Date
July 12, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.435094] ================================================================== [ 16.435142] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.435654] Write of size 1 at addr fff00000c585e978 by task kunit_try_catch/142 [ 16.435718] [ 16.436240] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.436620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.436676] Hardware name: linux,dummy-virt (DT) [ 16.436729] Call trace: [ 16.436749] show_stack+0x20/0x38 (C) [ 16.436799] dump_stack_lvl+0x8c/0xd0 [ 16.436844] print_report+0x118/0x5d0 [ 16.436889] kasan_report+0xdc/0x128 [ 16.436933] __asan_report_store1_noabort+0x20/0x30 [ 16.436984] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.437250] kunit_try_run_case+0x170/0x3f0 [ 16.437396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.437453] kthread+0x328/0x630 [ 16.437506] ret_from_fork+0x10/0x20 [ 16.437670] [ 16.437687] Allocated by task 142: [ 16.437714] kasan_save_stack+0x3c/0x68 [ 16.437756] kasan_save_track+0x20/0x40 [ 16.438085] kasan_save_alloc_info+0x40/0x58 [ 16.438159] __kasan_kmalloc+0xd4/0xd8 [ 16.438227] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.438428] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.438490] kunit_try_run_case+0x170/0x3f0 [ 16.438620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.438662] kthread+0x328/0x630 [ 16.438732] ret_from_fork+0x10/0x20 [ 16.438791] [ 16.438809] The buggy address belongs to the object at fff00000c585e900 [ 16.438809] which belongs to the cache kmalloc-128 of size 128 [ 16.439048] The buggy address is located 0 bytes to the right of [ 16.439048] allocated 120-byte region [fff00000c585e900, fff00000c585e978) [ 16.439151] [ 16.439456] The buggy address belongs to the physical page: [ 16.439627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e [ 16.439684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.439888] page_type: f5(slab) [ 16.439930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.440148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.440252] page dumped because: kasan: bad access detected [ 16.440304] [ 16.440321] Memory state around the buggy address: [ 16.440351] fff00000c585e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.440515] fff00000c585e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.440558] >fff00000c585e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.440595] ^ [ 16.440634] fff00000c585e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.440676] fff00000c585ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.440714] ================================================================== [ 16.429036] ================================================================== [ 16.429219] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.429506] Write of size 1 at addr fff00000c585e878 by task kunit_try_catch/142 [ 16.429691] [ 16.429873] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.430367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.430396] Hardware name: linux,dummy-virt (DT) [ 16.430427] Call trace: [ 16.430455] show_stack+0x20/0x38 (C) [ 16.430555] dump_stack_lvl+0x8c/0xd0 [ 16.430728] print_report+0x118/0x5d0 [ 16.430790] kasan_report+0xdc/0x128 [ 16.430834] __asan_report_store1_noabort+0x20/0x30 [ 16.430884] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.430933] kunit_try_run_case+0x170/0x3f0 [ 16.430979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.431030] kthread+0x328/0x630 [ 16.431078] ret_from_fork+0x10/0x20 [ 16.431266] [ 16.431284] Allocated by task 142: [ 16.431328] kasan_save_stack+0x3c/0x68 [ 16.431369] kasan_save_track+0x20/0x40 [ 16.431405] kasan_save_alloc_info+0x40/0x58 [ 16.431443] __kasan_kmalloc+0xd4/0xd8 [ 16.431500] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.431543] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.431583] kunit_try_run_case+0x170/0x3f0 [ 16.431619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.431661] kthread+0x328/0x630 [ 16.431694] ret_from_fork+0x10/0x20 [ 16.432259] [ 16.432293] The buggy address belongs to the object at fff00000c585e800 [ 16.432293] which belongs to the cache kmalloc-128 of size 128 [ 16.432528] The buggy address is located 0 bytes to the right of [ 16.432528] allocated 120-byte region [fff00000c585e800, fff00000c585e878) [ 16.432819] [ 16.432839] The buggy address belongs to the physical page: [ 16.432871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e [ 16.432992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.433042] page_type: f5(slab) [ 16.433183] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.433337] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.433403] page dumped because: kasan: bad access detected [ 16.433505] [ 16.433522] Memory state around the buggy address: [ 16.433563] fff00000c585e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.433676] fff00000c585e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.433724] >fff00000c585e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.433761] ^ [ 16.433801] fff00000c585e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.433842] fff00000c585e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.433880] ==================================================================
[ 12.307618] ================================================================== [ 12.308462] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 12.309660] Write of size 1 at addr ffff8881027eb278 by task kunit_try_catch/159 [ 12.310716] [ 12.310819] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.310865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.310877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.310898] Call Trace: [ 12.310911] <TASK> [ 12.310930] dump_stack_lvl+0x73/0xb0 [ 12.310963] print_report+0xd1/0x610 [ 12.310996] ? __virt_addr_valid+0x1db/0x2d0 [ 12.311021] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 12.311046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.311069] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 12.311094] kasan_report+0x141/0x180 [ 12.311170] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 12.311204] __asan_report_store1_noabort+0x1b/0x30 [ 12.311242] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 12.311278] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 12.311307] ? __schedule+0x10cc/0x2b60 [ 12.311331] ? __pfx_read_tsc+0x10/0x10 [ 12.311352] ? ktime_get_ts64+0x86/0x230 [ 12.311377] kunit_try_run_case+0x1a5/0x480 [ 12.311402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.311424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.311448] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.311472] ? __kthread_parkme+0x82/0x180 [ 12.311492] ? preempt_count_sub+0x50/0x80 [ 12.311517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.311541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.311564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.311589] kthread+0x337/0x6f0 [ 12.311608] ? trace_preempt_on+0x20/0xc0 [ 12.311631] ? __pfx_kthread+0x10/0x10 [ 12.311651] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.311672] ? calculate_sigpending+0x7b/0xa0 [ 12.311696] ? __pfx_kthread+0x10/0x10 [ 12.311717] ret_from_fork+0x116/0x1d0 [ 12.311736] ? __pfx_kthread+0x10/0x10 [ 12.311756] ret_from_fork_asm+0x1a/0x30 [ 12.311787] </TASK> [ 12.311797] [ 12.325492] Allocated by task 159: [ 12.325945] kasan_save_stack+0x45/0x70 [ 12.326437] kasan_save_track+0x18/0x40 [ 12.326802] kasan_save_alloc_info+0x3b/0x50 [ 12.327279] __kasan_kmalloc+0xb7/0xc0 [ 12.327675] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 12.327885] kmalloc_track_caller_oob_right+0x99/0x520 [ 12.328060] kunit_try_run_case+0x1a5/0x480 [ 12.328560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.329162] kthread+0x337/0x6f0 [ 12.329533] ret_from_fork+0x116/0x1d0 [ 12.329952] ret_from_fork_asm+0x1a/0x30 [ 12.330394] [ 12.330608] The buggy address belongs to the object at ffff8881027eb200 [ 12.330608] which belongs to the cache kmalloc-128 of size 128 [ 12.331395] The buggy address is located 0 bytes to the right of [ 12.331395] allocated 120-byte region [ffff8881027eb200, ffff8881027eb278) [ 12.332496] [ 12.332578] The buggy address belongs to the physical page: [ 12.332756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027eb [ 12.333020] flags: 0x200000000000000(node=0|zone=2) [ 12.333522] page_type: f5(slab) [ 12.333925] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.334740] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.335657] page dumped because: kasan: bad access detected [ 12.336323] [ 12.336558] Memory state around the buggy address: [ 12.337084] ffff8881027eb100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.337671] ffff8881027eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.338230] >ffff8881027eb200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.338998] ^ [ 12.339444] ffff8881027eb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.340212] ffff8881027eb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.340805] ================================================================== [ 12.341574] ================================================================== [ 12.342572] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 12.343093] Write of size 1 at addr ffff8881027eb378 by task kunit_try_catch/159 [ 12.343974] [ 12.344155] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.344199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.344209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.344229] Call Trace: [ 12.344240] <TASK> [ 12.344257] dump_stack_lvl+0x73/0xb0 [ 12.344301] print_report+0xd1/0x610 [ 12.344323] ? __virt_addr_valid+0x1db/0x2d0 [ 12.344346] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 12.344372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.344399] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 12.344426] kasan_report+0x141/0x180 [ 12.344448] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 12.344479] __asan_report_store1_noabort+0x1b/0x30 [ 12.344505] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 12.344565] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 12.344593] ? __schedule+0x10cc/0x2b60 [ 12.344616] ? __pfx_read_tsc+0x10/0x10 [ 12.344638] ? ktime_get_ts64+0x86/0x230 [ 12.344664] kunit_try_run_case+0x1a5/0x480 [ 12.344689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.344712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.344736] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.344759] ? __kthread_parkme+0x82/0x180 [ 12.344779] ? preempt_count_sub+0x50/0x80 [ 12.344803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.344827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.344851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.344876] kthread+0x337/0x6f0 [ 12.344895] ? trace_preempt_on+0x20/0xc0 [ 12.344918] ? __pfx_kthread+0x10/0x10 [ 12.344938] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.344959] ? calculate_sigpending+0x7b/0xa0 [ 12.345002] ? __pfx_kthread+0x10/0x10 [ 12.345032] ret_from_fork+0x116/0x1d0 [ 12.345062] ? __pfx_kthread+0x10/0x10 [ 12.345082] ret_from_fork_asm+0x1a/0x30 [ 12.345113] </TASK> [ 12.345123] [ 12.356512] Allocated by task 159: [ 12.356661] kasan_save_stack+0x45/0x70 [ 12.356818] kasan_save_track+0x18/0x40 [ 12.356954] kasan_save_alloc_info+0x3b/0x50 [ 12.357103] __kasan_kmalloc+0xb7/0xc0 [ 12.357238] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 12.357804] kmalloc_track_caller_oob_right+0x19a/0x520 [ 12.358351] kunit_try_run_case+0x1a5/0x480 [ 12.359890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.360880] kthread+0x337/0x6f0 [ 12.361290] ret_from_fork+0x116/0x1d0 [ 12.361636] ret_from_fork_asm+0x1a/0x30 [ 12.362063] [ 12.362224] The buggy address belongs to the object at ffff8881027eb300 [ 12.362224] which belongs to the cache kmalloc-128 of size 128 [ 12.362890] The buggy address is located 0 bytes to the right of [ 12.362890] allocated 120-byte region [ffff8881027eb300, ffff8881027eb378) [ 12.364122] [ 12.364318] The buggy address belongs to the physical page: [ 12.364583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027eb [ 12.364833] flags: 0x200000000000000(node=0|zone=2) [ 12.365155] page_type: f5(slab) [ 12.365470] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.366172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.366829] page dumped because: kasan: bad access detected [ 12.367370] [ 12.367527] Memory state around the buggy address: [ 12.367704] ffff8881027eb200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.367926] ffff8881027eb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.368705] >ffff8881027eb300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.369430] ^ [ 12.370071] ffff8881027eb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.370401] ffff8881027eb400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.370960] ==================================================================