Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 63.982111] ================================================================== [ 63.996336] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 64.003709] Read of size 8 at addr ffff000801ad8e78 by task kunit_try_catch/328 [ 64.011000] [ 64.012488] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 64.012548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.012567] Hardware name: WinLink E850-96 board (DT) [ 64.012588] Call trace: [ 64.012606] show_stack+0x20/0x38 (C) [ 64.012644] dump_stack_lvl+0x8c/0xd0 [ 64.012683] print_report+0x118/0x608 [ 64.012724] kasan_report+0xdc/0x128 [ 64.012757] __asan_report_load8_noabort+0x20/0x30 [ 64.012796] copy_to_kernel_nofault+0x204/0x250 [ 64.012836] copy_to_kernel_nofault_oob+0x158/0x418 [ 64.012873] kunit_try_run_case+0x170/0x3f0 [ 64.012911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.012951] kthread+0x328/0x630 [ 64.012981] ret_from_fork+0x10/0x20 [ 64.013022] [ 64.080531] Allocated by task 328: [ 64.083918] kasan_save_stack+0x3c/0x68 [ 64.087736] kasan_save_track+0x20/0x40 [ 64.091554] kasan_save_alloc_info+0x40/0x58 [ 64.095807] __kasan_kmalloc+0xd4/0xd8 [ 64.099540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.104054] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.108829] kunit_try_run_case+0x170/0x3f0 [ 64.112995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.118463] kthread+0x328/0x630 [ 64.121675] ret_from_fork+0x10/0x20 [ 64.125234] [ 64.126712] The buggy address belongs to the object at ffff000801ad8e00 [ 64.126712] which belongs to the cache kmalloc-128 of size 128 [ 64.139212] The buggy address is located 0 bytes to the right of [ 64.139212] allocated 120-byte region [ffff000801ad8e00, ffff000801ad8e78) [ 64.152143] [ 64.153623] The buggy address belongs to the physical page: [ 64.159179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8 [ 64.167162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.174800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.181746] page_type: f5(slab) [ 64.184883] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.192601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.200331] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.208139] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.215952] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff [ 64.223764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.231571] page dumped because: kasan: bad access detected [ 64.237124] [ 64.238600] Memory state around the buggy address: [ 64.243380] ffff000801ad8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.250583] ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.257788] >ffff000801ad8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.264989] ^ [ 64.272112] ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.279315] ffff000801ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.286518] ================================================================== [ 64.293956] ================================================================== [ 64.300931] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 64.308218] Write of size 8 at addr ffff000801ad8e78 by task kunit_try_catch/328 [ 64.315596] [ 64.317081] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 64.317134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.317150] Hardware name: WinLink E850-96 board (DT) [ 64.317173] Call trace: [ 64.317190] show_stack+0x20/0x38 (C) [ 64.317226] dump_stack_lvl+0x8c/0xd0 [ 64.317266] print_report+0x118/0x608 [ 64.317305] kasan_report+0xdc/0x128 [ 64.317340] kasan_check_range+0x100/0x1a8 [ 64.317377] __kasan_check_write+0x20/0x30 [ 64.317409] copy_to_kernel_nofault+0x8c/0x250 [ 64.317445] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 64.317479] kunit_try_run_case+0x170/0x3f0 [ 64.317516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.317555] kthread+0x328/0x630 [ 64.317583] ret_from_fork+0x10/0x20 [ 64.317620] [ 64.388426] Allocated by task 328: [ 64.391810] kasan_save_stack+0x3c/0x68 [ 64.395629] kasan_save_track+0x20/0x40 [ 64.399449] kasan_save_alloc_info+0x40/0x58 [ 64.403702] __kasan_kmalloc+0xd4/0xd8 [ 64.407435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.411948] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.416723] kunit_try_run_case+0x170/0x3f0 [ 64.420889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.426358] kthread+0x328/0x630 [ 64.429570] ret_from_fork+0x10/0x20 [ 64.433128] [ 64.434606] The buggy address belongs to the object at ffff000801ad8e00 [ 64.434606] which belongs to the cache kmalloc-128 of size 128 [ 64.447106] The buggy address is located 0 bytes to the right of [ 64.447106] allocated 120-byte region [ffff000801ad8e00, ffff000801ad8e78) [ 64.460038] [ 64.461515] The buggy address belongs to the physical page: [ 64.467073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8 [ 64.475058] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.482696] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.489638] page_type: f5(slab) [ 64.492778] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.500496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.508222] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.516033] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.523847] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff [ 64.531658] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.539463] page dumped because: kasan: bad access detected [ 64.545019] [ 64.546495] Memory state around the buggy address: [ 64.551274] ffff000801ad8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.558478] ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.565684] >ffff000801ad8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.572883] ^ [ 64.580005] ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.587210] ffff000801ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.594411] ==================================================================
[ 30.669981] ================================================================== [ 30.670088] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 30.670203] Write of size 8 at addr fff00000c7772978 by task kunit_try_catch/281 [ 30.670327] [ 30.670399] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.670593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.670664] Hardware name: linux,dummy-virt (DT) [ 30.670743] Call trace: [ 30.670803] show_stack+0x20/0x38 (C) [ 30.674258] dump_stack_lvl+0x8c/0xd0 [ 30.674786] print_report+0x118/0x608 [ 30.675229] kasan_report+0xdc/0x128 [ 30.675364] kasan_check_range+0x100/0x1a8 [ 30.676197] __kasan_check_write+0x20/0x30 [ 30.676673] copy_to_kernel_nofault+0x8c/0x250 [ 30.676893] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 30.677119] kunit_try_run_case+0x170/0x3f0 [ 30.677614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.677808] kthread+0x328/0x630 [ 30.678173] ret_from_fork+0x10/0x20 [ 30.678501] [ 30.678557] Allocated by task 281: [ 30.679816] kasan_save_stack+0x3c/0x68 [ 30.679963] kasan_save_track+0x20/0x40 [ 30.680115] kasan_save_alloc_info+0x40/0x58 [ 30.680226] __kasan_kmalloc+0xd4/0xd8 [ 30.680359] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.680495] copy_to_kernel_nofault_oob+0xc8/0x418 [ 30.680604] kunit_try_run_case+0x170/0x3f0 [ 30.680706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.680832] kthread+0x328/0x630 [ 30.680959] ret_from_fork+0x10/0x20 [ 30.681073] [ 30.681139] The buggy address belongs to the object at fff00000c7772900 [ 30.681139] which belongs to the cache kmalloc-128 of size 128 [ 30.681584] The buggy address is located 0 bytes to the right of [ 30.681584] allocated 120-byte region [fff00000c7772900, fff00000c7772978) [ 30.681855] [ 30.681925] The buggy address belongs to the physical page: [ 30.682101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 30.682241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.682689] page_type: f5(slab) [ 30.682800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.683002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.683349] page dumped because: kasan: bad access detected [ 30.683540] [ 30.683590] Memory state around the buggy address: [ 30.684223] fff00000c7772800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.684610] fff00000c7772880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.685628] >fff00000c7772900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.686122] ^ [ 30.686267] fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.686396] fff00000c7772a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.686593] ================================================================== [ 30.660295] ================================================================== [ 30.660436] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 30.660573] Read of size 8 at addr fff00000c7772978 by task kunit_try_catch/281 [ 30.660874] [ 30.661200] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.661486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.661598] Hardware name: linux,dummy-virt (DT) [ 30.661727] Call trace: [ 30.661802] show_stack+0x20/0x38 (C) [ 30.661963] dump_stack_lvl+0x8c/0xd0 [ 30.662176] print_report+0x118/0x608 [ 30.662311] kasan_report+0xdc/0x128 [ 30.662495] __asan_report_load8_noabort+0x20/0x30 [ 30.662658] copy_to_kernel_nofault+0x204/0x250 [ 30.662794] copy_to_kernel_nofault_oob+0x158/0x418 [ 30.662962] kunit_try_run_case+0x170/0x3f0 [ 30.663190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.663470] kthread+0x328/0x630 [ 30.663620] ret_from_fork+0x10/0x20 [ 30.663931] [ 30.663984] Allocated by task 281: [ 30.664165] kasan_save_stack+0x3c/0x68 [ 30.664302] kasan_save_track+0x20/0x40 [ 30.664403] kasan_save_alloc_info+0x40/0x58 [ 30.664536] __kasan_kmalloc+0xd4/0xd8 [ 30.664636] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.664779] copy_to_kernel_nofault_oob+0xc8/0x418 [ 30.664944] kunit_try_run_case+0x170/0x3f0 [ 30.665206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.665354] kthread+0x328/0x630 [ 30.665454] ret_from_fork+0x10/0x20 [ 30.665570] [ 30.665671] The buggy address belongs to the object at fff00000c7772900 [ 30.665671] which belongs to the cache kmalloc-128 of size 128 [ 30.665929] The buggy address is located 0 bytes to the right of [ 30.665929] allocated 120-byte region [fff00000c7772900, fff00000c7772978) [ 30.666205] [ 30.666264] The buggy address belongs to the physical page: [ 30.666345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 30.666485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.666610] page_type: f5(slab) [ 30.666727] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.666936] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.667047] page dumped because: kasan: bad access detected [ 30.667209] [ 30.667270] Memory state around the buggy address: [ 30.667360] fff00000c7772800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.667479] fff00000c7772880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.667628] >fff00000c7772900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.667833] ^ [ 30.667965] fff00000c7772980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.668079] fff00000c7772a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.668195] ==================================================================
[ 26.564458] ================================================================== [ 26.565280] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 26.566927] Write of size 8 at addr ffff888101b3ea78 by task kunit_try_catch/299 [ 26.568401] [ 26.568780] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.568920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.568967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.569037] Call Trace: [ 26.569089] <TASK> [ 26.569146] dump_stack_lvl+0x73/0xb0 [ 26.569261] print_report+0xd1/0x650 [ 26.569346] ? __virt_addr_valid+0x1db/0x2d0 [ 26.569453] ? copy_to_kernel_nofault+0x99/0x260 [ 26.569530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.569607] ? copy_to_kernel_nofault+0x99/0x260 [ 26.569711] kasan_report+0x141/0x180 [ 26.569786] ? copy_to_kernel_nofault+0x99/0x260 [ 26.569861] kasan_check_range+0x10c/0x1c0 [ 26.569924] __kasan_check_write+0x18/0x20 [ 26.569979] copy_to_kernel_nofault+0x99/0x260 [ 26.570043] copy_to_kernel_nofault_oob+0x288/0x560 [ 26.570107] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 26.570168] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.570240] ? trace_hardirqs_on+0x37/0xe0 [ 26.570319] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 26.570392] kunit_try_run_case+0x1a5/0x480 [ 26.570463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.570572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.570655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.570696] ? __kthread_parkme+0x82/0x180 [ 26.570729] ? preempt_count_sub+0x50/0x80 [ 26.570764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.570803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.570841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.570878] kthread+0x337/0x6f0 [ 26.570906] ? trace_preempt_on+0x20/0xc0 [ 26.570939] ? __pfx_kthread+0x10/0x10 [ 26.570970] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.571003] ? calculate_sigpending+0x7b/0xa0 [ 26.571039] ? __pfx_kthread+0x10/0x10 [ 26.571070] ret_from_fork+0x116/0x1d0 [ 26.571098] ? __pfx_kthread+0x10/0x10 [ 26.571128] ret_from_fork_asm+0x1a/0x30 [ 26.571171] </TASK> [ 26.571187] [ 26.593037] Allocated by task 299: [ 26.594182] kasan_save_stack+0x45/0x70 [ 26.595073] kasan_save_track+0x18/0x40 [ 26.595625] kasan_save_alloc_info+0x3b/0x50 [ 26.596264] __kasan_kmalloc+0xb7/0xc0 [ 26.597033] __kmalloc_cache_noprof+0x189/0x420 [ 26.597726] copy_to_kernel_nofault_oob+0x12f/0x560 [ 26.598036] kunit_try_run_case+0x1a5/0x480 [ 26.598440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.599458] kthread+0x337/0x6f0 [ 26.600251] ret_from_fork+0x116/0x1d0 [ 26.601063] ret_from_fork_asm+0x1a/0x30 [ 26.601418] [ 26.602213] The buggy address belongs to the object at ffff888101b3ea00 [ 26.602213] which belongs to the cache kmalloc-128 of size 128 [ 26.603799] The buggy address is located 0 bytes to the right of [ 26.603799] allocated 120-byte region [ffff888101b3ea00, ffff888101b3ea78) [ 26.605824] [ 26.606026] The buggy address belongs to the physical page: [ 26.606699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 26.608134] flags: 0x200000000000000(node=0|zone=2) [ 26.608684] page_type: f5(slab) [ 26.609314] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.609945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.610743] page dumped because: kasan: bad access detected [ 26.611303] [ 26.611779] Memory state around the buggy address: [ 26.612531] ffff888101b3e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.613709] ffff888101b3e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.614310] >ffff888101b3ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.615186] ^ [ 26.615871] ffff888101b3ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.616685] ffff888101b3eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.617057] ================================================================== [ 26.509027] ================================================================== [ 26.510907] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 26.511619] Read of size 8 at addr ffff888101b3ea78 by task kunit_try_catch/299 [ 26.513164] [ 26.513865] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.514014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.514059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.514133] Call Trace: [ 26.514307] <TASK> [ 26.514376] dump_stack_lvl+0x73/0xb0 [ 26.514547] print_report+0xd1/0x650 [ 26.514641] ? __virt_addr_valid+0x1db/0x2d0 [ 26.514717] ? copy_to_kernel_nofault+0x225/0x260 [ 26.514785] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.514846] ? copy_to_kernel_nofault+0x225/0x260 [ 26.514908] kasan_report+0x141/0x180 [ 26.514971] ? copy_to_kernel_nofault+0x225/0x260 [ 26.515045] __asan_report_load8_noabort+0x18/0x20 [ 26.515110] copy_to_kernel_nofault+0x225/0x260 [ 26.515175] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 26.515245] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 26.515317] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.515391] ? trace_hardirqs_on+0x37/0xe0 [ 26.515582] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 26.515679] kunit_try_run_case+0x1a5/0x480 [ 26.515729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.515767] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.515805] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.515840] ? __kthread_parkme+0x82/0x180 [ 26.515873] ? preempt_count_sub+0x50/0x80 [ 26.515907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.515944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.515980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.516016] kthread+0x337/0x6f0 [ 26.516046] ? trace_preempt_on+0x20/0xc0 [ 26.516079] ? __pfx_kthread+0x10/0x10 [ 26.516109] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.516142] ? calculate_sigpending+0x7b/0xa0 [ 26.516180] ? __pfx_kthread+0x10/0x10 [ 26.516212] ret_from_fork+0x116/0x1d0 [ 26.516287] ? __pfx_kthread+0x10/0x10 [ 26.516323] ret_from_fork_asm+0x1a/0x30 [ 26.516370] </TASK> [ 26.516388] [ 26.538997] Allocated by task 299: [ 26.540041] kasan_save_stack+0x45/0x70 [ 26.540377] kasan_save_track+0x18/0x40 [ 26.541025] kasan_save_alloc_info+0x3b/0x50 [ 26.541758] __kasan_kmalloc+0xb7/0xc0 [ 26.542168] __kmalloc_cache_noprof+0x189/0x420 [ 26.543073] copy_to_kernel_nofault_oob+0x12f/0x560 [ 26.543792] kunit_try_run_case+0x1a5/0x480 [ 26.544079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.544907] kthread+0x337/0x6f0 [ 26.545960] ret_from_fork+0x116/0x1d0 [ 26.547012] ret_from_fork_asm+0x1a/0x30 [ 26.547701] [ 26.548081] The buggy address belongs to the object at ffff888101b3ea00 [ 26.548081] which belongs to the cache kmalloc-128 of size 128 [ 26.549122] The buggy address is located 0 bytes to the right of [ 26.549122] allocated 120-byte region [ffff888101b3ea00, ffff888101b3ea78) [ 26.550600] [ 26.550883] The buggy address belongs to the physical page: [ 26.551376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 26.552105] flags: 0x200000000000000(node=0|zone=2) [ 26.552841] page_type: f5(slab) [ 26.553267] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.554673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.555302] page dumped because: kasan: bad access detected [ 26.555989] [ 26.556206] Memory state around the buggy address: [ 26.556724] ffff888101b3e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.557895] ffff888101b3e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.558475] >ffff888101b3ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.559036] ^ [ 26.559701] ffff888101b3ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.560702] ffff888101b3eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.561319] ==================================================================
[ 24.928827] ================================================================== [ 24.929532] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 24.929812] Read of size 8 at addr ffff8881038d5e78 by task kunit_try_catch/299 [ 24.930392] [ 24.930680] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.930810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.930851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.930997] Call Trace: [ 24.931069] <TASK> [ 24.931120] dump_stack_lvl+0x73/0xb0 [ 24.931216] print_report+0xd1/0x650 [ 24.931300] ? __virt_addr_valid+0x1db/0x2d0 [ 24.931380] ? copy_to_kernel_nofault+0x225/0x260 [ 24.931454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.931530] ? copy_to_kernel_nofault+0x225/0x260 [ 24.931685] kasan_report+0x141/0x180 [ 24.931888] ? copy_to_kernel_nofault+0x225/0x260 [ 24.931984] __asan_report_load8_noabort+0x18/0x20 [ 24.932064] copy_to_kernel_nofault+0x225/0x260 [ 24.932123] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 24.932175] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 24.932212] ? finish_task_switch.isra.0+0x153/0x700 [ 24.932246] ? __schedule+0x10cc/0x2b60 [ 24.932280] ? trace_hardirqs_on+0x37/0xe0 [ 24.932326] ? __pfx_read_tsc+0x10/0x10 [ 24.932359] ? ktime_get_ts64+0x86/0x230 [ 24.932393] kunit_try_run_case+0x1a5/0x480 [ 24.932435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.932474] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.932512] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.932548] ? __kthread_parkme+0x82/0x180 [ 24.932577] ? preempt_count_sub+0x50/0x80 [ 24.932609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.932646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.932682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.932719] kthread+0x337/0x6f0 [ 24.932748] ? trace_preempt_on+0x20/0xc0 [ 24.932781] ? __pfx_kthread+0x10/0x10 [ 24.932810] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.932842] ? calculate_sigpending+0x7b/0xa0 [ 24.932904] ? __pfx_kthread+0x10/0x10 [ 24.932942] ret_from_fork+0x116/0x1d0 [ 24.932972] ? __pfx_kthread+0x10/0x10 [ 24.933003] ret_from_fork_asm+0x1a/0x30 [ 24.933046] </TASK> [ 24.933064] [ 24.950400] Allocated by task 299: [ 24.951029] kasan_save_stack+0x45/0x70 [ 24.951542] kasan_save_track+0x18/0x40 [ 24.951863] kasan_save_alloc_info+0x3b/0x50 [ 24.952280] __kasan_kmalloc+0xb7/0xc0 [ 24.952858] __kmalloc_cache_noprof+0x189/0x420 [ 24.953704] copy_to_kernel_nofault_oob+0x12f/0x560 [ 24.954369] kunit_try_run_case+0x1a5/0x480 [ 24.954808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.955527] kthread+0x337/0x6f0 [ 24.955999] ret_from_fork+0x116/0x1d0 [ 24.956527] ret_from_fork_asm+0x1a/0x30 [ 24.956887] [ 24.957302] The buggy address belongs to the object at ffff8881038d5e00 [ 24.957302] which belongs to the cache kmalloc-128 of size 128 [ 24.958502] The buggy address is located 0 bytes to the right of [ 24.958502] allocated 120-byte region [ffff8881038d5e00, ffff8881038d5e78) [ 24.959593] [ 24.959990] The buggy address belongs to the physical page: [ 24.960655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 24.961380] flags: 0x200000000000000(node=0|zone=2) [ 24.961899] page_type: f5(slab) [ 24.962273] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.962972] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.963810] page dumped because: kasan: bad access detected [ 24.964363] [ 24.964614] Memory state around the buggy address: [ 24.965168] ffff8881038d5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.965970] ffff8881038d5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.966983] >ffff8881038d5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.967751] ^ [ 24.968623] ffff8881038d5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.969592] ffff8881038d5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.970118] ================================================================== [ 24.971514] ================================================================== [ 24.972103] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 24.973938] Write of size 8 at addr ffff8881038d5e78 by task kunit_try_catch/299 [ 24.974512] [ 24.974966] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.975252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.975292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.975327] Call Trace: [ 24.975351] <TASK> [ 24.975371] dump_stack_lvl+0x73/0xb0 [ 24.975417] print_report+0xd1/0x650 [ 24.975451] ? __virt_addr_valid+0x1db/0x2d0 [ 24.975485] ? copy_to_kernel_nofault+0x99/0x260 [ 24.975522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.975555] ? copy_to_kernel_nofault+0x99/0x260 [ 24.975590] kasan_report+0x141/0x180 [ 24.975623] ? copy_to_kernel_nofault+0x99/0x260 [ 24.975663] kasan_check_range+0x10c/0x1c0 [ 24.975698] __kasan_check_write+0x18/0x20 [ 24.975726] copy_to_kernel_nofault+0x99/0x260 [ 24.975762] copy_to_kernel_nofault_oob+0x288/0x560 [ 24.975797] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 24.975831] ? finish_task_switch.isra.0+0x153/0x700 [ 24.975864] ? __schedule+0x10cc/0x2b60 [ 24.975928] ? trace_hardirqs_on+0x37/0xe0 [ 24.975974] ? __pfx_read_tsc+0x10/0x10 [ 24.976006] ? ktime_get_ts64+0x86/0x230 [ 24.976042] kunit_try_run_case+0x1a5/0x480 [ 24.976080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.976154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.976196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.976232] ? __kthread_parkme+0x82/0x180 [ 24.976261] ? preempt_count_sub+0x50/0x80 [ 24.976294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.976331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.976367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.976403] kthread+0x337/0x6f0 [ 24.976432] ? trace_preempt_on+0x20/0xc0 [ 24.976464] ? __pfx_kthread+0x10/0x10 [ 24.976495] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.976526] ? calculate_sigpending+0x7b/0xa0 [ 24.976561] ? __pfx_kthread+0x10/0x10 [ 24.976593] ret_from_fork+0x116/0x1d0 [ 24.976619] ? __pfx_kthread+0x10/0x10 [ 24.976650] ret_from_fork_asm+0x1a/0x30 [ 24.976693] </TASK> [ 24.976710] [ 24.996115] Allocated by task 299: [ 24.996786] kasan_save_stack+0x45/0x70 [ 24.997323] kasan_save_track+0x18/0x40 [ 24.997724] kasan_save_alloc_info+0x3b/0x50 [ 24.998133] __kasan_kmalloc+0xb7/0xc0 [ 24.998642] __kmalloc_cache_noprof+0x189/0x420 [ 24.999134] copy_to_kernel_nofault_oob+0x12f/0x560 [ 24.999679] kunit_try_run_case+0x1a5/0x480 [ 25.000046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.000510] kthread+0x337/0x6f0 [ 25.001000] ret_from_fork+0x116/0x1d0 [ 25.001406] ret_from_fork_asm+0x1a/0x30 [ 25.001960] [ 25.002202] The buggy address belongs to the object at ffff8881038d5e00 [ 25.002202] which belongs to the cache kmalloc-128 of size 128 [ 25.003433] The buggy address is located 0 bytes to the right of [ 25.003433] allocated 120-byte region [ffff8881038d5e00, ffff8881038d5e78) [ 25.004601] [ 25.004796] The buggy address belongs to the physical page: [ 25.005189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 25.005948] flags: 0x200000000000000(node=0|zone=2) [ 25.006471] page_type: f5(slab) [ 25.006851] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.007581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.008114] page dumped because: kasan: bad access detected [ 25.009059] [ 25.009395] Memory state around the buggy address: [ 25.009889] ffff8881038d5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.010524] ffff8881038d5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.011218] >ffff8881038d5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.011666] ^ [ 25.012375] ffff8881038d5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.013185] ffff8881038d5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.013815] ==================================================================
[ 23.294093] ================================================================== [ 23.295460] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 23.296164] Read of size 8 at addr ffff00000e1a3278 by task kunit_try_catch/334 [ 23.296843] [ 23.297015] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.297068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.297084] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.297102] Call trace: [ 23.297114] show_stack+0x20/0x38 (C) [ 23.297152] dump_stack_lvl+0x8c/0xd0 [ 23.297189] print_report+0x118/0x608 [ 23.297225] kasan_report+0xdc/0x128 [ 23.297258] __asan_report_load8_noabort+0x20/0x30 [ 23.297298] copy_to_kernel_nofault+0x204/0x250 [ 23.297333] copy_to_kernel_nofault_oob+0x158/0x418 [ 23.297366] kunit_try_run_case+0x170/0x3f0 [ 23.297402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.297441] kthread+0x328/0x630 [ 23.297469] ret_from_fork+0x10/0x20 [ 23.297502] [ 23.303546] Allocated by task 334: [ 23.303874] kasan_save_stack+0x3c/0x68 [ 23.304255] kasan_save_track+0x20/0x40 [ 23.304632] kasan_save_alloc_info+0x40/0x58 [ 23.305051] __kasan_kmalloc+0xd4/0xd8 [ 23.305420] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.305857] copy_to_kernel_nofault_oob+0xc8/0x418 [ 23.306317] kunit_try_run_case+0x170/0x3f0 [ 23.306724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.307248] kthread+0x328/0x630 [ 23.307565] ret_from_fork+0x10/0x20 [ 23.307917] [ 23.308071] The buggy address belongs to the object at ffff00000e1a3200 [ 23.308071] which belongs to the cache kmalloc-128 of size 128 [ 23.309205] The buggy address is located 0 bytes to the right of [ 23.309205] allocated 120-byte region [ffff00000e1a3200, ffff00000e1a3278) [ 23.310381] [ 23.310536] The buggy address belongs to the physical page: [ 23.311053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3 [ 23.311777] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.312391] page_type: f5(slab) [ 23.312707] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 23.313423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.314130] page dumped because: kasan: bad access detected [ 23.314646] [ 23.314799] Memory state around the buggy address: [ 23.315248] ffff00000e1a3100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.315915] ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.316583] >ffff00000e1a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.317244] ^ [ 23.317903] ffff00000e1a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.318569] ffff00000e1a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.319231] ================================================================== [ 23.320726] ================================================================== [ 23.321436] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 23.322131] Write of size 8 at addr ffff00000e1a3278 by task kunit_try_catch/334 [ 23.322805] [ 23.322964] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.323002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.323013] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.323026] Call trace: [ 23.323036] show_stack+0x20/0x38 (C) [ 23.323062] dump_stack_lvl+0x8c/0xd0 [ 23.323088] print_report+0x118/0x608 [ 23.323116] kasan_report+0xdc/0x128 [ 23.323139] kasan_check_range+0x100/0x1a8 [ 23.323166] __kasan_check_write+0x20/0x30 [ 23.323187] copy_to_kernel_nofault+0x8c/0x250 [ 23.323211] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 23.323235] kunit_try_run_case+0x170/0x3f0 [ 23.323261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.323289] kthread+0x328/0x630 [ 23.323309] ret_from_fork+0x10/0x20 [ 23.323333] [ 23.329624] Allocated by task 334: [ 23.329942] kasan_save_stack+0x3c/0x68 [ 23.330307] kasan_save_track+0x20/0x40 [ 23.330671] kasan_save_alloc_info+0x40/0x58 [ 23.331075] __kasan_kmalloc+0xd4/0xd8 [ 23.331432] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.331859] copy_to_kernel_nofault_oob+0xc8/0x418 [ 23.332305] kunit_try_run_case+0x170/0x3f0 [ 23.332700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.333211] kthread+0x328/0x630 [ 23.333517] ret_from_fork+0x10/0x20 [ 23.333858] [ 23.334006] The buggy address belongs to the object at ffff00000e1a3200 [ 23.334006] which belongs to the cache kmalloc-128 of size 128 [ 23.335125] The buggy address is located 0 bytes to the right of [ 23.335125] allocated 120-byte region [ffff00000e1a3200, ffff00000e1a3278) [ 23.336285] [ 23.336433] The buggy address belongs to the physical page: [ 23.336940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3 [ 23.337653] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.338253] page_type: f5(slab) [ 23.338555] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 23.339259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.339956] page dumped because: kasan: bad access detected [ 23.340462] [ 23.340610] Memory state around the buggy address: [ 23.341050] ffff00000e1a3100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.341705] ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.342359] >ffff00000e1a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.343011] ^ [ 23.343656] ffff00000e1a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.344310] ffff00000e1a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.344963] ==================================================================