Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 | |
x86 |
[ 17.996213] ================================================================== [ 17.996944] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90 [ 17.997592] Write of size 121 at addr ffff88810254dc00 by task kunit_try_catch/303 [ 17.998242] [ 17.998477] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.998569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.998596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.998660] Call Trace: [ 17.998688] <TASK> [ 17.998737] dump_stack_lvl+0x73/0xb0 [ 17.998802] print_report+0xd1/0x650 [ 17.998836] ? __virt_addr_valid+0x1db/0x2d0 [ 17.998868] ? _copy_from_user+0x32/0x90 [ 17.998893] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.998925] ? _copy_from_user+0x32/0x90 [ 17.998950] kasan_report+0x141/0x180 [ 17.998977] ? _copy_from_user+0x32/0x90 [ 17.999008] kasan_check_range+0x10c/0x1c0 [ 17.999037] __kasan_check_write+0x18/0x20 [ 17.999061] _copy_from_user+0x32/0x90 [ 17.999088] copy_user_test_oob+0x2be/0x10f0 [ 17.999139] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.999160] ? finish_task_switch.isra.0+0x153/0x700 [ 17.999183] ? __switch_to+0x47/0xf50 [ 17.999209] ? __schedule+0x10cc/0x2b60 [ 17.999231] ? __pfx_read_tsc+0x10/0x10 [ 17.999252] ? ktime_get_ts64+0x86/0x230 [ 17.999276] kunit_try_run_case+0x1a5/0x480 [ 17.999298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.999319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.999341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.999362] ? __kthread_parkme+0x82/0x180 [ 17.999382] ? preempt_count_sub+0x50/0x80 [ 17.999404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.999426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.999447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.999469] kthread+0x337/0x6f0 [ 17.999488] ? trace_preempt_on+0x20/0xc0 [ 17.999511] ? __pfx_kthread+0x10/0x10 [ 17.999530] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.999549] ? calculate_sigpending+0x7b/0xa0 [ 17.999572] ? __pfx_kthread+0x10/0x10 [ 17.999592] ret_from_fork+0x116/0x1d0 [ 17.999611] ? __pfx_kthread+0x10/0x10 [ 17.999648] ret_from_fork_asm+0x1a/0x30 [ 17.999678] </TASK> [ 17.999692] [ 18.010604] Allocated by task 303: [ 18.010916] kasan_save_stack+0x45/0x70 [ 18.011136] kasan_save_track+0x18/0x40 [ 18.011450] kasan_save_alloc_info+0x3b/0x50 [ 18.011740] __kasan_kmalloc+0xb7/0xc0 [ 18.011910] __kmalloc_noprof+0x1c9/0x500 [ 18.012085] kunit_kmalloc_array+0x25/0x60 [ 18.012323] copy_user_test_oob+0xab/0x10f0 [ 18.012969] kunit_try_run_case+0x1a5/0x480 [ 18.013371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.013777] kthread+0x337/0x6f0 [ 18.014038] ret_from_fork+0x116/0x1d0 [ 18.014337] ret_from_fork_asm+0x1a/0x30 [ 18.014720] [ 18.014905] The buggy address belongs to the object at ffff88810254dc00 [ 18.014905] which belongs to the cache kmalloc-128 of size 128 [ 18.015731] The buggy address is located 0 bytes inside of [ 18.015731] allocated 120-byte region [ffff88810254dc00, ffff88810254dc78) [ 18.016278] [ 18.016445] The buggy address belongs to the physical page: [ 18.016729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 18.017152] flags: 0x200000000000000(node=0|zone=2) [ 18.017441] page_type: f5(slab) [ 18.017684] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.018060] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.018537] page dumped because: kasan: bad access detected [ 18.018767] [ 18.018924] Memory state around the buggy address: [ 18.019272] ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.019566] ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.020017] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.020348] ^ [ 18.020793] ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.021133] ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.021564] ==================================================================
[ 17.936498] ================================================================== [ 17.937222] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90 [ 17.937528] Write of size 121 at addr ffff8881031c0b00 by task kunit_try_catch/302 [ 17.937838] [ 17.937973] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.938024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.938038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.938073] Call Trace: [ 17.938090] <TASK> [ 17.938112] dump_stack_lvl+0x73/0xb0 [ 17.938149] print_report+0xd1/0x650 [ 17.938176] ? __virt_addr_valid+0x1db/0x2d0 [ 17.938205] ? _copy_from_user+0x32/0x90 [ 17.938227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.938256] ? _copy_from_user+0x32/0x90 [ 17.938279] kasan_report+0x141/0x180 [ 17.938305] ? _copy_from_user+0x32/0x90 [ 17.938333] kasan_check_range+0x10c/0x1c0 [ 17.938359] __kasan_check_write+0x18/0x20 [ 17.938382] _copy_from_user+0x32/0x90 [ 17.938405] copy_user_test_oob+0x2be/0x10f0 [ 17.938435] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.938462] ? __kasan_check_write+0x18/0x20 [ 17.938485] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.938511] ? irqentry_exit+0x2a/0x60 [ 17.938538] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.938565] ? trace_hardirqs_on+0x37/0xe0 [ 17.938593] ? __pfx_read_tsc+0x10/0x10 [ 17.938620] ? ktime_get_ts64+0x86/0x230 [ 17.938649] kunit_try_run_case+0x1a5/0x480 [ 17.938676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.938704] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.938741] ? __kthread_parkme+0x82/0x180 [ 17.938766] ? preempt_count_sub+0x50/0x80 [ 17.938797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.938825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.938851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.938878] kthread+0x337/0x6f0 [ 17.938901] ? trace_preempt_on+0x20/0xc0 [ 17.938927] ? __pfx_kthread+0x10/0x10 [ 17.938951] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.938975] ? calculate_sigpending+0x7b/0xa0 [ 17.939003] ? __pfx_kthread+0x10/0x10 [ 17.939029] ret_from_fork+0x116/0x1d0 [ 17.939061] ? __pfx_kthread+0x10/0x10 [ 17.939085] ret_from_fork_asm+0x1a/0x30 [ 17.939121] </TASK> [ 17.939136] [ 17.946984] Allocated by task 302: [ 17.947163] kasan_save_stack+0x45/0x70 [ 17.947349] kasan_save_track+0x18/0x40 [ 17.947558] kasan_save_alloc_info+0x3b/0x50 [ 17.947779] __kasan_kmalloc+0xb7/0xc0 [ 17.947981] __kmalloc_noprof+0x1c9/0x500 [ 17.948176] kunit_kmalloc_array+0x25/0x60 [ 17.948398] copy_user_test_oob+0xab/0x10f0 [ 17.948618] kunit_try_run_case+0x1a5/0x480 [ 17.948806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.948995] kthread+0x337/0x6f0 [ 17.949221] ret_from_fork+0x116/0x1d0 [ 17.949477] ret_from_fork_asm+0x1a/0x30 [ 17.949637] [ 17.949717] The buggy address belongs to the object at ffff8881031c0b00 [ 17.949717] which belongs to the cache kmalloc-128 of size 128 [ 17.950267] The buggy address is located 0 bytes inside of [ 17.950267] allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78) [ 17.950652] [ 17.950734] The buggy address belongs to the physical page: [ 17.951020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0 [ 17.951408] flags: 0x200000000000000(node=0|zone=2) [ 17.951661] page_type: f5(slab) [ 17.951841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.952263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.952512] page dumped because: kasan: bad access detected [ 17.952840] [ 17.952945] Memory state around the buggy address: [ 17.953202] ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.953514] ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.953871] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.954157] ^ [ 17.954460] ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.954796] ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.955116] ==================================================================
[ 76.744116] ================================================================== [ 76.757444] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90 [ 76.764064] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 76.771632] [ 76.773131] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 76.773140] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 76.773143] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 76.773147] Call Trace: [ 76.773149] <TASK> [ 76.773151] dump_stack_lvl+0x73/0xb0 [ 76.773156] print_report+0xd1/0x650 [ 76.773161] ? __virt_addr_valid+0x1db/0x2d0 [ 76.773165] ? _copy_from_user+0x32/0x90 [ 76.773168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 76.773174] ? _copy_from_user+0x32/0x90 [ 76.773177] kasan_report+0x141/0x180 [ 76.773181] ? _copy_from_user+0x32/0x90 [ 76.773186] kasan_check_range+0x10c/0x1c0 [ 76.773190] __kasan_check_write+0x18/0x20 [ 76.773194] _copy_from_user+0x32/0x90 [ 76.773198] copy_user_test_oob+0x2be/0x10f0 [ 76.773203] ? __pfx_copy_user_test_oob+0x10/0x10 [ 76.773207] ? finish_task_switch.isra.0+0x153/0x700 [ 76.773212] ? __switch_to+0x544/0xf50 [ 76.773217] ? __schedule+0x10cc/0x2b60 [ 76.773221] ? ktime_get_ts64+0x83/0x230 [ 76.773225] kunit_try_run_case+0x1a2/0x480 [ 76.773230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.773235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 76.773239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 76.773244] ? __kthread_parkme+0x82/0x180 [ 76.773247] ? preempt_count_sub+0x50/0x80 [ 76.773252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.773256] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.773261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 76.773265] kthread+0x334/0x6f0 [ 76.773269] ? trace_preempt_on+0x20/0xc0 [ 76.773273] ? __pfx_kthread+0x10/0x10 [ 76.773277] ? _raw_spin_unlock_irq+0x47/0x80 [ 76.773281] ? calculate_sigpending+0x7b/0xa0 [ 76.773286] ? __pfx_kthread+0x10/0x10 [ 76.773290] ret_from_fork+0x113/0x1d0 [ 76.773294] ? __pfx_kthread+0x10/0x10 [ 76.773297] ret_from_fork_asm+0x1a/0x30 [ 76.773304] </TASK> [ 76.773305] [ 76.953301] Allocated by task 326: [ 76.956706] kasan_save_stack+0x45/0x70 [ 76.960547] kasan_save_track+0x18/0x40 [ 76.964392] kasan_save_alloc_info+0x3b/0x50 [ 76.968685] __kasan_kmalloc+0xb7/0xc0 [ 76.972437] __kmalloc_noprof+0x1c9/0x500 [ 76.976450] kunit_kmalloc_array+0x25/0x60 [ 76.980557] copy_user_test_oob+0xab/0x10f0 [ 76.984742] kunit_try_run_case+0x1a2/0x480 [ 76.988929] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.994346] kthread+0x334/0x6f0 [ 76.997613] ret_from_fork+0x113/0x1d0 [ 77.001365] ret_from_fork_asm+0x1a/0x30 [ 77.005362] [ 77.006903] The buggy address belongs to the object at ffff8881066e9300 [ 77.006903] which belongs to the cache kmalloc-128 of size 128 [ 77.019418] The buggy address is located 0 bytes inside of [ 77.019418] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 77.031847] [ 77.033362] The buggy address belongs to the physical page: [ 77.038962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 77.046970] flags: 0x200000000000000(node=0|zone=2) [ 77.051849] page_type: f5(slab) [ 77.054995] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 77.062743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 77.070480] page dumped because: kasan: bad access detected [ 77.076054] [ 77.077553] Memory state around the buggy address: [ 77.082362] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.089602] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.096828] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.104047] ^ [ 77.111182] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.118432] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.125653] ==================================================================