Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.916668] ==================================================================
[   19.916775] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.916949] Read of size 8 at addr fff00000c5a57b78 by task kunit_try_catch/281
[   19.917011] 
[   19.917090] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.917178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.917209] Hardware name: linux,dummy-virt (DT)
[   19.917508] Call trace:
[   19.917555]  show_stack+0x20/0x38 (C)
[   19.917615]  dump_stack_lvl+0x8c/0xd0
[   19.917668]  print_report+0x118/0x608
[   19.917720]  kasan_report+0xdc/0x128
[   19.917797]  __asan_report_load8_noabort+0x20/0x30
[   19.917852]  copy_to_kernel_nofault+0x204/0x250
[   19.918165]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.918305]  kunit_try_run_case+0x170/0x3f0
[   19.918531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.918606]  kthread+0x328/0x630
[   19.918697]  ret_from_fork+0x10/0x20
[   19.918747] 
[   19.918768] Allocated by task 281:
[   19.918800]  kasan_save_stack+0x3c/0x68
[   19.918843]  kasan_save_track+0x20/0x40
[   19.918892]  kasan_save_alloc_info+0x40/0x58
[   19.919098]  __kasan_kmalloc+0xd4/0xd8
[   19.919223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.919300]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.919378]  kunit_try_run_case+0x170/0x3f0
[   19.919470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.919529]  kthread+0x328/0x630
[   19.919573]  ret_from_fork+0x10/0x20
[   19.919629] 
[   19.919651] The buggy address belongs to the object at fff00000c5a57b00
[   19.919651]  which belongs to the cache kmalloc-128 of size 128
[   19.919850] The buggy address is located 0 bytes to the right of
[   19.919850]  allocated 120-byte region [fff00000c5a57b00, fff00000c5a57b78)
[   19.919982] 
[   19.920032] The buggy address belongs to the physical page:
[   19.920077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   19.920164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.920217] page_type: f5(slab)
[   19.920290] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.920616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.920691] page dumped because: kasan: bad access detected
[   19.920775] 
[   19.920835] Memory state around the buggy address:
[   19.920915]  fff00000c5a57a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.920962]  fff00000c5a57a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.921014] >fff00000c5a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.921310]                                                                 ^
[   19.921388]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.921443]  fff00000c5a57c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.921541] ==================================================================
[   19.922994] ==================================================================
[   19.923045] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.923278] Write of size 8 at addr fff00000c5a57b78 by task kunit_try_catch/281
[   19.923354] 
[   19.923388] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.923476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.923524] Hardware name: linux,dummy-virt (DT)
[   19.923558] Call trace:
[   19.923588]  show_stack+0x20/0x38 (C)
[   19.923650]  dump_stack_lvl+0x8c/0xd0
[   19.923702]  print_report+0x118/0x608
[   19.923770]  kasan_report+0xdc/0x128
[   19.923818]  kasan_check_range+0x100/0x1a8
[   19.923913]  __kasan_check_write+0x20/0x30
[   19.924056]  copy_to_kernel_nofault+0x8c/0x250
[   19.924117]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.924211]  kunit_try_run_case+0x170/0x3f0
[   19.924265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.924321]  kthread+0x328/0x630
[   19.924376]  ret_from_fork+0x10/0x20
[   19.924555] 
[   19.924614] Allocated by task 281:
[   19.924652]  kasan_save_stack+0x3c/0x68
[   19.924707]  kasan_save_track+0x20/0x40
[   19.924749]  kasan_save_alloc_info+0x40/0x58
[   19.924809]  __kasan_kmalloc+0xd4/0xd8
[   19.924852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.924919]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.925033]  kunit_try_run_case+0x170/0x3f0
[   19.925080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.925126]  kthread+0x328/0x630
[   19.925160]  ret_from_fork+0x10/0x20
[   19.925198] 
[   19.925298] The buggy address belongs to the object at fff00000c5a57b00
[   19.925298]  which belongs to the cache kmalloc-128 of size 128
[   19.925396] The buggy address is located 0 bytes to the right of
[   19.925396]  allocated 120-byte region [fff00000c5a57b00, fff00000c5a57b78)
[   19.925480] 
[   19.925505] The buggy address belongs to the physical page:
[   19.925537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a57
[   19.925599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.925664] page_type: f5(slab)
[   19.925705] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.925765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.925809] page dumped because: kasan: bad access detected
[   19.925840] 
[   19.925859] Memory state around the buggy address:
[   19.925892]  fff00000c5a57a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.926117]  fff00000c5a57a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.926180] >fff00000c5a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.926239]                                                                 ^
[   19.926379]  fff00000c5a57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.926448]  fff00000c5a57c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.926661] ==================================================================

[   16.449514] ==================================================================
[   16.450189] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   16.450512] Write of size 8 at addr ffff888102791e78 by task kunit_try_catch/298
[   16.451005] 
[   16.451115] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.451160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.451173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.451403] Call Trace:
[   16.451420]  <TASK>
[   16.451435]  dump_stack_lvl+0x73/0xb0
[   16.451466]  print_report+0xd1/0x650
[   16.451491]  ? __virt_addr_valid+0x1db/0x2d0
[   16.451516]  ? copy_to_kernel_nofault+0x99/0x260
[   16.451541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.451565]  ? copy_to_kernel_nofault+0x99/0x260
[   16.451590]  kasan_report+0x141/0x180
[   16.451613]  ? copy_to_kernel_nofault+0x99/0x260
[   16.451643]  kasan_check_range+0x10c/0x1c0
[   16.451669]  __kasan_check_write+0x18/0x20
[   16.451690]  copy_to_kernel_nofault+0x99/0x260
[   16.451716]  copy_to_kernel_nofault_oob+0x288/0x560
[   16.451743]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.451768]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.451796]  ? trace_hardirqs_on+0x37/0xe0
[   16.451890]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.451920]  kunit_try_run_case+0x1a5/0x480
[   16.451962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.451987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.452012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.452049]  ? __kthread_parkme+0x82/0x180
[   16.452071]  ? preempt_count_sub+0x50/0x80
[   16.452096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.452121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.452147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.452174]  kthread+0x337/0x6f0
[   16.452194]  ? trace_preempt_on+0x20/0xc0
[   16.452217]  ? __pfx_kthread+0x10/0x10
[   16.452239]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.452262]  ? calculate_sigpending+0x7b/0xa0
[   16.452287]  ? __pfx_kthread+0x10/0x10
[   16.452309]  ret_from_fork+0x116/0x1d0
[   16.452329]  ? __pfx_kthread+0x10/0x10
[   16.452350]  ret_from_fork_asm+0x1a/0x30
[   16.452381]  </TASK>
[   16.452393] 
[   16.463121] Allocated by task 298:
[   16.463283]  kasan_save_stack+0x45/0x70
[   16.463478]  kasan_save_track+0x18/0x40
[   16.463666]  kasan_save_alloc_info+0x3b/0x50
[   16.463870]  __kasan_kmalloc+0xb7/0xc0
[   16.464451]  __kmalloc_cache_noprof+0x189/0x420
[   16.464659]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.465235]  kunit_try_run_case+0x1a5/0x480
[   16.465452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.465676]  kthread+0x337/0x6f0
[   16.466043]  ret_from_fork+0x116/0x1d0
[   16.466218]  ret_from_fork_asm+0x1a/0x30
[   16.466543] 
[   16.466624] The buggy address belongs to the object at ffff888102791e00
[   16.466624]  which belongs to the cache kmalloc-128 of size 128
[   16.467419] The buggy address is located 0 bytes to the right of
[   16.467419]  allocated 120-byte region [ffff888102791e00, ffff888102791e78)
[   16.468152] 
[   16.468398] The buggy address belongs to the physical page:
[   16.468599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   16.469162] flags: 0x200000000000000(node=0|zone=2)
[   16.469400] page_type: f5(slab)
[   16.469555] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.470262] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.470571] page dumped because: kasan: bad access detected
[   16.471009] 
[   16.471120] Memory state around the buggy address:
[   16.471340]  ffff888102791d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.471748]  ffff888102791d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.472145] >ffff888102791e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.472448]                                                                 ^
[   16.472746]  ffff888102791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.473344]  ffff888102791f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.473607] ==================================================================
[   16.424123] ==================================================================
[   16.424753] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   16.425268] Read of size 8 at addr ffff888102791e78 by task kunit_try_catch/298
[   16.425557] 
[   16.425670] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.425718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.425731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.425753] Call Trace:
[   16.425767]  <TASK>
[   16.425784]  dump_stack_lvl+0x73/0xb0
[   16.425818]  print_report+0xd1/0x650
[   16.425843]  ? __virt_addr_valid+0x1db/0x2d0
[   16.425868]  ? copy_to_kernel_nofault+0x225/0x260
[   16.425893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.425918]  ? copy_to_kernel_nofault+0x225/0x260
[   16.426196]  kasan_report+0x141/0x180
[   16.426225]  ? copy_to_kernel_nofault+0x225/0x260
[   16.426255]  __asan_report_load8_noabort+0x18/0x20
[   16.426282]  copy_to_kernel_nofault+0x225/0x260
[   16.426309]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   16.426335]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.426360]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.426481]  ? trace_hardirqs_on+0x37/0xe0
[   16.426517]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   16.426549]  kunit_try_run_case+0x1a5/0x480
[   16.426576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.426626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.426652]  ? __kthread_parkme+0x82/0x180
[   16.426675]  ? preempt_count_sub+0x50/0x80
[   16.426702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.426753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.426780]  kthread+0x337/0x6f0
[   16.426800]  ? trace_preempt_on+0x20/0xc0
[   16.426847]  ? __pfx_kthread+0x10/0x10
[   16.426870]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.426893]  ? calculate_sigpending+0x7b/0xa0
[   16.426919]  ? __pfx_kthread+0x10/0x10
[   16.426961]  ret_from_fork+0x116/0x1d0
[   16.426982]  ? __pfx_kthread+0x10/0x10
[   16.427004]  ret_from_fork_asm+0x1a/0x30
[   16.427046]  </TASK>
[   16.427057] 
[   16.436910] Allocated by task 298:
[   16.437106]  kasan_save_stack+0x45/0x70
[   16.437731]  kasan_save_track+0x18/0x40
[   16.438000]  kasan_save_alloc_info+0x3b/0x50
[   16.438251]  __kasan_kmalloc+0xb7/0xc0
[   16.438552]  __kmalloc_cache_noprof+0x189/0x420
[   16.438771]  copy_to_kernel_nofault_oob+0x12f/0x560
[   16.439130]  kunit_try_run_case+0x1a5/0x480
[   16.439488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.439794]  kthread+0x337/0x6f0
[   16.440118]  ret_from_fork+0x116/0x1d0
[   16.440296]  ret_from_fork_asm+0x1a/0x30
[   16.440497] 
[   16.440587] The buggy address belongs to the object at ffff888102791e00
[   16.440587]  which belongs to the cache kmalloc-128 of size 128
[   16.441568] The buggy address is located 0 bytes to the right of
[   16.441568]  allocated 120-byte region [ffff888102791e00, ffff888102791e78)
[   16.442240] 
[   16.442348] The buggy address belongs to the physical page:
[   16.442805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   16.443377] flags: 0x200000000000000(node=0|zone=2)
[   16.443609] page_type: f5(slab)
[   16.443906] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.444275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.444837] page dumped because: kasan: bad access detected
[   16.445197] 
[   16.445293] Memory state around the buggy address:
[   16.445510]  ffff888102791d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.446246]  ffff888102791d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.446546] >ffff888102791e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.446987]                                                                 ^
[   16.447300]  ffff888102791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.447603]  ffff888102791f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.447897] ==================================================================