Date
July 19, 2025, 11:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 14.988408] ================================================================== [ 14.988462] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 14.988513] Write of size 1 at addr fff00000c5f9d978 by task kunit_try_catch/143 [ 14.989726] [ 14.989925] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.990180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.990461] Hardware name: linux,dummy-virt (DT) [ 14.990516] Call trace: [ 14.990566] show_stack+0x20/0x38 (C) [ 14.990692] dump_stack_lvl+0x8c/0xd0 [ 14.990789] print_report+0x118/0x5d0 [ 14.990957] kasan_report+0xdc/0x128 [ 14.991045] __asan_report_store1_noabort+0x20/0x30 [ 14.991307] kmalloc_track_caller_oob_right+0x40c/0x488 [ 14.991551] kunit_try_run_case+0x170/0x3f0 [ 14.991625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.992416] kthread+0x328/0x630 [ 14.992498] ret_from_fork+0x10/0x20 [ 14.992634] [ 14.992718] Allocated by task 143: [ 14.992790] kasan_save_stack+0x3c/0x68 [ 14.993026] kasan_save_track+0x20/0x40 [ 14.993200] kasan_save_alloc_info+0x40/0x58 [ 14.993612] __kasan_kmalloc+0xd4/0xd8 [ 14.993689] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 14.993994] kmalloc_track_caller_oob_right+0xa8/0x488 [ 14.994180] kunit_try_run_case+0x170/0x3f0 [ 14.994227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.994270] kthread+0x328/0x630 [ 14.994628] ret_from_fork+0x10/0x20 [ 14.994690] [ 14.994802] The buggy address belongs to the object at fff00000c5f9d900 [ 14.994802] which belongs to the cache kmalloc-128 of size 128 [ 14.994997] The buggy address is located 0 bytes to the right of [ 14.994997] allocated 120-byte region [fff00000c5f9d900, fff00000c5f9d978) [ 14.995165] [ 14.995226] The buggy address belongs to the physical page: [ 14.995324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d [ 14.995451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.995511] page_type: f5(slab) [ 14.995689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.995918] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.995999] page dumped because: kasan: bad access detected [ 14.996194] [ 14.996467] Memory state around the buggy address: [ 14.996637] fff00000c5f9d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.996712] fff00000c5f9d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.996771] >fff00000c5f9d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.997055] ^ [ 14.997105] fff00000c5f9d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.997493] fff00000c5f9da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.997751] ================================================================== [ 15.000224] ================================================================== [ 15.000359] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 15.000441] Write of size 1 at addr fff00000c5f9da78 by task kunit_try_catch/143 [ 15.000718] [ 15.000891] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.000981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.001008] Hardware name: linux,dummy-virt (DT) [ 15.001046] Call trace: [ 15.001256] show_stack+0x20/0x38 (C) [ 15.001450] dump_stack_lvl+0x8c/0xd0 [ 15.001576] print_report+0x118/0x5d0 [ 15.001624] kasan_report+0xdc/0x128 [ 15.001677] __asan_report_store1_noabort+0x20/0x30 [ 15.001869] kmalloc_track_caller_oob_right+0x418/0x488 [ 15.002085] kunit_try_run_case+0x170/0x3f0 [ 15.002243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.002313] kthread+0x328/0x630 [ 15.002525] ret_from_fork+0x10/0x20 [ 15.002815] [ 15.002838] Allocated by task 143: [ 15.003050] kasan_save_stack+0x3c/0x68 [ 15.003296] kasan_save_track+0x20/0x40 [ 15.003682] kasan_save_alloc_info+0x40/0x58 [ 15.003903] __kasan_kmalloc+0xd4/0xd8 [ 15.004047] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 15.004113] kmalloc_track_caller_oob_right+0x184/0x488 [ 15.004476] kunit_try_run_case+0x170/0x3f0 [ 15.004584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.004629] kthread+0x328/0x630 [ 15.004939] ret_from_fork+0x10/0x20 [ 15.005104] [ 15.005160] The buggy address belongs to the object at fff00000c5f9da00 [ 15.005160] which belongs to the cache kmalloc-128 of size 128 [ 15.005246] The buggy address is located 0 bytes to the right of [ 15.005246] allocated 120-byte region [fff00000c5f9da00, fff00000c5f9da78) [ 15.005309] [ 15.005329] The buggy address belongs to the physical page: [ 15.005372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d [ 15.005423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.005470] page_type: f5(slab) [ 15.005523] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.005584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.005631] page dumped because: kasan: bad access detected [ 15.005676] [ 15.005694] Memory state around the buggy address: [ 15.006069] fff00000c5f9d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.006395] fff00000c5f9d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.006467] >fff00000c5f9da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.006680] ^ [ 15.006922] fff00000c5f9da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007049] fff00000c5f9db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007089] ==================================================================
[ 11.484510] ================================================================== [ 11.485008] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.485602] Write of size 1 at addr ffff888102f59578 by task kunit_try_catch/160 [ 11.486009] [ 11.486122] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.486171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.486182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.486210] Call Trace: [ 11.486223] <TASK> [ 11.486241] dump_stack_lvl+0x73/0xb0 [ 11.486274] print_report+0xd1/0x610 [ 11.486296] ? __virt_addr_valid+0x1db/0x2d0 [ 11.486320] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.486345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.486366] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.486391] kasan_report+0x141/0x180 [ 11.486412] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.486478] __asan_report_store1_noabort+0x1b/0x30 [ 11.486531] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.486555] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.486581] ? __schedule+0x10cc/0x2b60 [ 11.486603] ? __pfx_read_tsc+0x10/0x10 [ 11.486624] ? ktime_get_ts64+0x86/0x230 [ 11.486650] kunit_try_run_case+0x1a5/0x480 [ 11.486675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.486697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.486721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.486743] ? __kthread_parkme+0x82/0x180 [ 11.486764] ? preempt_count_sub+0x50/0x80 [ 11.486788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.486810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.486833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.486856] kthread+0x337/0x6f0 [ 11.486875] ? trace_preempt_on+0x20/0xc0 [ 11.486898] ? __pfx_kthread+0x10/0x10 [ 11.486917] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.486937] ? calculate_sigpending+0x7b/0xa0 [ 11.486961] ? __pfx_kthread+0x10/0x10 [ 11.486982] ret_from_fork+0x116/0x1d0 [ 11.487000] ? __pfx_kthread+0x10/0x10 [ 11.487020] ret_from_fork_asm+0x1a/0x30 [ 11.487050] </TASK> [ 11.487061] [ 11.494810] Allocated by task 160: [ 11.494947] kasan_save_stack+0x45/0x70 [ 11.495219] kasan_save_track+0x18/0x40 [ 11.495582] kasan_save_alloc_info+0x3b/0x50 [ 11.495789] __kasan_kmalloc+0xb7/0xc0 [ 11.496054] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.496238] kmalloc_track_caller_oob_right+0x99/0x520 [ 11.496408] kunit_try_run_case+0x1a5/0x480 [ 11.496626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.496887] kthread+0x337/0x6f0 [ 11.497175] ret_from_fork+0x116/0x1d0 [ 11.497505] ret_from_fork_asm+0x1a/0x30 [ 11.497716] [ 11.497827] The buggy address belongs to the object at ffff888102f59500 [ 11.497827] which belongs to the cache kmalloc-128 of size 128 [ 11.498371] The buggy address is located 0 bytes to the right of [ 11.498371] allocated 120-byte region [ffff888102f59500, ffff888102f59578) [ 11.499103] [ 11.499243] The buggy address belongs to the physical page: [ 11.499521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59 [ 11.499765] flags: 0x200000000000000(node=0|zone=2) [ 11.500084] page_type: f5(slab) [ 11.500323] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.500721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.501008] page dumped because: kasan: bad access detected [ 11.501183] [ 11.501251] Memory state around the buggy address: [ 11.501408] ffff888102f59400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.501730] ffff888102f59480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.502457] >ffff888102f59500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.502792] ^ [ 11.503005] ffff888102f59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.503674] ffff888102f59600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.503983] ================================================================== [ 11.504900] ================================================================== [ 11.505297] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.505856] Write of size 1 at addr ffff888102f59678 by task kunit_try_catch/160 [ 11.506133] [ 11.506226] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.506269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.506280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.506300] Call Trace: [ 11.506311] <TASK> [ 11.506326] dump_stack_lvl+0x73/0xb0 [ 11.506353] print_report+0xd1/0x610 [ 11.506375] ? __virt_addr_valid+0x1db/0x2d0 [ 11.506397] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.506420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.506442] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.506467] kasan_report+0x141/0x180 [ 11.506488] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.506547] __asan_report_store1_noabort+0x1b/0x30 [ 11.506571] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.506595] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.506620] ? __schedule+0x10cc/0x2b60 [ 11.506642] ? __pfx_read_tsc+0x10/0x10 [ 11.506662] ? ktime_get_ts64+0x86/0x230 [ 11.506686] kunit_try_run_case+0x1a5/0x480 [ 11.506709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.506730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.506753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.506776] ? __kthread_parkme+0x82/0x180 [ 11.506796] ? preempt_count_sub+0x50/0x80 [ 11.506820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.506843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.506866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.506889] kthread+0x337/0x6f0 [ 11.506907] ? trace_preempt_on+0x20/0xc0 [ 11.506929] ? __pfx_kthread+0x10/0x10 [ 11.506949] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.506970] ? calculate_sigpending+0x7b/0xa0 [ 11.506994] ? __pfx_kthread+0x10/0x10 [ 11.507014] ret_from_fork+0x116/0x1d0 [ 11.507032] ? __pfx_kthread+0x10/0x10 [ 11.507080] ret_from_fork_asm+0x1a/0x30 [ 11.507110] </TASK> [ 11.507130] [ 11.516169] Allocated by task 160: [ 11.516318] kasan_save_stack+0x45/0x70 [ 11.516467] kasan_save_track+0x18/0x40 [ 11.516808] kasan_save_alloc_info+0x3b/0x50 [ 11.516983] __kasan_kmalloc+0xb7/0xc0 [ 11.517216] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.517601] kmalloc_track_caller_oob_right+0x19a/0x520 [ 11.517920] kunit_try_run_case+0x1a5/0x480 [ 11.518152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.518371] kthread+0x337/0x6f0 [ 11.518502] ret_from_fork+0x116/0x1d0 [ 11.518636] ret_from_fork_asm+0x1a/0x30 [ 11.518786] [ 11.518928] The buggy address belongs to the object at ffff888102f59600 [ 11.518928] which belongs to the cache kmalloc-128 of size 128 [ 11.519553] The buggy address is located 0 bytes to the right of [ 11.519553] allocated 120-byte region [ffff888102f59600, ffff888102f59678) [ 11.520234] [ 11.520346] The buggy address belongs to the physical page: [ 11.520671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59 [ 11.521060] flags: 0x200000000000000(node=0|zone=2) [ 11.521278] page_type: f5(slab) [ 11.521489] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.521801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.522158] page dumped because: kasan: bad access detected [ 11.522512] [ 11.522655] Memory state around the buggy address: [ 11.522936] ffff888102f59500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.523195] ffff888102f59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.523632] >ffff888102f59600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.523991] ^ [ 11.524279] ffff888102f59680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.524621] ffff888102f59700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.524835] ==================================================================