Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
juno-r2 | |
qemu-arm64 | |
qemu-x86_64 |
[ 76.404295] ================================================================== [ 76.419357] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 76.426870] Read of size 8 at addr ffff000080dbcb78 by task kunit_try_catch/367 [ 76.434281] [ 76.435824] CPU: 1 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 76.435855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.435864] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.435876] Call trace: [ 76.435884] show_stack+0x20/0x38 (C) [ 76.435905] dump_stack_lvl+0x8c/0xd0 [ 76.435927] print_report+0x118/0x608 [ 76.435947] kasan_report+0xdc/0x128 [ 76.435966] __asan_report_load8_noabort+0x20/0x30 [ 76.435985] copy_to_kernel_nofault+0x204/0x250 [ 76.436006] copy_to_kernel_nofault_oob+0x158/0x418 [ 76.436025] kunit_try_run_case+0x170/0x3f0 [ 76.436047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.436070] kthread+0x328/0x630 [ 76.436087] ret_from_fork+0x10/0x20 [ 76.436107] [ 76.507081] Allocated by task 367: [ 76.510540] kasan_save_stack+0x3c/0x68 [ 76.514450] kasan_save_track+0x20/0x40 [ 76.518361] kasan_save_alloc_info+0x40/0x58 [ 76.522698] __kasan_kmalloc+0xd4/0xd8 [ 76.526522] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.531136] copy_to_kernel_nofault_oob+0xc8/0x418 [ 76.536009] kunit_try_run_case+0x170/0x3f0 [ 76.540262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.545834] kthread+0x328/0x630 [ 76.549125] ret_from_fork+0x10/0x20 [ 76.552770] [ 76.554302] The buggy address belongs to the object at ffff000080dbcb00 [ 76.554302] which belongs to the cache kmalloc-128 of size 128 [ 76.566968] The buggy address is located 0 bytes to the right of [ 76.566968] allocated 120-byte region [ffff000080dbcb00, ffff000080dbcb78) [ 76.580071] [ 76.581604] The buggy address belongs to the physical page: [ 76.587253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100dbc [ 76.595364] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.603122] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.610180] page_type: f5(slab) [ 76.613386] raw: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 76.621231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.629077] head: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 76.637008] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.644939] head: 0bfffe0000000001 fffffdffc2036f01 00000000ffffffff 00000000ffffffff [ 76.652878] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.660812] page dumped because: kasan: bad access detected [ 76.666462] [ 76.667998] Memory state around the buggy address: [ 76.672861] ffff000080dbca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.680185] ffff000080dbca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.687501] >ffff000080dbcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.694813] ^ [ 76.702048] ffff000080dbcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.709371] ffff000080dbcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.716693] ================================================================== [ 76.724166] ================================================================== [ 76.731493] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 76.738911] Write of size 8 at addr ffff000080dbcb78 by task kunit_try_catch/367 [ 76.746409] [ 76.747952] CPU: 1 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 76.747984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.747993] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.748005] Call trace: [ 76.748013] show_stack+0x20/0x38 (C) [ 76.748032] dump_stack_lvl+0x8c/0xd0 [ 76.748053] print_report+0x118/0x608 [ 76.748074] kasan_report+0xdc/0x128 [ 76.748093] kasan_check_range+0x100/0x1a8 [ 76.748114] __kasan_check_write+0x20/0x30 [ 76.748131] copy_to_kernel_nofault+0x8c/0x250 [ 76.748151] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 76.748172] kunit_try_run_case+0x170/0x3f0 [ 76.748194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.748216] kthread+0x328/0x630 [ 76.748232] ret_from_fork+0x10/0x20 [ 76.748253] [ 76.822595] Allocated by task 367: [ 76.826056] kasan_save_stack+0x3c/0x68 [ 76.829966] kasan_save_track+0x20/0x40 [ 76.833876] kasan_save_alloc_info+0x40/0x58 [ 76.838214] __kasan_kmalloc+0xd4/0xd8 [ 76.842033] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.846647] copy_to_kernel_nofault_oob+0xc8/0x418 [ 76.851511] kunit_try_run_case+0x170/0x3f0 [ 76.855766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.861334] kthread+0x328/0x630 [ 76.864623] ret_from_fork+0x10/0x20 [ 76.868262] [ 76.869791] The buggy address belongs to the object at ffff000080dbcb00 [ 76.869791] which belongs to the cache kmalloc-128 of size 128 [ 76.882451] The buggy address is located 0 bytes to the right of [ 76.882451] allocated 120-byte region [ffff000080dbcb00, ffff000080dbcb78) [ 76.895555] [ 76.897093] The buggy address belongs to the physical page: [ 76.902741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100dbc [ 76.910855] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.918620] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.925675] page_type: f5(slab) [ 76.928879] raw: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 76.936720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.944565] head: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 76.952504] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.960445] head: 0bfffe0000000001 fffffdffc2036f01 00000000ffffffff 00000000ffffffff [ 76.968375] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.976310] page dumped because: kasan: bad access detected [ 76.981957] [ 76.983483] Memory state around the buggy address: [ 76.988351] ffff000080dbca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.995676] ffff000080dbca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.002991] >ffff000080dbcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.010311] ^ [ 77.017546] ffff000080dbcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.024868] ffff000080dbcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.032188] ==================================================================
[ 1525.454463] ================================================================== [ 1525.454492] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 1525.454537] Read of size 8 at addr ffff000827f2f478 by task kunit_try_catch/352 [ 1525.454572] [ 1525.454589] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.454651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.454669] Hardware name: ARM Juno development board (r2) (DT) [ 1525.454693] Call trace: [ 1525.454706] show_stack+0x20/0x38 (C) [ 1525.454744] dump_stack_lvl+0x8c/0xd0 [ 1525.454785] print_report+0x118/0x608 [ 1525.454827] kasan_report+0xdc/0x128 [ 1525.454867] __asan_report_load8_noabort+0x20/0x30 [ 1525.454906] copy_to_kernel_nofault+0x204/0x250 [ 1525.454948] copy_to_kernel_nofault_oob+0x158/0x418 [ 1525.454989] kunit_try_run_case+0x170/0x3f0 [ 1525.455030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.455076] kthread+0x328/0x630 [ 1525.455109] ret_from_fork+0x10/0x20 [ 1525.455146] [ 1525.455158] Allocated by task 352: [ 1525.455176] kasan_save_stack+0x3c/0x68 [ 1525.455212] kasan_save_track+0x20/0x40 [ 1525.455244] kasan_save_alloc_info+0x40/0x58 [ 1525.455273] __kasan_kmalloc+0xd4/0xd8 [ 1525.455306] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.455341] copy_to_kernel_nofault_oob+0xc8/0x418 [ 1525.455374] kunit_try_run_case+0x170/0x3f0 [ 1525.455407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.455446] kthread+0x328/0x630 [ 1525.455471] ret_from_fork+0x10/0x20 [ 1525.455501] [ 1525.455512] The buggy address belongs to the object at ffff000827f2f400 [ 1525.455512] which belongs to the cache kmalloc-128 of size 128 [ 1525.455552] The buggy address is located 0 bytes to the right of [ 1525.455552] allocated 120-byte region [ffff000827f2f400, ffff000827f2f478) [ 1525.455598] [ 1525.455609] The buggy address belongs to the physical page: [ 1525.455628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.455664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.455697] page_type: f5(slab) [ 1525.455725] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.455761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.455788] page dumped because: kasan: bad access detected [ 1525.455808] [ 1525.455818] Memory state around the buggy address: [ 1525.455839] ffff000827f2f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.455869] ffff000827f2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.455900] >ffff000827f2f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.455927] ^ [ 1525.455954] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.455985] ffff000827f2f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.456011] ================================================================== [ 1525.456085] ================================================================== [ 1525.456110] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 1525.456148] Write of size 8 at addr ffff000827f2f478 by task kunit_try_catch/352 [ 1525.456182] [ 1525.456198] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.456258] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.456278] Hardware name: ARM Juno development board (r2) (DT) [ 1525.456300] Call trace: [ 1525.456313] show_stack+0x20/0x38 (C) [ 1525.456349] dump_stack_lvl+0x8c/0xd0 [ 1525.456389] print_report+0x118/0x608 [ 1525.456431] kasan_report+0xdc/0x128 [ 1525.456471] kasan_check_range+0x100/0x1a8 [ 1525.456516] __kasan_check_write+0x20/0x30 [ 1525.456551] copy_to_kernel_nofault+0x8c/0x250 [ 1525.456593] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 1525.456634] kunit_try_run_case+0x170/0x3f0 [ 1525.456674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.456720] kthread+0x328/0x630 [ 1525.456752] ret_from_fork+0x10/0x20 [ 1525.456791] [ 1525.456801] Allocated by task 352: [ 1525.456819] kasan_save_stack+0x3c/0x68 [ 1525.456853] kasan_save_track+0x20/0x40 [ 1525.456886] kasan_save_alloc_info+0x40/0x58 [ 1525.456915] __kasan_kmalloc+0xd4/0xd8 [ 1525.456948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.456981] copy_to_kernel_nofault_oob+0xc8/0x418 [ 1525.457015] kunit_try_run_case+0x170/0x3f0 [ 1525.457048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.457087] kthread+0x328/0x630 [ 1525.457112] ret_from_fork+0x10/0x20 [ 1525.457143] [ 1525.457153] The buggy address belongs to the object at ffff000827f2f400 [ 1525.457153] which belongs to the cache kmalloc-128 of size 128 [ 1525.457193] The buggy address is located 0 bytes to the right of [ 1525.457193] allocated 120-byte region [ffff000827f2f400, ffff000827f2f478) [ 1525.457239] [ 1525.457249] The buggy address belongs to the physical page: [ 1525.457268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.457302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.457334] page_type: f5(slab) [ 1525.457361] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.457397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.457425] page dumped because: kasan: bad access detected [ 1525.457444] [ 1525.457454] Memory state around the buggy address: [ 1525.457474] ffff000827f2f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.457505] ffff000827f2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.457536] >ffff000827f2f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.457562] ^ [ 1525.457589] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.457619] ffff000827f2f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.457645] ==================================================================
[ 29.978857] ================================================================== [ 29.978921] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 29.978987] Write of size 8 at addr fff00000c5773d78 by task kunit_try_catch/293 [ 29.979041] [ 29.979342] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.979512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.979547] Hardware name: linux,dummy-virt (DT) [ 29.979606] Call trace: [ 29.979656] show_stack+0x20/0x38 (C) [ 29.979717] dump_stack_lvl+0x8c/0xd0 [ 29.979917] print_report+0x118/0x608 [ 29.980108] kasan_report+0xdc/0x128 [ 29.980241] kasan_check_range+0x100/0x1a8 [ 29.980376] __kasan_check_write+0x20/0x30 [ 29.980525] copy_to_kernel_nofault+0x8c/0x250 [ 29.980657] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 29.980818] kunit_try_run_case+0x170/0x3f0 [ 29.981034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.981212] kthread+0x328/0x630 [ 29.981299] ret_from_fork+0x10/0x20 [ 29.981487] [ 29.981509] Allocated by task 293: [ 29.981541] kasan_save_stack+0x3c/0x68 [ 29.981899] kasan_save_track+0x20/0x40 [ 29.982328] kasan_save_alloc_info+0x40/0x58 [ 29.982457] __kasan_kmalloc+0xd4/0xd8 [ 29.982523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.982668] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.982819] kunit_try_run_case+0x170/0x3f0 [ 29.982864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.982973] kthread+0x328/0x630 [ 29.983325] ret_from_fork+0x10/0x20 [ 29.983399] [ 29.983448] The buggy address belongs to the object at fff00000c5773d00 [ 29.983448] which belongs to the cache kmalloc-128 of size 128 [ 29.983511] The buggy address is located 0 bytes to the right of [ 29.983511] allocated 120-byte region [fff00000c5773d00, fff00000c5773d78) [ 29.983979] [ 29.984293] The buggy address belongs to the physical page: [ 29.984627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 29.984703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.984756] page_type: f5(slab) [ 29.984798] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.984850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.984893] page dumped because: kasan: bad access detected [ 29.984928] [ 29.984947] Memory state around the buggy address: [ 29.984980] fff00000c5773c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.985026] fff00000c5773c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985081] >fff00000c5773d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.985121] ^ [ 29.985163] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985207] fff00000c5773e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985246] ================================================================== [ 29.970806] ================================================================== [ 29.970900] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 29.971245] Read of size 8 at addr fff00000c5773d78 by task kunit_try_catch/293 [ 29.971361] [ 29.971399] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.971508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.971596] Hardware name: linux,dummy-virt (DT) [ 29.971700] Call trace: [ 29.971813] show_stack+0x20/0x38 (C) [ 29.972121] dump_stack_lvl+0x8c/0xd0 [ 29.972205] print_report+0x118/0x608 [ 29.972381] kasan_report+0xdc/0x128 [ 29.972509] __asan_report_load8_noabort+0x20/0x30 [ 29.972709] copy_to_kernel_nofault+0x204/0x250 [ 29.972848] copy_to_kernel_nofault_oob+0x158/0x418 [ 29.973282] kunit_try_run_case+0x170/0x3f0 [ 29.973529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.973654] kthread+0x328/0x630 [ 29.973787] ret_from_fork+0x10/0x20 [ 29.973886] [ 29.973982] Allocated by task 293: [ 29.974374] kasan_save_stack+0x3c/0x68 [ 29.974444] kasan_save_track+0x20/0x40 [ 29.974509] kasan_save_alloc_info+0x40/0x58 [ 29.974661] __kasan_kmalloc+0xd4/0xd8 [ 29.974757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.975069] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.975161] kunit_try_run_case+0x170/0x3f0 [ 29.975331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.975401] kthread+0x328/0x630 [ 29.975751] ret_from_fork+0x10/0x20 [ 29.975985] [ 29.976143] The buggy address belongs to the object at fff00000c5773d00 [ 29.976143] which belongs to the cache kmalloc-128 of size 128 [ 29.976287] The buggy address is located 0 bytes to the right of [ 29.976287] allocated 120-byte region [fff00000c5773d00, fff00000c5773d78) [ 29.976424] [ 29.976449] The buggy address belongs to the physical page: [ 29.976483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 29.976835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.976920] page_type: f5(slab) [ 29.976970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.977098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.977153] page dumped because: kasan: bad access detected [ 29.977202] [ 29.977224] Memory state around the buggy address: [ 29.977258] fff00000c5773c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.977303] fff00000c5773c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977357] >fff00000c5773d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.977406] ^ [ 29.977447] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977502] fff00000c5773e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977558] ==================================================================
[ 25.985103] ================================================================== [ 25.985617] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 25.985917] Read of size 8 at addr ffff8881024e1a78 by task kunit_try_catch/310 [ 25.986340] [ 25.986481] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.986778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.986817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.986858] Call Trace: [ 25.986875] <TASK> [ 25.986898] dump_stack_lvl+0x73/0xb0 [ 25.986934] print_report+0xd1/0x650 [ 25.986962] ? __virt_addr_valid+0x1db/0x2d0 [ 25.986989] ? copy_to_kernel_nofault+0x225/0x260 [ 25.987013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.987049] ? copy_to_kernel_nofault+0x225/0x260 [ 25.987075] kasan_report+0x141/0x180 [ 25.987098] ? copy_to_kernel_nofault+0x225/0x260 [ 25.987129] __asan_report_load8_noabort+0x18/0x20 [ 25.987157] copy_to_kernel_nofault+0x225/0x260 [ 25.987183] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 25.987208] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 25.987246] ? finish_task_switch.isra.0+0x153/0x700 [ 25.987273] ? __schedule+0x10cc/0x2b60 [ 25.987299] ? trace_hardirqs_on+0x37/0xe0 [ 25.987330] ? trace_hardirqs_on+0x37/0xe0 [ 25.987353] ? __pfx_read_tsc+0x10/0x10 [ 25.987379] ? ktime_get_ts64+0x86/0x230 [ 25.987544] kunit_try_run_case+0x1a5/0x480 [ 25.987572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.987598] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.987625] ? __kthread_parkme+0x82/0x180 [ 25.987647] ? preempt_count_sub+0x50/0x80 [ 25.987671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.987697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.987721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.987747] kthread+0x337/0x6f0 [ 25.987768] ? trace_preempt_on+0x20/0xc0 [ 25.987806] ? __pfx_kthread+0x10/0x10 [ 25.987828] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.987852] ? calculate_sigpending+0x7b/0xa0 [ 25.987879] ? __pfx_kthread+0x10/0x10 [ 25.987901] ret_from_fork+0x116/0x1d0 [ 25.987923] ? __pfx_kthread+0x10/0x10 [ 25.987944] ret_from_fork_asm+0x1a/0x30 [ 25.987978] </TASK> [ 25.987991] [ 25.997670] Allocated by task 310: [ 25.997860] kasan_save_stack+0x45/0x70 [ 25.998057] kasan_save_track+0x18/0x40 [ 25.998637] kasan_save_alloc_info+0x3b/0x50 [ 25.998793] __kasan_kmalloc+0xb7/0xc0 [ 25.999087] __kmalloc_cache_noprof+0x189/0x420 [ 25.999288] copy_to_kernel_nofault_oob+0x12f/0x560 [ 25.999682] kunit_try_run_case+0x1a5/0x480 [ 25.999915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.000284] kthread+0x337/0x6f0 [ 26.000512] ret_from_fork+0x116/0x1d0 [ 26.000650] ret_from_fork_asm+0x1a/0x30 [ 26.000973] [ 26.001049] The buggy address belongs to the object at ffff8881024e1a00 [ 26.001049] which belongs to the cache kmalloc-128 of size 128 [ 26.001690] The buggy address is located 0 bytes to the right of [ 26.001690] allocated 120-byte region [ffff8881024e1a00, ffff8881024e1a78) [ 26.002349] [ 26.002460] The buggy address belongs to the physical page: [ 26.002721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1 [ 26.003053] flags: 0x200000000000000(node=0|zone=2) [ 26.003591] page_type: f5(slab) [ 26.003832] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.004147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.004465] page dumped because: kasan: bad access detected [ 26.004685] [ 26.004756] Memory state around the buggy address: [ 26.005296] ffff8881024e1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.005642] ffff8881024e1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.005970] >ffff8881024e1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.006501] ^ [ 26.006891] ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.007232] ffff8881024e1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.007641] ================================================================== [ 26.008408] ================================================================== [ 26.008849] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 26.009302] Write of size 8 at addr ffff8881024e1a78 by task kunit_try_catch/310 [ 26.009611] [ 26.009723] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 26.009780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.009997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.010178] Call Trace: [ 26.010197] <TASK> [ 26.010232] dump_stack_lvl+0x73/0xb0 [ 26.010327] print_report+0xd1/0x650 [ 26.010355] ? __virt_addr_valid+0x1db/0x2d0 [ 26.010383] ? copy_to_kernel_nofault+0x99/0x260 [ 26.010410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.010439] ? copy_to_kernel_nofault+0x99/0x260 [ 26.010464] kasan_report+0x141/0x180 [ 26.010488] ? copy_to_kernel_nofault+0x99/0x260 [ 26.010607] kasan_check_range+0x10c/0x1c0 [ 26.010634] __kasan_check_write+0x18/0x20 [ 26.010659] copy_to_kernel_nofault+0x99/0x260 [ 26.010685] copy_to_kernel_nofault_oob+0x288/0x560 [ 26.010710] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 26.010733] ? finish_task_switch.isra.0+0x153/0x700 [ 26.010760] ? __schedule+0x10cc/0x2b60 [ 26.010802] ? trace_hardirqs_on+0x37/0xe0 [ 26.010833] ? trace_hardirqs_on+0x37/0xe0 [ 26.010855] ? __pfx_read_tsc+0x10/0x10 [ 26.010879] ? ktime_get_ts64+0x86/0x230 [ 26.010904] kunit_try_run_case+0x1a5/0x480 [ 26.010932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.010957] ? queued_spin_lock_slowpath+0x116/0xb40 [ 26.010984] ? __kthread_parkme+0x82/0x180 [ 26.011006] ? preempt_count_sub+0x50/0x80 [ 26.011046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.011072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.011097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.011122] kthread+0x337/0x6f0 [ 26.011143] ? trace_preempt_on+0x20/0xc0 [ 26.011166] ? __pfx_kthread+0x10/0x10 [ 26.011188] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.011212] ? calculate_sigpending+0x7b/0xa0 [ 26.011249] ? __pfx_kthread+0x10/0x10 [ 26.011272] ret_from_fork+0x116/0x1d0 [ 26.011292] ? __pfx_kthread+0x10/0x10 [ 26.011314] ret_from_fork_asm+0x1a/0x30 [ 26.011346] </TASK> [ 26.011359] [ 26.021581] Allocated by task 310: [ 26.021744] kasan_save_stack+0x45/0x70 [ 26.022306] kasan_save_track+0x18/0x40 [ 26.022582] kasan_save_alloc_info+0x3b/0x50 [ 26.022889] __kasan_kmalloc+0xb7/0xc0 [ 26.023038] __kmalloc_cache_noprof+0x189/0x420 [ 26.023270] copy_to_kernel_nofault_oob+0x12f/0x560 [ 26.023510] kunit_try_run_case+0x1a5/0x480 [ 26.023997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.024445] kthread+0x337/0x6f0 [ 26.024662] ret_from_fork+0x116/0x1d0 [ 26.025062] ret_from_fork_asm+0x1a/0x30 [ 26.025446] [ 26.025585] The buggy address belongs to the object at ffff8881024e1a00 [ 26.025585] which belongs to the cache kmalloc-128 of size 128 [ 26.026454] The buggy address is located 0 bytes to the right of [ 26.026454] allocated 120-byte region [ffff8881024e1a00, ffff8881024e1a78) [ 26.027087] [ 26.027242] The buggy address belongs to the physical page: [ 26.027573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1 [ 26.027895] flags: 0x200000000000000(node=0|zone=2) [ 26.028322] page_type: f5(slab) [ 26.028493] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.028949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.029454] page dumped because: kasan: bad access detected [ 26.029761] [ 26.029851] Memory state around the buggy address: [ 26.030300] ffff8881024e1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.030694] ffff8881024e1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.030968] >ffff8881024e1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.031578] ^ [ 26.031994] ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.032414] ffff8881024e1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.032729] ==================================================================