Hay
Date
July 22, 2025, 5:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.427114] ==================================================================
[   33.427202] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   33.427343] Write of size 8 at addr fff00000c922a378 by task kunit_try_catch/312
[   33.427417] 
[   33.427454] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.427801] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.427862] Hardware name: linux,dummy-virt (DT)
[   33.427985] Call trace:
[   33.428043]  show_stack+0x20/0x38 (C)
[   33.428127]  dump_stack_lvl+0x8c/0xd0
[   33.428239]  print_report+0x118/0x5e8
[   33.428315]  kasan_report+0xdc/0x128
[   33.428381]  kasan_check_range+0x100/0x1a8
[   33.428481]  __kasan_check_write+0x20/0x30
[   33.428546]  copy_to_kernel_nofault+0x8c/0x250
[   33.428627]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   33.428681]  kunit_try_run_case+0x170/0x3f0
[   33.428885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.429184]  kthread+0x328/0x630
[   33.429341]  ret_from_fork+0x10/0x20
[   33.429681] 
[   33.429727] Allocated by task 312:
[   33.429763]  kasan_save_stack+0x3c/0x68
[   33.430027]  kasan_save_track+0x20/0x40
[   33.430292]  kasan_save_alloc_info+0x40/0x58
[   33.430484]  __kasan_kmalloc+0xd4/0xd8
[   33.430531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.431076]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.431236]  kunit_try_run_case+0x170/0x3f0
[   33.431459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.431553]  kthread+0x328/0x630
[   33.432006]  ret_from_fork+0x10/0x20
[   33.432089] 
[   33.432375] The buggy address belongs to the object at fff00000c922a300
[   33.432375]  which belongs to the cache kmalloc-128 of size 128
[   33.432625] The buggy address is located 0 bytes to the right of
[   33.432625]  allocated 120-byte region [fff00000c922a300, fff00000c922a378)
[   33.432987] 
[   33.433394] The buggy address belongs to the physical page:
[   33.433623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.434010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.434108] page_type: f5(slab)
[   33.434206] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.434289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.434543] page dumped because: kasan: bad access detected
[   33.434698] 
[   33.434974] Memory state around the buggy address:
[   33.435136]  fff00000c922a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.435506]  fff00000c922a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.435751] >fff00000c922a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.435986]                                                                 ^
[   33.436267]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.436693]  fff00000c922a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.437014] ==================================================================
[   33.420322] ==================================================================
[   33.420396] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   33.420555] Read of size 8 at addr fff00000c922a378 by task kunit_try_catch/312
[   33.420615] 
[   33.420680] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.420981] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.421248] Hardware name: linux,dummy-virt (DT)
[   33.421289] Call trace:
[   33.421376]  show_stack+0x20/0x38 (C)
[   33.421435]  dump_stack_lvl+0x8c/0xd0
[   33.421487]  print_report+0x118/0x5e8
[   33.421533]  kasan_report+0xdc/0x128
[   33.421579]  __asan_report_load8_noabort+0x20/0x30
[   33.421631]  copy_to_kernel_nofault+0x204/0x250
[   33.421682]  copy_to_kernel_nofault_oob+0x158/0x418
[   33.421734]  kunit_try_run_case+0x170/0x3f0
[   33.421794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.421859]  kthread+0x328/0x630
[   33.421903]  ret_from_fork+0x10/0x20
[   33.421952] 
[   33.421984] Allocated by task 312:
[   33.422021]  kasan_save_stack+0x3c/0x68
[   33.422077]  kasan_save_track+0x20/0x40
[   33.422130]  kasan_save_alloc_info+0x40/0x58
[   33.422176]  __kasan_kmalloc+0xd4/0xd8
[   33.422214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.422257]  copy_to_kernel_nofault_oob+0xc8/0x418
[   33.422301]  kunit_try_run_case+0x170/0x3f0
[   33.422339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.422386]  kthread+0x328/0x630
[   33.422425]  ret_from_fork+0x10/0x20
[   33.422464] 
[   33.422501] The buggy address belongs to the object at fff00000c922a300
[   33.422501]  which belongs to the cache kmalloc-128 of size 128
[   33.422562] The buggy address is located 0 bytes to the right of
[   33.422562]  allocated 120-byte region [fff00000c922a300, fff00000c922a378)
[   33.422628] 
[   33.422660] The buggy address belongs to the physical page:
[   33.422708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a
[   33.422766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.422854] page_type: f5(slab)
[   33.423654] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.423765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.423853] page dumped because: kasan: bad access detected
[   33.423965] 
[   33.424036] Memory state around the buggy address:
[   33.424132]  fff00000c922a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.424313]  fff00000c922a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.424485] >fff00000c922a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.424791]                                                                 ^
[   33.425098]  fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425169]  fff00000c922a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425212] ==================================================================

[   29.200811] ==================================================================
[   29.202265] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   29.203723] Read of size 8 at addr ffff888106002578 by task kunit_try_catch/329
[   29.203983] 
[   29.204082] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.204139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.204154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.204425] Call Trace:
[   29.204442]  <TASK>
[   29.204478]  dump_stack_lvl+0x73/0xb0
[   29.204516]  print_report+0xd1/0x640
[   29.204550]  ? __virt_addr_valid+0x1db/0x2d0
[   29.204600]  ? copy_to_kernel_nofault+0x225/0x260
[   29.204627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.204656]  ? copy_to_kernel_nofault+0x225/0x260
[   29.204683]  kasan_report+0x141/0x180
[   29.204709]  ? copy_to_kernel_nofault+0x225/0x260
[   29.204740]  __asan_report_load8_noabort+0x18/0x20
[   29.204767]  copy_to_kernel_nofault+0x225/0x260
[   29.204794]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   29.204819]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   29.204855]  ? __schedule+0x10da/0x2b60
[   29.204892]  ? finish_task_switch.isra.0+0x153/0x700
[   29.204918]  ? finish_task_switch.isra.0+0x156/0x700
[   29.204950]  ? __pfx_read_tsc+0x10/0x10
[   29.204975]  ? ktime_get_ts64+0x86/0x230
[   29.205003]  kunit_try_run_case+0x1a5/0x480
[   29.205031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.205056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.205082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.205110]  ? __kthread_parkme+0x82/0x180
[   29.205132]  ? preempt_count_sub+0x50/0x80
[   29.205155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.205182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.205207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.205233]  kthread+0x337/0x6f0
[   29.205254]  ? trace_preempt_on+0x20/0xc0
[   29.205280]  ? __pfx_kthread+0x10/0x10
[   29.205303]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.205338]  ? calculate_sigpending+0x7b/0xa0
[   29.205365]  ? __pfx_kthread+0x10/0x10
[   29.205399]  ret_from_fork+0x116/0x1d0
[   29.205421]  ? __pfx_kthread+0x10/0x10
[   29.205444]  ret_from_fork_asm+0x1a/0x30
[   29.205477]  </TASK>
[   29.205491] 
[   29.217772] Allocated by task 329:
[   29.218547]  kasan_save_stack+0x45/0x70
[   29.218710]  kasan_save_track+0x18/0x40
[   29.218921]  kasan_save_alloc_info+0x3b/0x50
[   29.219108]  __kasan_kmalloc+0xb7/0xc0
[   29.219324]  __kmalloc_cache_noprof+0x189/0x420
[   29.219782]  copy_to_kernel_nofault_oob+0x12f/0x560
[   29.220002]  kunit_try_run_case+0x1a5/0x480
[   29.220335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.220804]  kthread+0x337/0x6f0
[   29.220965]  ret_from_fork+0x116/0x1d0
[   29.221258]  ret_from_fork_asm+0x1a/0x30
[   29.221456] 
[   29.221559] The buggy address belongs to the object at ffff888106002500
[   29.221559]  which belongs to the cache kmalloc-128 of size 128
[   29.222367] The buggy address is located 0 bytes to the right of
[   29.222367]  allocated 120-byte region [ffff888106002500, ffff888106002578)
[   29.223296] 
[   29.223416] The buggy address belongs to the physical page:
[   29.223657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106002
[   29.224006] flags: 0x200000000000000(node=0|zone=2)
[   29.224234] page_type: f5(slab)
[   29.224638] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.225069] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.225441] page dumped because: kasan: bad access detected
[   29.225769] 
[   29.225969] Memory state around the buggy address:
[   29.226369]  ffff888106002400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.226757]  ffff888106002480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.227100] >ffff888106002500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.227392]                                                                 ^
[   29.227816]  ffff888106002580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.228122]  ffff888106002600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.228620] ==================================================================
[   29.229602] ==================================================================
[   29.229917] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   29.230264] Write of size 8 at addr ffff888106002578 by task kunit_try_catch/329
[   29.230763] 
[   29.230926] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.230978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.230993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.231016] Call Trace:
[   29.231030]  <TASK>
[   29.231046]  dump_stack_lvl+0x73/0xb0
[   29.231077]  print_report+0xd1/0x640
[   29.231103]  ? __virt_addr_valid+0x1db/0x2d0
[   29.231130]  ? copy_to_kernel_nofault+0x99/0x260
[   29.231155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.231305]  ? copy_to_kernel_nofault+0x99/0x260
[   29.231335]  kasan_report+0x141/0x180
[   29.231361]  ? copy_to_kernel_nofault+0x99/0x260
[   29.231391]  kasan_check_range+0x10c/0x1c0
[   29.231417]  __kasan_check_write+0x18/0x20
[   29.231442]  copy_to_kernel_nofault+0x99/0x260
[   29.231565]  copy_to_kernel_nofault_oob+0x288/0x560
[   29.231595]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   29.231621]  ? __schedule+0x10da/0x2b60
[   29.231647]  ? finish_task_switch.isra.0+0x153/0x700
[   29.231671]  ? finish_task_switch.isra.0+0x156/0x700
[   29.231703]  ? __pfx_read_tsc+0x10/0x10
[   29.231727]  ? ktime_get_ts64+0x86/0x230
[   29.231753]  kunit_try_run_case+0x1a5/0x480
[   29.231779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.231803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.231841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.231868]  ? __kthread_parkme+0x82/0x180
[   29.231890]  ? preempt_count_sub+0x50/0x80
[   29.231914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.231940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.231966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.231992]  kthread+0x337/0x6f0
[   29.232012]  ? trace_preempt_on+0x20/0xc0
[   29.232036]  ? __pfx_kthread+0x10/0x10
[   29.232059]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.232084]  ? calculate_sigpending+0x7b/0xa0
[   29.232109]  ? __pfx_kthread+0x10/0x10
[   29.232132]  ret_from_fork+0x116/0x1d0
[   29.232153]  ? __pfx_kthread+0x10/0x10
[   29.232176]  ret_from_fork_asm+0x1a/0x30
[   29.232208]  </TASK>
[   29.232221] 
[   29.243151] Allocated by task 329:
[   29.243783]  kasan_save_stack+0x45/0x70
[   29.243977]  kasan_save_track+0x18/0x40
[   29.244176]  kasan_save_alloc_info+0x3b/0x50
[   29.244607]  __kasan_kmalloc+0xb7/0xc0
[   29.244807]  __kmalloc_cache_noprof+0x189/0x420
[   29.245039]  copy_to_kernel_nofault_oob+0x12f/0x560
[   29.245431]  kunit_try_run_case+0x1a5/0x480
[   29.245635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.245977]  kthread+0x337/0x6f0
[   29.246285]  ret_from_fork+0x116/0x1d0
[   29.246469]  ret_from_fork_asm+0x1a/0x30
[   29.246814] 
[   29.246918] The buggy address belongs to the object at ffff888106002500
[   29.246918]  which belongs to the cache kmalloc-128 of size 128
[   29.247542] The buggy address is located 0 bytes to the right of
[   29.247542]  allocated 120-byte region [ffff888106002500, ffff888106002578)
[   29.248286] 
[   29.248526] The buggy address belongs to the physical page:
[   29.248767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106002
[   29.249103] flags: 0x200000000000000(node=0|zone=2)
[   29.249528] page_type: f5(slab)
[   29.249700] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.250142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.250566] page dumped because: kasan: bad access detected
[   29.250782] 
[   29.250895] Memory state around the buggy address:
[   29.251244]  ffff888106002400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.251686]  ffff888106002480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.251984] >ffff888106002500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.252346]                                                                 ^
[   29.252683]  ffff888106002580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.253213]  ffff888106002600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.253520] ==================================================================