Hay
Date
June 19, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   34.569415] ==================================================================
[   34.569617] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   34.569799] Read of size 8 at addr fff00000c7741378 by task kunit_try_catch/292
[   34.569995] 
[   34.570110] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.570362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.570429] Hardware name: linux,dummy-virt (DT)
[   34.570504] Call trace:
[   34.570567]  show_stack+0x20/0x38 (C)
[   34.570674]  dump_stack_lvl+0x8c/0xd0
[   34.570841]  print_report+0x118/0x608
[   34.570978]  kasan_report+0xdc/0x128
[   34.571096]  __asan_report_load8_noabort+0x20/0x30
[   34.571214]  copy_to_kernel_nofault+0x204/0x250
[   34.571365]  copy_to_kernel_nofault_oob+0x158/0x418
[   34.571518]  kunit_try_run_case+0x170/0x3f0
[   34.571710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.571915]  kthread+0x328/0x630
[   34.572079]  ret_from_fork+0x10/0x20
[   34.572202] 
[   34.572262] Allocated by task 292:
[   34.572342]  kasan_save_stack+0x3c/0x68
[   34.572454]  kasan_save_track+0x20/0x40
[   34.572550]  kasan_save_alloc_info+0x40/0x58
[   34.572655]  __kasan_kmalloc+0xd4/0xd8
[   34.572762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.572901]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.573020]  kunit_try_run_case+0x170/0x3f0
[   34.573160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.573320]  kthread+0x328/0x630
[   34.573433]  ret_from_fork+0x10/0x20
[   34.573553] 
[   34.573609] The buggy address belongs to the object at fff00000c7741300
[   34.573609]  which belongs to the cache kmalloc-128 of size 128
[   34.573744] The buggy address is located 0 bytes to the right of
[   34.573744]  allocated 120-byte region [fff00000c7741300, fff00000c7741378)
[   34.573987] 
[   34.574046] The buggy address belongs to the physical page:
[   34.574124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.574269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.574432] page_type: f5(slab)
[   34.574541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.574701] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.574825] page dumped because: kasan: bad access detected
[   34.575038] 
[   34.575097] Memory state around the buggy address:
[   34.575184]  fff00000c7741200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.575295]  fff00000c7741280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.575389] >fff00000c7741300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.575469]                                                                 ^
[   34.575561]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.575645]  fff00000c7741400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.575739] ==================================================================
[   34.579489] ==================================================================
[   34.580024] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   34.580313] Write of size 8 at addr fff00000c7741378 by task kunit_try_catch/292
[   34.580582] 
[   34.580861] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.581349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.581552] Hardware name: linux,dummy-virt (DT)
[   34.581758] Call trace:
[   34.582098]  show_stack+0x20/0x38 (C)
[   34.582259]  dump_stack_lvl+0x8c/0xd0
[   34.582381]  print_report+0x118/0x608
[   34.582681]  kasan_report+0xdc/0x128
[   34.583071]  kasan_check_range+0x100/0x1a8
[   34.583278]  __kasan_check_write+0x20/0x30
[   34.583396]  copy_to_kernel_nofault+0x8c/0x250
[   34.583747]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   34.584108]  kunit_try_run_case+0x170/0x3f0
[   34.584283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.584518]  kthread+0x328/0x630
[   34.584763]  ret_from_fork+0x10/0x20
[   34.585056] 
[   34.585349] Allocated by task 292:
[   34.585457]  kasan_save_stack+0x3c/0x68
[   34.585629]  kasan_save_track+0x20/0x40
[   34.585859]  kasan_save_alloc_info+0x40/0x58
[   34.586043]  __kasan_kmalloc+0xd4/0xd8
[   34.586228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.586462]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.586555]  kunit_try_run_case+0x170/0x3f0
[   34.586649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.586747]  kthread+0x328/0x630
[   34.587230]  ret_from_fork+0x10/0x20
[   34.587334] 
[   34.587451] The buggy address belongs to the object at fff00000c7741300
[   34.587451]  which belongs to the cache kmalloc-128 of size 128
[   34.587599] The buggy address is located 0 bytes to the right of
[   34.587599]  allocated 120-byte region [fff00000c7741300, fff00000c7741378)
[   34.587776] 
[   34.587836] The buggy address belongs to the physical page:
[   34.588279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.588651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.589092] page_type: f5(slab)
[   34.589238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.589538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.589764] page dumped because: kasan: bad access detected
[   34.589944] 
[   34.590073] Memory state around the buggy address:
[   34.590265]  fff00000c7741200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.590459]  fff00000c7741280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.590555] >fff00000c7741300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.590930]                                                                 ^
[   34.591162]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.591319]  fff00000c7741400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.591431] ==================================================================

[   30.295779] ==================================================================
[   30.296900] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   30.297481] Write of size 8 at addr ffff888103782e78 by task kunit_try_catch/310
[   30.298496] 
[   30.298792] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   30.298924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.299003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.299072] Call Trace:
[   30.299126]  <TASK>
[   30.299172]  dump_stack_lvl+0x73/0xb0
[   30.299228]  print_report+0xd1/0x650
[   30.299258]  ? __virt_addr_valid+0x1db/0x2d0
[   30.299286]  ? copy_to_kernel_nofault+0x99/0x260
[   30.299332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.299422]  ? copy_to_kernel_nofault+0x99/0x260
[   30.299464]  kasan_report+0x141/0x180
[   30.299505]  ? copy_to_kernel_nofault+0x99/0x260
[   30.299535]  kasan_check_range+0x10c/0x1c0
[   30.299560]  __kasan_check_write+0x18/0x20
[   30.299586]  copy_to_kernel_nofault+0x99/0x260
[   30.299613]  copy_to_kernel_nofault_oob+0x288/0x560
[   30.299638]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   30.299664]  ? finish_task_switch.isra.0+0x153/0x700
[   30.299690]  ? __schedule+0x10cc/0x2b60
[   30.299715]  ? trace_hardirqs_on+0x37/0xe0
[   30.299748]  ? __pfx_read_tsc+0x10/0x10
[   30.299771]  ? ktime_get_ts64+0x86/0x230
[   30.299799]  kunit_try_run_case+0x1a5/0x480
[   30.299827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.299851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.299877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.299917]  ? __kthread_parkme+0x82/0x180
[   30.299953]  ? preempt_count_sub+0x50/0x80
[   30.299996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.300040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.300081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.300140]  kthread+0x337/0x6f0
[   30.300175]  ? trace_preempt_on+0x20/0xc0
[   30.300212]  ? __pfx_kthread+0x10/0x10
[   30.300246]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.300283]  ? calculate_sigpending+0x7b/0xa0
[   30.300323]  ? __pfx_kthread+0x10/0x10
[   30.300360]  ret_from_fork+0x116/0x1d0
[   30.300396]  ? __pfx_kthread+0x10/0x10
[   30.300434]  ret_from_fork_asm+0x1a/0x30
[   30.300482]  </TASK>
[   30.300497] 
[   30.317771] Allocated by task 310:
[   30.318587]  kasan_save_stack+0x45/0x70
[   30.318923]  kasan_save_track+0x18/0x40
[   30.319370]  kasan_save_alloc_info+0x3b/0x50
[   30.319810]  __kasan_kmalloc+0xb7/0xc0
[   30.320408]  __kmalloc_cache_noprof+0x189/0x420
[   30.320836]  copy_to_kernel_nofault_oob+0x12f/0x560
[   30.321053]  kunit_try_run_case+0x1a5/0x480
[   30.321711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.322413]  kthread+0x337/0x6f0
[   30.322812]  ret_from_fork+0x116/0x1d0
[   30.323275]  ret_from_fork_asm+0x1a/0x30
[   30.323613] 
[   30.323721] The buggy address belongs to the object at ffff888103782e00
[   30.323721]  which belongs to the cache kmalloc-128 of size 128
[   30.325086] The buggy address is located 0 bytes to the right of
[   30.325086]  allocated 120-byte region [ffff888103782e00, ffff888103782e78)
[   30.326375] 
[   30.326515] The buggy address belongs to the physical page:
[   30.327071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103782
[   30.328306] flags: 0x200000000000000(node=0|zone=2)
[   30.328598] page_type: f5(slab)
[   30.328846] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.330226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.330599] page dumped because: kasan: bad access detected
[   30.331327] 
[   30.331695] Memory state around the buggy address:
[   30.332080]  ffff888103782d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.332702]  ffff888103782d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.333476] >ffff888103782e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.334230]                                                                 ^
[   30.334490]  ffff888103782e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.334733]  ffff888103782f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.334879] ==================================================================
[   30.258737] ==================================================================
[   30.259899] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   30.260551] Read of size 8 at addr ffff888103782e78 by task kunit_try_catch/310
[   30.260870] 
[   30.261343] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   30.261462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.261488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.261532] Call Trace:
[   30.261562]  <TASK>
[   30.261604]  dump_stack_lvl+0x73/0xb0
[   30.261685]  print_report+0xd1/0x650
[   30.261743]  ? __virt_addr_valid+0x1db/0x2d0
[   30.261799]  ? copy_to_kernel_nofault+0x225/0x260
[   30.261841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.261896]  ? copy_to_kernel_nofault+0x225/0x260
[   30.261942]  kasan_report+0x141/0x180
[   30.261993]  ? copy_to_kernel_nofault+0x225/0x260
[   30.262366]  __asan_report_load8_noabort+0x18/0x20
[   30.262415]  copy_to_kernel_nofault+0x225/0x260
[   30.262443]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   30.262468]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   30.262492]  ? finish_task_switch.isra.0+0x153/0x700
[   30.262520]  ? __schedule+0x10cc/0x2b60
[   30.262546]  ? trace_hardirqs_on+0x37/0xe0
[   30.262579]  ? __pfx_read_tsc+0x10/0x10
[   30.262603]  ? ktime_get_ts64+0x86/0x230
[   30.262630]  kunit_try_run_case+0x1a5/0x480
[   30.262659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.262682]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.262706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.262730]  ? __kthread_parkme+0x82/0x180
[   30.262753]  ? preempt_count_sub+0x50/0x80
[   30.262777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.262801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.262826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.262850]  kthread+0x337/0x6f0
[   30.262871]  ? trace_preempt_on+0x20/0xc0
[   30.262894]  ? __pfx_kthread+0x10/0x10
[   30.262926]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.263221]  ? calculate_sigpending+0x7b/0xa0
[   30.263275]  ? __pfx_kthread+0x10/0x10
[   30.263318]  ret_from_fork+0x116/0x1d0
[   30.263355]  ? __pfx_kthread+0x10/0x10
[   30.263388]  ret_from_fork_asm+0x1a/0x30
[   30.263445]  </TASK>
[   30.263497] 
[   30.280128] Allocated by task 310:
[   30.280506]  kasan_save_stack+0x45/0x70
[   30.280976]  kasan_save_track+0x18/0x40
[   30.281165]  kasan_save_alloc_info+0x3b/0x50
[   30.281564]  __kasan_kmalloc+0xb7/0xc0
[   30.281816]  __kmalloc_cache_noprof+0x189/0x420
[   30.282061]  copy_to_kernel_nofault_oob+0x12f/0x560
[   30.282477]  kunit_try_run_case+0x1a5/0x480
[   30.282850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.283235]  kthread+0x337/0x6f0
[   30.283372]  ret_from_fork+0x116/0x1d0
[   30.283727]  ret_from_fork_asm+0x1a/0x30
[   30.284142] 
[   30.284308] The buggy address belongs to the object at ffff888103782e00
[   30.284308]  which belongs to the cache kmalloc-128 of size 128
[   30.284850] The buggy address is located 0 bytes to the right of
[   30.284850]  allocated 120-byte region [ffff888103782e00, ffff888103782e78)
[   30.285564] 
[   30.285740] The buggy address belongs to the physical page:
[   30.286385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103782
[   30.286936] flags: 0x200000000000000(node=0|zone=2)
[   30.287521] page_type: f5(slab)
[   30.287927] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.288462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.288747] page dumped because: kasan: bad access detected
[   30.289076] 
[   30.289258] Memory state around the buggy address:
[   30.289700]  ffff888103782d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.290208]  ffff888103782d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.290957] >ffff888103782e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.291480]                                                                 ^
[   30.292242]  ffff888103782e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.292886]  ffff888103782f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.293602] ==================================================================