Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.118790] ================================================================== [ 18.118999] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 18.119128] Read of size 8 at addr fff00000c790e578 by task kunit_try_catch/281 [ 18.119201] [ 18.119244] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.119615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.119720] Hardware name: linux,dummy-virt (DT) [ 18.119761] Call trace: [ 18.119790] show_stack+0x20/0x38 (C) [ 18.120157] dump_stack_lvl+0x8c/0xd0 [ 18.120291] print_report+0x118/0x5d0 [ 18.120346] kasan_report+0xdc/0x128 [ 18.120678] __asan_report_load8_noabort+0x20/0x30 [ 18.120876] copy_to_kernel_nofault+0x204/0x250 [ 18.120979] copy_to_kernel_nofault_oob+0x158/0x418 [ 18.121104] kunit_try_run_case+0x170/0x3f0 [ 18.121163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.121582] kthread+0x328/0x630 [ 18.121916] ret_from_fork+0x10/0x20 [ 18.122054] [ 18.122372] Allocated by task 281: [ 18.122721] kasan_save_stack+0x3c/0x68 [ 18.122834] kasan_save_track+0x20/0x40 [ 18.122962] kasan_save_alloc_info+0x40/0x58 [ 18.123106] __kasan_kmalloc+0xd4/0xd8 [ 18.123217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.123307] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.123519] kunit_try_run_case+0x170/0x3f0 [ 18.123772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.123940] kthread+0x328/0x630 [ 18.123981] ret_from_fork+0x10/0x20 [ 18.124047] [ 18.124073] The buggy address belongs to the object at fff00000c790e500 [ 18.124073] which belongs to the cache kmalloc-128 of size 128 [ 18.124295] The buggy address is located 0 bytes to the right of [ 18.124295] allocated 120-byte region [fff00000c790e500, fff00000c790e578) [ 18.124518] [ 18.124548] The buggy address belongs to the physical page: [ 18.124584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.124651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.124727] page_type: f5(slab) [ 18.124780] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.124852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.124897] page dumped because: kasan: bad access detected [ 18.124930] [ 18.124952] Memory state around the buggy address: [ 18.124996] fff00000c790e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.125049] fff00000c790e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.125095] >fff00000c790e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.125145] ^ [ 18.125190] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.125235] fff00000c790e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.125285] ================================================================== [ 18.126858] ================================================================== [ 18.127255] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 18.127334] Write of size 8 at addr fff00000c790e578 by task kunit_try_catch/281 [ 18.127389] [ 18.127448] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.127623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.127655] Hardware name: linux,dummy-virt (DT) [ 18.127845] Call trace: [ 18.127881] show_stack+0x20/0x38 (C) [ 18.128161] dump_stack_lvl+0x8c/0xd0 [ 18.128281] print_report+0x118/0x5d0 [ 18.128497] kasan_report+0xdc/0x128 [ 18.128733] kasan_check_range+0x100/0x1a8 [ 18.128895] __kasan_check_write+0x20/0x30 [ 18.129036] copy_to_kernel_nofault+0x8c/0x250 [ 18.129136] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 18.129496] kunit_try_run_case+0x170/0x3f0 [ 18.129716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.129882] kthread+0x328/0x630 [ 18.129952] ret_from_fork+0x10/0x20 [ 18.130126] [ 18.130167] Allocated by task 281: [ 18.130509] kasan_save_stack+0x3c/0x68 [ 18.130582] kasan_save_track+0x20/0x40 [ 18.130645] kasan_save_alloc_info+0x40/0x58 [ 18.130817] __kasan_kmalloc+0xd4/0xd8 [ 18.130897] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.131225] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.131315] kunit_try_run_case+0x170/0x3f0 [ 18.131515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.131713] kthread+0x328/0x630 [ 18.131918] ret_from_fork+0x10/0x20 [ 18.132110] [ 18.132232] The buggy address belongs to the object at fff00000c790e500 [ 18.132232] which belongs to the cache kmalloc-128 of size 128 [ 18.132389] The buggy address is located 0 bytes to the right of [ 18.132389] allocated 120-byte region [fff00000c790e500, fff00000c790e578) [ 18.132481] [ 18.132581] The buggy address belongs to the physical page: [ 18.132651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.132740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.133169] page_type: f5(slab) [ 18.133505] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.133844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.133913] page dumped because: kasan: bad access detected [ 18.133967] [ 18.134003] Memory state around the buggy address: [ 18.134054] fff00000c790e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.134179] fff00000c790e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.134234] >fff00000c790e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.134291] ^ [ 18.134338] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.134384] fff00000c790e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.134426] ==================================================================
[ 15.905536] ================================================================== [ 15.907067] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 15.907847] Read of size 8 at addr ffff888102fd1d78 by task kunit_try_catch/299 [ 15.908562] [ 15.908740] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.908788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.908802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.908825] Call Trace: [ 15.908837] <TASK> [ 15.908853] dump_stack_lvl+0x73/0xb0 [ 15.908906] print_report+0xd1/0x610 [ 15.908930] ? __virt_addr_valid+0x1db/0x2d0 [ 15.908954] ? copy_to_kernel_nofault+0x225/0x260 [ 15.908984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.909017] ? copy_to_kernel_nofault+0x225/0x260 [ 15.909041] kasan_report+0x141/0x180 [ 15.909064] ? copy_to_kernel_nofault+0x225/0x260 [ 15.909092] __asan_report_load8_noabort+0x18/0x20 [ 15.909117] copy_to_kernel_nofault+0x225/0x260 [ 15.909142] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 15.909166] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.909189] ? finish_task_switch.isra.0+0x153/0x700 [ 15.909212] ? __schedule+0x10cc/0x2b60 [ 15.909235] ? trace_hardirqs_on+0x37/0xe0 [ 15.909266] ? __pfx_read_tsc+0x10/0x10 [ 15.909288] ? ktime_get_ts64+0x86/0x230 [ 15.909312] kunit_try_run_case+0x1a5/0x480 [ 15.909340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.909369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.909393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.909417] ? __kthread_parkme+0x82/0x180 [ 15.909438] ? preempt_count_sub+0x50/0x80 [ 15.909461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.909486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.909509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.909533] kthread+0x337/0x6f0 [ 15.909553] ? trace_preempt_on+0x20/0xc0 [ 15.909576] ? __pfx_kthread+0x10/0x10 [ 15.909597] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.909619] ? calculate_sigpending+0x7b/0xa0 [ 15.909644] ? __pfx_kthread+0x10/0x10 [ 15.909666] ret_from_fork+0x116/0x1d0 [ 15.909685] ? __pfx_kthread+0x10/0x10 [ 15.909705] ret_from_fork_asm+0x1a/0x30 [ 15.909736] </TASK> [ 15.909748] [ 15.916956] Allocated by task 299: [ 15.917152] kasan_save_stack+0x45/0x70 [ 15.917444] kasan_save_track+0x18/0x40 [ 15.917790] kasan_save_alloc_info+0x3b/0x50 [ 15.917972] __kasan_kmalloc+0xb7/0xc0 [ 15.918119] __kmalloc_cache_noprof+0x189/0x420 [ 15.918279] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.918529] kunit_try_run_case+0x1a5/0x480 [ 15.918757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.919079] kthread+0x337/0x6f0 [ 15.919250] ret_from_fork+0x116/0x1d0 [ 15.919487] ret_from_fork_asm+0x1a/0x30 [ 15.919756] [ 15.919874] The buggy address belongs to the object at ffff888102fd1d00 [ 15.919874] which belongs to the cache kmalloc-128 of size 128 [ 15.920302] The buggy address is located 0 bytes to the right of [ 15.920302] allocated 120-byte region [ffff888102fd1d00, ffff888102fd1d78) [ 15.920868] [ 15.920975] The buggy address belongs to the physical page: [ 15.921166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 15.921496] flags: 0x200000000000000(node=0|zone=2) [ 15.921717] page_type: f5(slab) [ 15.921862] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.922246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.922574] page dumped because: kasan: bad access detected [ 15.922818] [ 15.922908] Memory state around the buggy address: [ 15.923097] ffff888102fd1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.923370] ffff888102fd1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.923586] >ffff888102fd1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.923798] ^ [ 15.924036] ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.924253] ffff888102fd1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.924585] ================================================================== [ 15.925553] ================================================================== [ 15.926229] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 15.926574] Write of size 8 at addr ffff888102fd1d78 by task kunit_try_catch/299 [ 15.926878] [ 15.927071] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.927113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.927125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.927147] Call Trace: [ 15.927159] <TASK> [ 15.927172] dump_stack_lvl+0x73/0xb0 [ 15.927200] print_report+0xd1/0x610 [ 15.927223] ? __virt_addr_valid+0x1db/0x2d0 [ 15.927245] ? copy_to_kernel_nofault+0x99/0x260 [ 15.927269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.927292] ? copy_to_kernel_nofault+0x99/0x260 [ 15.927315] kasan_report+0x141/0x180 [ 15.927338] ? copy_to_kernel_nofault+0x99/0x260 [ 15.927373] kasan_check_range+0x10c/0x1c0 [ 15.927398] __kasan_check_write+0x18/0x20 [ 15.927417] copy_to_kernel_nofault+0x99/0x260 [ 15.927442] copy_to_kernel_nofault_oob+0x288/0x560 [ 15.927466] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.927489] ? finish_task_switch.isra.0+0x153/0x700 [ 15.927512] ? __schedule+0x10cc/0x2b60 [ 15.927534] ? trace_hardirqs_on+0x37/0xe0 [ 15.927564] ? __pfx_read_tsc+0x10/0x10 [ 15.927586] ? ktime_get_ts64+0x86/0x230 [ 15.927609] kunit_try_run_case+0x1a5/0x480 [ 15.927633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.927657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.927680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.927704] ? __kthread_parkme+0x82/0x180 [ 15.927724] ? preempt_count_sub+0x50/0x80 [ 15.927747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.927772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.927795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.927820] kthread+0x337/0x6f0 [ 15.927840] ? trace_preempt_on+0x20/0xc0 [ 15.927862] ? __pfx_kthread+0x10/0x10 [ 15.927883] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.927904] ? calculate_sigpending+0x7b/0xa0 [ 15.927928] ? __pfx_kthread+0x10/0x10 [ 15.927949] ret_from_fork+0x116/0x1d0 [ 15.927968] ? __pfx_kthread+0x10/0x10 [ 15.927989] ret_from_fork_asm+0x1a/0x30 [ 15.928030] </TASK> [ 15.928040] [ 15.936799] Allocated by task 299: [ 15.937064] kasan_save_stack+0x45/0x70 [ 15.937321] kasan_save_track+0x18/0x40 [ 15.937540] kasan_save_alloc_info+0x3b/0x50 [ 15.937762] __kasan_kmalloc+0xb7/0xc0 [ 15.937941] __kmalloc_cache_noprof+0x189/0x420 [ 15.938143] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.938346] kunit_try_run_case+0x1a5/0x480 [ 15.938569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.938903] kthread+0x337/0x6f0 [ 15.939071] ret_from_fork+0x116/0x1d0 [ 15.939257] ret_from_fork_asm+0x1a/0x30 [ 15.939402] [ 15.939474] The buggy address belongs to the object at ffff888102fd1d00 [ 15.939474] which belongs to the cache kmalloc-128 of size 128 [ 15.940126] The buggy address is located 0 bytes to the right of [ 15.940126] allocated 120-byte region [ffff888102fd1d00, ffff888102fd1d78) [ 15.940702] [ 15.940778] The buggy address belongs to the physical page: [ 15.941185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 15.942411] flags: 0x200000000000000(node=0|zone=2) [ 15.942579] page_type: f5(slab) [ 15.942703] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.942940] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.943558] page dumped because: kasan: bad access detected [ 15.943845] [ 15.943943] Memory state around the buggy address: [ 15.944199] ffff888102fd1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.944819] ffff888102fd1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945093] >ffff888102fd1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.945389] ^ [ 15.945824] ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.946071] ffff888102fd1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.946289] ==================================================================