Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.301859] ================================================================== [ 29.301927] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 29.301978] Write of size 1 at addr fff00000c59f9d78 by task kunit_try_catch/173 [ 29.302077] [ 29.302124] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.302228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.302284] Hardware name: linux,dummy-virt (DT) [ 29.302354] Call trace: [ 29.302381] show_stack+0x20/0x38 (C) [ 29.302462] dump_stack_lvl+0x8c/0xd0 [ 29.302510] print_report+0x118/0x5d0 [ 29.302553] kasan_report+0xdc/0x128 [ 29.302606] __asan_report_store1_noabort+0x20/0x30 [ 29.302671] kmalloc_track_caller_oob_right+0x418/0x488 [ 29.302723] kunit_try_run_case+0x170/0x3f0 [ 29.302781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.302832] kthread+0x328/0x630 [ 29.302875] ret_from_fork+0x10/0x20 [ 29.303133] [ 29.303172] Allocated by task 173: [ 29.303228] kasan_save_stack+0x3c/0x68 [ 29.303289] kasan_save_track+0x20/0x40 [ 29.303353] kasan_save_alloc_info+0x40/0x58 [ 29.303408] __kasan_kmalloc+0xd4/0xd8 [ 29.303461] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.303559] kmalloc_track_caller_oob_right+0x184/0x488 [ 29.303601] kunit_try_run_case+0x170/0x3f0 [ 29.303636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.303693] kthread+0x328/0x630 [ 29.303744] ret_from_fork+0x10/0x20 [ 29.303805] [ 29.303843] The buggy address belongs to the object at fff00000c59f9d00 [ 29.303843] which belongs to the cache kmalloc-128 of size 128 [ 29.303925] The buggy address is located 0 bytes to the right of [ 29.303925] allocated 120-byte region [fff00000c59f9d00, fff00000c59f9d78) [ 29.304064] [ 29.304102] The buggy address belongs to the physical page: [ 29.304130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.304179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.304242] page_type: f5(slab) [ 29.304993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.305048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.305442] page dumped because: kasan: bad access detected [ 29.305472] [ 29.305489] Memory state around the buggy address: [ 29.305518] fff00000c59f9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.305559] fff00000c59f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.305599] >fff00000c59f9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.305634] ^ [ 29.305671] fff00000c59f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.305710] fff00000c59f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.305745] ================================================================== [ 29.296600] ================================================================== [ 29.296727] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.296809] Write of size 1 at addr fff00000c59f9c78 by task kunit_try_catch/173 [ 29.296899] [ 29.296941] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.297023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.297202] Hardware name: linux,dummy-virt (DT) [ 29.297300] Call trace: [ 29.297449] show_stack+0x20/0x38 (C) [ 29.297578] dump_stack_lvl+0x8c/0xd0 [ 29.297719] print_report+0x118/0x5d0 [ 29.297788] kasan_report+0xdc/0x128 [ 29.297874] __asan_report_store1_noabort+0x20/0x30 [ 29.297935] kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.298010] kunit_try_run_case+0x170/0x3f0 [ 29.298171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.298332] kthread+0x328/0x630 [ 29.298412] ret_from_fork+0x10/0x20 [ 29.298459] [ 29.298477] Allocated by task 173: [ 29.298505] kasan_save_stack+0x3c/0x68 [ 29.298542] kasan_save_track+0x20/0x40 [ 29.298576] kasan_save_alloc_info+0x40/0x58 [ 29.298612] __kasan_kmalloc+0xd4/0xd8 [ 29.298644] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.298723] kmalloc_track_caller_oob_right+0xa8/0x488 [ 29.298778] kunit_try_run_case+0x170/0x3f0 [ 29.298812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.298853] kthread+0x328/0x630 [ 29.298896] ret_from_fork+0x10/0x20 [ 29.299020] [ 29.299108] The buggy address belongs to the object at fff00000c59f9c00 [ 29.299108] which belongs to the cache kmalloc-128 of size 128 [ 29.299205] The buggy address is located 0 bytes to the right of [ 29.299205] allocated 120-byte region [fff00000c59f9c00, fff00000c59f9c78) [ 29.299310] [ 29.299346] The buggy address belongs to the physical page: [ 29.299394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.299497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.299616] page_type: f5(slab) [ 29.299700] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.299840] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.299980] page dumped because: kasan: bad access detected [ 29.300010] [ 29.300028] Memory state around the buggy address: [ 29.300077] fff00000c59f9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.300118] fff00000c59f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300158] >fff00000c59f9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.300442] ^ [ 29.300546] fff00000c59f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300651] fff00000c59f9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300736] ==================================================================
[ 25.104550] ================================================================== [ 25.104946] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 25.105212] Write of size 1 at addr ffff88810553d478 by task kunit_try_catch/191 [ 25.106415] [ 25.106772] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 25.106826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.106838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.106858] Call Trace: [ 25.106870] <TASK> [ 25.106885] dump_stack_lvl+0x73/0xb0 [ 25.106953] print_report+0xd1/0x610 [ 25.106975] ? __virt_addr_valid+0x1db/0x2d0 [ 25.106998] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 25.107134] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.107165] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 25.107189] kasan_report+0x141/0x180 [ 25.107210] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 25.107239] __asan_report_store1_noabort+0x1b/0x30 [ 25.107262] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 25.107285] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 25.107309] ? __schedule+0x10c6/0x2b60 [ 25.107331] ? __pfx_read_tsc+0x10/0x10 [ 25.107351] ? ktime_get_ts64+0x86/0x230 [ 25.107375] kunit_try_run_case+0x1a5/0x480 [ 25.107398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.107418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.107440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.107462] ? __kthread_parkme+0x82/0x180 [ 25.107485] ? preempt_count_sub+0x50/0x80 [ 25.107507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.107530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.107551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.107573] kthread+0x337/0x6f0 [ 25.107591] ? trace_preempt_on+0x20/0xc0 [ 25.107614] ? __pfx_kthread+0x10/0x10 [ 25.107633] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.107654] ? calculate_sigpending+0x7b/0xa0 [ 25.107676] ? __pfx_kthread+0x10/0x10 [ 25.107696] ret_from_fork+0x116/0x1d0 [ 25.107714] ? __pfx_kthread+0x10/0x10 [ 25.107733] ret_from_fork_asm+0x1a/0x30 [ 25.107763] </TASK> [ 25.107773] [ 25.120446] Allocated by task 191: [ 25.120605] kasan_save_stack+0x45/0x70 [ 25.121039] kasan_save_track+0x18/0x40 [ 25.121299] kasan_save_alloc_info+0x3b/0x50 [ 25.121436] __kasan_kmalloc+0xb7/0xc0 [ 25.121555] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 25.121983] kmalloc_track_caller_oob_right+0x99/0x520 [ 25.122155] kunit_try_run_case+0x1a5/0x480 [ 25.122573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.122892] kthread+0x337/0x6f0 [ 25.123004] ret_from_fork+0x116/0x1d0 [ 25.123136] ret_from_fork_asm+0x1a/0x30 [ 25.123606] [ 25.123752] The buggy address belongs to the object at ffff88810553d400 [ 25.123752] which belongs to the cache kmalloc-128 of size 128 [ 25.124825] The buggy address is located 0 bytes to the right of [ 25.124825] allocated 120-byte region [ffff88810553d400, ffff88810553d478) [ 25.126100] [ 25.126286] The buggy address belongs to the physical page: [ 25.126686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 25.127469] flags: 0x200000000000000(node=0|zone=2) [ 25.127889] page_type: f5(slab) [ 25.128216] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.128846] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.129445] page dumped because: kasan: bad access detected [ 25.129727] [ 25.129788] Memory state around the buggy address: [ 25.129940] ffff88810553d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.130150] ffff88810553d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.130380] >ffff88810553d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.130781] ^ [ 25.131051] ffff88810553d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.131382] ffff88810553d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.131822] ================================================================== [ 25.132628] ================================================================== [ 25.132856] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 25.133251] Write of size 1 at addr ffff88810553d578 by task kunit_try_catch/191 [ 25.133637] [ 25.133743] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 25.133788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.133819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.133838] Call Trace: [ 25.133871] <TASK> [ 25.133884] dump_stack_lvl+0x73/0xb0 [ 25.133912] print_report+0xd1/0x610 [ 25.133937] ? __virt_addr_valid+0x1db/0x2d0 [ 25.133958] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 25.133981] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.134005] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 25.134029] kasan_report+0x141/0x180 [ 25.134050] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 25.134090] __asan_report_store1_noabort+0x1b/0x30 [ 25.134113] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 25.134136] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 25.134161] ? __schedule+0x10c6/0x2b60 [ 25.134183] ? __pfx_read_tsc+0x10/0x10 [ 25.134203] ? ktime_get_ts64+0x86/0x230 [ 25.134227] kunit_try_run_case+0x1a5/0x480 [ 25.134263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.134285] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.134405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.134430] ? __kthread_parkme+0x82/0x180 [ 25.134453] ? preempt_count_sub+0x50/0x80 [ 25.134475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.134498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.134521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.134543] kthread+0x337/0x6f0 [ 25.134561] ? trace_preempt_on+0x20/0xc0 [ 25.134583] ? __pfx_kthread+0x10/0x10 [ 25.134602] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.134624] ? calculate_sigpending+0x7b/0xa0 [ 25.134646] ? __pfx_kthread+0x10/0x10 [ 25.134666] ret_from_fork+0x116/0x1d0 [ 25.134684] ? __pfx_kthread+0x10/0x10 [ 25.134703] ret_from_fork_asm+0x1a/0x30 [ 25.134733] </TASK> [ 25.134742] [ 25.142200] Allocated by task 191: [ 25.142458] kasan_save_stack+0x45/0x70 [ 25.142627] kasan_save_track+0x18/0x40 [ 25.142902] kasan_save_alloc_info+0x3b/0x50 [ 25.143089] __kasan_kmalloc+0xb7/0xc0 [ 25.143210] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 25.143379] kmalloc_track_caller_oob_right+0x19a/0x520 [ 25.143566] kunit_try_run_case+0x1a5/0x480 [ 25.143762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.144033] kthread+0x337/0x6f0 [ 25.144238] ret_from_fork+0x116/0x1d0 [ 25.144437] ret_from_fork_asm+0x1a/0x30 [ 25.144784] [ 25.144869] The buggy address belongs to the object at ffff88810553d500 [ 25.144869] which belongs to the cache kmalloc-128 of size 128 [ 25.145491] The buggy address is located 0 bytes to the right of [ 25.145491] allocated 120-byte region [ffff88810553d500, ffff88810553d578) [ 25.145846] [ 25.145938] The buggy address belongs to the physical page: [ 25.146187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 25.146589] flags: 0x200000000000000(node=0|zone=2) [ 25.146818] page_type: f5(slab) [ 25.147060] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.147314] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.147705] page dumped because: kasan: bad access detected [ 25.147978] [ 25.148076] Memory state around the buggy address: [ 25.148313] ffff88810553d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.148543] ffff88810553d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.148887] >ffff88810553d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.149258] ^ [ 25.149632] ffff88810553d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.149965] ffff88810553d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.150189] ==================================================================