Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-x86_64

[   15.976336] ==================================================================
[   15.976745] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70
[   15.977304] Read of size 121 at addr ffff888102ae1400 by task kunit_try_catch/303
[   15.978139] 
[   15.978410] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.978468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.978480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.978503] Call Trace:
[   15.978517]  <TASK>
[   15.978535]  dump_stack_lvl+0x73/0xb0
[   15.978566]  print_report+0xd1/0x610
[   15.978591]  ? __virt_addr_valid+0x1db/0x2d0
[   15.978615]  ? _copy_to_user+0x3c/0x70
[   15.978635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.978660]  ? _copy_to_user+0x3c/0x70
[   15.978680]  kasan_report+0x141/0x180
[   15.978703]  ? _copy_to_user+0x3c/0x70
[   15.978729]  kasan_check_range+0x10c/0x1c0
[   15.978754]  __kasan_check_read+0x15/0x20
[   15.978774]  _copy_to_user+0x3c/0x70
[   15.978795]  copy_user_test_oob+0x364/0x10f0
[   15.978823]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.978847]  ? finish_task_switch.isra.0+0x153/0x700
[   15.978871]  ? __switch_to+0x47/0xf50
[   15.978898]  ? __schedule+0x10cc/0x2b60
[   15.978922]  ? __pfx_read_tsc+0x10/0x10
[   15.978945]  ? ktime_get_ts64+0x86/0x230
[   15.978971]  kunit_try_run_case+0x1a5/0x480
[   15.978996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.979020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.979045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.979071]  ? __kthread_parkme+0x82/0x180
[   15.979092]  ? preempt_count_sub+0x50/0x80
[   15.979117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.979142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.979167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.979193]  kthread+0x337/0x6f0
[   15.979213]  ? trace_preempt_on+0x20/0xc0
[   15.979238]  ? __pfx_kthread+0x10/0x10
[   15.979260]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.979282]  ? calculate_sigpending+0x7b/0xa0
[   15.979308]  ? __pfx_kthread+0x10/0x10
[   15.979330]  ret_from_fork+0x116/0x1d0
[   15.979349]  ? __pfx_kthread+0x10/0x10
[   15.979371]  ret_from_fork_asm+0x1a/0x30
[   15.979404]  </TASK>
[   15.979415] 
[   15.989783] Allocated by task 303:
[   15.990041]  kasan_save_stack+0x45/0x70
[   15.990283]  kasan_save_track+0x18/0x40
[   15.990423]  kasan_save_alloc_info+0x3b/0x50
[   15.990772]  __kasan_kmalloc+0xb7/0xc0
[   15.990966]  __kmalloc_noprof+0x1c9/0x500
[   15.991191]  kunit_kmalloc_array+0x25/0x60
[   15.991338]  copy_user_test_oob+0xab/0x10f0
[   15.991533]  kunit_try_run_case+0x1a5/0x480
[   15.991956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.992218]  kthread+0x337/0x6f0
[   15.992348]  ret_from_fork+0x116/0x1d0
[   15.992494]  ret_from_fork_asm+0x1a/0x30
[   15.992637] 
[   15.992730] The buggy address belongs to the object at ffff888102ae1400
[   15.992730]  which belongs to the cache kmalloc-128 of size 128
[   15.993350] The buggy address is located 0 bytes inside of
[   15.993350]  allocated 120-byte region [ffff888102ae1400, ffff888102ae1478)
[   15.993936] 
[   15.994032] The buggy address belongs to the physical page:
[   15.994219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   15.994525] flags: 0x200000000000000(node=0|zone=2)
[   15.994737] page_type: f5(slab)
[   15.994901] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.995230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.995578] page dumped because: kasan: bad access detected
[   15.995806] 
[   15.995911] Memory state around the buggy address:
[   15.996115]  ffff888102ae1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.996426]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.996806] >ffff888102ae1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.997060]                                                                 ^
[   15.997283]  ffff888102ae1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997689]  ffff888102ae1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.998162] ==================================================================

[   16.466556] ==================================================================
[   16.466997] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70
[   16.467314] Read of size 121 at addr ffff8881029c5700 by task kunit_try_catch/302
[   16.467723] 
[   16.467845] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.467897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.467910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.467934] Call Trace:
[   16.467952]  <TASK>
[   16.467974]  dump_stack_lvl+0x73/0xb0
[   16.468021]  print_report+0xd1/0x610
[   16.468048]  ? __virt_addr_valid+0x1db/0x2d0
[   16.468072]  ? _copy_to_user+0x3c/0x70
[   16.468093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.468117]  ? _copy_to_user+0x3c/0x70
[   16.468137]  kasan_report+0x141/0x180
[   16.468160]  ? _copy_to_user+0x3c/0x70
[   16.468184]  kasan_check_range+0x10c/0x1c0
[   16.468209]  __kasan_check_read+0x15/0x20
[   16.468228]  _copy_to_user+0x3c/0x70
[   16.468248]  copy_user_test_oob+0x364/0x10f0
[   16.468276]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.468300]  ? finish_task_switch.isra.0+0x153/0x700
[   16.468324]  ? __switch_to+0x47/0xf50
[   16.468351]  ? __schedule+0x10cc/0x2b60
[   16.468375]  ? __pfx_read_tsc+0x10/0x10
[   16.468397]  ? ktime_get_ts64+0x86/0x230
[   16.468422]  kunit_try_run_case+0x1a5/0x480
[   16.468459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.468482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.468507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.468532]  ? __kthread_parkme+0x82/0x180
[   16.468554]  ? preempt_count_sub+0x50/0x80
[   16.468578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.468603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.468628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.468653]  kthread+0x337/0x6f0
[   16.468673]  ? trace_preempt_on+0x20/0xc0
[   16.468697]  ? __pfx_kthread+0x10/0x10
[   16.468718]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.468741]  ? calculate_sigpending+0x7b/0xa0
[   16.468767]  ? __pfx_kthread+0x10/0x10
[   16.468788]  ret_from_fork+0x116/0x1d0
[   16.468808]  ? __pfx_kthread+0x10/0x10
[   16.468831]  ret_from_fork_asm+0x1a/0x30
[   16.468871]  </TASK>
[   16.468881] 
[   16.475973] Allocated by task 302:
[   16.476181]  kasan_save_stack+0x45/0x70
[   16.476392]  kasan_save_track+0x18/0x40
[   16.476580]  kasan_save_alloc_info+0x3b/0x50
[   16.476794]  __kasan_kmalloc+0xb7/0xc0
[   16.476966]  __kmalloc_noprof+0x1c9/0x500
[   16.477154]  kunit_kmalloc_array+0x25/0x60
[   16.477342]  copy_user_test_oob+0xab/0x10f0
[   16.477503]  kunit_try_run_case+0x1a5/0x480
[   16.477649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.477906]  kthread+0x337/0x6f0
[   16.478087]  ret_from_fork+0x116/0x1d0
[   16.478276]  ret_from_fork_asm+0x1a/0x30
[   16.478465] 
[   16.478565] The buggy address belongs to the object at ffff8881029c5700
[   16.478565]  which belongs to the cache kmalloc-128 of size 128
[   16.479113] The buggy address is located 0 bytes inside of
[   16.479113]  allocated 120-byte region [ffff8881029c5700, ffff8881029c5778)
[   16.479631] 
[   16.479730] The buggy address belongs to the physical page:
[   16.479942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   16.480245] flags: 0x200000000000000(node=0|zone=2)
[   16.480483] page_type: f5(slab)
[   16.480663] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.480956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.481264] page dumped because: kasan: bad access detected
[   16.481507] 
[   16.481580] Memory state around the buggy address:
[   16.481779]  ffff8881029c5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.482092]  ffff8881029c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.482351] >ffff8881029c5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.482650]                                                                 ^
[   16.482915]  ffff8881029c5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.483218]  ffff8881029c5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.483524] ==================================================================

[   16.178345] ==================================================================
[   16.178782] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70
[   16.179107] Read of size 121 at addr ffff8881029b2200 by task kunit_try_catch/302
[   16.179570] 
[   16.179672] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.179718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.179731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.179753] Call Trace:
[   16.179767]  <TASK>
[   16.179783]  dump_stack_lvl+0x73/0xb0
[   16.179813]  print_report+0xd1/0x610
[   16.179837]  ? __virt_addr_valid+0x1db/0x2d0
[   16.179861]  ? _copy_to_user+0x3c/0x70
[   16.179881]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.179918]  ? _copy_to_user+0x3c/0x70
[   16.179938]  kasan_report+0x141/0x180
[   16.179962]  ? _copy_to_user+0x3c/0x70
[   16.179987]  kasan_check_range+0x10c/0x1c0
[   16.180011]  __kasan_check_read+0x15/0x20
[   16.180031]  _copy_to_user+0x3c/0x70
[   16.180051]  copy_user_test_oob+0x364/0x10f0
[   16.180078]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.180103]  ? finish_task_switch.isra.0+0x153/0x700
[   16.180127]  ? __switch_to+0x47/0xf50
[   16.180153]  ? __schedule+0x10cc/0x2b60
[   16.180177]  ? __pfx_read_tsc+0x10/0x10
[   16.180198]  ? ktime_get_ts64+0x86/0x230
[   16.180224]  kunit_try_run_case+0x1a5/0x480
[   16.180249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.180272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.180297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.180322]  ? __kthread_parkme+0x82/0x180
[   16.180344]  ? preempt_count_sub+0x50/0x80
[   16.180369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.180394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.180420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.180445]  kthread+0x337/0x6f0
[   16.180464]  ? trace_preempt_on+0x20/0xc0
[   16.180489]  ? __pfx_kthread+0x10/0x10
[   16.180511]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.180533]  ? calculate_sigpending+0x7b/0xa0
[   16.180558]  ? __pfx_kthread+0x10/0x10
[   16.180580]  ret_from_fork+0x116/0x1d0
[   16.180599]  ? __pfx_kthread+0x10/0x10
[   16.180620]  ret_from_fork_asm+0x1a/0x30
[   16.180654]  </TASK>
[   16.180664] 
[   16.187698] Allocated by task 302:
[   16.187827]  kasan_save_stack+0x45/0x70
[   16.187984]  kasan_save_track+0x18/0x40
[   16.188179]  kasan_save_alloc_info+0x3b/0x50
[   16.188402]  __kasan_kmalloc+0xb7/0xc0
[   16.188591]  __kmalloc_noprof+0x1c9/0x500
[   16.188790]  kunit_kmalloc_array+0x25/0x60
[   16.189004]  copy_user_test_oob+0xab/0x10f0
[   16.189340]  kunit_try_run_case+0x1a5/0x480
[   16.189549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.189728]  kthread+0x337/0x6f0
[   16.189850]  ret_from_fork+0x116/0x1d0
[   16.190131]  ret_from_fork_asm+0x1a/0x30
[   16.190334] 
[   16.190429] The buggy address belongs to the object at ffff8881029b2200
[   16.190429]  which belongs to the cache kmalloc-128 of size 128
[   16.190923] The buggy address is located 0 bytes inside of
[   16.190923]  allocated 120-byte region [ffff8881029b2200, ffff8881029b2278)
[   16.191466] 
[   16.191547] The buggy address belongs to the physical page:
[   16.191755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   16.192120] flags: 0x200000000000000(node=0|zone=2)
[   16.192339] page_type: f5(slab)
[   16.192484] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.192771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.193137] page dumped because: kasan: bad access detected
[   16.193342] 
[   16.193437] Memory state around the buggy address:
[   16.193637]  ffff8881029b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.193917]  ffff8881029b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.194227] >ffff8881029b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.194445]                                                                 ^
[   16.194659]  ffff8881029b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.194886]  ffff8881029b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.195112] ==================================================================