Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.292521] ==================================================================
[   20.292792] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.292854] Write of size 8 at addr fff00000c6fc5678 by task kunit_try_catch/283
[   20.292909] 
[   20.292943] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.293026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.293055] Hardware name: linux,dummy-virt (DT)
[   20.293357] Call trace:
[   20.293438]  show_stack+0x20/0x38 (C)
[   20.293638]  dump_stack_lvl+0x8c/0xd0
[   20.293851]  print_report+0x118/0x5d0
[   20.294057]  kasan_report+0xdc/0x128
[   20.294169]  kasan_check_range+0x100/0x1a8
[   20.294395]  __kasan_check_write+0x20/0x30
[   20.294487]  copy_to_kernel_nofault+0x8c/0x250
[   20.294541]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.295005]  kunit_try_run_case+0x170/0x3f0
[   20.295065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.295130]  kthread+0x328/0x630
[   20.295561]  ret_from_fork+0x10/0x20
[   20.295970] 
[   20.296082] Allocated by task 283:
[   20.296142]  kasan_save_stack+0x3c/0x68
[   20.296330]  kasan_save_track+0x20/0x40
[   20.296590]  kasan_save_alloc_info+0x40/0x58
[   20.296641]  __kasan_kmalloc+0xd4/0xd8
[   20.296867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.297073]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.297126]  kunit_try_run_case+0x170/0x3f0
[   20.297180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.297226]  kthread+0x328/0x630
[   20.297262]  ret_from_fork+0x10/0x20
[   20.297313] 
[   20.297354] The buggy address belongs to the object at fff00000c6fc5600
[   20.297354]  which belongs to the cache kmalloc-128 of size 128
[   20.297442] The buggy address is located 0 bytes to the right of
[   20.297442]  allocated 120-byte region [fff00000c6fc5600, fff00000c6fc5678)
[   20.297530] 
[   20.297554] The buggy address belongs to the physical page:
[   20.297597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.297664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.297723] page_type: f5(slab)
[   20.297764] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.297815] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.297864] page dumped because: kasan: bad access detected
[   20.297898] 
[   20.297935] Memory state around the buggy address:
[   20.297967]  fff00000c6fc5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.298022]  fff00000c6fc5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.298080] >fff00000c6fc5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.298146]                                                                 ^
[   20.298199]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.298243]  fff00000c6fc5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.298633] ==================================================================
[   20.283450] ==================================================================
[   20.283528] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.283745] Read of size 8 at addr fff00000c6fc5678 by task kunit_try_catch/283
[   20.284048] 
[   20.284183] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.284357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.284391] Hardware name: linux,dummy-virt (DT)
[   20.284427] Call trace:
[   20.284454]  show_stack+0x20/0x38 (C)
[   20.284875]  dump_stack_lvl+0x8c/0xd0
[   20.285002]  print_report+0x118/0x5d0
[   20.285096]  kasan_report+0xdc/0x128
[   20.285206]  __asan_report_load8_noabort+0x20/0x30
[   20.285270]  copy_to_kernel_nofault+0x204/0x250
[   20.285330]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.285390]  kunit_try_run_case+0x170/0x3f0
[   20.285647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.285939]  kthread+0x328/0x630
[   20.286036]  ret_from_fork+0x10/0x20
[   20.286096] 
[   20.286319] Allocated by task 283:
[   20.286365]  kasan_save_stack+0x3c/0x68
[   20.286410]  kasan_save_track+0x20/0x40
[   20.286449]  kasan_save_alloc_info+0x40/0x58
[   20.286634]  __kasan_kmalloc+0xd4/0xd8
[   20.286688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.287044]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.287184]  kunit_try_run_case+0x170/0x3f0
[   20.287365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.287429]  kthread+0x328/0x630
[   20.287609]  ret_from_fork+0x10/0x20
[   20.287832] 
[   20.287880] The buggy address belongs to the object at fff00000c6fc5600
[   20.287880]  which belongs to the cache kmalloc-128 of size 128
[   20.288008] The buggy address is located 0 bytes to the right of
[   20.288008]  allocated 120-byte region [fff00000c6fc5600, fff00000c6fc5678)
[   20.288136] 
[   20.288180] The buggy address belongs to the physical page:
[   20.288311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fc5
[   20.288397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.288662] page_type: f5(slab)
[   20.288887] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.288966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.289104] page dumped because: kasan: bad access detected
[   20.289205] 
[   20.289348] Memory state around the buggy address:
[   20.289411]  fff00000c6fc5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.289663]  fff00000c6fc5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.289724] >fff00000c6fc5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.289767]                                                                 ^
[   20.289823]  fff00000c6fc5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.290261]  fff00000c6fc5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.290656] ==================================================================

[   14.986576] ==================================================================
[   14.986906] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   14.987643] Write of size 8 at addr ffff8881028ba478 by task kunit_try_catch/301
[   14.988166] 
[   14.988379] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.988441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.988453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.988475] Call Trace:
[   14.988488]  <TASK>
[   14.988504]  dump_stack_lvl+0x73/0xb0
[   14.988532]  print_report+0xd1/0x610
[   14.988557]  ? __virt_addr_valid+0x1db/0x2d0
[   14.988580]  ? copy_to_kernel_nofault+0x99/0x260
[   14.988601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.988626]  ? copy_to_kernel_nofault+0x99/0x260
[   14.988647]  kasan_report+0x141/0x180
[   14.988681]  ? copy_to_kernel_nofault+0x99/0x260
[   14.988707]  kasan_check_range+0x10c/0x1c0
[   14.988728]  __kasan_check_write+0x18/0x20
[   14.988749]  copy_to_kernel_nofault+0x99/0x260
[   14.988771]  copy_to_kernel_nofault_oob+0x288/0x560
[   14.988797]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   14.988821]  ? finish_task_switch.isra.0+0x153/0x700
[   14.988845]  ? __schedule+0x10c6/0x2b60
[   14.988868]  ? trace_hardirqs_on+0x37/0xe0
[   14.988901]  ? __pfx_read_tsc+0x10/0x10
[   14.988928]  ? ktime_get_ts64+0x86/0x230
[   14.988953]  kunit_try_run_case+0x1a5/0x480
[   14.988975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.988994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.989023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.989048]  ? __kthread_parkme+0x82/0x180
[   14.989070]  ? preempt_count_sub+0x50/0x80
[   14.989095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.989116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.989141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.989165]  kthread+0x337/0x6f0
[   14.989183]  ? trace_preempt_on+0x20/0xc0
[   14.989206]  ? __pfx_kthread+0x10/0x10
[   14.989235]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.989258]  ? calculate_sigpending+0x7b/0xa0
[   14.989280]  ? __pfx_kthread+0x10/0x10
[   14.989299]  ret_from_fork+0x41/0x80
[   14.989320]  ? __pfx_kthread+0x10/0x10
[   14.989339]  ret_from_fork_asm+0x1a/0x30
[   14.989371]  </TASK>
[   14.989383] 
[   15.003121] Allocated by task 301:
[   15.003377]  kasan_save_stack+0x45/0x70
[   15.003526]  kasan_save_track+0x18/0x40
[   15.003955]  kasan_save_alloc_info+0x3b/0x50
[   15.004435]  __kasan_kmalloc+0xb7/0xc0
[   15.004691]  __kmalloc_cache_noprof+0x189/0x420
[   15.005146]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.005366]  kunit_try_run_case+0x1a5/0x480
[   15.005796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.006382]  kthread+0x337/0x6f0
[   15.006745]  ret_from_fork+0x41/0x80
[   15.006879]  ret_from_fork_asm+0x1a/0x30
[   15.007014] 
[   15.007083] The buggy address belongs to the object at ffff8881028ba400
[   15.007083]  which belongs to the cache kmalloc-128 of size 128
[   15.007579] The buggy address is located 0 bytes to the right of
[   15.007579]  allocated 120-byte region [ffff8881028ba400, ffff8881028ba478)
[   15.008250] 
[   15.008394] The buggy address belongs to the physical page:
[   15.008639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba
[   15.008919] flags: 0x200000000000000(node=0|zone=2)
[   15.009217] page_type: f5(slab)
[   15.009533] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.009860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.010446] page dumped because: kasan: bad access detected
[   15.011247] 
[   15.011517] Memory state around the buggy address:
[   15.012088]  ffff8881028ba300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.012400]  ffff8881028ba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.012878] >ffff8881028ba400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.013500]                                                                 ^
[   15.014127]  ffff8881028ba480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.014567]  ffff8881028ba500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.015087] ==================================================================
[   14.952395] ==================================================================
[   14.952891] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   14.953153] Read of size 8 at addr ffff8881028ba478 by task kunit_try_catch/301
[   14.953395] 
[   14.953492] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.953541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.953554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.953578] Call Trace:
[   14.953592]  <TASK>
[   14.953610]  dump_stack_lvl+0x73/0xb0
[   14.953639]  print_report+0xd1/0x610
[   14.953666]  ? __virt_addr_valid+0x1db/0x2d0
[   14.953690]  ? copy_to_kernel_nofault+0x225/0x260
[   14.953711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.953734]  ? copy_to_kernel_nofault+0x225/0x260
[   14.953756]  kasan_report+0x141/0x180
[   14.953779]  ? copy_to_kernel_nofault+0x225/0x260
[   14.953805]  __asan_report_load8_noabort+0x18/0x20
[   14.953827]  copy_to_kernel_nofault+0x225/0x260
[   14.953850]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   14.953875]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   14.953899]  ? finish_task_switch.isra.0+0x153/0x700
[   14.953925]  ? __schedule+0x10c6/0x2b60
[   14.953949]  ? trace_hardirqs_on+0x37/0xe0
[   14.953982]  ? __pfx_read_tsc+0x10/0x10
[   14.954008]  ? ktime_get_ts64+0x86/0x230
[   14.954040]  kunit_try_run_case+0x1a5/0x480
[   14.954067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.954086]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.954108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.954133]  ? __kthread_parkme+0x82/0x180
[   14.954157]  ? preempt_count_sub+0x50/0x80
[   14.954181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.954204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.954255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.954643]  kthread+0x337/0x6f0
[   14.954682]  ? trace_preempt_on+0x20/0xc0
[   14.954708]  ? __pfx_kthread+0x10/0x10
[   14.954727]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.954759]  ? calculate_sigpending+0x7b/0xa0
[   14.954783]  ? __pfx_kthread+0x10/0x10
[   14.954802]  ret_from_fork+0x41/0x80
[   14.954825]  ? __pfx_kthread+0x10/0x10
[   14.954843]  ret_from_fork_asm+0x1a/0x30
[   14.954876]  </TASK>
[   14.954889] 
[   14.970025] Allocated by task 301:
[   14.970162]  kasan_save_stack+0x45/0x70
[   14.970500]  kasan_save_track+0x18/0x40
[   14.970838]  kasan_save_alloc_info+0x3b/0x50
[   14.971203]  __kasan_kmalloc+0xb7/0xc0
[   14.971539]  __kmalloc_cache_noprof+0x189/0x420
[   14.972145]  copy_to_kernel_nofault_oob+0x12f/0x560
[   14.972637]  kunit_try_run_case+0x1a5/0x480
[   14.973055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.973663]  kthread+0x337/0x6f0
[   14.974012]  ret_from_fork+0x41/0x80
[   14.974369]  ret_from_fork_asm+0x1a/0x30
[   14.974752] 
[   14.974953] The buggy address belongs to the object at ffff8881028ba400
[   14.974953]  which belongs to the cache kmalloc-128 of size 128
[   14.976188] The buggy address is located 0 bytes to the right of
[   14.976188]  allocated 120-byte region [ffff8881028ba400, ffff8881028ba478)
[   14.977495] 
[   14.977664] The buggy address belongs to the physical page:
[   14.978268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba
[   14.979048] flags: 0x200000000000000(node=0|zone=2)
[   14.979595] page_type: f5(slab)
[   14.979984] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.980952] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.981261] page dumped because: kasan: bad access detected
[   14.981528] 
[   14.981712] Memory state around the buggy address:
[   14.982272]  ffff8881028ba300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.982971]  ffff8881028ba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.983635] >ffff8881028ba400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.983858]                                                                 ^
[   14.984072]  ffff8881028ba480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.984589]  ffff8881028ba500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.985377] ==================================================================