Hay
Date
June 3, 2025, 7:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.477865] ==================================================================
[   21.477943] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.478015] Read of size 8 at addr fff00000c58a9578 by task kunit_try_catch/281
[   21.478070] 
[   21.478111] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.478199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.478229] Hardware name: linux,dummy-virt (DT)
[   21.478262] Call trace:
[   21.478288]  show_stack+0x20/0x38 (C)
[   21.478342]  dump_stack_lvl+0x8c/0xd0
[   21.478651]  print_report+0x118/0x608
[   21.478704]  kasan_report+0xdc/0x128
[   21.478751]  __asan_report_load8_noabort+0x20/0x30
[   21.479359]  copy_to_kernel_nofault+0x204/0x250
[   21.479469]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.479638]  kunit_try_run_case+0x170/0x3f0
[   21.479714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.479770]  kthread+0x328/0x630
[   21.480118]  ret_from_fork+0x10/0x20
[   21.480309] 
[   21.480360] Allocated by task 281:
[   21.480423]  kasan_save_stack+0x3c/0x68
[   21.480653]  kasan_save_track+0x20/0x40
[   21.480824]  kasan_save_alloc_info+0x40/0x58
[   21.481020]  __kasan_kmalloc+0xd4/0xd8
[   21.481193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.481279]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.481320]  kunit_try_run_case+0x170/0x3f0
[   21.481518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.481749]  kthread+0x328/0x630
[   21.481811]  ret_from_fork+0x10/0x20
[   21.481947] 
[   21.482028] The buggy address belongs to the object at fff00000c58a9500
[   21.482028]  which belongs to the cache kmalloc-128 of size 128
[   21.482182] The buggy address is located 0 bytes to the right of
[   21.482182]  allocated 120-byte region [fff00000c58a9500, fff00000c58a9578)
[   21.482598] 
[   21.482781] The buggy address belongs to the physical page:
[   21.482936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.483044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.483130] page_type: f5(slab)
[   21.483173] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.483369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.484014] page dumped because: kasan: bad access detected
[   21.484075] 
[   21.484107] Memory state around the buggy address:
[   21.484146]  fff00000c58a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.484192]  fff00000c58a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.484481] >fff00000c58a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.484810]                                                                 ^
[   21.485305]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.485388]  fff00000c58a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.485616] ==================================================================
[   21.487116] ==================================================================
[   21.487174] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.487228] Write of size 8 at addr fff00000c58a9578 by task kunit_try_catch/281
[   21.487329] 
[   21.487377] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.487831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.487940] Hardware name: linux,dummy-virt (DT)
[   21.488042] Call trace:
[   21.488167]  show_stack+0x20/0x38 (C)
[   21.488226]  dump_stack_lvl+0x8c/0xd0
[   21.488448]  print_report+0x118/0x608
[   21.488640]  kasan_report+0xdc/0x128
[   21.488774]  kasan_check_range+0x100/0x1a8
[   21.489161]  __kasan_check_write+0x20/0x30
[   21.489377]  copy_to_kernel_nofault+0x8c/0x250
[   21.489657]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.489921]  kunit_try_run_case+0x170/0x3f0
[   21.490139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.490209]  kthread+0x328/0x630
[   21.490415]  ret_from_fork+0x10/0x20
[   21.490621] 
[   21.490646] Allocated by task 281:
[   21.490679]  kasan_save_stack+0x3c/0x68
[   21.490722]  kasan_save_track+0x20/0x40
[   21.490763]  kasan_save_alloc_info+0x40/0x58
[   21.490801]  __kasan_kmalloc+0xd4/0xd8
[   21.490840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.490889]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.490930]  kunit_try_run_case+0x170/0x3f0
[   21.490979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.491025]  kthread+0x328/0x630
[   21.491058]  ret_from_fork+0x10/0x20
[   21.491104] 
[   21.491135] The buggy address belongs to the object at fff00000c58a9500
[   21.491135]  which belongs to the cache kmalloc-128 of size 128
[   21.491202] The buggy address is located 0 bytes to the right of
[   21.491202]  allocated 120-byte region [fff00000c58a9500, fff00000c58a9578)
[   21.491270] 
[   21.491290] The buggy address belongs to the physical page:
[   21.491347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.491436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.491867] page_type: f5(slab)
[   21.491916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.491971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.492484] page dumped because: kasan: bad access detected
[   21.492814] 
[   21.492958] Memory state around the buggy address:
[   21.493039]  fff00000c58a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.493213]  fff00000c58a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493408] >fff00000c58a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.493492]                                                                 ^
[   21.493680]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493923]  fff00000c58a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.494026] ==================================================================


[   19.735912] ==================================================================
[   19.736550] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   19.736778] Write of size 8 at addr ffff888103341b78 by task kunit_try_catch/298
[   19.737438] 
[   19.737628] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.737714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.737732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.737761] Call Trace:
[   19.737780]  <TASK>
[   19.737805]  dump_stack_lvl+0x73/0xb0
[   19.737840]  print_report+0xd1/0x650
[   19.737867]  ? __virt_addr_valid+0x1db/0x2d0
[   19.737895]  ? copy_to_kernel_nofault+0x99/0x260
[   19.737921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.737949]  ? copy_to_kernel_nofault+0x99/0x260
[   19.737976]  kasan_report+0x141/0x180
[   19.738002]  ? copy_to_kernel_nofault+0x99/0x260
[   19.738033]  kasan_check_range+0x10c/0x1c0
[   19.738060]  __kasan_check_write+0x18/0x20
[   19.738082]  copy_to_kernel_nofault+0x99/0x260
[   19.738110]  copy_to_kernel_nofault_oob+0x288/0x560
[   19.738136]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.738162]  ? finish_task_switch.isra.0+0x153/0x700
[   19.738189]  ? __schedule+0x10cc/0x2b60
[   19.738244]  ? trace_hardirqs_on+0x37/0xe0
[   19.738280]  ? __pfx_read_tsc+0x10/0x10
[   19.738307]  ? ktime_get_ts64+0x86/0x230
[   19.738336]  kunit_try_run_case+0x1a5/0x480
[   19.738362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.738415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.738444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.738484]  ? __kthread_parkme+0x82/0x180
[   19.738508]  ? preempt_count_sub+0x50/0x80
[   19.738535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.738559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.738586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.738613]  kthread+0x337/0x6f0
[   19.738636]  ? trace_preempt_on+0x20/0xc0
[   19.738661]  ? __pfx_kthread+0x10/0x10
[   19.738706]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.738735]  ? calculate_sigpending+0x7b/0xa0
[   19.738764]  ? __pfx_kthread+0x10/0x10
[   19.738790]  ret_from_fork+0x116/0x1d0
[   19.738814]  ? __pfx_kthread+0x10/0x10
[   19.738838]  ret_from_fork_asm+0x1a/0x30
[   19.738873]  </TASK>
[   19.738888] 
[   19.750637] Allocated by task 298:
[   19.751079]  kasan_save_stack+0x45/0x70
[   19.751482]  kasan_save_track+0x18/0x40
[   19.751978]  kasan_save_alloc_info+0x3b/0x50
[   19.752361]  __kasan_kmalloc+0xb7/0xc0
[   19.752675]  __kmalloc_cache_noprof+0x189/0x420
[   19.753438]  copy_to_kernel_nofault_oob+0x12f/0x560
[   19.753634]  kunit_try_run_case+0x1a5/0x480
[   19.754000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.754549]  kthread+0x337/0x6f0
[   19.754800]  ret_from_fork+0x116/0x1d0
[   19.754934]  ret_from_fork_asm+0x1a/0x30
[   19.755231] 
[   19.755369] The buggy address belongs to the object at ffff888103341b00
[   19.755369]  which belongs to the cache kmalloc-128 of size 128
[   19.755821] The buggy address is located 0 bytes to the right of
[   19.755821]  allocated 120-byte region [ffff888103341b00, ffff888103341b78)
[   19.756271] 
[   19.756342] The buggy address belongs to the physical page:
[   19.756594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.757248] flags: 0x200000000000000(node=0|zone=2)
[   19.757601] page_type: f5(slab)
[   19.758512] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.758709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.759240] page dumped because: kasan: bad access detected
[   19.759611] 
[   19.760044] Memory state around the buggy address:
[   19.760186]  ffff888103341a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.760584]  ffff888103341a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.760946] >ffff888103341b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.761315]                                                                 ^
[   19.761610]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.762122]  ffff888103341c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.762541] ==================================================================
[   19.710632] ==================================================================
[   19.711742] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   19.712563] Read of size 8 at addr ffff888103341b78 by task kunit_try_catch/298
[   19.713096] 
[   19.713522] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.713600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.713618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.713646] Call Trace:
[   19.713666]  <TASK>
[   19.713703]  dump_stack_lvl+0x73/0xb0
[   19.713754]  print_report+0xd1/0x650
[   19.713785]  ? __virt_addr_valid+0x1db/0x2d0
[   19.713816]  ? copy_to_kernel_nofault+0x225/0x260
[   19.713844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.713872]  ? copy_to_kernel_nofault+0x225/0x260
[   19.713955]  kasan_report+0x141/0x180
[   19.714026]  ? copy_to_kernel_nofault+0x225/0x260
[   19.714065]  __asan_report_load8_noabort+0x18/0x20
[   19.714093]  copy_to_kernel_nofault+0x225/0x260
[   19.714123]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   19.714151]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.714178]  ? finish_task_switch.isra.0+0x153/0x700
[   19.714232]  ? __schedule+0x10cc/0x2b60
[   19.714308]  ? trace_hardirqs_on+0x37/0xe0
[   19.714347]  ? __pfx_read_tsc+0x10/0x10
[   19.714375]  ? ktime_get_ts64+0x86/0x230
[   19.714406]  kunit_try_run_case+0x1a5/0x480
[   19.714436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.714479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.714511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.714539]  ? __kthread_parkme+0x82/0x180
[   19.714565]  ? preempt_count_sub+0x50/0x80
[   19.714591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.714617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.714646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.714673]  kthread+0x337/0x6f0
[   19.714696]  ? trace_preempt_on+0x20/0xc0
[   19.714809]  ? __pfx_kthread+0x10/0x10
[   19.714851]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.714881]  ? calculate_sigpending+0x7b/0xa0
[   19.714911]  ? __pfx_kthread+0x10/0x10
[   19.714935]  ret_from_fork+0x116/0x1d0
[   19.714962]  ? __pfx_kthread+0x10/0x10
[   19.714985]  ret_from_fork_asm+0x1a/0x30
[   19.715022]  </TASK>
[   19.715037] 
[   19.726029] Allocated by task 298:
[   19.726311]  kasan_save_stack+0x45/0x70
[   19.726606]  kasan_save_track+0x18/0x40
[   19.726739]  kasan_save_alloc_info+0x3b/0x50
[   19.726943]  __kasan_kmalloc+0xb7/0xc0
[   19.727126]  __kmalloc_cache_noprof+0x189/0x420
[   19.727395]  copy_to_kernel_nofault_oob+0x12f/0x560
[   19.727545]  kunit_try_run_case+0x1a5/0x480
[   19.727667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.728083]  kthread+0x337/0x6f0
[   19.728358]  ret_from_fork+0x116/0x1d0
[   19.728486]  ret_from_fork_asm+0x1a/0x30
[   19.728607] 
[   19.728829] The buggy address belongs to the object at ffff888103341b00
[   19.728829]  which belongs to the cache kmalloc-128 of size 128
[   19.729489] The buggy address is located 0 bytes to the right of
[   19.729489]  allocated 120-byte region [ffff888103341b00, ffff888103341b78)
[   19.730020] 
[   19.730237] The buggy address belongs to the physical page:
[   19.730615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.730848] flags: 0x200000000000000(node=0|zone=2)
[   19.730998] page_type: f5(slab)
[   19.731336] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.731858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.732038] page dumped because: kasan: bad access detected
[   19.732175] 
[   19.732351] Memory state around the buggy address:
[   19.732775]  ffff888103341a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.733235]  ffff888103341a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.733504] >ffff888103341b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.733672]                                                                 ^
[   19.734129]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.734511]  ffff888103341c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.734826] ==================================================================