Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   36.405894] ==================================================================
[   36.406034] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   36.406172] Write of size 8 at addr fff00000c6515778 by task kunit_try_catch/292
[   36.406297] 
[   36.406699] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.407025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.407150] Hardware name: linux,dummy-virt (DT)
[   36.407242] Call trace:
[   36.407335]  show_stack+0x20/0x38 (C)
[   36.407534]  dump_stack_lvl+0x8c/0xd0
[   36.407678]  print_report+0x118/0x608
[   36.407802]  kasan_report+0xdc/0x128
[   36.407918]  kasan_check_range+0x100/0x1a8
[   36.408037]  __kasan_check_write+0x20/0x30
[   36.408162]  copy_to_kernel_nofault+0x8c/0x250
[   36.408290]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   36.408545]  kunit_try_run_case+0x170/0x3f0
[   36.408947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.409018]  kthread+0x328/0x630
[   36.409125]  ret_from_fork+0x10/0x20
[   36.409195] 
[   36.409221] Allocated by task 292:
[   36.409261]  kasan_save_stack+0x3c/0x68
[   36.409315]  kasan_save_track+0x20/0x40
[   36.409361]  kasan_save_alloc_info+0x40/0x58
[   36.409408]  __kasan_kmalloc+0xd4/0xd8
[   36.409452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.409498]  copy_to_kernel_nofault_oob+0xc8/0x418
[   36.409546]  kunit_try_run_case+0x170/0x3f0
[   36.409591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.409697]  kthread+0x328/0x630
[   36.409792]  ret_from_fork+0x10/0x20
[   36.409884] 
[   36.409928] The buggy address belongs to the object at fff00000c6515700
[   36.409928]  which belongs to the cache kmalloc-128 of size 128
[   36.410047] The buggy address is located 0 bytes to the right of
[   36.410047]  allocated 120-byte region [fff00000c6515700, fff00000c6515778)
[   36.410183] 
[   36.410235] The buggy address belongs to the physical page:
[   36.410316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.410469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.410623] page_type: f5(slab)
[   36.410745] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.410890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.411009] page dumped because: kasan: bad access detected
[   36.411120] 
[   36.411177] Memory state around the buggy address:
[   36.411288]  fff00000c6515600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.411431]  fff00000c6515680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.411562] >fff00000c6515700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.411671]                                                                 ^
[   36.411775]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.411892]  fff00000c6515800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.412005] ==================================================================
[   36.395750] ==================================================================
[   36.396004] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   36.396238] Read of size 8 at addr fff00000c6515778 by task kunit_try_catch/292
[   36.396622] 
[   36.396769] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.397255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.397350] Hardware name: linux,dummy-virt (DT)
[   36.397429] Call trace:
[   36.397487]  show_stack+0x20/0x38 (C)
[   36.397619]  dump_stack_lvl+0x8c/0xd0
[   36.397732]  print_report+0x118/0x608
[   36.397893]  kasan_report+0xdc/0x128
[   36.398026]  __asan_report_load8_noabort+0x20/0x30
[   36.398181]  copy_to_kernel_nofault+0x204/0x250
[   36.398346]  copy_to_kernel_nofault_oob+0x158/0x418
[   36.398493]  kunit_try_run_case+0x170/0x3f0
[   36.398655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.398796]  kthread+0x328/0x630
[   36.398908]  ret_from_fork+0x10/0x20
[   36.399029] 
[   36.399090] Allocated by task 292:
[   36.399166]  kasan_save_stack+0x3c/0x68
[   36.399287]  kasan_save_track+0x20/0x40
[   36.399378]  kasan_save_alloc_info+0x40/0x58
[   36.399577]  __kasan_kmalloc+0xd4/0xd8
[   36.399775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.400117]  copy_to_kernel_nofault_oob+0xc8/0x418
[   36.400260]  kunit_try_run_case+0x170/0x3f0
[   36.400368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.400504]  kthread+0x328/0x630
[   36.400627]  ret_from_fork+0x10/0x20
[   36.400750] 
[   36.400908] The buggy address belongs to the object at fff00000c6515700
[   36.400908]  which belongs to the cache kmalloc-128 of size 128
[   36.401053] The buggy address is located 0 bytes to the right of
[   36.401053]  allocated 120-byte region [fff00000c6515700, fff00000c6515778)
[   36.401418] 
[   36.401521] The buggy address belongs to the physical page:
[   36.401630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.401783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.401923] page_type: f5(slab)
[   36.402032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.402171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.402288] page dumped because: kasan: bad access detected
[   36.402373] 
[   36.402427] Memory state around the buggy address:
[   36.402533]  fff00000c6515600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.402657]  fff00000c6515680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.402996] >fff00000c6515700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.403221]                                                                 ^
[   36.403366]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.403497]  fff00000c6515800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.403791] ==================================================================

[   30.550202] ==================================================================
[   30.550799] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   30.551401] Write of size 8 at addr ffff888102b17878 by task kunit_try_catch/310
[   30.551986] 
[   30.552226] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.552359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.552401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.552462] Call Trace:
[   30.552509]  <TASK>
[   30.552556]  dump_stack_lvl+0x73/0xb0
[   30.552633]  print_report+0xd1/0x650
[   30.552692]  ? __virt_addr_valid+0x1db/0x2d0
[   30.552747]  ? copy_to_kernel_nofault+0x99/0x260
[   30.552803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.552849]  ? copy_to_kernel_nofault+0x99/0x260
[   30.552895]  kasan_report+0x141/0x180
[   30.552944]  ? copy_to_kernel_nofault+0x99/0x260
[   30.553026]  kasan_check_range+0x10c/0x1c0
[   30.553079]  __kasan_check_write+0x18/0x20
[   30.553146]  copy_to_kernel_nofault+0x99/0x260
[   30.553201]  copy_to_kernel_nofault_oob+0x288/0x560
[   30.553246]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   30.553285]  ? finish_task_switch.isra.0+0x153/0x700
[   30.553324]  ? __schedule+0x10cc/0x2b60
[   30.553363]  ? trace_hardirqs_on+0x37/0xe0
[   30.553419]  ? __pfx_read_tsc+0x10/0x10
[   30.553478]  ? ktime_get_ts64+0x86/0x230
[   30.553532]  ? irqentry_exit+0x2a/0x60
[   30.553589]  kunit_try_run_case+0x1a5/0x480
[   30.553644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.553684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.553725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.553762]  ? __kthread_parkme+0x82/0x180
[   30.553800]  ? preempt_count_sub+0x50/0x80
[   30.553839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.553876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.553915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.553952]  kthread+0x337/0x6f0
[   30.553983]  ? trace_preempt_on+0x20/0xc0
[   30.554017]  ? __pfx_kthread+0x10/0x10
[   30.554062]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.554100]  ? calculate_sigpending+0x7b/0xa0
[   30.554139]  ? __pfx_kthread+0x10/0x10
[   30.554180]  ret_from_fork+0x116/0x1d0
[   30.554208]  ? __pfx_kthread+0x10/0x10
[   30.554230]  ret_from_fork_asm+0x1a/0x30
[   30.554265]  </TASK>
[   30.554279] 
[   30.568319] Allocated by task 310:
[   30.568661]  kasan_save_stack+0x45/0x70
[   30.569787]  kasan_save_track+0x18/0x40
[   30.570038]  kasan_save_alloc_info+0x3b/0x50
[   30.570671]  __kasan_kmalloc+0xb7/0xc0
[   30.570995]  __kmalloc_cache_noprof+0x189/0x420
[   30.571452]  copy_to_kernel_nofault_oob+0x12f/0x560
[   30.572107]  kunit_try_run_case+0x1a5/0x480
[   30.572539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.573095]  kthread+0x337/0x6f0
[   30.573378]  ret_from_fork+0x116/0x1d0
[   30.573795]  ret_from_fork_asm+0x1a/0x30
[   30.574382] 
[   30.574533] The buggy address belongs to the object at ffff888102b17800
[   30.574533]  which belongs to the cache kmalloc-128 of size 128
[   30.575939] The buggy address is located 0 bytes to the right of
[   30.575939]  allocated 120-byte region [ffff888102b17800, ffff888102b17878)
[   30.576404] 
[   30.576617] The buggy address belongs to the physical page:
[   30.577253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b17
[   30.578187] flags: 0x200000000000000(node=0|zone=2)
[   30.578716] page_type: f5(slab)
[   30.579148] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.579526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.579804] page dumped because: kasan: bad access detected
[   30.580017] 
[   30.580164] Memory state around the buggy address:
[   30.580550]  ffff888102b17700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.581085]  ffff888102b17780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.582598] >ffff888102b17800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.583056]                                                                 ^
[   30.583570]  ffff888102b17880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.584300]  ffff888102b17900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.584846] ==================================================================
[   30.517295] ==================================================================
[   30.518626] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   30.519087] Read of size 8 at addr ffff888102b17878 by task kunit_try_catch/310
[   30.519544] 
[   30.519711] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.519795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.519813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.519842] Call Trace:
[   30.519862]  <TASK>
[   30.519893]  dump_stack_lvl+0x73/0xb0
[   30.519958]  print_report+0xd1/0x650
[   30.520015]  ? __virt_addr_valid+0x1db/0x2d0
[   30.520071]  ? copy_to_kernel_nofault+0x225/0x260
[   30.520126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.520178]  ? copy_to_kernel_nofault+0x225/0x260
[   30.520224]  kasan_report+0x141/0x180
[   30.520251]  ? copy_to_kernel_nofault+0x225/0x260
[   30.520281]  __asan_report_load8_noabort+0x18/0x20
[   30.520308]  copy_to_kernel_nofault+0x225/0x260
[   30.520336]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   30.520362]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   30.520388]  ? finish_task_switch.isra.0+0x153/0x700
[   30.520416]  ? __schedule+0x10cc/0x2b60
[   30.520476]  ? trace_hardirqs_on+0x37/0xe0
[   30.520546]  ? __pfx_read_tsc+0x10/0x10
[   30.520587]  ? ktime_get_ts64+0x86/0x230
[   30.520656]  ? irqentry_exit+0x2a/0x60
[   30.520707]  kunit_try_run_case+0x1a5/0x480
[   30.520762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.520811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.520863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.520917]  ? __kthread_parkme+0x82/0x180
[   30.520970]  ? preempt_count_sub+0x50/0x80
[   30.521026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.521084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.521141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.521195]  kthread+0x337/0x6f0
[   30.521244]  ? trace_preempt_on+0x20/0xc0
[   30.521300]  ? __pfx_kthread+0x10/0x10
[   30.521345]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.521385]  ? calculate_sigpending+0x7b/0xa0
[   30.521430]  ? __pfx_kthread+0x10/0x10
[   30.521486]  ret_from_fork+0x116/0x1d0
[   30.521517]  ? __pfx_kthread+0x10/0x10
[   30.521541]  ret_from_fork_asm+0x1a/0x30
[   30.521604]  </TASK>
[   30.521633] 
[   30.534232] Allocated by task 310:
[   30.534491]  kasan_save_stack+0x45/0x70
[   30.535105]  kasan_save_track+0x18/0x40
[   30.535485]  kasan_save_alloc_info+0x3b/0x50
[   30.535864]  __kasan_kmalloc+0xb7/0xc0
[   30.536231]  __kmalloc_cache_noprof+0x189/0x420
[   30.536790]  copy_to_kernel_nofault_oob+0x12f/0x560
[   30.537145]  kunit_try_run_case+0x1a5/0x480
[   30.537389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.537855]  kthread+0x337/0x6f0
[   30.538172]  ret_from_fork+0x116/0x1d0
[   30.538508]  ret_from_fork_asm+0x1a/0x30
[   30.538850] 
[   30.539151] The buggy address belongs to the object at ffff888102b17800
[   30.539151]  which belongs to the cache kmalloc-128 of size 128
[   30.539980] The buggy address is located 0 bytes to the right of
[   30.539980]  allocated 120-byte region [ffff888102b17800, ffff888102b17878)
[   30.540656] 
[   30.540910] The buggy address belongs to the physical page:
[   30.541382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b17
[   30.541714] flags: 0x200000000000000(node=0|zone=2)
[   30.541939] page_type: f5(slab)
[   30.542123] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.542687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.543470] page dumped because: kasan: bad access detected
[   30.544272] 
[   30.544494] Memory state around the buggy address:
[   30.544947]  ffff888102b17700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.545368]  ffff888102b17780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.546065] >ffff888102b17800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.546603]                                                                 ^
[   30.547115]  ffff888102b17880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.547388]  ffff888102b17900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.547661] ==================================================================