Hay
Date
June 25, 2025, 8:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.677657] ==================================================================
[   29.677727] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   29.677801] Read of size 8 at addr fff00000c786ac78 by task kunit_try_catch/293
[   29.677853] 
[   29.677893] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.677983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.678013] Hardware name: linux,dummy-virt (DT)
[   29.678049] Call trace:
[   29.678074]  show_stack+0x20/0x38 (C)
[   29.678128]  dump_stack_lvl+0x8c/0xd0
[   29.678176]  print_report+0x118/0x608
[   29.678226]  kasan_report+0xdc/0x128
[   29.678271]  __asan_report_load8_noabort+0x20/0x30
[   29.678321]  copy_to_kernel_nofault+0x204/0x250
[   29.678371]  copy_to_kernel_nofault_oob+0x158/0x418
[   29.678469]  kunit_try_run_case+0x170/0x3f0
[   29.678520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.678594]  kthread+0x328/0x630
[   29.678658]  ret_from_fork+0x10/0x20
[   29.678737] 
[   29.678759] Allocated by task 293:
[   29.678791]  kasan_save_stack+0x3c/0x68
[   29.678888]  kasan_save_track+0x20/0x40
[   29.678987]  kasan_save_alloc_info+0x40/0x58
[   29.679055]  __kasan_kmalloc+0xd4/0xd8
[   29.679158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.679235]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.679680]  kunit_try_run_case+0x170/0x3f0
[   29.679820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.679972]  kthread+0x328/0x630
[   29.680012]  ret_from_fork+0x10/0x20
[   29.680070] 
[   29.680104] The buggy address belongs to the object at fff00000c786ac00
[   29.680104]  which belongs to the cache kmalloc-128 of size 128
[   29.680167] The buggy address is located 0 bytes to the right of
[   29.680167]  allocated 120-byte region [fff00000c786ac00, fff00000c786ac78)
[   29.680437] 
[   29.680527] The buggy address belongs to the physical page:
[   29.680687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   29.680785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.681000] page_type: f5(slab)
[   29.681165] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.681288] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.681330] page dumped because: kasan: bad access detected
[   29.681578] 
[   29.681606] Memory state around the buggy address:
[   29.681742]  fff00000c786ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.681871]  fff00000c786ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.682045] >fff00000c786ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.682118]                                                                 ^
[   29.682253]  fff00000c786ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.682301]  fff00000c786ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.682608] ==================================================================
[   29.683795] ==================================================================
[   29.683856] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   29.684100] Write of size 8 at addr fff00000c786ac78 by task kunit_try_catch/293
[   29.684312] 
[   29.684444] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.684642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.684723] Hardware name: linux,dummy-virt (DT)
[   29.684811] Call trace:
[   29.684900]  show_stack+0x20/0x38 (C)
[   29.685055]  dump_stack_lvl+0x8c/0xd0
[   29.685271]  print_report+0x118/0x608
[   29.685360]  kasan_report+0xdc/0x128
[   29.685425]  kasan_check_range+0x100/0x1a8
[   29.685606]  __kasan_check_write+0x20/0x30
[   29.685775]  copy_to_kernel_nofault+0x8c/0x250
[   29.685936]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   29.686059]  kunit_try_run_case+0x170/0x3f0
[   29.686134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.686453]  kthread+0x328/0x630
[   29.686655]  ret_from_fork+0x10/0x20
[   29.686745] 
[   29.686775] Allocated by task 293:
[   29.686869]  kasan_save_stack+0x3c/0x68
[   29.687011]  kasan_save_track+0x20/0x40
[   29.687170]  kasan_save_alloc_info+0x40/0x58
[   29.687261]  __kasan_kmalloc+0xd4/0xd8
[   29.687352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.687478]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.687524]  kunit_try_run_case+0x170/0x3f0
[   29.687965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.688079]  kthread+0x328/0x630
[   29.688340]  ret_from_fork+0x10/0x20
[   29.688533] 
[   29.688614] The buggy address belongs to the object at fff00000c786ac00
[   29.688614]  which belongs to the cache kmalloc-128 of size 128
[   29.688827] The buggy address is located 0 bytes to the right of
[   29.688827]  allocated 120-byte region [fff00000c786ac00, fff00000c786ac78)
[   29.688959] 
[   29.689118] The buggy address belongs to the physical page:
[   29.689160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   29.689352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.689532] page_type: f5(slab)
[   29.689775] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.689985] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.690127] page dumped because: kasan: bad access detected
[   29.690166] 
[   29.690186] Memory state around the buggy address:
[   29.690433]  fff00000c786ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.690487]  fff00000c786ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690592] >fff00000c786ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.690739]                                                                 ^
[   29.690902]  fff00000c786ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.691101]  fff00000c786ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.691148] ==================================================================

[   25.654336] ==================================================================
[   25.654833] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   25.655796] Read of size 8 at addr ffff888102597b78 by task kunit_try_catch/310
[   25.656612] 
[   25.656855] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.656914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.656929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.656965] Call Trace:
[   25.656981]  <TASK>
[   25.657001]  dump_stack_lvl+0x73/0xb0
[   25.657032]  print_report+0xd1/0x650
[   25.657057]  ? __virt_addr_valid+0x1db/0x2d0
[   25.657134]  ? copy_to_kernel_nofault+0x225/0x260
[   25.657160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.657185]  ? copy_to_kernel_nofault+0x225/0x260
[   25.657208]  kasan_report+0x141/0x180
[   25.657230]  ? copy_to_kernel_nofault+0x225/0x260
[   25.657257]  __asan_report_load8_noabort+0x18/0x20
[   25.657281]  copy_to_kernel_nofault+0x225/0x260
[   25.657305]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   25.657329]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   25.657352]  ? finish_task_switch.isra.0+0x153/0x700
[   25.657375]  ? __schedule+0x10cc/0x2b60
[   25.657400]  ? trace_hardirqs_on+0x37/0xe0
[   25.657431]  ? __pfx_read_tsc+0x10/0x10
[   25.657454]  ? ktime_get_ts64+0x86/0x230
[   25.657479]  kunit_try_run_case+0x1a5/0x480
[   25.657507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.657529]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.657551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.657576]  ? __kthread_parkme+0x82/0x180
[   25.657597]  ? preempt_count_sub+0x50/0x80
[   25.657619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.657644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.657668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.657692]  kthread+0x337/0x6f0
[   25.657712]  ? trace_preempt_on+0x20/0xc0
[   25.657733]  ? __pfx_kthread+0x10/0x10
[   25.657754]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.657777]  ? calculate_sigpending+0x7b/0xa0
[   25.657818]  ? __pfx_kthread+0x10/0x10
[   25.657840]  ret_from_fork+0x116/0x1d0
[   25.657859]  ? __pfx_kthread+0x10/0x10
[   25.657880]  ret_from_fork_asm+0x1a/0x30
[   25.657911]  </TASK>
[   25.657923] 
[   25.671002] Allocated by task 310:
[   25.671354]  kasan_save_stack+0x45/0x70
[   25.671771]  kasan_save_track+0x18/0x40
[   25.672189]  kasan_save_alloc_info+0x3b/0x50
[   25.672666]  __kasan_kmalloc+0xb7/0xc0
[   25.673086]  __kmalloc_cache_noprof+0x189/0x420
[   25.673606]  copy_to_kernel_nofault_oob+0x12f/0x560
[   25.674140]  kunit_try_run_case+0x1a5/0x480
[   25.674625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.675190]  kthread+0x337/0x6f0
[   25.675548]  ret_from_fork+0x116/0x1d0
[   25.675966]  ret_from_fork_asm+0x1a/0x30
[   25.676380] 
[   25.676579] The buggy address belongs to the object at ffff888102597b00
[   25.676579]  which belongs to the cache kmalloc-128 of size 128
[   25.677785] The buggy address is located 0 bytes to the right of
[   25.677785]  allocated 120-byte region [ffff888102597b00, ffff888102597b78)
[   25.678926] 
[   25.679142] The buggy address belongs to the physical page:
[   25.679683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102597
[   25.680445] flags: 0x200000000000000(node=0|zone=2)
[   25.680976] page_type: f5(slab)
[   25.681303] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.681669] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.682114] page dumped because: kasan: bad access detected
[   25.682449] 
[   25.682534] Memory state around the buggy address:
[   25.682686]  ffff888102597a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.682977]  ffff888102597a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.683203] >ffff888102597b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.683781]                                                                 ^
[   25.684475]  ffff888102597b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.685251]  ffff888102597c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.685516] ==================================================================
[   25.686395] ==================================================================
[   25.686667] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   25.687301] Write of size 8 at addr ffff888102597b78 by task kunit_try_catch/310
[   25.687954] 
[   25.688126] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.688179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.688193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.688216] Call Trace:
[   25.688230]  <TASK>
[   25.688251]  dump_stack_lvl+0x73/0xb0
[   25.688279]  print_report+0xd1/0x650
[   25.688303]  ? __virt_addr_valid+0x1db/0x2d0
[   25.688327]  ? copy_to_kernel_nofault+0x99/0x260
[   25.688354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.688381]  ? copy_to_kernel_nofault+0x99/0x260
[   25.688403]  kasan_report+0x141/0x180
[   25.688424]  ? copy_to_kernel_nofault+0x99/0x260
[   25.688451]  kasan_check_range+0x10c/0x1c0
[   25.688475]  __kasan_check_write+0x18/0x20
[   25.688497]  copy_to_kernel_nofault+0x99/0x260
[   25.688521]  copy_to_kernel_nofault_oob+0x288/0x560
[   25.688544]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   25.688567]  ? finish_task_switch.isra.0+0x153/0x700
[   25.688604]  ? __schedule+0x10cc/0x2b60
[   25.688645]  ? trace_hardirqs_on+0x37/0xe0
[   25.688675]  ? __pfx_read_tsc+0x10/0x10
[   25.688698]  ? ktime_get_ts64+0x86/0x230
[   25.688723]  kunit_try_run_case+0x1a5/0x480
[   25.688750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.688773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.688795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.688820]  ? __kthread_parkme+0x82/0x180
[   25.688841]  ? preempt_count_sub+0x50/0x80
[   25.688864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.688888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.688929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.688963]  kthread+0x337/0x6f0
[   25.688983]  ? trace_preempt_on+0x20/0xc0
[   25.689005]  ? __pfx_kthread+0x10/0x10
[   25.689025]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.689048]  ? calculate_sigpending+0x7b/0xa0
[   25.689072]  ? __pfx_kthread+0x10/0x10
[   25.689093]  ret_from_fork+0x116/0x1d0
[   25.689112]  ? __pfx_kthread+0x10/0x10
[   25.689139]  ret_from_fork_asm+0x1a/0x30
[   25.689170]  </TASK>
[   25.689183] 
[   25.696650] Allocated by task 310:
[   25.696831]  kasan_save_stack+0x45/0x70
[   25.697077]  kasan_save_track+0x18/0x40
[   25.697282]  kasan_save_alloc_info+0x3b/0x50
[   25.697448]  __kasan_kmalloc+0xb7/0xc0
[   25.697584]  __kmalloc_cache_noprof+0x189/0x420
[   25.697731]  copy_to_kernel_nofault_oob+0x12f/0x560
[   25.697928]  kunit_try_run_case+0x1a5/0x480
[   25.698138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.698436]  kthread+0x337/0x6f0
[   25.698559]  ret_from_fork+0x116/0x1d0
[   25.698791]  ret_from_fork_asm+0x1a/0x30
[   25.698924] 
[   25.698999] The buggy address belongs to the object at ffff888102597b00
[   25.698999]  which belongs to the cache kmalloc-128 of size 128
[   25.699596] The buggy address is located 0 bytes to the right of
[   25.699596]  allocated 120-byte region [ffff888102597b00, ffff888102597b78)
[   25.700189] 
[   25.700265] The buggy address belongs to the physical page:
[   25.700473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102597
[   25.701019] flags: 0x200000000000000(node=0|zone=2)
[   25.701228] page_type: f5(slab)
[   25.701377] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.701627] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.702049] page dumped because: kasan: bad access detected
[   25.702279] 
[   25.702359] Memory state around the buggy address:
[   25.702547]  ffff888102597a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.703088]  ffff888102597a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.703400] >ffff888102597b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.703621]                                                                 ^
[   25.703827]  ffff888102597b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.704043]  ffff888102597c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.704251] ==================================================================