================================================================== BUG: KASAN: invalid-access in __arch_copy_to_user+0x180/0x240 arch/arm64/lib/copy_template.S:146 Read at addr f3ff000011f18000 by task rm/26582 Pointer tag: [f3], memory tag: [fe] CPU: 1 PID: 26582 Comm: rm Not tainted 6.0.0-rc4-syzkaller-00302-gb96fbd602d35 #0 Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace.part.0+0xd0/0xe0 arch/arm64/kernel/stacktrace.c:182 dump_backtrace arch/arm64/kernel/stacktrace.c:188 [inline] show_stack+0x18/0x5c arch/arm64/kernel/stacktrace.c:189 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x68/0x84 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:317 [inline] print_report+0x104/0x604 mm/kasan/report.c:433 kasan_report+0x8c/0xb0 mm/kasan/report.c:495 __do_kernel_fault+0x11c/0x1c0 arch/arm64/mm/fault.c:319 do_bad_area arch/arm64/mm/fault.c:469 [inline] do_tag_check_fault+0x78/0x90 arch/arm64/mm/fault.c:742 do_mem_abort+0x48/0x9c arch/arm64/mm/fault.c:818 el1_abort+0x40/0x60 arch/arm64/kernel/entry-common.c:366 el1h_64_sync_handler+0xb0/0xd0 arch/arm64/kernel/entry-common.c:417 el1h_64_sync+0x64/0x68 arch/arm64/kernel/entry.S:576 __arch_copy_to_user+0x180/0x240 arch/arm64/lib/copy_template.S:146 _copy_to_iter+0x68/0x5c0 lib/iov_iter.c:524 copy_page_to_iter+0xac/0x33c lib/iov_iter.c:722 copy_folio_to_iter include/linux/uio.h:169 [inline] filemap_read+0x1b4/0x3b0 mm/filemap.c:2711 generic_file_read_iter+0x108/0x1a0 mm/filemap.c:2806 ext4_file_read_iter+0x58/0x1f0 fs/ext4/file.c:132 call_read_iter include/linux/fs.h:2181 [inline] new_sync_read fs/read_write.c:389 [inline] vfs_read+0x1f8/0x29c fs/read_write.c:470 ksys_read+0x68/0xf4 fs/read_write.c:607 __do_sys_read fs/read_write.c:617 [inline] __se_sys_read fs/read_write.c:615 [inline] __arm64_sys_read+0x20/0x2c fs/read_write.c:615 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x48/0x114 arch/arm64/kernel/syscall.c:52 el0_svc_common.constprop.0+0x44/0xec arch/arm64/kernel/syscall.c:142 do_el0_svc+0x2c/0xc0 arch/arm64/kernel/syscall.c:206 el0_svc+0x2c/0xb4 arch/arm64/kernel/entry-common.c:624 el0t_64_sync_handler+0x1ac/0x1b0 arch/arm64/kernel/entry-common.c:642 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:581 The buggy address belongs to the physical page: page:00000000141f70ca refcount:10 mapcount:8 mapping:00000000d9fd6f61 index:0x0 pfn:0x51f18 memcg:f4ff000002ce0000 aops:ext4_da_aops ino:b8 dentry name:"libresolv-2.31.so" flags: 0x1ffc30002020836(referenced|uptodate|lru|active|arch_1|mappedtodisk|arch_2|node=0|zone=0|lastcpupid=0x7ff|kasantag=0xc) raw: 01ffc30002020836 fffffc000047c648 fffffc000047b3c8 f1ff00000315b6e0 raw: 0000000000000000 0000000000000000 0000000a00000007 f4ff000002ce0000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff000011f17e00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ffff000011f17f00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe >ffff000011f18000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ^ ffff000011f18100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ffff000011f18200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ==================================================================