Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.923595] ==================================================================
[   19.923678] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.923953] Read of size 8 at addr fff00000c7834478 by task kunit_try_catch/281
[   19.924045] 
[   19.924105] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.924194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.924587] Hardware name: linux,dummy-virt (DT)
[   19.924669] Call trace:
[   19.924713]  show_stack+0x20/0x38 (C)
[   19.924776]  dump_stack_lvl+0x8c/0xd0
[   19.924828]  print_report+0x118/0x608
[   19.925245]  kasan_report+0xdc/0x128
[   19.925414]  __asan_report_load8_noabort+0x20/0x30
[   19.925759]  copy_to_kernel_nofault+0x204/0x250
[   19.925834]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.926460]  kunit_try_run_case+0x170/0x3f0
[   19.926604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.926773]  kthread+0x328/0x630
[   19.926955]  ret_from_fork+0x10/0x20
[   19.927448] 
[   19.927514] Allocated by task 281:
[   19.927563]  kasan_save_stack+0x3c/0x68
[   19.927718]  kasan_save_track+0x20/0x40
[   19.927836]  kasan_save_alloc_info+0x40/0x58
[   19.928176]  __kasan_kmalloc+0xd4/0xd8
[   19.928264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.928389]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.928472]  kunit_try_run_case+0x170/0x3f0
[   19.928659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.928860]  kthread+0x328/0x630
[   19.928935]  ret_from_fork+0x10/0x20
[   19.929607] 
[   19.929710] The buggy address belongs to the object at fff00000c7834400
[   19.929710]  which belongs to the cache kmalloc-128 of size 128
[   19.929807] The buggy address is located 0 bytes to the right of
[   19.929807]  allocated 120-byte region [fff00000c7834400, fff00000c7834478)
[   19.929872] 
[   19.929946] The buggy address belongs to the physical page:
[   19.930245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   19.930645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.930716] page_type: f5(slab)
[   19.930817] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.930906] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.930947] page dumped because: kasan: bad access detected
[   19.930981] 
[   19.931050] Memory state around the buggy address:
[   19.931183]  fff00000c7834300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.931318]  fff00000c7834380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.931449] >fff00000c7834400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.931490]                                                                 ^
[   19.931533]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.931577]  fff00000c7834500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.931618] ==================================================================
[   19.932398] ==================================================================
[   19.932537] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.932592] Write of size 8 at addr fff00000c7834478 by task kunit_try_catch/281
[   19.932644] 
[   19.932703] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.932807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.932842] Hardware name: linux,dummy-virt (DT)
[   19.932875] Call trace:
[   19.932899]  show_stack+0x20/0x38 (C)
[   19.932971]  dump_stack_lvl+0x8c/0xd0
[   19.933021]  print_report+0x118/0x608
[   19.933123]  kasan_report+0xdc/0x128
[   19.933180]  kasan_check_range+0x100/0x1a8
[   19.933330]  __kasan_check_write+0x20/0x30
[   19.933658]  copy_to_kernel_nofault+0x8c/0x250
[   19.933744]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.933919]  kunit_try_run_case+0x170/0x3f0
[   19.934005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.934229]  kthread+0x328/0x630
[   19.934374]  ret_from_fork+0x10/0x20
[   19.934472] 
[   19.934494] Allocated by task 281:
[   19.934555]  kasan_save_stack+0x3c/0x68
[   19.934911]  kasan_save_track+0x20/0x40
[   19.935077]  kasan_save_alloc_info+0x40/0x58
[   19.935216]  __kasan_kmalloc+0xd4/0xd8
[   19.935352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.935460]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.935545]  kunit_try_run_case+0x170/0x3f0
[   19.935638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.935722]  kthread+0x328/0x630
[   19.935757]  ret_from_fork+0x10/0x20
[   19.935792] 
[   19.935965] The buggy address belongs to the object at fff00000c7834400
[   19.935965]  which belongs to the cache kmalloc-128 of size 128
[   19.936173] The buggy address is located 0 bytes to the right of
[   19.936173]  allocated 120-byte region [fff00000c7834400, fff00000c7834478)
[   19.936380] 
[   19.936428] The buggy address belongs to the physical page:
[   19.936482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   19.936565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.936616] page_type: f5(slab)
[   19.936668] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.936890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.937086] page dumped because: kasan: bad access detected
[   19.937191] 
[   19.937283] Memory state around the buggy address:
[   19.937375]  fff00000c7834300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.937447]  fff00000c7834380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.937493] >fff00000c7834400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.937552]                                                                 ^
[   19.937595]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.937870]  fff00000c7834500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.937957] ==================================================================

[   15.363893] ==================================================================
[   15.364236] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   15.364965] Write of size 8 at addr ffff888103348678 by task kunit_try_catch/299
[   15.365312] 
[   15.365465] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.365510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.365523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.365545] Call Trace:
[   15.365559]  <TASK>
[   15.365575]  dump_stack_lvl+0x73/0xb0
[   15.365606]  print_report+0xd1/0x650
[   15.365631]  ? __virt_addr_valid+0x1db/0x2d0
[   15.365654]  ? copy_to_kernel_nofault+0x99/0x260
[   15.365699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.365737]  ? copy_to_kernel_nofault+0x99/0x260
[   15.365761]  kasan_report+0x141/0x180
[   15.365784]  ? copy_to_kernel_nofault+0x99/0x260
[   15.365826]  kasan_check_range+0x10c/0x1c0
[   15.365874]  __kasan_check_write+0x18/0x20
[   15.365895]  copy_to_kernel_nofault+0x99/0x260
[   15.365921]  copy_to_kernel_nofault_oob+0x288/0x560
[   15.365945]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.365969]  ? finish_task_switch.isra.0+0x153/0x700
[   15.365992]  ? __schedule+0x10cc/0x2b60
[   15.366015]  ? trace_hardirqs_on+0x37/0xe0
[   15.366050]  ? __pfx_read_tsc+0x10/0x10
[   15.366071]  ? ktime_get_ts64+0x86/0x230
[   15.366108]  kunit_try_run_case+0x1a5/0x480
[   15.366131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.366180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.366204]  ? __kthread_parkme+0x82/0x180
[   15.366225]  ? preempt_count_sub+0x50/0x80
[   15.366256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.366329]  kthread+0x337/0x6f0
[   15.366349]  ? trace_preempt_on+0x20/0xc0
[   15.366376]  ? __pfx_kthread+0x10/0x10
[   15.366397]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.366419]  ? calculate_sigpending+0x7b/0xa0
[   15.366443]  ? __pfx_kthread+0x10/0x10
[   15.366466]  ret_from_fork+0x116/0x1d0
[   15.366485]  ? __pfx_kthread+0x10/0x10
[   15.366506]  ret_from_fork_asm+0x1a/0x30
[   15.366536]  </TASK>
[   15.366549] 
[   15.374866] Allocated by task 299:
[   15.375067]  kasan_save_stack+0x45/0x70
[   15.375275]  kasan_save_track+0x18/0x40
[   15.375434]  kasan_save_alloc_info+0x3b/0x50
[   15.375650]  __kasan_kmalloc+0xb7/0xc0
[   15.375852]  __kmalloc_cache_noprof+0x189/0x420
[   15.376038]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.376288]  kunit_try_run_case+0x1a5/0x480
[   15.376490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.376788]  kthread+0x337/0x6f0
[   15.376973]  ret_from_fork+0x116/0x1d0
[   15.377168]  ret_from_fork_asm+0x1a/0x30
[   15.377370] 
[   15.378346] The buggy address belongs to the object at ffff888103348600
[   15.378346]  which belongs to the cache kmalloc-128 of size 128
[   15.378946] The buggy address is located 0 bytes to the right of
[   15.378946]  allocated 120-byte region [ffff888103348600, ffff888103348678)
[   15.380183] 
[   15.380271] The buggy address belongs to the physical page:
[   15.381032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103348
[   15.381662] flags: 0x200000000000000(node=0|zone=2)
[   15.381899] page_type: f5(slab)
[   15.382063] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.382713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.383469] page dumped because: kasan: bad access detected
[   15.383710] 
[   15.383805] Memory state around the buggy address:
[   15.384016]  ffff888103348500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.384746]  ffff888103348580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.385240] >ffff888103348600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.385782]                                                                 ^
[   15.386492]  ffff888103348680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.387030]  ffff888103348700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.387719] ==================================================================
[   15.335874] ==================================================================
[   15.336512] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   15.336847] Read of size 8 at addr ffff888103348678 by task kunit_try_catch/299
[   15.337185] 
[   15.337298] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.337349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.337362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.337387] Call Trace:
[   15.337400]  <TASK>
[   15.337419]  dump_stack_lvl+0x73/0xb0
[   15.337450]  print_report+0xd1/0x650
[   15.337476]  ? __virt_addr_valid+0x1db/0x2d0
[   15.337501]  ? copy_to_kernel_nofault+0x225/0x260
[   15.337526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.337549]  ? copy_to_kernel_nofault+0x225/0x260
[   15.337573]  kasan_report+0x141/0x180
[   15.337596]  ? copy_to_kernel_nofault+0x225/0x260
[   15.337624]  __asan_report_load8_noabort+0x18/0x20
[   15.338051]  copy_to_kernel_nofault+0x225/0x260
[   15.338080]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   15.338120]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   15.338144]  ? finish_task_switch.isra.0+0x153/0x700
[   15.338170]  ? __schedule+0x10cc/0x2b60
[   15.338194]  ? trace_hardirqs_on+0x37/0xe0
[   15.338231]  ? __pfx_read_tsc+0x10/0x10
[   15.338255]  ? ktime_get_ts64+0x86/0x230
[   15.338281]  kunit_try_run_case+0x1a5/0x480
[   15.338309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.338333]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.338358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.338383]  ? __kthread_parkme+0x82/0x180
[   15.338406]  ? preempt_count_sub+0x50/0x80
[   15.338429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.338454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.338503]  kthread+0x337/0x6f0
[   15.338524]  ? trace_preempt_on+0x20/0xc0
[   15.338551]  ? __pfx_kthread+0x10/0x10
[   15.338573]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.338595]  ? calculate_sigpending+0x7b/0xa0
[   15.338621]  ? __pfx_kthread+0x10/0x10
[   15.338644]  ret_from_fork+0x116/0x1d0
[   15.338663]  ? __pfx_kthread+0x10/0x10
[   15.338685]  ret_from_fork_asm+0x1a/0x30
[   15.338717]  </TASK>
[   15.338731] 
[   15.351008] Allocated by task 299:
[   15.351453]  kasan_save_stack+0x45/0x70
[   15.351780]  kasan_save_track+0x18/0x40
[   15.351963]  kasan_save_alloc_info+0x3b/0x50
[   15.352345]  __kasan_kmalloc+0xb7/0xc0
[   15.352658]  __kmalloc_cache_noprof+0x189/0x420
[   15.352962]  copy_to_kernel_nofault_oob+0x12f/0x560
[   15.353399]  kunit_try_run_case+0x1a5/0x480
[   15.353687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.354013]  kthread+0x337/0x6f0
[   15.354336]  ret_from_fork+0x116/0x1d0
[   15.354512]  ret_from_fork_asm+0x1a/0x30
[   15.354847] 
[   15.354947] The buggy address belongs to the object at ffff888103348600
[   15.354947]  which belongs to the cache kmalloc-128 of size 128
[   15.355768] The buggy address is located 0 bytes to the right of
[   15.355768]  allocated 120-byte region [ffff888103348600, ffff888103348678)
[   15.356496] 
[   15.356806] The buggy address belongs to the physical page:
[   15.357017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103348
[   15.357641] flags: 0x200000000000000(node=0|zone=2)
[   15.358001] page_type: f5(slab)
[   15.358257] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.358762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.359065] page dumped because: kasan: bad access detected
[   15.359483] 
[   15.359593] Memory state around the buggy address:
[   15.359969]  ffff888103348500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.360501]  ffff888103348580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360948] >ffff888103348600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.361478]                                                                 ^
[   15.361768]  ffff888103348680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.362420]  ffff888103348700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.362920] ==================================================================