x3f0
[   64.276062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.281532]  kthread+0x328/0x630
[   64.284743]  ret_from_fork+0x10/0x20
[   64.288303] 
[   64.289780] The buggy address belongs to the object at ffff000801adc900
[   64.289780]  which belongs to the cache kmalloc-128 of size 128
[   64.302281] The buggy address is located 0 bytes to the right of
[   64.302281]  allocated 120-byte region [ffff000801adc900, ffff000801adc978)
[   64.315212] 
[   64.316691] The buggy address belongs to the physical page:
[   64.322247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc
[   64.330230] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.337870] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.344813] page_type: f5(slab)
[   64.347952] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.355669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.363395] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.371207] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.379020] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff
[   64.386832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.394637] page dumped because: kasan: bad access detected
[   64.400193] 
[   64.401668] Memory state around the buggy address:
[   64.406452]  ffff000801adc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.413651]  ffff000801adc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.420857] >ffff000801adc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.428057]                                                                 ^
[   64.435179]  ffff000801adc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.442385]  ffff000801adca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.449586] ==================================================================
[   64.456927] ==================================================================
[   64.463998] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   64.471286] Write of size 8 at addr ffff000801adc978 by task kunit_try_catch/326
[   64.478664] 
[   64.480149] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   64.480209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.480227] Hardware name: WinLink E850-96 board (DT)
[   64.480247] Call trace:
[   64.480260]  show_stack+0x20/0x38 (C)
[   64.480296]  dump_stack_lvl+0x8c/0xd0
[   64.480330]  print_report+0x118/0x608
[   64.480367]  kasan_report+0xdc/0x128
[   64.480397]  kasan_check_range+0x100/0x1a8
[   64.480434]  __kasan_check_write+0x20/0x30
[   64.480468]  copy_to_kernel_nofault+0x8c/0x250
[   64.480502]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   64.480535]  kunit_try_run_case+0x170/0x3f0
[   64.480569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.480605]  kthread+0x328/0x630
[   64.480640]  ret_from_fork+0x10/0x20
[   64.480677] 
[   64.552709] Allocated by task 326:
[   64.556096]  kasan_save_stack+0x3c/0x68
[   64.559913]  kasan_save_track+0x20/0x40
[   64.563732]  kasan_save_alloc_info+0x40/0x58
[   64.567986]  __kasan_kmalloc+0xd4/0xd8
[   64.571720]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.576232]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.581006]  kunit_try_run_case+0x170/0x3f0
[   64.585173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.590642]  kthread+0x328/0x630
[   64.593853]  ret_from_fork+0x10/0x20
[   64.597412] 
[   64.598890] The buggy address belongs to the object at ffff000801adc900
[   64.598890]  which belongs to the cache kmalloc-128 of size 128
[   64.611390] The buggy address is located 0 bytes to the right of
[   64.611390]  allocated 120-byte region [ffff000801adc900, ffff000801adc978)
[   64.624321] 
[   64.625800] The buggy address belongs to the physical page:
[   64.631357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc
[   64.639340] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.646979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.653922] page_type: f5(slab)
[   64.657057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.664779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.672506] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.680317] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.688129] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff
[   64.695942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.703749] page dumped because: kasan: bad access detected
[   64.709303] 
[   64.710778] Memory state around the buggy address:
[   64.715558]  ffff000801adc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.722761]  ffff000801adc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.729968] >ffff000801adc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.737167]                                                                 ^
[   64.744289]  ffff000801adc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.751494]  ffff000801adca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.758695] ==================================================================