Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.960766] ================================================================== [ 18.961750] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 18.961824] Write of size 8 at addr fff00000c58c3a78 by task kunit_try_catch/282 [ 18.961969] [ 18.962014] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.962110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.962141] Hardware name: linux,dummy-virt (DT) [ 18.962184] Call trace: [ 18.962221] show_stack+0x20/0x38 (C) [ 18.962273] dump_stack_lvl+0x8c/0xd0 [ 18.962323] print_report+0x118/0x5d0 [ 18.962371] kasan_report+0xdc/0x128 [ 18.962419] kasan_check_range+0x100/0x1a8 [ 18.962518] __kasan_check_write+0x20/0x30 [ 18.962714] copy_to_kernel_nofault+0x8c/0x250 [ 18.962791] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 18.963121] kunit_try_run_case+0x170/0x3f0 [ 18.963217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.963518] kthread+0x328/0x630 [ 18.963585] ret_from_fork+0x10/0x20 [ 18.963637] [ 18.963687] Allocated by task 282: [ 18.963719] kasan_save_stack+0x3c/0x68 [ 18.963762] kasan_save_track+0x20/0x40 [ 18.963829] kasan_save_alloc_info+0x40/0x58 [ 18.963871] __kasan_kmalloc+0xd4/0xd8 [ 18.963911] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.963954] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.963995] kunit_try_run_case+0x170/0x3f0 [ 18.964034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.964079] kthread+0x328/0x630 [ 18.964112] ret_from_fork+0x10/0x20 [ 18.964190] [ 18.964266] The buggy address belongs to the object at fff00000c58c3a00 [ 18.964266] which belongs to the cache kmalloc-128 of size 128 [ 18.964622] The buggy address is located 0 bytes to the right of [ 18.964622] allocated 120-byte region [fff00000c58c3a00, fff00000c58c3a78) [ 18.964960] [ 18.964985] The buggy address belongs to the physical page: [ 18.965019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 18.965075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.966314] page_type: f5(slab) [ 18.966433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.967139] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.967540] page dumped because: kasan: bad access detected [ 18.967656] [ 18.968033] Memory state around the buggy address: [ 18.968300] fff00000c58c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.968371] fff00000c58c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.968624] >fff00000c58c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.969032] ^ [ 18.969167] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.969260] fff00000c58c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.971104] ================================================================== [ 18.954340] ================================================================== [ 18.954412] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 18.954660] Read of size 8 at addr fff00000c58c3a78 by task kunit_try_catch/282 [ 18.954856] [ 18.954902] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.955053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.955256] Hardware name: linux,dummy-virt (DT) [ 18.955293] Call trace: [ 18.955374] show_stack+0x20/0x38 (C) [ 18.955450] dump_stack_lvl+0x8c/0xd0 [ 18.955503] print_report+0x118/0x5d0 [ 18.955553] kasan_report+0xdc/0x128 [ 18.955599] __asan_report_load8_noabort+0x20/0x30 [ 18.955653] copy_to_kernel_nofault+0x204/0x250 [ 18.955703] copy_to_kernel_nofault_oob+0x158/0x418 [ 18.955913] kunit_try_run_case+0x170/0x3f0 [ 18.955986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.956070] kthread+0x328/0x630 [ 18.956114] ret_from_fork+0x10/0x20 [ 18.956230] [ 18.956280] Allocated by task 282: [ 18.956346] kasan_save_stack+0x3c/0x68 [ 18.956399] kasan_save_track+0x20/0x40 [ 18.956439] kasan_save_alloc_info+0x40/0x58 [ 18.956519] __kasan_kmalloc+0xd4/0xd8 [ 18.956590] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.956636] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.956701] kunit_try_run_case+0x170/0x3f0 [ 18.956787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.958238] kthread+0x328/0x630 [ 18.958309] ret_from_fork+0x10/0x20 [ 18.958377] [ 18.958416] The buggy address belongs to the object at fff00000c58c3a00 [ 18.958416] which belongs to the cache kmalloc-128 of size 128 [ 18.958555] The buggy address is located 0 bytes to the right of [ 18.958555] allocated 120-byte region [fff00000c58c3a00, fff00000c58c3a78) [ 18.958662] [ 18.959012] The buggy address belongs to the physical page: [ 18.959089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 18.959194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.959277] page_type: f5(slab) [ 18.959393] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.959459] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.959513] page dumped because: kasan: bad access detected [ 18.959545] [ 18.959582] Memory state around the buggy address: [ 18.959631] fff00000c58c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.959754] fff00000c58c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.959830] >fff00000c58c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.959897] ^ [ 18.959943] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.959989] fff00000c58c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.960032] ==================================================================
[ 19.663260] ================================================================== [ 19.663345] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 19.663775] Read of size 8 at addr fff00000c5ae0a78 by task kunit_try_catch/282 [ 19.663930] [ 19.664027] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.664307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.664378] Hardware name: linux,dummy-virt (DT) [ 19.664620] Call trace: [ 19.664764] show_stack+0x20/0x38 (C) [ 19.664829] dump_stack_lvl+0x8c/0xd0 [ 19.664956] print_report+0x118/0x5d0 [ 19.665025] kasan_report+0xdc/0x128 [ 19.665101] __asan_report_load8_noabort+0x20/0x30 [ 19.665472] copy_to_kernel_nofault+0x204/0x250 [ 19.665810] copy_to_kernel_nofault_oob+0x158/0x418 [ 19.665903] kunit_try_run_case+0x170/0x3f0 [ 19.666063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.666138] kthread+0x328/0x630 [ 19.666270] ret_from_fork+0x10/0x20 [ 19.666360] [ 19.666408] Allocated by task 282: [ 19.666465] kasan_save_stack+0x3c/0x68 [ 19.666899] kasan_save_track+0x20/0x40 [ 19.666974] kasan_save_alloc_info+0x40/0x58 [ 19.667093] __kasan_kmalloc+0xd4/0xd8 [ 19.667174] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.667292] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.667466] kunit_try_run_case+0x170/0x3f0 [ 19.667523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667585] kthread+0x328/0x630 [ 19.667765] ret_from_fork+0x10/0x20 [ 19.667999] [ 19.668055] The buggy address belongs to the object at fff00000c5ae0a00 [ 19.668055] which belongs to the cache kmalloc-128 of size 128 [ 19.668205] The buggy address is located 0 bytes to the right of [ 19.668205] allocated 120-byte region [fff00000c5ae0a00, fff00000c5ae0a78) [ 19.668434] [ 19.668645] The buggy address belongs to the physical page: [ 19.668712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.669222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.669315] page_type: f5(slab) [ 19.669674] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.669803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.669904] page dumped because: kasan: bad access detected [ 19.669973] [ 19.670111] Memory state around the buggy address: [ 19.670172] fff00000c5ae0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.670504] fff00000c5ae0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670642] >fff00000c5ae0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.670781] ^ [ 19.670848] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670996] fff00000c5ae0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671072] ================================================================== [ 19.673671] ================================================================== [ 19.673741] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 19.673803] Write of size 8 at addr fff00000c5ae0a78 by task kunit_try_catch/282 [ 19.673860] [ 19.673891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.673975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.674013] Hardware name: linux,dummy-virt (DT) [ 19.674046] Call trace: [ 19.674084] show_stack+0x20/0x38 (C) [ 19.674135] dump_stack_lvl+0x8c/0xd0 [ 19.674193] print_report+0x118/0x5d0 [ 19.675469] kasan_report+0xdc/0x128 [ 19.675519] kasan_check_range+0x100/0x1a8 [ 19.675685] __kasan_check_write+0x20/0x30 [ 19.675742] copy_to_kernel_nofault+0x8c/0x250 [ 19.675792] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 19.675843] kunit_try_run_case+0x170/0x3f0 [ 19.675891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675947] kthread+0x328/0x630 [ 19.675991] ret_from_fork+0x10/0x20 [ 19.676041] [ 19.676062] Allocated by task 282: [ 19.676091] kasan_save_stack+0x3c/0x68 [ 19.676134] kasan_save_track+0x20/0x40 [ 19.676174] kasan_save_alloc_info+0x40/0x58 [ 19.677794] __kasan_kmalloc+0xd4/0xd8 [ 19.678202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.678927] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.678984] kunit_try_run_case+0x170/0x3f0 [ 19.679288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.679507] kthread+0x328/0x630 [ 19.679609] ret_from_fork+0x10/0x20 [ 19.679650] [ 19.679992] The buggy address belongs to the object at fff00000c5ae0a00 [ 19.679992] which belongs to the cache kmalloc-128 of size 128 [ 19.680435] The buggy address is located 0 bytes to the right of [ 19.680435] allocated 120-byte region [fff00000c5ae0a00, fff00000c5ae0a78) [ 19.680692] [ 19.680898] The buggy address belongs to the physical page: [ 19.681159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.681261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.681312] page_type: f5(slab) [ 19.681353] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.681406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.681450] page dumped because: kasan: bad access detected [ 19.681484] [ 19.681504] Memory state around the buggy address: [ 19.681535] fff00000c5ae0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.682319] fff00000c5ae0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682372] >fff00000c5ae0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.682415] ^ [ 19.682459] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682504] fff00000c5ae0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682547] ==================================================================
[ 16.511840] ================================================================== [ 16.512438] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 16.512816] Read of size 8 at addr ffff8881026ce878 by task kunit_try_catch/299 [ 16.513152] [ 16.513263] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.513315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.513328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.513354] Call Trace: [ 16.513368] <TASK> [ 16.513387] dump_stack_lvl+0x73/0xb0 [ 16.513431] print_report+0xd1/0x610 [ 16.513470] ? __virt_addr_valid+0x1db/0x2d0 [ 16.513498] ? copy_to_kernel_nofault+0x225/0x260 [ 16.513524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.513549] ? copy_to_kernel_nofault+0x225/0x260 [ 16.513574] kasan_report+0x141/0x180 [ 16.513597] ? copy_to_kernel_nofault+0x225/0x260 [ 16.513627] __asan_report_load8_noabort+0x18/0x20 [ 16.513654] copy_to_kernel_nofault+0x225/0x260 [ 16.513681] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 16.513707] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.513745] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.513774] ? trace_hardirqs_on+0x37/0xe0 [ 16.513807] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.513837] kunit_try_run_case+0x1a5/0x480 [ 16.513865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.513890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.513929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.513955] ? __kthread_parkme+0x82/0x180 [ 16.513979] ? preempt_count_sub+0x50/0x80 [ 16.514006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.514032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.514058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.514085] kthread+0x337/0x6f0 [ 16.514107] ? trace_preempt_on+0x20/0xc0 [ 16.514131] ? __pfx_kthread+0x10/0x10 [ 16.514153] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.514176] ? calculate_sigpending+0x7b/0xa0 [ 16.514203] ? __pfx_kthread+0x10/0x10 [ 16.514227] ret_from_fork+0x116/0x1d0 [ 16.514249] ? __pfx_kthread+0x10/0x10 [ 16.514271] ret_from_fork_asm+0x1a/0x30 [ 16.514304] </TASK> [ 16.514316] [ 16.521873] Allocated by task 299: [ 16.522024] kasan_save_stack+0x45/0x70 [ 16.522229] kasan_save_track+0x18/0x40 [ 16.522385] kasan_save_alloc_info+0x3b/0x50 [ 16.522613] __kasan_kmalloc+0xb7/0xc0 [ 16.522864] __kmalloc_cache_noprof+0x189/0x420 [ 16.523139] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.523350] kunit_try_run_case+0x1a5/0x480 [ 16.523552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.523793] kthread+0x337/0x6f0 [ 16.523983] ret_from_fork+0x116/0x1d0 [ 16.524164] ret_from_fork_asm+0x1a/0x30 [ 16.524341] [ 16.524467] The buggy address belongs to the object at ffff8881026ce800 [ 16.524467] which belongs to the cache kmalloc-128 of size 128 [ 16.525006] The buggy address is located 0 bytes to the right of [ 16.525006] allocated 120-byte region [ffff8881026ce800, ffff8881026ce878) [ 16.525406] [ 16.525508] The buggy address belongs to the physical page: [ 16.525767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.526136] flags: 0x200000000000000(node=0|zone=2) [ 16.526304] page_type: f5(slab) [ 16.526429] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.526957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.527239] page dumped because: kasan: bad access detected [ 16.527474] [ 16.527544] Memory state around the buggy address: [ 16.527700] ffff8881026ce700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.527915] ffff8881026ce780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.528130] >ffff8881026ce800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.528389] ^ [ 16.528747] ffff8881026ce880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.529062] ffff8881026ce900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.529372] ================================================================== [ 16.529983] ================================================================== [ 16.530227] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 16.530477] Write of size 8 at addr ffff8881026ce878 by task kunit_try_catch/299 [ 16.530844] [ 16.531049] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.531094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.531106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.531128] Call Trace: [ 16.531148] <TASK> [ 16.531179] dump_stack_lvl+0x73/0xb0 [ 16.531210] print_report+0xd1/0x610 [ 16.531234] ? __virt_addr_valid+0x1db/0x2d0 [ 16.531259] ? copy_to_kernel_nofault+0x99/0x260 [ 16.531285] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.531310] ? copy_to_kernel_nofault+0x99/0x260 [ 16.531335] kasan_report+0x141/0x180 [ 16.531358] ? copy_to_kernel_nofault+0x99/0x260 [ 16.531388] kasan_check_range+0x10c/0x1c0 [ 16.531414] __kasan_check_write+0x18/0x20 [ 16.531434] copy_to_kernel_nofault+0x99/0x260 [ 16.531474] copy_to_kernel_nofault_oob+0x288/0x560 [ 16.531501] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.531537] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.531565] ? trace_hardirqs_on+0x37/0xe0 [ 16.531597] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.531628] kunit_try_run_case+0x1a5/0x480 [ 16.531655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.531680] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.531706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.531732] ? __kthread_parkme+0x82/0x180 [ 16.531755] ? preempt_count_sub+0x50/0x80 [ 16.531781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.531807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.531834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.531861] kthread+0x337/0x6f0 [ 16.531882] ? trace_preempt_on+0x20/0xc0 [ 16.531906] ? __pfx_kthread+0x10/0x10 [ 16.531927] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.531951] ? calculate_sigpending+0x7b/0xa0 [ 16.531978] ? __pfx_kthread+0x10/0x10 [ 16.532000] ret_from_fork+0x116/0x1d0 [ 16.532021] ? __pfx_kthread+0x10/0x10 [ 16.532043] ret_from_fork_asm+0x1a/0x30 [ 16.532087] </TASK> [ 16.532108] [ 16.545248] Allocated by task 299: [ 16.545399] kasan_save_stack+0x45/0x70 [ 16.546292] kasan_save_track+0x18/0x40 [ 16.546759] kasan_save_alloc_info+0x3b/0x50 [ 16.546989] __kasan_kmalloc+0xb7/0xc0 [ 16.547167] __kmalloc_cache_noprof+0x189/0x420 [ 16.547509] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.547737] kunit_try_run_case+0x1a5/0x480 [ 16.547945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.548155] kthread+0x337/0x6f0 [ 16.548336] ret_from_fork+0x116/0x1d0 [ 16.548618] ret_from_fork_asm+0x1a/0x30 [ 16.548806] [ 16.548894] The buggy address belongs to the object at ffff8881026ce800 [ 16.548894] which belongs to the cache kmalloc-128 of size 128 [ 16.549319] The buggy address is located 0 bytes to the right of [ 16.549319] allocated 120-byte region [ffff8881026ce800, ffff8881026ce878) [ 16.550038] [ 16.550143] The buggy address belongs to the physical page: [ 16.550325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.550815] flags: 0x200000000000000(node=0|zone=2) [ 16.551052] page_type: f5(slab) [ 16.551176] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.551720] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.551960] page dumped because: kasan: bad access detected [ 16.552145] [ 16.552240] Memory state around the buggy address: [ 16.552511] ffff8881026ce700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.552873] ffff8881026ce780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.553201] >ffff8881026ce800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.553725] ^ [ 16.554000] ffff8881026ce880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.554265] ffff8881026ce900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.554601] ==================================================================
[ 16.908940] ================================================================== [ 16.909217] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 16.909568] Write of size 8 at addr ffff8881025b8078 by task kunit_try_catch/300 [ 16.909983] [ 16.910474] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.910534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.910548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.910882] Call Trace: [ 16.910901] <TASK> [ 16.910918] dump_stack_lvl+0x73/0xb0 [ 16.910951] print_report+0xd1/0x610 [ 16.910975] ? __virt_addr_valid+0x1db/0x2d0 [ 16.910999] ? copy_to_kernel_nofault+0x99/0x260 [ 16.911025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.911062] ? copy_to_kernel_nofault+0x99/0x260 [ 16.911088] kasan_report+0x141/0x180 [ 16.911112] ? copy_to_kernel_nofault+0x99/0x260 [ 16.911154] kasan_check_range+0x10c/0x1c0 [ 16.911179] __kasan_check_write+0x18/0x20 [ 16.911200] copy_to_kernel_nofault+0x99/0x260 [ 16.911228] copy_to_kernel_nofault_oob+0x288/0x560 [ 16.911255] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.911281] ? finish_task_switch.isra.0+0x153/0x700 [ 16.911306] ? __schedule+0x10cc/0x2b60 [ 16.911329] ? trace_hardirqs_on+0x37/0xe0 [ 16.911362] ? __pfx_read_tsc+0x10/0x10 [ 16.911384] ? ktime_get_ts64+0x86/0x230 [ 16.911409] kunit_try_run_case+0x1a5/0x480 [ 16.911436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.911461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.911488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.911514] ? __kthread_parkme+0x82/0x180 [ 16.911536] ? preempt_count_sub+0x50/0x80 [ 16.911560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.911587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.911613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.911641] kthread+0x337/0x6f0 [ 16.911661] ? trace_preempt_on+0x20/0xc0 [ 16.911686] ? __pfx_kthread+0x10/0x10 [ 16.911708] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.911732] ? calculate_sigpending+0x7b/0xa0 [ 16.911757] ? __pfx_kthread+0x10/0x10 [ 16.911780] ret_from_fork+0x116/0x1d0 [ 16.911801] ? __pfx_kthread+0x10/0x10 [ 16.911822] ret_from_fork_asm+0x1a/0x30 [ 16.911856] </TASK> [ 16.911867] [ 16.923778] Allocated by task 300: [ 16.924414] kasan_save_stack+0x45/0x70 [ 16.924736] kasan_save_track+0x18/0x40 [ 16.924977] kasan_save_alloc_info+0x3b/0x50 [ 16.925509] __kasan_kmalloc+0xb7/0xc0 [ 16.925688] __kmalloc_cache_noprof+0x189/0x420 [ 16.926017] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.926626] kunit_try_run_case+0x1a5/0x480 [ 16.926834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.927569] kthread+0x337/0x6f0 [ 16.927914] ret_from_fork+0x116/0x1d0 [ 16.928266] ret_from_fork_asm+0x1a/0x30 [ 16.928460] [ 16.928687] The buggy address belongs to the object at ffff8881025b8000 [ 16.928687] which belongs to the cache kmalloc-128 of size 128 [ 16.929378] The buggy address is located 0 bytes to the right of [ 16.929378] allocated 120-byte region [ffff8881025b8000, ffff8881025b8078) [ 16.930148] [ 16.930334] The buggy address belongs to the physical page: [ 16.930823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 16.931253] flags: 0x200000000000000(node=0|zone=2) [ 16.931601] page_type: f5(slab) [ 16.931820] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.932391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.932865] page dumped because: kasan: bad access detected [ 16.933070] [ 16.933169] Memory state around the buggy address: [ 16.933410] ffff8881025b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.934157] ffff8881025b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.934584] >ffff8881025b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.934951] ^ [ 16.935490] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.935981] ffff8881025b8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.936559] ================================================================== [ 16.880509] ================================================================== [ 16.881206] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 16.881774] Read of size 8 at addr ffff8881025b8078 by task kunit_try_catch/300 [ 16.882555] [ 16.882798] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.882850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.882864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.882887] Call Trace: [ 16.882902] <TASK> [ 16.882921] dump_stack_lvl+0x73/0xb0 [ 16.882954] print_report+0xd1/0x610 [ 16.882980] ? __virt_addr_valid+0x1db/0x2d0 [ 16.883038] ? copy_to_kernel_nofault+0x225/0x260 [ 16.883162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.883190] ? copy_to_kernel_nofault+0x225/0x260 [ 16.883216] kasan_report+0x141/0x180 [ 16.883240] ? copy_to_kernel_nofault+0x225/0x260 [ 16.883271] __asan_report_load8_noabort+0x18/0x20 [ 16.883298] copy_to_kernel_nofault+0x225/0x260 [ 16.883326] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 16.883353] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.883380] ? finish_task_switch.isra.0+0x153/0x700 [ 16.883406] ? __schedule+0x10cc/0x2b60 [ 16.883430] ? trace_hardirqs_on+0x37/0xe0 [ 16.883464] ? __pfx_read_tsc+0x10/0x10 [ 16.883488] ? ktime_get_ts64+0x86/0x230 [ 16.883514] kunit_try_run_case+0x1a5/0x480 [ 16.883541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.883566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.883592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.883619] ? __kthread_parkme+0x82/0x180 [ 16.883651] ? preempt_count_sub+0x50/0x80 [ 16.883676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.883703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.883730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.883758] kthread+0x337/0x6f0 [ 16.883779] ? trace_preempt_on+0x20/0xc0 [ 16.883804] ? __pfx_kthread+0x10/0x10 [ 16.883826] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.883850] ? calculate_sigpending+0x7b/0xa0 [ 16.883877] ? __pfx_kthread+0x10/0x10 [ 16.883900] ret_from_fork+0x116/0x1d0 [ 16.883921] ? __pfx_kthread+0x10/0x10 [ 16.883943] ret_from_fork_asm+0x1a/0x30 [ 16.883977] </TASK> [ 16.883989] [ 16.895989] Allocated by task 300: [ 16.896605] kasan_save_stack+0x45/0x70 [ 16.896844] kasan_save_track+0x18/0x40 [ 16.897291] kasan_save_alloc_info+0x3b/0x50 [ 16.897605] __kasan_kmalloc+0xb7/0xc0 [ 16.897973] __kmalloc_cache_noprof+0x189/0x420 [ 16.898438] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.898693] kunit_try_run_case+0x1a5/0x480 [ 16.899091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.899396] kthread+0x337/0x6f0 [ 16.899561] ret_from_fork+0x116/0x1d0 [ 16.899872] ret_from_fork_asm+0x1a/0x30 [ 16.900340] [ 16.900448] The buggy address belongs to the object at ffff8881025b8000 [ 16.900448] which belongs to the cache kmalloc-128 of size 128 [ 16.901338] The buggy address is located 0 bytes to the right of [ 16.901338] allocated 120-byte region [ffff8881025b8000, ffff8881025b8078) [ 16.902154] [ 16.902273] The buggy address belongs to the physical page: [ 16.902674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 16.903201] flags: 0x200000000000000(node=0|zone=2) [ 16.903551] page_type: f5(slab) [ 16.903848] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.904270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.904717] page dumped because: kasan: bad access detected [ 16.904992] [ 16.905323] Memory state around the buggy address: [ 16.905618] ffff8881025b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.905947] ffff8881025b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.906437] >ffff8881025b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.906991] ^ [ 16.907390] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.907808] ffff8881025b8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.908152] ==================================================================