Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.380630] ================================================================== [ 18.380984] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 18.381074] Read of size 8 at addr fff00000c77fa978 by task kunit_try_catch/284 [ 18.381270] [ 18.381387] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.381519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.381600] Hardware name: linux,dummy-virt (DT) [ 18.381665] Call trace: [ 18.381720] show_stack+0x20/0x38 (C) [ 18.381781] dump_stack_lvl+0x8c/0xd0 [ 18.381835] print_report+0x118/0x608 [ 18.382095] kasan_report+0xdc/0x128 [ 18.382188] __asan_report_load8_noabort+0x20/0x30 [ 18.382326] copy_to_kernel_nofault+0x204/0x250 [ 18.382400] copy_to_kernel_nofault_oob+0x158/0x418 [ 18.382878] kunit_try_run_case+0x170/0x3f0 [ 18.383040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.383127] kthread+0x328/0x630 [ 18.383497] ret_from_fork+0x10/0x20 [ 18.383658] [ 18.383757] Allocated by task 284: [ 18.383793] kasan_save_stack+0x3c/0x68 [ 18.383981] kasan_save_track+0x20/0x40 [ 18.384120] kasan_save_alloc_info+0x40/0x58 [ 18.384336] __kasan_kmalloc+0xd4/0xd8 [ 18.384492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.384537] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.384578] kunit_try_run_case+0x170/0x3f0 [ 18.384671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.384721] kthread+0x328/0x630 [ 18.384757] ret_from_fork+0x10/0x20 [ 18.384796] [ 18.384838] The buggy address belongs to the object at fff00000c77fa900 [ 18.384838] which belongs to the cache kmalloc-128 of size 128 [ 18.384899] The buggy address is located 0 bytes to the right of [ 18.384899] allocated 120-byte region [fff00000c77fa900, fff00000c77fa978) [ 18.384981] [ 18.385015] The buggy address belongs to the physical page: [ 18.385051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.385108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.385159] page_type: f5(slab) [ 18.385207] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.385275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.385316] page dumped because: kasan: bad access detected [ 18.385360] [ 18.385389] Memory state around the buggy address: [ 18.385432] fff00000c77fa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.385487] fff00000c77fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385532] >fff00000c77fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.385590] ^ [ 18.385633] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385692] fff00000c77faa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385737] ================================================================== [ 18.386319] ================================================================== [ 18.386741] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 18.386847] Write of size 8 at addr fff00000c77fa978 by task kunit_try_catch/284 [ 18.387021] [ 18.387070] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.387418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.387474] Hardware name: linux,dummy-virt (DT) [ 18.387587] Call trace: [ 18.387691] show_stack+0x20/0x38 (C) [ 18.387863] dump_stack_lvl+0x8c/0xd0 [ 18.387922] print_report+0x118/0x608 [ 18.387978] kasan_report+0xdc/0x128 [ 18.388024] kasan_check_range+0x100/0x1a8 [ 18.388071] __kasan_check_write+0x20/0x30 [ 18.388300] copy_to_kernel_nofault+0x8c/0x250 [ 18.388519] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 18.388713] kunit_try_run_case+0x170/0x3f0 [ 18.388923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.389095] kthread+0x328/0x630 [ 18.389321] ret_from_fork+0x10/0x20 [ 18.389513] [ 18.389697] Allocated by task 284: [ 18.389757] kasan_save_stack+0x3c/0x68 [ 18.390134] kasan_save_track+0x20/0x40 [ 18.390376] kasan_save_alloc_info+0x40/0x58 [ 18.390620] __kasan_kmalloc+0xd4/0xd8 [ 18.390788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.390991] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.391111] kunit_try_run_case+0x170/0x3f0 [ 18.391311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.391587] kthread+0x328/0x630 [ 18.391767] ret_from_fork+0x10/0x20 [ 18.391896] [ 18.391992] The buggy address belongs to the object at fff00000c77fa900 [ 18.391992] which belongs to the cache kmalloc-128 of size 128 [ 18.392162] The buggy address is located 0 bytes to the right of [ 18.392162] allocated 120-byte region [fff00000c77fa900, fff00000c77fa978) [ 18.392231] [ 18.392421] The buggy address belongs to the physical page: [ 18.392657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.392874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.393037] page_type: f5(slab) [ 18.393136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.393250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.393364] page dumped because: kasan: bad access detected [ 18.393482] [ 18.393535] Memory state around the buggy address: [ 18.393570] fff00000c77fa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.393863] fff00000c77fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394129] >fff00000c77fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.394389] ^ [ 18.394584] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394670] fff00000c77faa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394710] ==================================================================
[ 15.095266] ================================================================== [ 15.095808] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 15.096384] Write of size 8 at addr ffff888103151d78 by task kunit_try_catch/301 [ 15.096843] [ 15.096967] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 15.097020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.097034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.097059] Call Trace: [ 15.097073] <TASK> [ 15.097095] dump_stack_lvl+0x73/0xb0 [ 15.097127] print_report+0xd1/0x650 [ 15.097154] ? __virt_addr_valid+0x1db/0x2d0 [ 15.097178] ? copy_to_kernel_nofault+0x99/0x260 [ 15.097200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.097237] ? copy_to_kernel_nofault+0x99/0x260 [ 15.097260] kasan_report+0x141/0x180 [ 15.097434] ? copy_to_kernel_nofault+0x99/0x260 [ 15.097478] kasan_check_range+0x10c/0x1c0 [ 15.097503] __kasan_check_write+0x18/0x20 [ 15.097525] copy_to_kernel_nofault+0x99/0x260 [ 15.097555] copy_to_kernel_nofault_oob+0x288/0x560 [ 15.097620] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.097656] ? finish_task_switch.isra.0+0x153/0x700 [ 15.097683] ? __schedule+0x10cc/0x2b60 [ 15.097707] ? trace_hardirqs_on+0x37/0xe0 [ 15.097740] ? __pfx_read_tsc+0x10/0x10 [ 15.097764] ? ktime_get_ts64+0x86/0x230 [ 15.097791] kunit_try_run_case+0x1a5/0x480 [ 15.097817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.097841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.097868] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.097893] ? __kthread_parkme+0x82/0x180 [ 15.097916] ? preempt_count_sub+0x50/0x80 [ 15.097942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.097968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.097992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.098018] kthread+0x337/0x6f0 [ 15.098038] ? trace_preempt_on+0x20/0xc0 [ 15.098062] ? __pfx_kthread+0x10/0x10 [ 15.098082] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.098106] ? calculate_sigpending+0x7b/0xa0 [ 15.098130] ? __pfx_kthread+0x10/0x10 [ 15.098150] ret_from_fork+0x41/0x80 [ 15.098172] ? __pfx_kthread+0x10/0x10 [ 15.098191] ret_from_fork_asm+0x1a/0x30 [ 15.098236] </TASK> [ 15.098249] [ 15.110578] Allocated by task 301: [ 15.110930] kasan_save_stack+0x45/0x70 [ 15.111248] kasan_save_track+0x18/0x40 [ 15.111549] kasan_save_alloc_info+0x3b/0x50 [ 15.111859] __kasan_kmalloc+0xb7/0xc0 [ 15.112059] __kmalloc_cache_noprof+0x189/0x420 [ 15.112463] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.112769] kunit_try_run_case+0x1a5/0x480 [ 15.113088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.113392] kthread+0x337/0x6f0 [ 15.113564] ret_from_fork+0x41/0x80 [ 15.113941] ret_from_fork_asm+0x1a/0x30 [ 15.114352] [ 15.114463] The buggy address belongs to the object at ffff888103151d00 [ 15.114463] which belongs to the cache kmalloc-128 of size 128 [ 15.115561] The buggy address is located 0 bytes to the right of [ 15.115561] allocated 120-byte region [ffff888103151d00, ffff888103151d78) [ 15.116218] [ 15.116497] The buggy address belongs to the physical page: [ 15.116902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151 [ 15.117255] flags: 0x200000000000000(node=0|zone=2) [ 15.117650] page_type: f5(slab) [ 15.117816] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.118130] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.118764] page dumped because: kasan: bad access detected [ 15.119236] [ 15.119501] Memory state around the buggy address: [ 15.120001] ffff888103151c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.120484] ffff888103151c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.121152] >ffff888103151d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.121974] ^ [ 15.122448] ffff888103151d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122922] ffff888103151e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.123568] ================================================================== [ 15.055700] ================================================================== [ 15.057275] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 15.058459] Read of size 8 at addr ffff888103151d78 by task kunit_try_catch/301 [ 15.058715] [ 15.058818] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 15.058873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.058887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.058912] Call Trace: [ 15.058927] <TASK> [ 15.058950] dump_stack_lvl+0x73/0xb0 [ 15.058983] print_report+0xd1/0x650 [ 15.059011] ? __virt_addr_valid+0x1db/0x2d0 [ 15.059037] ? copy_to_kernel_nofault+0x225/0x260 [ 15.059060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.059085] ? copy_to_kernel_nofault+0x225/0x260 [ 15.059107] kasan_report+0x141/0x180 [ 15.059131] ? copy_to_kernel_nofault+0x225/0x260 [ 15.059158] __asan_report_load8_noabort+0x18/0x20 [ 15.059181] copy_to_kernel_nofault+0x225/0x260 [ 15.059204] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 15.059491] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.059526] ? finish_task_switch.isra.0+0x153/0x700 [ 15.059569] ? __schedule+0x10cc/0x2b60 [ 15.059595] ? trace_hardirqs_on+0x37/0xe0 [ 15.059662] ? __pfx_read_tsc+0x10/0x10 [ 15.059687] ? ktime_get_ts64+0x86/0x230 [ 15.059715] kunit_try_run_case+0x1a5/0x480 [ 15.059742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.059766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.059793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.059818] ? __kthread_parkme+0x82/0x180 [ 15.059843] ? preempt_count_sub+0x50/0x80 [ 15.059869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.059894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.059919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.059944] kthread+0x337/0x6f0 [ 15.059962] ? trace_preempt_on+0x20/0xc0 [ 15.059987] ? __pfx_kthread+0x10/0x10 [ 15.060007] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.060030] ? calculate_sigpending+0x7b/0xa0 [ 15.060055] ? __pfx_kthread+0x10/0x10 [ 15.060075] ret_from_fork+0x41/0x80 [ 15.060097] ? __pfx_kthread+0x10/0x10 [ 15.060117] ret_from_fork_asm+0x1a/0x30 [ 15.060150] </TASK> [ 15.060164] [ 15.079522] Allocated by task 301: [ 15.079952] kasan_save_stack+0x45/0x70 [ 15.080548] kasan_save_track+0x18/0x40 [ 15.081152] kasan_save_alloc_info+0x3b/0x50 [ 15.081751] __kasan_kmalloc+0xb7/0xc0 [ 15.082129] __kmalloc_cache_noprof+0x189/0x420 [ 15.082806] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.082994] kunit_try_run_case+0x1a5/0x480 [ 15.083145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.083590] kthread+0x337/0x6f0 [ 15.083924] ret_from_fork+0x41/0x80 [ 15.084111] ret_from_fork_asm+0x1a/0x30 [ 15.084532] [ 15.084640] The buggy address belongs to the object at ffff888103151d00 [ 15.084640] which belongs to the cache kmalloc-128 of size 128 [ 15.085517] The buggy address is located 0 bytes to the right of [ 15.085517] allocated 120-byte region [ffff888103151d00, ffff888103151d78) [ 15.086231] [ 15.086509] The buggy address belongs to the physical page: [ 15.087114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151 [ 15.087990] flags: 0x200000000000000(node=0|zone=2) [ 15.088416] page_type: f5(slab) [ 15.088741] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.089214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.089789] page dumped because: kasan: bad access detected [ 15.090171] [ 15.090437] Memory state around the buggy address: [ 15.090662] ffff888103151c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.090966] ffff888103151c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091268] >ffff888103151d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.091583] ^ [ 15.092513] ffff888103151d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093070] ffff888103151e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093745] ==================================================================