Hay
Date
July 10, 2025, 9:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.494722] ==================================================================
[   32.494913] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   32.495067] Write of size 8 at addr fff00000c9bc2878 by task kunit_try_catch/312
[   32.495165] 
[   32.495254] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.495475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.495512] Hardware name: linux,dummy-virt (DT)
[   32.496151] Call trace:
[   32.496269]  show_stack+0x20/0x38 (C)
[   32.496377]  dump_stack_lvl+0x8c/0xd0
[   32.496454]  print_report+0x118/0x5d0
[   32.496557]  kasan_report+0xdc/0x128
[   32.496601]  kasan_check_range+0x100/0x1a8
[   32.496650]  __kasan_check_write+0x20/0x30
[   32.496739]  copy_to_kernel_nofault+0x8c/0x250
[   32.496981]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   32.497088]  kunit_try_run_case+0x170/0x3f0
[   32.497224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.497281]  kthread+0x328/0x630
[   32.497365]  ret_from_fork+0x10/0x20
[   32.497578] 
[   32.497672] Allocated by task 312:
[   32.497721]  kasan_save_stack+0x3c/0x68
[   32.497805]  kasan_save_track+0x20/0x40
[   32.497866]  kasan_save_alloc_info+0x40/0x58
[   32.497906]  __kasan_kmalloc+0xd4/0xd8
[   32.497945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.497987]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.498030]  kunit_try_run_case+0x170/0x3f0
[   32.498072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.498120]  kthread+0x328/0x630
[   32.498162]  ret_from_fork+0x10/0x20
[   32.498201] 
[   32.498222] The buggy address belongs to the object at fff00000c9bc2800
[   32.498222]  which belongs to the cache kmalloc-128 of size 128
[   32.498285] The buggy address is located 0 bytes to the right of
[   32.498285]  allocated 120-byte region [fff00000c9bc2800, fff00000c9bc2878)
[   32.498353] 
[   32.498423] The buggy address belongs to the physical page:
[   32.498702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.499011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.499365] page_type: f5(slab)
[   32.499602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.499953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.500185] page dumped because: kasan: bad access detected
[   32.500418] 
[   32.500441] Memory state around the buggy address:
[   32.500487]  fff00000c9bc2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.500538]  fff00000c9bc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.500585] >fff00000c9bc2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.500877]                                                                 ^
[   32.500942]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.501125]  fff00000c9bc2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.501252] ==================================================================
[   32.487731] ==================================================================
[   32.487800] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   32.487870] Read of size 8 at addr fff00000c9bc2878 by task kunit_try_catch/312
[   32.488108] 
[   32.488263] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   32.488460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.488515] Hardware name: linux,dummy-virt (DT)
[   32.488672] Call trace:
[   32.488743]  show_stack+0x20/0x38 (C)
[   32.488796]  dump_stack_lvl+0x8c/0xd0
[   32.488843]  print_report+0x118/0x5d0
[   32.488888]  kasan_report+0xdc/0x128
[   32.488931]  __asan_report_load8_noabort+0x20/0x30
[   32.488981]  copy_to_kernel_nofault+0x204/0x250
[   32.489037]  copy_to_kernel_nofault_oob+0x158/0x418
[   32.489425]  kunit_try_run_case+0x170/0x3f0
[   32.489571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.489915]  kthread+0x328/0x630
[   32.489965]  ret_from_fork+0x10/0x20
[   32.490016] 
[   32.490523] Allocated by task 312:
[   32.490644]  kasan_save_stack+0x3c/0x68
[   32.490756]  kasan_save_track+0x20/0x40
[   32.490811]  kasan_save_alloc_info+0x40/0x58
[   32.490850]  __kasan_kmalloc+0xd4/0xd8
[   32.490891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.490933]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.490977]  kunit_try_run_case+0x170/0x3f0
[   32.491072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.491183]  kthread+0x328/0x630
[   32.491368]  ret_from_fork+0x10/0x20
[   32.491471] 
[   32.491530] The buggy address belongs to the object at fff00000c9bc2800
[   32.491530]  which belongs to the cache kmalloc-128 of size 128
[   32.491644] The buggy address is located 0 bytes to the right of
[   32.491644]  allocated 120-byte region [fff00000c9bc2800, fff00000c9bc2878)
[   32.491719] 
[   32.491742] The buggy address belongs to the physical page:
[   32.491781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2
[   32.491838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.491893] page_type: f5(slab)
[   32.491948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.492152] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.492437] page dumped because: kasan: bad access detected
[   32.492478] 
[   32.492500] Memory state around the buggy address:
[   32.492541]  fff00000c9bc2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.492603]  fff00000c9bc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.492650] >fff00000c9bc2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.493072]                                                                 ^
[   32.493238]  fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.493319]  fff00000c9bc2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.493362] ==================================================================

[   29.087414] ==================================================================
[   29.088054] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   29.088370] Read of size 8 at addr ffff8881060c3c78 by task kunit_try_catch/329
[   29.088690] 
[   29.089130] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   29.089499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.089516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.089541] Call Trace:
[   29.089557]  <TASK>
[   29.089578]  dump_stack_lvl+0x73/0xb0
[   29.089612]  print_report+0xd1/0x610
[   29.089640]  ? __virt_addr_valid+0x1db/0x2d0
[   29.089668]  ? copy_to_kernel_nofault+0x225/0x260
[   29.089693]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.089730]  ? copy_to_kernel_nofault+0x225/0x260
[   29.089755]  kasan_report+0x141/0x180
[   29.089796]  ? copy_to_kernel_nofault+0x225/0x260
[   29.089825]  __asan_report_load8_noabort+0x18/0x20
[   29.089851]  copy_to_kernel_nofault+0x225/0x260
[   29.089877]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   29.089902]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   29.089926]  ? finish_task_switch.isra.0+0x153/0x700
[   29.089950]  ? __schedule+0x10cc/0x2b60
[   29.089975]  ? trace_hardirqs_on+0x37/0xe0
[   29.090008]  ? __pfx_read_tsc+0x10/0x10
[   29.090033]  ? ktime_get_ts64+0x86/0x230
[   29.090060]  kunit_try_run_case+0x1a5/0x480
[   29.090084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.090106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.090132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.090156]  ? __kthread_parkme+0x82/0x180
[   29.090179]  ? preempt_count_sub+0x50/0x80
[   29.090204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.090227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.090253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.090281]  kthread+0x337/0x6f0
[   29.090302]  ? trace_preempt_on+0x20/0xc0
[   29.090325]  ? __pfx_kthread+0x10/0x10
[   29.090348]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.090371]  ? calculate_sigpending+0x7b/0xa0
[   29.090396]  ? __pfx_kthread+0x10/0x10
[   29.090419]  ret_from_fork+0x116/0x1d0
[   29.090441]  ? __pfx_kthread+0x10/0x10
[   29.090463]  ret_from_fork_asm+0x1a/0x30
[   29.090512]  </TASK>
[   29.090526] 
[   29.102261] Allocated by task 329:
[   29.102716]  kasan_save_stack+0x45/0x70
[   29.103059]  kasan_save_track+0x18/0x40
[   29.103236]  kasan_save_alloc_info+0x3b/0x50
[   29.103638]  __kasan_kmalloc+0xb7/0xc0
[   29.104036]  __kmalloc_cache_noprof+0x189/0x420
[   29.104295]  copy_to_kernel_nofault_oob+0x12f/0x560
[   29.104501]  kunit_try_run_case+0x1a5/0x480
[   29.104716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.105073]  kthread+0x337/0x6f0
[   29.105403]  ret_from_fork+0x116/0x1d0
[   29.105678]  ret_from_fork_asm+0x1a/0x30
[   29.106172] 
[   29.106270] The buggy address belongs to the object at ffff8881060c3c00
[   29.106270]  which belongs to the cache kmalloc-128 of size 128
[   29.106981] The buggy address is located 0 bytes to the right of
[   29.106981]  allocated 120-byte region [ffff8881060c3c00, ffff8881060c3c78)
[   29.107760] 
[   29.107896] The buggy address belongs to the physical page:
[   29.108129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c3
[   29.108633] flags: 0x200000000000000(node=0|zone=2)
[   29.108939] page_type: f5(slab)
[   29.109149] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.109393] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.109746] page dumped because: kasan: bad access detected
[   29.110001] 
[   29.110092] Memory state around the buggy address:
[   29.110303]  ffff8881060c3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.110605]  ffff8881060c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.110951] >ffff8881060c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.111169]                                                                 ^
[   29.111538]  ffff8881060c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.111914]  ffff8881060c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.112531] ==================================================================
[   29.113418] ==================================================================
[   29.113744] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   29.114091] Write of size 8 at addr ffff8881060c3c78 by task kunit_try_catch/329
[   29.114404] 
[   29.114568] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   29.114619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.114632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.114691] Call Trace:
[   29.114715]  <TASK>
[   29.114733]  dump_stack_lvl+0x73/0xb0
[   29.114783]  print_report+0xd1/0x610
[   29.114837]  ? __virt_addr_valid+0x1db/0x2d0
[   29.114863]  ? copy_to_kernel_nofault+0x99/0x260
[   29.114887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.114915]  ? copy_to_kernel_nofault+0x99/0x260
[   29.114939]  kasan_report+0x141/0x180
[   29.114962]  ? copy_to_kernel_nofault+0x99/0x260
[   29.114992]  kasan_check_range+0x10c/0x1c0
[   29.115017]  __kasan_check_write+0x18/0x20
[   29.115041]  copy_to_kernel_nofault+0x99/0x260
[   29.115068]  copy_to_kernel_nofault_oob+0x288/0x560
[   29.115092]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   29.115116]  ? finish_task_switch.isra.0+0x153/0x700
[   29.115140]  ? __schedule+0x10cc/0x2b60
[   29.115163]  ? trace_hardirqs_on+0x37/0xe0
[   29.115197]  ? __pfx_read_tsc+0x10/0x10
[   29.115222]  ? ktime_get_ts64+0x86/0x230
[   29.115248]  kunit_try_run_case+0x1a5/0x480
[   29.115271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.115293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.115317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.115341]  ? __kthread_parkme+0x82/0x180
[   29.115363]  ? preempt_count_sub+0x50/0x80
[   29.115388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.115411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.115438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.115467]  kthread+0x337/0x6f0
[   29.115495]  ? trace_preempt_on+0x20/0xc0
[   29.115520]  ? __pfx_kthread+0x10/0x10
[   29.115542]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.115565]  ? calculate_sigpending+0x7b/0xa0
[   29.115593]  ? __pfx_kthread+0x10/0x10
[   29.115616]  ret_from_fork+0x116/0x1d0
[   29.115637]  ? __pfx_kthread+0x10/0x10
[   29.115660]  ret_from_fork_asm+0x1a/0x30
[   29.115728]  </TASK>
[   29.115744] 
[   29.124028] Allocated by task 329:
[   29.124160]  kasan_save_stack+0x45/0x70
[   29.124300]  kasan_save_track+0x18/0x40
[   29.124526]  kasan_save_alloc_info+0x3b/0x50
[   29.124781]  __kasan_kmalloc+0xb7/0xc0
[   29.124975]  __kmalloc_cache_noprof+0x189/0x420
[   29.125196]  copy_to_kernel_nofault_oob+0x12f/0x560
[   29.125531]  kunit_try_run_case+0x1a5/0x480
[   29.125771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.125987]  kthread+0x337/0x6f0
[   29.126157]  ret_from_fork+0x116/0x1d0
[   29.126423]  ret_from_fork_asm+0x1a/0x30
[   29.126625] 
[   29.126738] The buggy address belongs to the object at ffff8881060c3c00
[   29.126738]  which belongs to the cache kmalloc-128 of size 128
[   29.127228] The buggy address is located 0 bytes to the right of
[   29.127228]  allocated 120-byte region [ffff8881060c3c00, ffff8881060c3c78)
[   29.127649] 
[   29.127775] The buggy address belongs to the physical page:
[   29.128310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c3
[   29.128685] flags: 0x200000000000000(node=0|zone=2)
[   29.128950] page_type: f5(slab)
[   29.129117] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.129368] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.129676] page dumped because: kasan: bad access detected
[   29.130721] 
[   29.131818] Memory state around the buggy address:
[   29.131984]  ffff8881060c3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.132203]  ffff8881060c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.132419] >ffff8881060c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.132789]                                                                 ^
[   29.133010]  ffff8881060c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.133223]  ffff8881060c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.133434] ==================================================================