Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.046321] ==================================================================
[   20.046391] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.046577] Write of size 8 at addr fff00000c57ee678 by task kunit_try_catch/282
[   20.046663] 
[   20.046730] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.046848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.046898] Hardware name: linux,dummy-virt (DT)
[   20.046933] Call trace:
[   20.046957]  show_stack+0x20/0x38 (C)
[   20.047009]  dump_stack_lvl+0x8c/0xd0
[   20.047061]  print_report+0x118/0x608
[   20.047299]  kasan_report+0xdc/0x128
[   20.047584]  kasan_check_range+0x100/0x1a8
[   20.047656]  __kasan_check_write+0x20/0x30
[   20.047723]  copy_to_kernel_nofault+0x8c/0x250
[   20.047775]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.047825]  kunit_try_run_case+0x170/0x3f0
[   20.047875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.047931]  kthread+0x328/0x630
[   20.047998]  ret_from_fork+0x10/0x20
[   20.048048] 
[   20.048070] Allocated by task 282:
[   20.048099]  kasan_save_stack+0x3c/0x68
[   20.048144]  kasan_save_track+0x20/0x40
[   20.048183]  kasan_save_alloc_info+0x40/0x58
[   20.048224]  __kasan_kmalloc+0xd4/0xd8
[   20.048262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.048302]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.048343]  kunit_try_run_case+0x170/0x3f0
[   20.048384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.048429]  kthread+0x328/0x630
[   20.048461]  ret_from_fork+0x10/0x20
[   20.048497] 
[   20.048518] The buggy address belongs to the object at fff00000c57ee600
[   20.048518]  which belongs to the cache kmalloc-128 of size 128
[   20.048599] The buggy address is located 0 bytes to the right of
[   20.048599]  allocated 120-byte region [fff00000c57ee600, fff00000c57ee678)
[   20.048668] 
[   20.048689] The buggy address belongs to the physical page:
[   20.048722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.048777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.048827] page_type: f5(slab)
[   20.048867] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.048920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.048965] page dumped because: kasan: bad access detected
[   20.048997] 
[   20.049016] Memory state around the buggy address:
[   20.049050]  fff00000c57ee500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.049097]  fff00000c57ee580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.049143] >fff00000c57ee600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.049535]                                                                 ^
[   20.049610]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.049698]  fff00000c57ee700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.049741] ==================================================================
[   20.039205] ==================================================================
[   20.039276] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.039414] Read of size 8 at addr fff00000c57ee678 by task kunit_try_catch/282
[   20.039473] 
[   20.039530] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.039827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.039874] Hardware name: linux,dummy-virt (DT)
[   20.039910] Call trace:
[   20.039936]  show_stack+0x20/0x38 (C)
[   20.040021]  dump_stack_lvl+0x8c/0xd0
[   20.040074]  print_report+0x118/0x608
[   20.040292]  kasan_report+0xdc/0x128
[   20.040352]  __asan_report_load8_noabort+0x20/0x30
[   20.040480]  copy_to_kernel_nofault+0x204/0x250
[   20.040554]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.040851]  kunit_try_run_case+0x170/0x3f0
[   20.041001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.041070]  kthread+0x328/0x630
[   20.041114]  ret_from_fork+0x10/0x20
[   20.041166] 
[   20.041271] Allocated by task 282:
[   20.041355]  kasan_save_stack+0x3c/0x68
[   20.041578]  kasan_save_track+0x20/0x40
[   20.041763]  kasan_save_alloc_info+0x40/0x58
[   20.041827]  __kasan_kmalloc+0xd4/0xd8
[   20.041929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.041993]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.042033]  kunit_try_run_case+0x170/0x3f0
[   20.042208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.042268]  kthread+0x328/0x630
[   20.042345]  ret_from_fork+0x10/0x20
[   20.042430] 
[   20.042499] The buggy address belongs to the object at fff00000c57ee600
[   20.042499]  which belongs to the cache kmalloc-128 of size 128
[   20.042716] The buggy address is located 0 bytes to the right of
[   20.042716]  allocated 120-byte region [fff00000c57ee600, fff00000c57ee678)
[   20.042893] 
[   20.042928] The buggy address belongs to the physical page:
[   20.042974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057ee
[   20.043097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.043170] page_type: f5(slab)
[   20.043339] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.043420] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.043465] page dumped because: kasan: bad access detected
[   20.043601] 
[   20.043640] Memory state around the buggy address:
[   20.043741]  fff00000c57ee500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.043811]  fff00000c57ee580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.043858] >fff00000c57ee600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.044099]                                                                 ^
[   20.044181]  fff00000c57ee680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.044301]  fff00000c57ee700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.044378] ==================================================================

[   15.424238] ==================================================================
[   15.424568] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   15.424955] Write of size 8 at addr ffff8881027e1778 by task kunit_try_catch/298
[   15.425303] 
[   15.425454] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.425531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.425544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.425568] Call Trace:
[   15.425584]  <TASK>
[   15.425606]  dump_stack_lvl+0x73/0xb0
[   15.425636]  print_report+0xd1/0x650
[   15.425673]  ? __virt_addr_valid+0x1db/0x2d0
[   15.425698]  ? copy_to_kernel_nofault+0x99/0x260
[   15.425722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.425745]  ? copy_to_kernel_nofault+0x99/0x260
[   15.425798]  kasan_report+0x141/0x180
[   15.425821]  ? copy_to_kernel_nofault+0x99/0x260
[   15.425849]  kasan_check_range+0x10c/0x1c0
[   15.425884]  __kasan_check_write+0x18/0x20
[   15.425904]  copy_to_kernel_nofault+0x99/0x260
[   15.425956]  copy_to_kernel_nofault_oob+0x288/0x560
[   15.425981]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.426016]  ? finish_task_switch.isra.0+0x153/0x700
[   15.426049]  ? __schedule+0x10cc/0x2b60
[   15.426072]  ? trace_hardirqs_on+0x37/0xe0
[   15.426104]  ? __pfx_read_tsc+0x10/0x10
[   15.426126]  ? ktime_get_ts64+0x86/0x230
[   15.426151]  kunit_try_run_case+0x1a5/0x480
[   15.426176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.426199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.426223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.426246]  ? __kthread_parkme+0x82/0x180
[   15.426267]  ? preempt_count_sub+0x50/0x80
[   15.426290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.426314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.426338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.426361]  kthread+0x337/0x6f0
[   15.426380]  ? trace_preempt_on+0x20/0xc0
[   15.426403]  ? __pfx_kthread+0x10/0x10
[   15.426424]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.426444]  ? calculate_sigpending+0x7b/0xa0
[   15.426469]  ? __pfx_kthread+0x10/0x10
[   15.426490]  ret_from_fork+0x116/0x1d0
[   15.426509]  ? __pfx_kthread+0x10/0x10
[   15.426530]  ret_from_fork_asm+0x1a/0x30
[   15.426562]  </TASK>
[   15.426575] 
[   15.434735] Allocated by task 298:
[   15.434931]  kasan_save_stack+0x45/0x70
[   15.435139]  kasan_save_track+0x18/0x40
[   15.435331]  kasan_save_alloc_info+0x3b/0x50
[   15.435567]  __kasan_kmalloc+0xb7/0xc0
[   15.435793]  __kmalloc_cache_noprof+0x189/0x420
[   15.436043]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.436328]  kunit_try_run_case+0x1a5/0x480
[   15.436538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.436862]  kthread+0x337/0x6f0
[   15.437084]  ret_from_fork+0x116/0x1d0
[   15.437305]  ret_from_fork_asm+0x1a/0x30
[   15.437537] 
[   15.437664] The buggy address belongs to the object at ffff8881027e1700
[   15.437664]  which belongs to the cache kmalloc-128 of size 128
[   15.438160] The buggy address is located 0 bytes to the right of
[   15.438160]  allocated 120-byte region [ffff8881027e1700, ffff8881027e1778)
[   15.438716] 
[   15.438792] The buggy address belongs to the physical page:
[   15.438963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e1
[   15.439382] flags: 0x200000000000000(node=0|zone=2)
[   15.439663] page_type: f5(slab)
[   15.439835] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.440233] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.440598] page dumped because: kasan: bad access detected
[   15.440859] 
[   15.440930] Memory state around the buggy address:
[   15.441163]  ffff8881027e1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.441518]  ffff8881027e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.441854] >ffff8881027e1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.442166]                                                                 ^
[   15.442487]  ffff8881027e1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.442874]  ffff8881027e1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.443261] ==================================================================
[   15.398891] ==================================================================
[   15.400489] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   15.401465] Read of size 8 at addr ffff8881027e1778 by task kunit_try_catch/298
[   15.402138] 
[   15.402359] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.402416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.402431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.402456] Call Trace:
[   15.402471]  <TASK>
[   15.402493]  dump_stack_lvl+0x73/0xb0
[   15.402529]  print_report+0xd1/0x650
[   15.402557]  ? __virt_addr_valid+0x1db/0x2d0
[   15.402583]  ? copy_to_kernel_nofault+0x225/0x260
[   15.402608]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.402632]  ? copy_to_kernel_nofault+0x225/0x260
[   15.402658]  kasan_report+0x141/0x180
[   15.402681]  ? copy_to_kernel_nofault+0x225/0x260
[   15.402710]  __asan_report_load8_noabort+0x18/0x20
[   15.402736]  copy_to_kernel_nofault+0x225/0x260
[   15.402761]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   15.402785]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.402820]  ? finish_task_switch.isra.0+0x153/0x700
[   15.402846]  ? __schedule+0x10cc/0x2b60
[   15.402868]  ? trace_hardirqs_on+0x37/0xe0
[   15.402912]  ? __pfx_read_tsc+0x10/0x10
[   15.402935]  ? ktime_get_ts64+0x86/0x230
[   15.402960]  kunit_try_run_case+0x1a5/0x480
[   15.402988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.403044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.403066]  ? __kthread_parkme+0x82/0x180
[   15.403088]  ? preempt_count_sub+0x50/0x80
[   15.403111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.403158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.403182]  kthread+0x337/0x6f0
[   15.403201]  ? trace_preempt_on+0x20/0xc0
[   15.403224]  ? __pfx_kthread+0x10/0x10
[   15.403245]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.403266]  ? calculate_sigpending+0x7b/0xa0
[   15.403291]  ? __pfx_kthread+0x10/0x10
[   15.403313]  ret_from_fork+0x116/0x1d0
[   15.403331]  ? __pfx_kthread+0x10/0x10
[   15.403352]  ret_from_fork_asm+0x1a/0x30
[   15.403384]  </TASK>
[   15.403398] 
[   15.413446] Allocated by task 298:
[   15.413659]  kasan_save_stack+0x45/0x70
[   15.413922]  kasan_save_track+0x18/0x40
[   15.414157]  kasan_save_alloc_info+0x3b/0x50
[   15.414387]  __kasan_kmalloc+0xb7/0xc0
[   15.414585]  __kmalloc_cache_noprof+0x189/0x420
[   15.414826]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.415062]  kunit_try_run_case+0x1a5/0x480
[   15.415250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.415418]  kthread+0x337/0x6f0
[   15.415536]  ret_from_fork+0x116/0x1d0
[   15.415814]  ret_from_fork_asm+0x1a/0x30
[   15.416031] 
[   15.416130] The buggy address belongs to the object at ffff8881027e1700
[   15.416130]  which belongs to the cache kmalloc-128 of size 128
[   15.416674] The buggy address is located 0 bytes to the right of
[   15.416674]  allocated 120-byte region [ffff8881027e1700, ffff8881027e1778)
[   15.417251] 
[   15.417350] The buggy address belongs to the physical page:
[   15.417630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e1
[   15.417933] flags: 0x200000000000000(node=0|zone=2)
[   15.418144] page_type: f5(slab)
[   15.418275] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.418853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.419250] page dumped because: kasan: bad access detected
[   15.419503] 
[   15.419598] Memory state around the buggy address:
[   15.419864]  ffff8881027e1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.420269]  ffff8881027e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.420598] >ffff8881027e1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.420967]                                                                 ^
[   15.421316]  ffff8881027e1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.421658]  ffff8881027e1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.422006] ==================================================================