Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.739482] ================================================================== [ 19.739686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 19.739750] Read of size 8 at addr fff00000c780a978 by task kunit_try_catch/281 [ 19.739804] [ 19.739840] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.739941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.739981] Hardware name: linux,dummy-virt (DT) [ 19.740016] Call trace: [ 19.740043] show_stack+0x20/0x38 (C) [ 19.740094] dump_stack_lvl+0x8c/0xd0 [ 19.740388] print_report+0x118/0x5d0 [ 19.740521] kasan_report+0xdc/0x128 [ 19.740753] __asan_report_load8_noabort+0x20/0x30 [ 19.740809] copy_to_kernel_nofault+0x204/0x250 [ 19.740868] copy_to_kernel_nofault_oob+0x158/0x418 [ 19.742016] kunit_try_run_case+0x170/0x3f0 [ 19.742067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.742123] kthread+0x328/0x630 [ 19.742166] ret_from_fork+0x10/0x20 [ 19.742216] [ 19.742236] Allocated by task 281: [ 19.742270] kasan_save_stack+0x3c/0x68 [ 19.742591] kasan_save_track+0x20/0x40 [ 19.742640] kasan_save_alloc_info+0x40/0x58 [ 19.742745] __kasan_kmalloc+0xd4/0xd8 [ 19.742796] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.742839] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.742959] kunit_try_run_case+0x170/0x3f0 [ 19.743071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.743118] kthread+0x328/0x630 [ 19.743154] ret_from_fork+0x10/0x20 [ 19.743215] [ 19.743277] The buggy address belongs to the object at fff00000c780a900 [ 19.743277] which belongs to the cache kmalloc-128 of size 128 [ 19.743503] The buggy address is located 0 bytes to the right of [ 19.743503] allocated 120-byte region [fff00000c780a900, fff00000c780a978) [ 19.743593] [ 19.743620] The buggy address belongs to the physical page: [ 19.743656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.743792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.743974] page_type: f5(slab) [ 19.744025] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.744078] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.744265] page dumped because: kasan: bad access detected [ 19.744303] [ 19.744366] Memory state around the buggy address: [ 19.744476] fff00000c780a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.744567] fff00000c780a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.744636] >fff00000c780a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.744827] ^ [ 19.744914] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.745020] fff00000c780aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.745062] ================================================================== [ 19.746336] ================================================================== [ 19.746389] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 19.746440] Write of size 8 at addr fff00000c780a978 by task kunit_try_catch/281 [ 19.746493] [ 19.746525] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.746609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.746857] Hardware name: linux,dummy-virt (DT) [ 19.746989] Call trace: [ 19.747015] show_stack+0x20/0x38 (C) [ 19.747252] dump_stack_lvl+0x8c/0xd0 [ 19.747309] print_report+0x118/0x5d0 [ 19.747357] kasan_report+0xdc/0x128 [ 19.747406] kasan_check_range+0x100/0x1a8 [ 19.747457] __kasan_check_write+0x20/0x30 [ 19.747507] copy_to_kernel_nofault+0x8c/0x250 [ 19.747558] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 19.747608] kunit_try_run_case+0x170/0x3f0 [ 19.747667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.747722] kthread+0x328/0x630 [ 19.747864] ret_from_fork+0x10/0x20 [ 19.748011] [ 19.748142] Allocated by task 281: [ 19.748378] kasan_save_stack+0x3c/0x68 [ 19.748805] kasan_save_track+0x20/0x40 [ 19.748846] kasan_save_alloc_info+0x40/0x58 [ 19.748889] __kasan_kmalloc+0xd4/0xd8 [ 19.748940] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.748981] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.749021] kunit_try_run_case+0x170/0x3f0 [ 19.749062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.749105] kthread+0x328/0x630 [ 19.749529] ret_from_fork+0x10/0x20 [ 19.749877] [ 19.750096] The buggy address belongs to the object at fff00000c780a900 [ 19.750096] which belongs to the cache kmalloc-128 of size 128 [ 19.750162] The buggy address is located 0 bytes to the right of [ 19.750162] allocated 120-byte region [fff00000c780a900, fff00000c780a978) [ 19.750229] [ 19.750275] The buggy address belongs to the physical page: [ 19.750308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.750479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.750533] page_type: f5(slab) [ 19.750575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.750780] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.750879] page dumped because: kasan: bad access detected [ 19.750976] [ 19.751083] Memory state around the buggy address: [ 19.751205] fff00000c780a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.751252] fff00000c780a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751297] >fff00000c780a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.751366] ^ [ 19.751411] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751457] fff00000c780aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751498] ==================================================================
[ 20.054743] ================================================================== [ 20.054948] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 20.055092] Write of size 8 at addr fff00000c5b3e178 by task kunit_try_catch/281 [ 20.055204] [ 20.055237] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.055748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.055793] Hardware name: linux,dummy-virt (DT) [ 20.055855] Call trace: [ 20.055880] show_stack+0x20/0x38 (C) [ 20.056017] dump_stack_lvl+0x8c/0xd0 [ 20.056075] print_report+0x118/0x5d0 [ 20.056374] kasan_report+0xdc/0x128 [ 20.056707] kasan_check_range+0x100/0x1a8 [ 20.056794] __kasan_check_write+0x20/0x30 [ 20.056847] copy_to_kernel_nofault+0x8c/0x250 [ 20.056898] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 20.057079] kunit_try_run_case+0x170/0x3f0 [ 20.057144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.057344] kthread+0x328/0x630 [ 20.057812] ret_from_fork+0x10/0x20 [ 20.057967] [ 20.058175] Allocated by task 281: [ 20.058268] kasan_save_stack+0x3c/0x68 [ 20.058450] kasan_save_track+0x20/0x40 [ 20.058858] kasan_save_alloc_info+0x40/0x58 [ 20.058993] __kasan_kmalloc+0xd4/0xd8 [ 20.059161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.059324] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.059805] kunit_try_run_case+0x170/0x3f0 [ 20.059979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.060126] kthread+0x328/0x630 [ 20.060221] ret_from_fork+0x10/0x20 [ 20.060272] [ 20.060294] The buggy address belongs to the object at fff00000c5b3e100 [ 20.060294] which belongs to the cache kmalloc-128 of size 128 [ 20.060553] The buggy address is located 0 bytes to the right of [ 20.060553] allocated 120-byte region [fff00000c5b3e100, fff00000c5b3e178) [ 20.060697] [ 20.060938] The buggy address belongs to the physical page: [ 20.060982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.061042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.061093] page_type: f5(slab) [ 20.061503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.061666] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.061813] page dumped because: kasan: bad access detected [ 20.061874] [ 20.061904] Memory state around the buggy address: [ 20.061951] fff00000c5b3e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.062011] fff00000c5b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.062066] >fff00000c5b3e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.062118] ^ [ 20.062164] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.062219] fff00000c5b3e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.062269] ================================================================== [ 20.044055] ================================================================== [ 20.044414] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 20.044506] Read of size 8 at addr fff00000c5b3e178 by task kunit_try_catch/281 [ 20.044873] [ 20.044984] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.045091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.045398] Hardware name: linux,dummy-virt (DT) [ 20.045529] Call trace: [ 20.045693] show_stack+0x20/0x38 (C) [ 20.045802] dump_stack_lvl+0x8c/0xd0 [ 20.046018] print_report+0x118/0x5d0 [ 20.046143] kasan_report+0xdc/0x128 [ 20.046209] __asan_report_load8_noabort+0x20/0x30 [ 20.046667] copy_to_kernel_nofault+0x204/0x250 [ 20.047362] copy_to_kernel_nofault_oob+0x158/0x418 [ 20.047462] kunit_try_run_case+0x170/0x3f0 [ 20.047653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.047929] kthread+0x328/0x630 [ 20.048351] ret_from_fork+0x10/0x20 [ 20.048613] [ 20.048728] Allocated by task 281: [ 20.048856] kasan_save_stack+0x3c/0x68 [ 20.048910] kasan_save_track+0x20/0x40 [ 20.049134] kasan_save_alloc_info+0x40/0x58 [ 20.049339] __kasan_kmalloc+0xd4/0xd8 [ 20.049386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.049432] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.049499] kunit_try_run_case+0x170/0x3f0 [ 20.049673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.049783] kthread+0x328/0x630 [ 20.049860] ret_from_fork+0x10/0x20 [ 20.049908] [ 20.050020] The buggy address belongs to the object at fff00000c5b3e100 [ 20.050020] which belongs to the cache kmalloc-128 of size 128 [ 20.050091] The buggy address is located 0 bytes to the right of [ 20.050091] allocated 120-byte region [fff00000c5b3e100, fff00000c5b3e178) [ 20.050174] [ 20.050205] The buggy address belongs to the physical page: [ 20.050274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.050369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.050427] page_type: f5(slab) [ 20.050485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.050550] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.050629] page dumped because: kasan: bad access detected [ 20.050681] [ 20.050789] Memory state around the buggy address: [ 20.051483] fff00000c5b3e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.051549] fff00000c5b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.051632] >fff00000c5b3e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.051698] ^ [ 20.052014] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.052537] fff00000c5b3e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.052670] ==================================================================
[ 16.619529] ================================================================== [ 16.619840] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 16.620197] Write of size 8 at addr ffff88810315a178 by task kunit_try_catch/299 [ 16.620551] [ 16.620744] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.620792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.620805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.620828] Call Trace: [ 16.620847] <TASK> [ 16.620865] dump_stack_lvl+0x73/0xb0 [ 16.620894] print_report+0xd1/0x610 [ 16.620918] ? __virt_addr_valid+0x1db/0x2d0 [ 16.620942] ? copy_to_kernel_nofault+0x99/0x260 [ 16.620967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.620990] ? copy_to_kernel_nofault+0x99/0x260 [ 16.621015] kasan_report+0x141/0x180 [ 16.621038] ? copy_to_kernel_nofault+0x99/0x260 [ 16.621068] kasan_check_range+0x10c/0x1c0 [ 16.621093] __kasan_check_write+0x18/0x20 [ 16.621114] copy_to_kernel_nofault+0x99/0x260 [ 16.621140] copy_to_kernel_nofault_oob+0x288/0x560 [ 16.621165] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.621189] ? finish_task_switch.isra.0+0x153/0x700 [ 16.621212] ? __schedule+0x10c6/0x2b60 [ 16.621235] ? trace_hardirqs_on+0x37/0xe0 [ 16.621267] ? __pfx_read_tsc+0x10/0x10 [ 16.621289] ? ktime_get_ts64+0x86/0x230 [ 16.621315] kunit_try_run_case+0x1a5/0x480 [ 16.621362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.621385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.621420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.621444] ? __kthread_parkme+0x82/0x180 [ 16.621467] ? preempt_count_sub+0x50/0x80 [ 16.621493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.621519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.621544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.621586] kthread+0x337/0x6f0 [ 16.621608] ? trace_preempt_on+0x20/0xc0 [ 16.621631] ? __pfx_kthread+0x10/0x10 [ 16.621653] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.621676] ? calculate_sigpending+0x7b/0xa0 [ 16.621700] ? __pfx_kthread+0x10/0x10 [ 16.621724] ret_from_fork+0x116/0x1d0 [ 16.621744] ? __pfx_kthread+0x10/0x10 [ 16.621766] ret_from_fork_asm+0x1a/0x30 [ 16.621799] </TASK> [ 16.621835] [ 16.629894] Allocated by task 299: [ 16.630089] kasan_save_stack+0x45/0x70 [ 16.630342] kasan_save_track+0x18/0x40 [ 16.630588] kasan_save_alloc_info+0x3b/0x50 [ 16.630745] __kasan_kmalloc+0xb7/0xc0 [ 16.631008] __kmalloc_cache_noprof+0x189/0x420 [ 16.631236] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.631504] kunit_try_run_case+0x1a5/0x480 [ 16.631683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.631938] kthread+0x337/0x6f0 [ 16.632134] ret_from_fork+0x116/0x1d0 [ 16.632303] ret_from_fork_asm+0x1a/0x30 [ 16.632457] [ 16.632650] The buggy address belongs to the object at ffff88810315a100 [ 16.632650] which belongs to the cache kmalloc-128 of size 128 [ 16.633122] The buggy address is located 0 bytes to the right of [ 16.633122] allocated 120-byte region [ffff88810315a100, ffff88810315a178) [ 16.633508] [ 16.633583] The buggy address belongs to the physical page: [ 16.633759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10315a [ 16.634160] flags: 0x200000000000000(node=0|zone=2) [ 16.634405] page_type: f5(slab) [ 16.634732] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.635165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.635458] page dumped because: kasan: bad access detected [ 16.635657] [ 16.635730] Memory state around the buggy address: [ 16.635888] ffff88810315a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.636242] ffff88810315a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.636592] >ffff88810315a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.636931] ^ [ 16.637298] ffff88810315a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.637692] ffff88810315a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.637945] ================================================================== [ 16.586967] ================================================================== [ 16.588800] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 16.589492] Read of size 8 at addr ffff88810315a178 by task kunit_try_catch/299 [ 16.590370] [ 16.590618] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.590671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.590686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.590710] Call Trace: [ 16.590726] <TASK> [ 16.590744] dump_stack_lvl+0x73/0xb0 [ 16.590780] print_report+0xd1/0x610 [ 16.590806] ? __virt_addr_valid+0x1db/0x2d0 [ 16.590832] ? copy_to_kernel_nofault+0x225/0x260 [ 16.590856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.590880] ? copy_to_kernel_nofault+0x225/0x260 [ 16.590905] kasan_report+0x141/0x180 [ 16.590928] ? copy_to_kernel_nofault+0x225/0x260 [ 16.590959] __asan_report_load8_noabort+0x18/0x20 [ 16.590984] copy_to_kernel_nofault+0x225/0x260 [ 16.591011] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 16.591202] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.591228] ? finish_task_switch.isra.0+0x153/0x700 [ 16.591269] ? __schedule+0x10c6/0x2b60 [ 16.591294] ? trace_hardirqs_on+0x37/0xe0 [ 16.591330] ? __pfx_read_tsc+0x10/0x10 [ 16.591355] ? ktime_get_ts64+0x86/0x230 [ 16.591382] kunit_try_run_case+0x1a5/0x480 [ 16.591417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.591441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.591466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.591491] ? __kthread_parkme+0x82/0x180 [ 16.591513] ? preempt_count_sub+0x50/0x80 [ 16.591538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.591564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.591589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.591614] kthread+0x337/0x6f0 [ 16.591635] ? trace_preempt_on+0x20/0xc0 [ 16.591659] ? __pfx_kthread+0x10/0x10 [ 16.591681] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.591704] ? calculate_sigpending+0x7b/0xa0 [ 16.591730] ? __pfx_kthread+0x10/0x10 [ 16.591753] ret_from_fork+0x116/0x1d0 [ 16.591772] ? __pfx_kthread+0x10/0x10 [ 16.591795] ret_from_fork_asm+0x1a/0x30 [ 16.591830] </TASK> [ 16.591843] [ 16.609198] Allocated by task 299: [ 16.609724] kasan_save_stack+0x45/0x70 [ 16.610089] kasan_save_track+0x18/0x40 [ 16.610591] kasan_save_alloc_info+0x3b/0x50 [ 16.610760] __kasan_kmalloc+0xb7/0xc0 [ 16.610901] __kmalloc_cache_noprof+0x189/0x420 [ 16.611450] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.611968] kunit_try_run_case+0x1a5/0x480 [ 16.612558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.612818] kthread+0x337/0x6f0 [ 16.612948] ret_from_fork+0x116/0x1d0 [ 16.613086] ret_from_fork_asm+0x1a/0x30 [ 16.613233] [ 16.613310] The buggy address belongs to the object at ffff88810315a100 [ 16.613310] which belongs to the cache kmalloc-128 of size 128 [ 16.613699] The buggy address is located 0 bytes to the right of [ 16.613699] allocated 120-byte region [ffff88810315a100, ffff88810315a178) [ 16.614337] [ 16.614487] The buggy address belongs to the physical page: [ 16.614700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10315a [ 16.615094] flags: 0x200000000000000(node=0|zone=2) [ 16.615351] page_type: f5(slab) [ 16.615537] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.615867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.616140] page dumped because: kasan: bad access detected [ 16.616602] [ 16.616703] Memory state around the buggy address: [ 16.616893] ffff88810315a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.617128] ffff88810315a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.617632] >ffff88810315a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.617966] ^ [ 16.618220] ffff88810315a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.618487] ffff88810315a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.618804] ==================================================================
[ 16.708066] ================================================================== [ 16.708730] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 16.709544] Write of size 8 at addr ffff8881027bca78 by task kunit_try_catch/299 [ 16.709847] [ 16.709940] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.709986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.710000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.710023] Call Trace: [ 16.710037] <TASK> [ 16.710053] dump_stack_lvl+0x73/0xb0 [ 16.710081] print_report+0xd1/0x610 [ 16.710104] ? __virt_addr_valid+0x1db/0x2d0 [ 16.710128] ? copy_to_kernel_nofault+0x99/0x260 [ 16.710162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.710196] ? copy_to_kernel_nofault+0x99/0x260 [ 16.710220] kasan_report+0x141/0x180 [ 16.710243] ? copy_to_kernel_nofault+0x99/0x260 [ 16.710272] kasan_check_range+0x10c/0x1c0 [ 16.710296] __kasan_check_write+0x18/0x20 [ 16.710324] copy_to_kernel_nofault+0x99/0x260 [ 16.710349] copy_to_kernel_nofault_oob+0x288/0x560 [ 16.710374] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.710398] ? finish_task_switch.isra.0+0x153/0x700 [ 16.710421] ? __schedule+0x10c6/0x2b60 [ 16.710444] ? trace_hardirqs_on+0x37/0xe0 [ 16.710475] ? __pfx_read_tsc+0x10/0x10 [ 16.710497] ? ktime_get_ts64+0x86/0x230 [ 16.710521] kunit_try_run_case+0x1a5/0x480 [ 16.710547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.710571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.710594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.710618] ? __kthread_parkme+0x82/0x180 [ 16.710639] ? preempt_count_sub+0x50/0x80 [ 16.710663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.710688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.710712] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.710737] kthread+0x337/0x6f0 [ 16.710757] ? trace_preempt_on+0x20/0xc0 [ 16.710781] ? __pfx_kthread+0x10/0x10 [ 16.710803] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.710825] ? calculate_sigpending+0x7b/0xa0 [ 16.710849] ? __pfx_kthread+0x10/0x10 [ 16.710871] ret_from_fork+0x116/0x1d0 [ 16.710891] ? __pfx_kthread+0x10/0x10 [ 16.710913] ret_from_fork_asm+0x1a/0x30 [ 16.710943] </TASK> [ 16.710954] [ 16.723578] Allocated by task 299: [ 16.723720] kasan_save_stack+0x45/0x70 [ 16.724100] kasan_save_track+0x18/0x40 [ 16.724343] kasan_save_alloc_info+0x3b/0x50 [ 16.724560] __kasan_kmalloc+0xb7/0xc0 [ 16.724750] __kmalloc_cache_noprof+0x189/0x420 [ 16.725160] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.725434] kunit_try_run_case+0x1a5/0x480 [ 16.725658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.725853] kthread+0x337/0x6f0 [ 16.726119] ret_from_fork+0x116/0x1d0 [ 16.726347] ret_from_fork_asm+0x1a/0x30 [ 16.726568] [ 16.726643] The buggy address belongs to the object at ffff8881027bca00 [ 16.726643] which belongs to the cache kmalloc-128 of size 128 [ 16.727380] The buggy address is located 0 bytes to the right of [ 16.727380] allocated 120-byte region [ffff8881027bca00, ffff8881027bca78) [ 16.728086] [ 16.728198] The buggy address belongs to the physical page: [ 16.728432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc [ 16.728678] flags: 0x200000000000000(node=0|zone=2) [ 16.728936] page_type: f5(slab) [ 16.729114] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.729458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.729697] page dumped because: kasan: bad access detected [ 16.730294] [ 16.730534] Memory state around the buggy address: [ 16.730787] ffff8881027bc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.731174] ffff8881027bc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.731401] >ffff8881027bca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.731660] ^ [ 16.731977] ffff8881027bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.732302] ffff8881027bcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.732721] ================================================================== [ 16.676484] ================================================================== [ 16.677258] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 16.677979] Read of size 8 at addr ffff8881027bca78 by task kunit_try_catch/299 [ 16.678856] [ 16.679067] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.679117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.679131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.679165] Call Trace: [ 16.679179] <TASK> [ 16.679196] dump_stack_lvl+0x73/0xb0 [ 16.679226] print_report+0xd1/0x610 [ 16.679251] ? __virt_addr_valid+0x1db/0x2d0 [ 16.679277] ? copy_to_kernel_nofault+0x225/0x260 [ 16.679301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.679324] ? copy_to_kernel_nofault+0x225/0x260 [ 16.679348] kasan_report+0x141/0x180 [ 16.679371] ? copy_to_kernel_nofault+0x225/0x260 [ 16.679399] __asan_report_load8_noabort+0x18/0x20 [ 16.679425] copy_to_kernel_nofault+0x225/0x260 [ 16.679450] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 16.679474] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 16.679498] ? finish_task_switch.isra.0+0x153/0x700 [ 16.679522] ? __schedule+0x10c6/0x2b60 [ 16.679545] ? trace_hardirqs_on+0x37/0xe0 [ 16.679578] ? __pfx_read_tsc+0x10/0x10 [ 16.679601] ? ktime_get_ts64+0x86/0x230 [ 16.679625] kunit_try_run_case+0x1a5/0x480 [ 16.679651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.679675] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.679699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.679723] ? __kthread_parkme+0x82/0x180 [ 16.679744] ? preempt_count_sub+0x50/0x80 [ 16.679768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.679792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.679816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.679842] kthread+0x337/0x6f0 [ 16.679862] ? trace_preempt_on+0x20/0xc0 [ 16.679884] ? __pfx_kthread+0x10/0x10 [ 16.679905] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.679927] ? calculate_sigpending+0x7b/0xa0 [ 16.679952] ? __pfx_kthread+0x10/0x10 [ 16.679974] ret_from_fork+0x116/0x1d0 [ 16.679994] ? __pfx_kthread+0x10/0x10 [ 16.680015] ret_from_fork_asm+0x1a/0x30 [ 16.680046] </TASK> [ 16.680058] [ 16.691815] Allocated by task 299: [ 16.692439] kasan_save_stack+0x45/0x70 [ 16.692934] kasan_save_track+0x18/0x40 [ 16.693372] kasan_save_alloc_info+0x3b/0x50 [ 16.693826] __kasan_kmalloc+0xb7/0xc0 [ 16.694179] __kmalloc_cache_noprof+0x189/0x420 [ 16.694499] copy_to_kernel_nofault_oob+0x12f/0x560 [ 16.695070] kunit_try_run_case+0x1a5/0x480 [ 16.695241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.695753] kthread+0x337/0x6f0 [ 16.696164] ret_from_fork+0x116/0x1d0 [ 16.696586] ret_from_fork_asm+0x1a/0x30 [ 16.696995] [ 16.697077] The buggy address belongs to the object at ffff8881027bca00 [ 16.697077] which belongs to the cache kmalloc-128 of size 128 [ 16.697971] The buggy address is located 0 bytes to the right of [ 16.697971] allocated 120-byte region [ffff8881027bca00, ffff8881027bca78) [ 16.699303] [ 16.699480] The buggy address belongs to the physical page: [ 16.699990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc [ 16.700819] flags: 0x200000000000000(node=0|zone=2) [ 16.701038] page_type: f5(slab) [ 16.701488] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.702248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.702772] page dumped because: kasan: bad access detected [ 16.703073] [ 16.703383] Memory state around the buggy address: [ 16.703908] ffff8881027bc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.704665] ffff8881027bc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.704967] >ffff8881027bca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.705198] ^ [ 16.705439] ffff8881027bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.706071] ffff8881027bcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.706772] ==================================================================