Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   64.456351] ==================================================================
[   64.463317] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   64.470602] Write of size 8 at addr ffff000805826578 by task kunit_try_catch/325
[   64.477980] 
[   64.479465] CPU: 2 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   64.479519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.479537] Hardware name: WinLink E850-96 board (DT)
[   64.479558] Call trace:
[   64.479572]  show_stack+0x20/0x38 (C)
[   64.479608]  dump_stack_lvl+0x8c/0xd0
[   64.479647]  print_report+0x118/0x608
[   64.479685]  kasan_report+0xdc/0x128
[   64.479716]  kasan_check_range+0x100/0x1a8
[   64.479753]  __kasan_check_write+0x20/0x30
[   64.479783]  copy_to_kernel_nofault+0x8c/0x250
[   64.479822]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   64.479854]  kunit_try_run_case+0x170/0x3f0
[   64.479891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.479930]  kthread+0x328/0x630
[   64.479959]  ret_from_fork+0x10/0x20
[   64.479994] 
[   64.551677] Allocated by task 325:
[   64.555066]  kasan_save_stack+0x3c/0x68
[   64.558882]  kasan_save_track+0x20/0x40
[   64.562701]  kasan_save_alloc_info+0x40/0x58
[   64.566955]  __kasan_kmalloc+0xd4/0xd8
[   64.570687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.575201]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.579975]  kunit_try_run_case+0x170/0x3f0
[   64.584142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.589612]  kthread+0x328/0x630
[   64.592822]  ret_from_fork+0x10/0x20
[   64.596381] 
[   64.597858] The buggy address belongs to the object at ffff000805826500
[   64.597858]  which belongs to the cache kmalloc-128 of size 128
[   64.610358] The buggy address is located 0 bytes to the right of
[   64.610358]  allocated 120-byte region [ffff000805826500, ffff000805826578)
[   64.623290] 
[   64.624769] The buggy address belongs to the physical page:
[   64.630324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826
[   64.638309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.645947] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.652890] page_type: f5(slab)
[   64.656025] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.663748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.671474] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.679285] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.687098] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff
[   64.694910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.702716] page dumped because: kasan: bad access detected
[   64.708273] 
[   64.709747] Memory state around the buggy address:
[   64.714530]  ffff000805826400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.721730]  ffff000805826480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.728935] >ffff000805826500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.736136]                                                                 ^
[   64.743257]  ffff000805826580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.750462]  ffff000805826600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.757663] ==================================================================
[   64.143682] ==================================================================
[   64.157853] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   64.165225] Read of size 8 at addr ffff000805826578 by task kunit_try_catch/325
[   64.172516] 
[   64.174002] CPU: 2 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   64.174060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.174079] Hardware name: WinLink E850-96 board (DT)
[   64.174102] Call trace:
[   64.174117]  show_stack+0x20/0x38 (C)
[   64.174157]  dump_stack_lvl+0x8c/0xd0
[   64.174200]  print_report+0x118/0x608
[   64.174238]  kasan_report+0xdc/0x128
[   64.174272]  __asan_report_load8_noabort+0x20/0x30
[   64.174308]  copy_to_kernel_nofault+0x204/0x250
[   64.174346]  copy_to_kernel_nofault_oob+0x158/0x418
[   64.174380]  kunit_try_run_case+0x170/0x3f0
[   64.174420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.174461]  kthread+0x328/0x630
[   64.174493]  ret_from_fork+0x10/0x20
[   64.174531] 
[   64.242914] Allocated by task 325:
[   64.246302]  kasan_save_stack+0x3c/0x68
[   64.250119]  kasan_save_track+0x20/0x40
[   64.253938]  kasan_save_alloc_info+0x40/0x58
[   64.258192]  __kasan_kmalloc+0xd4/0xd8
[   64.261924]  __kmalloc_cache_noprof+0x15c/0x3c0
[   64.266438]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.271212]  kunit_try_run_case+0x170/0x3f0
[   64.275379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.280849]  kthread+0x328/0x630
[   64.284059]  ret_from_fork+0x10/0x20
[   64.287618] 
[   64.289097] The buggy address belongs to the object at ffff000805826500
[   64.289097]  which belongs to the cache kmalloc-128 of size 128
[   64.301597] The buggy address is located 0 bytes to the right of
[   64.301597]  allocated 120-byte region [ffff000805826500, ffff000805826578)
[   64.314527] 
[   64.316006] The buggy address belongs to the physical page:
[   64.321564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826
[   64.329548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.337186] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.344129] page_type: f5(slab)
[   64.347267] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.354985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.362713] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.370523] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.378336] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff
[   64.386148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.393954] page dumped because: kasan: bad access detected
[   64.399510] 
[   64.400984] Memory state around the buggy address:
[   64.405769]  ffff000805826400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.412967]  ffff000805826480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.420173] >ffff000805826500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.427373]                                                                 ^
[   64.434494]  ffff000805826580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.441700]  ffff000805826600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.448902] ==================================================================

[   29.861880] ==================================================================
[   29.862033] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   29.862188] Read of size 8 at addr fff00000c56e8e78 by task kunit_try_catch/282
[   29.862312] 
[   29.865878] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.866835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.866905] Hardware name: linux,dummy-virt (DT)
[   29.868173] Call trace:
[   29.868273]  show_stack+0x20/0x38 (C)
[   29.868540]  dump_stack_lvl+0x8c/0xd0
[   29.868671]  print_report+0x118/0x608
[   29.870586]  kasan_report+0xdc/0x128
[   29.870867]  __asan_report_load8_noabort+0x20/0x30
[   29.871215]  copy_to_kernel_nofault+0x204/0x250
[   29.871380]  copy_to_kernel_nofault_oob+0x158/0x418
[   29.871662]  kunit_try_run_case+0x170/0x3f0
[   29.871826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.871957]  kthread+0x328/0x630
[   29.872120]  ret_from_fork+0x10/0x20
[   29.872286] 
[   29.872452] Allocated by task 282:
[   29.872667]  kasan_save_stack+0x3c/0x68
[   29.872798]  kasan_save_track+0x20/0x40
[   29.872900]  kasan_save_alloc_info+0x40/0x58
[   29.872997]  __kasan_kmalloc+0xd4/0xd8
[   29.873142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.873271]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.873382]  kunit_try_run_case+0x170/0x3f0
[   29.873514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.873758]  kthread+0x328/0x630
[   29.873870]  ret_from_fork+0x10/0x20
[   29.873981] 
[   29.874045] The buggy address belongs to the object at fff00000c56e8e00
[   29.874045]  which belongs to the cache kmalloc-128 of size 128
[   29.874205] The buggy address is located 0 bytes to the right of
[   29.874205]  allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78)
[   29.874380] 
[   29.874598] The buggy address belongs to the physical page:
[   29.874806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   29.874969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.875115] page_type: f5(slab)
[   29.875300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.875444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.875822] page dumped because: kasan: bad access detected
[   29.876039] 
[   29.876136] Memory state around the buggy address:
[   29.876368]  fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.876482]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.876591] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.876701]                                                                 ^
[   29.876810]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.876918]  fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.877077] ==================================================================
[   29.879375] ==================================================================
[   29.879529] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   29.879660] Write of size 8 at addr fff00000c56e8e78 by task kunit_try_catch/282
[   29.879826] 
[   29.880058] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.880182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.880228] Hardware name: linux,dummy-virt (DT)
[   29.880363] Call trace:
[   29.880497]  show_stack+0x20/0x38 (C)
[   29.880731]  dump_stack_lvl+0x8c/0xd0
[   29.881111]  print_report+0x118/0x608
[   29.881401]  kasan_report+0xdc/0x128
[   29.881587]  kasan_check_range+0x100/0x1a8
[   29.881728]  __kasan_check_write+0x20/0x30
[   29.881849]  copy_to_kernel_nofault+0x8c/0x250
[   29.881973]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   29.882105]  kunit_try_run_case+0x170/0x3f0
[   29.882228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.882361]  kthread+0x328/0x630
[   29.882474]  ret_from_fork+0x10/0x20
[   29.882599] 
[   29.882731] Allocated by task 282:
[   29.882828]  kasan_save_stack+0x3c/0x68
[   29.882949]  kasan_save_track+0x20/0x40
[   29.883072]  kasan_save_alloc_info+0x40/0x58
[   29.883400]  __kasan_kmalloc+0xd4/0xd8
[   29.883525]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.883653]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.883791]  kunit_try_run_case+0x170/0x3f0
[   29.883912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.884086]  kthread+0x328/0x630
[   29.884192]  ret_from_fork+0x10/0x20
[   29.884360] 
[   29.884429] The buggy address belongs to the object at fff00000c56e8e00
[   29.884429]  which belongs to the cache kmalloc-128 of size 128
[   29.884605] The buggy address is located 0 bytes to the right of
[   29.884605]  allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78)
[   29.884896] 
[   29.884958] The buggy address belongs to the physical page:
[   29.885053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   29.885189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.885398] page_type: f5(slab)
[   29.885700] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.886037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.886179] page dumped because: kasan: bad access detected
[   29.886302] 
[   29.886358] Memory state around the buggy address:
[   29.886452]  fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.886583]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.886931] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.887025]                                                                 ^
[   29.887256]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.887754]  fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.887876] ==================================================================

[   25.495695] ==================================================================
[   25.497421] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   25.498131] Write of size 8 at addr ffff888102b56b78 by task kunit_try_catch/298
[   25.499733] 
[   25.500022] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.500148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.500181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.500274] Call Trace:
[   25.500322]  <TASK>
[   25.500358]  dump_stack_lvl+0x73/0xb0
[   25.500401]  print_report+0xd1/0x650
[   25.500437]  ? __virt_addr_valid+0x1db/0x2d0
[   25.500474]  ? copy_to_kernel_nofault+0x99/0x260
[   25.500511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.500547]  ? copy_to_kernel_nofault+0x99/0x260
[   25.500611]  kasan_report+0x141/0x180
[   25.500649]  ? copy_to_kernel_nofault+0x99/0x260
[   25.500692]  kasan_check_range+0x10c/0x1c0
[   25.500729]  __kasan_check_write+0x18/0x20
[   25.500758]  copy_to_kernel_nofault+0x99/0x260
[   25.500796]  copy_to_kernel_nofault_oob+0x288/0x560
[   25.500860]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   25.500944]  ? finish_task_switch.isra.0+0x153/0x700
[   25.501025]  ? __schedule+0x10cc/0x2b60
[   25.501106]  ? trace_hardirqs_on+0x37/0xe0
[   25.501171]  ? __pfx_read_tsc+0x10/0x10
[   25.501423]  ? ktime_get_ts64+0x86/0x230
[   25.501465]  kunit_try_run_case+0x1a5/0x480
[   25.501500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.501530]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.501608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.501651]  ? __kthread_parkme+0x82/0x180
[   25.501681]  ? preempt_count_sub+0x50/0x80
[   25.501717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.501749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.501785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.501822]  kthread+0x337/0x6f0
[   25.501884]  ? trace_preempt_on+0x20/0xc0
[   25.501920]  ? __pfx_kthread+0x10/0x10
[   25.501951]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.501986]  ? calculate_sigpending+0x7b/0xa0
[   25.502025]  ? __pfx_kthread+0x10/0x10
[   25.502056]  ret_from_fork+0x116/0x1d0
[   25.502084]  ? __pfx_kthread+0x10/0x10
[   25.502114]  ret_from_fork_asm+0x1a/0x30
[   25.502157]  </TASK>
[   25.502188] 
[   25.525794] Allocated by task 298:
[   25.526463]  kasan_save_stack+0x45/0x70
[   25.527105]  kasan_save_track+0x18/0x40
[   25.527603]  kasan_save_alloc_info+0x3b/0x50
[   25.527967]  __kasan_kmalloc+0xb7/0xc0
[   25.528977]  __kmalloc_cache_noprof+0x189/0x420
[   25.529598]  copy_to_kernel_nofault_oob+0x12f/0x560
[   25.530326]  kunit_try_run_case+0x1a5/0x480
[   25.530678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.531151]  kthread+0x337/0x6f0
[   25.531597]  ret_from_fork+0x116/0x1d0
[   25.532471]  ret_from_fork_asm+0x1a/0x30
[   25.533072] 
[   25.533707] The buggy address belongs to the object at ffff888102b56b00
[   25.533707]  which belongs to the cache kmalloc-128 of size 128
[   25.534607] The buggy address is located 0 bytes to the right of
[   25.534607]  allocated 120-byte region [ffff888102b56b00, ffff888102b56b78)
[   25.536487] 
[   25.536698] The buggy address belongs to the physical page:
[   25.537817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   25.538591] flags: 0x200000000000000(node=0|zone=2)
[   25.539043] page_type: f5(slab)
[   25.540006] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.540920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.541948] page dumped because: kasan: bad access detected
[   25.542779] 
[   25.542965] Memory state around the buggy address:
[   25.543275]  ffff888102b56a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.546142]  ffff888102b56a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.546998] >ffff888102b56b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.549644]                                                                 ^
[   25.550237]  ffff888102b56b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.551022]  ffff888102b56c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.551889] ==================================================================
[   25.438996] ==================================================================
[   25.440474] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   25.441731] Read of size 8 at addr ffff888102b56b78 by task kunit_try_catch/298
[   25.442585] 
[   25.443143] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.443910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.443945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.443991] Call Trace:
[   25.444012]  <TASK>
[   25.444053]  dump_stack_lvl+0x73/0xb0
[   25.444104]  print_report+0xd1/0x650
[   25.444163]  ? __virt_addr_valid+0x1db/0x2d0
[   25.444318]  ? copy_to_kernel_nofault+0x225/0x260
[   25.444361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.444417]  ? copy_to_kernel_nofault+0x225/0x260
[   25.444458]  kasan_report+0x141/0x180
[   25.444553]  ? copy_to_kernel_nofault+0x225/0x260
[   25.444638]  __asan_report_load8_noabort+0x18/0x20
[   25.444676]  copy_to_kernel_nofault+0x225/0x260
[   25.444716]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   25.444753]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   25.444789]  ? finish_task_switch.isra.0+0x153/0x700
[   25.444826]  ? __schedule+0x10cc/0x2b60
[   25.444892]  ? trace_hardirqs_on+0x37/0xe0
[   25.444940]  ? __pfx_read_tsc+0x10/0x10
[   25.444973]  ? ktime_get_ts64+0x86/0x230
[   25.445010]  kunit_try_run_case+0x1a5/0x480
[   25.445046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.445076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.445114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.445150]  ? __kthread_parkme+0x82/0x180
[   25.445220]  ? preempt_count_sub+0x50/0x80
[   25.445260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.445293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.445331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.445368]  kthread+0x337/0x6f0
[   25.445398]  ? trace_preempt_on+0x20/0xc0
[   25.445430]  ? __pfx_kthread+0x10/0x10
[   25.445462]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.445495]  ? calculate_sigpending+0x7b/0xa0
[   25.445532]  ? __pfx_kthread+0x10/0x10
[   25.445578]  ret_from_fork+0x116/0x1d0
[   25.445621]  ? __pfx_kthread+0x10/0x10
[   25.445654]  ret_from_fork_asm+0x1a/0x30
[   25.445701]  </TASK>
[   25.445718] 
[   25.471010] Allocated by task 298:
[   25.471886]  kasan_save_stack+0x45/0x70
[   25.472701]  kasan_save_track+0x18/0x40
[   25.473055]  kasan_save_alloc_info+0x3b/0x50
[   25.473592]  __kasan_kmalloc+0xb7/0xc0
[   25.473931]  __kmalloc_cache_noprof+0x189/0x420
[   25.475146]  copy_to_kernel_nofault_oob+0x12f/0x560
[   25.475826]  kunit_try_run_case+0x1a5/0x480
[   25.476504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.476958]  kthread+0x337/0x6f0
[   25.477239]  ret_from_fork+0x116/0x1d0
[   25.477564]  ret_from_fork_asm+0x1a/0x30
[   25.478998] 
[   25.479177] The buggy address belongs to the object at ffff888102b56b00
[   25.479177]  which belongs to the cache kmalloc-128 of size 128
[   25.480562] The buggy address is located 0 bytes to the right of
[   25.480562]  allocated 120-byte region [ffff888102b56b00, ffff888102b56b78)
[   25.481960] 
[   25.482141] The buggy address belongs to the physical page:
[   25.483264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   25.484171] flags: 0x200000000000000(node=0|zone=2)
[   25.484785] page_type: f5(slab)
[   25.485193] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.486248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.487249] page dumped because: kasan: bad access detected
[   25.487818] 
[   25.488164] Memory state around the buggy address:
[   25.488783]  ffff888102b56a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.489815]  ffff888102b56a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.490567] >ffff888102b56b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.491500]                                                                 ^
[   25.492473]  ffff888102b56b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.493254]  ffff888102b56c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.494127] ==================================================================

[   90.636047] ==================================================================
[   90.643310] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x144/0x3fc
[   90.650756] Write of size 8 at addr cc963178 by task kunit_try_catch/333
[   90.657501] 
[   90.659027] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   90.659057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.659057] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.659057] Call trace: 
[   90.659088]  unwind_backtrace from show_stack+0x18/0x1c
[   90.659118]  show_stack from dump_stack_lvl+0x70/0x90
[   90.659118]  dump_stack_lvl from print_report+0x158/0x528
[   90.659149]  print_report from kasan_report+0xdc/0x118
[   90.659179]  kasan_report from kasan_check_range+0x14c/0x198
[   90.659210]  kasan_check_range from copy_to_kernel_nofault+0x144/0x3fc
[   90.659240]  copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x258/0x4fc
[   90.659240]  copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8
[   90.659271]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.659301]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.659332]  kthread from ret_from_fork+0x14/0x20
[   90.659362] Exception stack(0xf2553fb0 to 0xf2553ff8)
[   90.659362] 3fa0:                                     00000000 00000000 00000000 00000000
[   90.659393] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.659393] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.659423] 
[   90.779846] Allocated by task 333:
[   90.783264]  kasan_save_track+0x30/0x5c
[   90.787139]  __kasan_kmalloc+0x8c/0x94
[   90.790893]  copy_to_kernel_nofault_oob+0xf0/0x4fc
[   90.795745]  kunit_try_run_case+0x22c/0x5a8
[   90.799957]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.805480]  kthread+0x464/0x810
[   90.808746]  ret_from_fork+0x14/0x20
[   90.812347] 
[   90.813842] The buggy address belongs to the object at cc963100
[   90.813842]  which belongs to the cache kmalloc-128 of size 128
[   90.825744] The buggy address is located 0 bytes to the right of
[   90.825744]  allocated 120-byte region [cc963100, cc963178)
[   90.837371] 
[   90.838897] The buggy address belongs to the physical page:
[   90.844482] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c963
[   90.851745] flags: 0x0(zone=0)
[   90.854827] page_type: f5(slab)
[   90.858001] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   90.866149] raw: 00000000
[   90.868804] page dumped because: kasan: bad access detected
[   90.874389] 
[   90.875915] Memory state around the buggy address:
[   90.880737]  cc963000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   90.887298]  cc963080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.893859] >cc963100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   90.900451]                                                         ^
[   90.906921]  cc963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.913482]  cc963200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.920074] ==================================================================
[   90.343170] ==================================================================
[   90.358154] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x37c/0x3fc
[   90.365600] Read of size 8 at addr cc963178 by task kunit_try_catch/333
[   90.372253] 
[   90.373779] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   90.373809] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.373809] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.373840] Call trace: 
[   90.373840]  unwind_backtrace from show_stack+0x18/0x1c
[   90.373870]  show_stack from dump_stack_lvl+0x70/0x90
[   90.373901]  dump_stack_lvl from print_report+0x158/0x528
[   90.373901]  print_report from kasan_report+0xdc/0x118
[   90.373931]  kasan_report from copy_to_kernel_nofault+0x37c/0x3fc
[   90.373962]  copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x1c0/0x4fc
[   90.373992]  copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8
[   90.374023]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.374053]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.374084]  kthread from ret_from_fork+0x14/0x20
[   90.374084] Exception stack(0xf2553fb0 to 0xf2553ff8)
[   90.374114] 3fa0:                                     00000000 00000000 00000000 00000000
[   90.374114] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.374145] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.374145] 
[   90.488464] Allocated by task 333:
[   90.491882]  kasan_save_track+0x30/0x5c
[   90.495758]  __kasan_kmalloc+0x8c/0x94
[   90.499542]  copy_to_kernel_nofault_oob+0xf0/0x4fc
[   90.504364]  kunit_try_run_case+0x22c/0x5a8
[   90.508605]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.514129]  kthread+0x464/0x810
[   90.517395]  ret_from_fork+0x14/0x20
[   90.520996] 
[   90.522491] The buggy address belongs to the object at cc963100
[   90.522491]  which belongs to the cache kmalloc-128 of size 128
[   90.534393] The buggy address is located 0 bytes to the right of
[   90.534393]  allocated 120-byte region [cc963100, cc963178)
[   90.546020] 
[   90.547515] The buggy address belongs to the physical page:
[   90.553131] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c963
[   90.560424] flags: 0x0(zone=0)
[   90.563507] page_type: f5(slab)
[   90.566650] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   90.574798] raw: 00000000
[   90.577453] page dumped because: kasan: bad access detected
[   90.583038] 
[   90.584564] Memory state around the buggy address:
[   90.589385]  cc963000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   90.595947]  cc963080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.602508] >cc963100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   90.609100]                                                         ^
[   90.615570]  cc963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.622131]  cc963200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.628723] ==================================================================