Hay
Date
July 15, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.051113] ==================================================================
[   21.051189] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.051509] Read of size 8 at addr fff00000c59cb678 by task kunit_try_catch/283
[   21.051641] 
[   21.051737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.051829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.051870] Hardware name: linux,dummy-virt (DT)
[   21.051906] Call trace:
[   21.051931]  show_stack+0x20/0x38 (C)
[   21.051989]  dump_stack_lvl+0x8c/0xd0
[   21.052040]  print_report+0x118/0x5d0
[   21.052090]  kasan_report+0xdc/0x128
[   21.052138]  __asan_report_load8_noabort+0x20/0x30
[   21.052191]  copy_to_kernel_nofault+0x204/0x250
[   21.052260]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.052311]  kunit_try_run_case+0x170/0x3f0
[   21.052361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.052417]  kthread+0x328/0x630
[   21.052486]  ret_from_fork+0x10/0x20
[   21.052538] 
[   21.052560] Allocated by task 283:
[   21.052588]  kasan_save_stack+0x3c/0x68
[   21.052640]  kasan_save_track+0x20/0x40
[   21.052678]  kasan_save_alloc_info+0x40/0x58
[   21.052720]  __kasan_kmalloc+0xd4/0xd8
[   21.052756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.052799]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.052850]  kunit_try_run_case+0x170/0x3f0
[   21.052892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.052938]  kthread+0x328/0x630
[   21.052977]  ret_from_fork+0x10/0x20
[   21.053013] 
[   21.053035] The buggy address belongs to the object at fff00000c59cb600
[   21.053035]  which belongs to the cache kmalloc-128 of size 128
[   21.053098] The buggy address is located 0 bytes to the right of
[   21.053098]  allocated 120-byte region [fff00000c59cb600, fff00000c59cb678)
[   21.053173] 
[   21.053196] The buggy address belongs to the physical page:
[   21.053608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.053910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.053968] page_type: f5(slab)
[   21.054314] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.054400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.054591] page dumped because: kasan: bad access detected
[   21.054779] 
[   21.055022] Memory state around the buggy address:
[   21.055083]  fff00000c59cb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.055250]  fff00000c59cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.055433] >fff00000c59cb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.055500]                                                                 ^
[   21.055874]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056043]  fff00000c59cb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056133] ==================================================================
[   21.058712] ==================================================================
[   21.058816] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.058910] Write of size 8 at addr fff00000c59cb678 by task kunit_try_catch/283
[   21.059104] 
[   21.059142] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.059247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.059493] Hardware name: linux,dummy-virt (DT)
[   21.059547] Call trace:
[   21.059572]  show_stack+0x20/0x38 (C)
[   21.059627]  dump_stack_lvl+0x8c/0xd0
[   21.059722]  print_report+0x118/0x5d0
[   21.059809]  kasan_report+0xdc/0x128
[   21.059858]  kasan_check_range+0x100/0x1a8
[   21.060344]  __kasan_check_write+0x20/0x30
[   21.060433]  copy_to_kernel_nofault+0x8c/0x250
[   21.060486]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.060539]  kunit_try_run_case+0x170/0x3f0
[   21.060687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.060763]  kthread+0x328/0x630
[   21.060988]  ret_from_fork+0x10/0x20
[   21.061231] 
[   21.061286] Allocated by task 283:
[   21.061540]  kasan_save_stack+0x3c/0x68
[   21.061610]  kasan_save_track+0x20/0x40
[   21.062034]  kasan_save_alloc_info+0x40/0x58
[   21.062358]  __kasan_kmalloc+0xd4/0xd8
[   21.062428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.062496]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.062585]  kunit_try_run_case+0x170/0x3f0
[   21.062675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.063166]  kthread+0x328/0x630
[   21.063355]  ret_from_fork+0x10/0x20
[   21.063671] 
[   21.063865] The buggy address belongs to the object at fff00000c59cb600
[   21.063865]  which belongs to the cache kmalloc-128 of size 128
[   21.064198] The buggy address is located 0 bytes to the right of
[   21.064198]  allocated 120-byte region [fff00000c59cb600, fff00000c59cb678)
[   21.064366] 
[   21.064435] The buggy address belongs to the physical page:
[   21.064549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.064674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.064820] page_type: f5(slab)
[   21.064910] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.065319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.065445] page dumped because: kasan: bad access detected
[   21.065501] 
[   21.065521] Memory state around the buggy address:
[   21.065558]  fff00000c59cb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.065895]  fff00000c59cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.066068] >fff00000c59cb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.066219]                                                                 ^
[   21.066269]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.066615]  fff00000c59cb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067053] ==================================================================

[   14.798060] ==================================================================
[   14.798632] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   14.799220] Write of size 8 at addr ffff888103a34478 by task kunit_try_catch/300
[   14.799583] 
[   14.799778] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.799826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.799839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.799859] Call Trace:
[   14.799874]  <TASK>
[   14.799904]  dump_stack_lvl+0x73/0xb0
[   14.799929]  print_report+0xd1/0x610
[   14.799952]  ? __virt_addr_valid+0x1db/0x2d0
[   14.799974]  ? copy_to_kernel_nofault+0x99/0x260
[   14.799993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.800016]  ? copy_to_kernel_nofault+0x99/0x260
[   14.800207]  kasan_report+0x141/0x180
[   14.800232]  ? copy_to_kernel_nofault+0x99/0x260
[   14.800258]  kasan_check_range+0x10c/0x1c0
[   14.800279]  __kasan_check_write+0x18/0x20
[   14.800299]  copy_to_kernel_nofault+0x99/0x260
[   14.800321]  copy_to_kernel_nofault_oob+0x288/0x560
[   14.800345]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   14.800369]  ? finish_task_switch.isra.0+0x153/0x700
[   14.800392]  ? __schedule+0x10cc/0x2b60
[   14.800415]  ? trace_hardirqs_on+0x37/0xe0
[   14.800446]  ? __pfx_read_tsc+0x10/0x10
[   14.800465]  ? ktime_get_ts64+0x86/0x230
[   14.800490]  kunit_try_run_case+0x1a5/0x480
[   14.800512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.800532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.800556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.800581]  ? __kthread_parkme+0x82/0x180
[   14.800604]  ? preempt_count_sub+0x50/0x80
[   14.800627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.800649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.800672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.800696]  kthread+0x337/0x6f0
[   14.800713]  ? trace_preempt_on+0x20/0xc0
[   14.800735]  ? __pfx_kthread+0x10/0x10
[   14.800754]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.800776]  ? calculate_sigpending+0x7b/0xa0
[   14.800797]  ? __pfx_kthread+0x10/0x10
[   14.800816]  ret_from_fork+0x41/0x80
[   14.800837]  ? __pfx_kthread+0x10/0x10
[   14.800855]  ret_from_fork_asm+0x1a/0x30
[   14.800898]  </TASK>
[   14.800910] 
[   14.812183] Allocated by task 300:
[   14.812545]  kasan_save_stack+0x45/0x70
[   14.812945]  kasan_save_track+0x18/0x40
[   14.813254]  kasan_save_alloc_info+0x3b/0x50
[   14.813458]  __kasan_kmalloc+0xb7/0xc0
[   14.813630]  __kmalloc_cache_noprof+0x189/0x420
[   14.814123]  copy_to_kernel_nofault_oob+0x12f/0x560
[   14.814485]  kunit_try_run_case+0x1a5/0x480
[   14.814704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.815154]  kthread+0x337/0x6f0
[   14.815338]  ret_from_fork+0x41/0x80
[   14.815512]  ret_from_fork_asm+0x1a/0x30
[   14.815702] 
[   14.815793] The buggy address belongs to the object at ffff888103a34400
[   14.815793]  which belongs to the cache kmalloc-128 of size 128
[   14.816501] The buggy address is located 0 bytes to the right of
[   14.816501]  allocated 120-byte region [ffff888103a34400, ffff888103a34478)
[   14.817181] 
[   14.817400] The buggy address belongs to the physical page:
[   14.817740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a34
[   14.818238] flags: 0x200000000000000(node=0|zone=2)
[   14.818412] page_type: f5(slab)
[   14.818615] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.819253] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.819556] page dumped because: kasan: bad access detected
[   14.819837] 
[   14.820128] Memory state around the buggy address:
[   14.820427]  ffff888103a34300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.820823]  ffff888103a34380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.821308] >ffff888103a34400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.821621]                                                                 ^
[   14.822063]  ffff888103a34480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.822452]  ffff888103a34500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.822875] ==================================================================
[   14.771137] ==================================================================
[   14.771897] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   14.772200] Read of size 8 at addr ffff888103a34478 by task kunit_try_catch/300
[   14.772490] 
[   14.772581] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.772629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.772641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.772662] Call Trace:
[   14.772675]  <TASK>
[   14.773005]  dump_stack_lvl+0x73/0xb0
[   14.773041]  print_report+0xd1/0x610
[   14.773082]  ? __virt_addr_valid+0x1db/0x2d0
[   14.773105]  ? copy_to_kernel_nofault+0x225/0x260
[   14.773284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.773313]  ? copy_to_kernel_nofault+0x225/0x260
[   14.773335]  kasan_report+0x141/0x180
[   14.773358]  ? copy_to_kernel_nofault+0x225/0x260
[   14.773384]  __asan_report_load8_noabort+0x18/0x20
[   14.773406]  copy_to_kernel_nofault+0x225/0x260
[   14.773428]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   14.773453]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   14.773477]  ? finish_task_switch.isra.0+0x153/0x700
[   14.773503]  ? __schedule+0x10cc/0x2b60
[   14.773526]  ? trace_hardirqs_on+0x37/0xe0
[   14.773558]  ? __pfx_read_tsc+0x10/0x10
[   14.773579]  ? ktime_get_ts64+0x86/0x230
[   14.773605]  kunit_try_run_case+0x1a5/0x480
[   14.773626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.773646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.773671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.773695]  ? __kthread_parkme+0x82/0x180
[   14.773718]  ? preempt_count_sub+0x50/0x80
[   14.773742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.773764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.773787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.773811]  kthread+0x337/0x6f0
[   14.773828]  ? trace_preempt_on+0x20/0xc0
[   14.773851]  ? __pfx_kthread+0x10/0x10
[   14.773870]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.773902]  ? calculate_sigpending+0x7b/0xa0
[   14.773923]  ? __pfx_kthread+0x10/0x10
[   14.773942]  ret_from_fork+0x41/0x80
[   14.773963]  ? __pfx_kthread+0x10/0x10
[   14.773982]  ret_from_fork_asm+0x1a/0x30
[   14.774014]  </TASK>
[   14.774027] 
[   14.786073] Allocated by task 300:
[   14.786247]  kasan_save_stack+0x45/0x70
[   14.786461]  kasan_save_track+0x18/0x40
[   14.786648]  kasan_save_alloc_info+0x3b/0x50
[   14.787211]  __kasan_kmalloc+0xb7/0xc0
[   14.787395]  __kmalloc_cache_noprof+0x189/0x420
[   14.787765]  copy_to_kernel_nofault_oob+0x12f/0x560
[   14.787961]  kunit_try_run_case+0x1a5/0x480
[   14.788168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.788455]  kthread+0x337/0x6f0
[   14.788929]  ret_from_fork+0x41/0x80
[   14.789102]  ret_from_fork_asm+0x1a/0x30
[   14.789444] 
[   14.789543] The buggy address belongs to the object at ffff888103a34400
[   14.789543]  which belongs to the cache kmalloc-128 of size 128
[   14.790385] The buggy address is located 0 bytes to the right of
[   14.790385]  allocated 120-byte region [ffff888103a34400, ffff888103a34478)
[   14.790897] 
[   14.790999] The buggy address belongs to the physical page:
[   14.791239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a34
[   14.791593] flags: 0x200000000000000(node=0|zone=2)
[   14.792227] page_type: f5(slab)
[   14.792409] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.792987] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.793620] page dumped because: kasan: bad access detected
[   14.794112] 
[   14.794202] Memory state around the buggy address:
[   14.794656]  ffff888103a34300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.795184]  ffff888103a34380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795635] >ffff888103a34400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.795985]                                                                 ^
[   14.796420]  ffff888103a34480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796698]  ffff888103a34500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797331] ==================================================================