Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.645885] ================================================================== [ 20.645935] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 20.645988] Write of size 8 at addr fff00000c6e6c978 by task kunit_try_catch/283 [ 20.646043] [ 20.646076] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.646157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.646329] Hardware name: linux,dummy-virt (DT) [ 20.646407] Call trace: [ 20.646432] show_stack+0x20/0x38 (C) [ 20.646483] dump_stack_lvl+0x8c/0xd0 [ 20.646570] print_report+0x118/0x608 [ 20.646623] kasan_report+0xdc/0x128 [ 20.646689] kasan_check_range+0x100/0x1a8 [ 20.646764] __kasan_check_write+0x20/0x30 [ 20.647036] copy_to_kernel_nofault+0x8c/0x250 [ 20.647151] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 20.647207] kunit_try_run_case+0x170/0x3f0 [ 20.647258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.647314] kthread+0x328/0x630 [ 20.647571] ret_from_fork+0x10/0x20 [ 20.647629] [ 20.647671] Allocated by task 283: [ 20.647721] kasan_save_stack+0x3c/0x68 [ 20.647764] kasan_save_track+0x20/0x40 [ 20.647803] kasan_save_alloc_info+0x40/0x58 [ 20.647842] __kasan_kmalloc+0xd4/0xd8 [ 20.647890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.647931] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.647975] kunit_try_run_case+0x170/0x3f0 [ 20.648016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.648070] kthread+0x328/0x630 [ 20.648109] ret_from_fork+0x10/0x20 [ 20.648146] [ 20.648168] The buggy address belongs to the object at fff00000c6e6c900 [ 20.648168] which belongs to the cache kmalloc-128 of size 128 [ 20.648226] The buggy address is located 0 bytes to the right of [ 20.648226] allocated 120-byte region [fff00000c6e6c900, fff00000c6e6c978) [ 20.648291] [ 20.648324] The buggy address belongs to the physical page: [ 20.648579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.648842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.648977] page_type: f5(slab) [ 20.649179] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.649356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.649432] page dumped because: kasan: bad access detected [ 20.649507] [ 20.649654] Memory state around the buggy address: [ 20.649754] fff00000c6e6c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.649838] fff00000c6e6c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.649952] >fff00000c6e6c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.650020] ^ [ 20.650124] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.650238] fff00000c6e6ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.650278] ================================================================== [ 20.641068] ================================================================== [ 20.641144] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 20.641234] Read of size 8 at addr fff00000c6e6c978 by task kunit_try_catch/283 [ 20.641287] [ 20.641361] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.641466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.641504] Hardware name: linux,dummy-virt (DT) [ 20.641538] Call trace: [ 20.641588] show_stack+0x20/0x38 (C) [ 20.641639] dump_stack_lvl+0x8c/0xd0 [ 20.641732] print_report+0x118/0x608 [ 20.641809] kasan_report+0xdc/0x128 [ 20.641876] __asan_report_load8_noabort+0x20/0x30 [ 20.641927] copy_to_kernel_nofault+0x204/0x250 [ 20.642134] copy_to_kernel_nofault_oob+0x158/0x418 [ 20.642272] kunit_try_run_case+0x170/0x3f0 [ 20.642364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.642425] kthread+0x328/0x630 [ 20.642474] ret_from_fork+0x10/0x20 [ 20.642524] [ 20.642545] Allocated by task 283: [ 20.642581] kasan_save_stack+0x3c/0x68 [ 20.642780] kasan_save_track+0x20/0x40 [ 20.642826] kasan_save_alloc_info+0x40/0x58 [ 20.642886] __kasan_kmalloc+0xd4/0xd8 [ 20.642924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.642966] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.643009] kunit_try_run_case+0x170/0x3f0 [ 20.643050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.643104] kthread+0x328/0x630 [ 20.643280] ret_from_fork+0x10/0x20 [ 20.643561] [ 20.643728] The buggy address belongs to the object at fff00000c6e6c900 [ 20.643728] which belongs to the cache kmalloc-128 of size 128 [ 20.644033] The buggy address is located 0 bytes to the right of [ 20.644033] allocated 120-byte region [fff00000c6e6c900, fff00000c6e6c978) [ 20.644109] [ 20.644133] The buggy address belongs to the physical page: [ 20.644166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.644311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.644496] page_type: f5(slab) [ 20.644621] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.644673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.644783] page dumped because: kasan: bad access detected [ 20.645097] [ 20.645230] Memory state around the buggy address: [ 20.645310] fff00000c6e6c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.645369] fff00000c6e6c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.645415] >fff00000c6e6c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.645492] ^ [ 20.645535] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.645579] fff00000c6e6ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.645620] ==================================================================
[ 15.329687] ================================================================== [ 15.331379] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 15.332189] Read of size 8 at addr ffff8881029e8578 by task kunit_try_catch/301 [ 15.332776] [ 15.332984] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.333040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.333054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.333081] Call Trace: [ 15.333097] <TASK> [ 15.333119] dump_stack_lvl+0x73/0xb0 [ 15.333150] print_report+0xd1/0x650 [ 15.333179] ? __virt_addr_valid+0x1db/0x2d0 [ 15.333206] ? copy_to_kernel_nofault+0x225/0x260 [ 15.333229] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.333255] ? copy_to_kernel_nofault+0x225/0x260 [ 15.333277] kasan_report+0x141/0x180 [ 15.333302] ? copy_to_kernel_nofault+0x225/0x260 [ 15.333329] __asan_report_load8_noabort+0x18/0x20 [ 15.333353] copy_to_kernel_nofault+0x225/0x260 [ 15.333377] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 15.333404] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.333430] ? finish_task_switch.isra.0+0x153/0x700 [ 15.333458] ? __schedule+0x10cc/0x2b60 [ 15.333483] ? trace_hardirqs_on+0x37/0xe0 [ 15.333541] ? __pfx_read_tsc+0x10/0x10 [ 15.333564] ? ktime_get_ts64+0x86/0x230 [ 15.333593] kunit_try_run_case+0x1a5/0x480 [ 15.333618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.333639] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.333665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.333692] ? __kthread_parkme+0x82/0x180 [ 15.333717] ? preempt_count_sub+0x50/0x80 [ 15.333743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.333765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.333791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.333820] kthread+0x337/0x6f0 [ 15.333840] ? trace_preempt_on+0x20/0xc0 [ 15.333866] ? __pfx_kthread+0x10/0x10 [ 15.333919] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.333944] ? calculate_sigpending+0x7b/0xa0 [ 15.333969] ? __pfx_kthread+0x10/0x10 [ 15.333990] ret_from_fork+0x41/0x80 [ 15.334013] ? __pfx_kthread+0x10/0x10 [ 15.334033] ret_from_fork_asm+0x1a/0x30 [ 15.334066] </TASK> [ 15.334079] [ 15.344713] Allocated by task 301: [ 15.344986] kasan_save_stack+0x45/0x70 [ 15.345196] kasan_save_track+0x18/0x40 [ 15.345366] kasan_save_alloc_info+0x3b/0x50 [ 15.345536] __kasan_kmalloc+0xb7/0xc0 [ 15.345753] __kmalloc_cache_noprof+0x189/0x420 [ 15.346113] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.346343] kunit_try_run_case+0x1a5/0x480 [ 15.346574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.346853] kthread+0x337/0x6f0 [ 15.347042] ret_from_fork+0x41/0x80 [ 15.347258] ret_from_fork_asm+0x1a/0x30 [ 15.347447] [ 15.347525] The buggy address belongs to the object at ffff8881029e8500 [ 15.347525] which belongs to the cache kmalloc-128 of size 128 [ 15.348094] The buggy address is located 0 bytes to the right of [ 15.348094] allocated 120-byte region [ffff8881029e8500, ffff8881029e8578) [ 15.348581] [ 15.348662] The buggy address belongs to the physical page: [ 15.348945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8 [ 15.349304] flags: 0x200000000000000(node=0|zone=2) [ 15.349631] page_type: f5(slab) [ 15.349818] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.350261] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.350597] page dumped because: kasan: bad access detected [ 15.350849] [ 15.351045] Memory state around the buggy address: [ 15.351302] ffff8881029e8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.351598] ffff8881029e8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.351902] >ffff8881029e8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.352196] ^ [ 15.352436] ffff8881029e8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.352981] ffff8881029e8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.353303] ================================================================== [ 15.354305] ================================================================== [ 15.354767] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 15.355162] Write of size 8 at addr ffff8881029e8578 by task kunit_try_catch/301 [ 15.355507] [ 15.355625] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.355671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.355685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.355709] Call Trace: [ 15.355724] <TASK> [ 15.355740] dump_stack_lvl+0x73/0xb0 [ 15.355768] print_report+0xd1/0x650 [ 15.355794] ? __virt_addr_valid+0x1db/0x2d0 [ 15.355818] ? copy_to_kernel_nofault+0x99/0x260 [ 15.355862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.355900] ? copy_to_kernel_nofault+0x99/0x260 [ 15.355922] kasan_report+0x141/0x180 [ 15.355966] ? copy_to_kernel_nofault+0x99/0x260 [ 15.355993] kasan_check_range+0x10c/0x1c0 [ 15.356029] __kasan_check_write+0x18/0x20 [ 15.356065] copy_to_kernel_nofault+0x99/0x260 [ 15.356089] copy_to_kernel_nofault_oob+0x288/0x560 [ 15.356116] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.356164] ? finish_task_switch.isra.0+0x153/0x700 [ 15.356191] ? __schedule+0x10cc/0x2b60 [ 15.356215] ? trace_hardirqs_on+0x37/0xe0 [ 15.356248] ? __pfx_read_tsc+0x10/0x10 [ 15.356270] ? ktime_get_ts64+0x86/0x230 [ 15.356297] kunit_try_run_case+0x1a5/0x480 [ 15.356320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.356341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.356367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.356394] ? __kthread_parkme+0x82/0x180 [ 15.356418] ? preempt_count_sub+0x50/0x80 [ 15.356444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.356466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.356492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.356528] kthread+0x337/0x6f0 [ 15.356565] ? trace_preempt_on+0x20/0xc0 [ 15.356590] ? __pfx_kthread+0x10/0x10 [ 15.356611] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.356652] ? calculate_sigpending+0x7b/0xa0 [ 15.356676] ? __pfx_kthread+0x10/0x10 [ 15.356696] ret_from_fork+0x41/0x80 [ 15.356719] ? __pfx_kthread+0x10/0x10 [ 15.356738] ret_from_fork_asm+0x1a/0x30 [ 15.356772] </TASK> [ 15.356785] [ 15.365286] Allocated by task 301: [ 15.365494] kasan_save_stack+0x45/0x70 [ 15.365714] kasan_save_track+0x18/0x40 [ 15.365915] kasan_save_alloc_info+0x3b/0x50 [ 15.366153] __kasan_kmalloc+0xb7/0xc0 [ 15.366345] __kmalloc_cache_noprof+0x189/0x420 [ 15.366662] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.367078] kunit_try_run_case+0x1a5/0x480 [ 15.367306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.367500] kthread+0x337/0x6f0 [ 15.367682] ret_from_fork+0x41/0x80 [ 15.367820] ret_from_fork_asm+0x1a/0x30 [ 15.367971] [ 15.368066] The buggy address belongs to the object at ffff8881029e8500 [ 15.368066] which belongs to the cache kmalloc-128 of size 128 [ 15.368598] The buggy address is located 0 bytes to the right of [ 15.368598] allocated 120-byte region [ffff8881029e8500, ffff8881029e8578) [ 15.369201] [ 15.369302] The buggy address belongs to the physical page: [ 15.369772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8 [ 15.370083] flags: 0x200000000000000(node=0|zone=2) [ 15.370247] page_type: f5(slab) [ 15.370370] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.371319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.371748] page dumped because: kasan: bad access detected [ 15.372258] [ 15.372462] Memory state around the buggy address: [ 15.373060] ffff8881029e8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.374100] ffff8881029e8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.374418] >ffff8881029e8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.374757] ^ [ 15.375323] ffff8881029e8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.375764] ffff8881029e8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.376245] ==================================================================