Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 105.843045] ================================================================== [ 105.843980] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e4 [ 105.844788] Read of size 64 at addr ffff0000c67cdf04 by task kunit_try_catch/226 [ 105.845347] [ 105.845601] CPU: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 105.846320] Hardware name: linux,dummy-virt (DT) [ 105.846719] Call trace: [ 105.847973] dump_backtrace+0xe0/0x134 [ 105.848422] show_stack+0x20/0x2c [ 105.849066] dump_stack_lvl+0x88/0xb4 [ 105.849516] print_report+0x158/0x44c [ 105.849954] kasan_report+0xc8/0x180 [ 105.850385] kasan_check_range+0xe4/0x190 [ 105.850838] memmove+0x44/0xc0 [ 105.851250] kmalloc_memmove_invalid_size+0xe4/0x1e4 [ 105.851809] kunit_try_run_case+0x8c/0x124 [ 105.852290] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.853063] kthread+0x15c/0x170 [ 105.853489] ret_from_fork+0x10/0x20 [ 105.853917] [ 105.854105] Allocated by task 226: [ 105.854467] kasan_save_stack+0x3c/0x70 [ 105.854937] kasan_set_track+0x2c/0x40 [ 105.855386] kasan_save_alloc_info+0x24/0x34 [ 105.855850] __kasan_kmalloc+0xd4/0xe0 [ 105.856299] kmalloc_trace+0x8c/0x150 [ 105.856905] kmalloc_memmove_invalid_size+0xa0/0x1e4 [ 105.857451] kunit_try_run_case+0x8c/0x124 [ 105.857931] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.858491] kthread+0x15c/0x170 [ 105.858924] ret_from_fork+0x10/0x20 [ 105.859369] [ 105.859569] The buggy address belongs to the object at ffff0000c67cdf00 [ 105.859569] which belongs to the cache kmalloc-128 of size 128 [ 105.860479] The buggy address is located 4 bytes inside of [ 105.860479] 128-byte region [ffff0000c67cdf00, ffff0000c67cdf80) [ 105.861513] [ 105.861763] The buggy address belongs to the physical page: [ 105.862214] page:00000000e8cb511a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067cd [ 105.863703] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 105.864390] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 105.865241] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 105.865853] page dumped because: kasan: bad access detected [ 105.866366] [ 105.866564] Memory state around the buggy address: [ 105.867021] ffff0000c67cde00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.867660] ffff0000c67cde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.868281] >ffff0000c67cdf00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 105.869074] ^ [ 105.869561] ffff0000c67cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.870204] ffff0000c67ce000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 105.870814] ==================================================================
[ 75.595895] ================================================================== [ 75.597068] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160 [ 75.597814] Read of size 64 at addr ffff0000c5a46804 by task kunit_try_catch/142 [ 75.598397] [ 75.598604] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.599366] Hardware name: linux,dummy-virt (DT) [ 75.599804] Call trace: [ 75.600080] dump_backtrace+0xf8/0x118 [ 75.600574] show_stack+0x18/0x24 [ 75.601034] __dump_stack+0x28/0x38 [ 75.601511] dump_stack_lvl+0x54/0x6c [ 75.601973] print_address_description+0x7c/0x1ec [ 75.602502] print_report+0x50/0x68 [ 75.603151] kasan_report+0xac/0x100 [ 75.603604] kasan_check_range+0x260/0x2a0 [ 75.604108] memmove+0x48/0x90 [ 75.604499] kmalloc_memmove_invalid_size+0xb8/0x160 [ 75.605170] kunit_try_run_case+0x80/0x184 [ 75.605643] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.606210] kthread+0x16c/0x21c [ 75.606622] ret_from_fork+0x10/0x20 [ 75.607056] [ 75.607254] Allocated by task 142: [ 75.607613] kasan_set_track+0x4c/0x80 [ 75.608138] kasan_save_alloc_info+0x28/0x34 [ 75.608587] __kasan_kmalloc+0x88/0xa0 [ 75.609201] kmalloc_trace+0x54/0x68 [ 75.609608] kmalloc_memmove_invalid_size+0x48/0x160 [ 75.610180] kunit_try_run_case+0x80/0x184 [ 75.610625] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.611212] kthread+0x16c/0x21c [ 75.611616] ret_from_fork+0x10/0x20 [ 75.612019] [ 75.612238] The buggy address belongs to the object at ffff0000c5a46800 [ 75.612238] which belongs to the cache kmalloc-128 of size 128 [ 75.613460] The buggy address is located 4 bytes inside of [ 75.613460] 128-byte region [ffff0000c5a46800, ffff0000c5a46880) [ 75.614351] [ 75.614546] The buggy address belongs to the physical page: [ 75.614989] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.615807] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.616504] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.617711] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.618352] page dumped because: kasan: bad access detected [ 75.618850] [ 75.619054] Memory state around the buggy address: [ 75.619507] ffff0000c5a46700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.620151] ffff0000c5a46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.620843] >ffff0000c5a46800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.621552] ^ [ 75.622059] ffff0000c5a46880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.622676] ffff0000c5a46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.623244] ==================================================================
[ 74.643094] ================================================================== [ 74.644249] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160 [ 74.645201] Read of size 64 at addr ffff0000c5a09f04 by task kunit_try_catch/142 [ 74.645882] [ 74.646148] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.646919] Hardware name: linux,dummy-virt (DT) [ 74.647356] Call trace: [ 74.647653] dump_backtrace+0xf4/0x114 [ 74.648289] show_stack+0x18/0x24 [ 74.649189] __dump_stack+0x28/0x38 [ 74.649676] dump_stack_lvl+0x50/0x68 [ 74.650125] print_address_description+0x7c/0x1ec [ 74.650685] print_report+0x50/0x68 [ 74.651151] kasan_report+0xac/0xfc [ 74.651613] kasan_check_range+0x258/0x290 [ 74.652125] memmove+0x48/0x90 [ 74.652530] kmalloc_memmove_invalid_size+0xb8/0x160 [ 74.653060] kunit_try_run_case+0x80/0x184 [ 74.653595] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.654188] kthread+0x16c/0x21c [ 74.654623] ret_from_fork+0x10/0x20 [ 74.655063] [ 74.655255] Allocated by task 142: [ 74.655612] kasan_set_track+0x4c/0x80 [ 74.656106] kasan_save_alloc_info+0x28/0x34 [ 74.656592] __kasan_kmalloc+0x88/0xa0 [ 74.657057] kmalloc_trace+0x54/0x68 [ 74.657484] kmalloc_memmove_invalid_size+0x48/0x160 [ 74.658506] kunit_try_run_case+0x80/0x184 [ 74.659045] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.659629] kthread+0x16c/0x21c [ 74.660090] ret_from_fork+0x10/0x20 [ 74.660546] [ 74.660748] The buggy address belongs to the object at ffff0000c5a09f00 [ 74.660748] which belongs to the cache kmalloc-128 of size 128 [ 74.661690] The buggy address is located 4 bytes inside of [ 74.661690] 128-byte region [ffff0000c5a09f00, ffff0000c5a09f80) [ 74.662638] [ 74.662884] The buggy address belongs to the physical page: [ 74.663326] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.664768] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.665478] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.666147] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.666784] page dumped because: kasan: bad access detected [ 74.667268] [ 74.667467] Memory state around the buggy address: [ 74.667913] ffff0000c5a09e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.668553] ffff0000c5a09e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.669194] >ffff0000c5a09f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.669933] ^ [ 74.670609] ffff0000c5a09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.671493] ffff0000c5a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.673423] ==================================================================
[ 73.231542] ================================================================== [ 73.232300] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xdc/0x1e0 [ 73.232920] Read of size 64 at addr ffff0000c5915c04 by task kunit_try_catch/142 [ 73.233381] [ 73.234061] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.235807] Hardware name: linux,dummy-virt (DT) [ 73.236454] Call trace: [ 73.236866] dump_backtrace.part.0+0xdc/0xf0 [ 73.237591] show_stack+0x18/0x30 [ 73.238262] dump_stack_lvl+0x64/0x80 [ 73.238877] print_report+0x158/0x438 [ 73.239489] kasan_report+0xb4/0xf4 [ 73.240037] kasan_check_range+0xe4/0x190 [ 73.240649] memmove+0x44/0xc0 [ 73.241163] kmalloc_memmove_invalid_size+0xdc/0x1e0 [ 73.241960] kunit_try_run_case+0x84/0x120 [ 73.242635] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.243422] kthread+0x180/0x190 [ 73.243948] ret_from_fork+0x10/0x20 [ 73.244515] [ 73.244795] Allocated by task 142: [ 73.245270] kasan_save_stack+0x3c/0x70 [ 73.245905] kasan_set_track+0x2c/0x40 [ 73.246506] kasan_save_alloc_info+0x24/0x34 [ 73.247152] __kasan_kmalloc+0xb8/0xc0 [ 73.247715] kmalloc_trace+0x58/0x6c [ 73.248280] kmalloc_memmove_invalid_size+0x98/0x1e0 [ 73.248809] kunit_try_run_case+0x84/0x120 [ 73.249185] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.249865] kthread+0x180/0x190 [ 73.250248] ret_from_fork+0x10/0x20 [ 73.250808] [ 73.251083] The buggy address belongs to the object at ffff0000c5915c00 [ 73.251083] which belongs to the cache kmalloc-128 of size 128 [ 73.251917] The buggy address is located 4 bytes inside of [ 73.251917] 128-byte region [ffff0000c5915c00, ffff0000c5915c80) [ 73.252586] [ 73.252755] The buggy address belongs to the physical page: [ 73.253106] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 73.255194] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.256100] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.257327] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.258782] page dumped because: kasan: bad access detected [ 73.259157] [ 73.259325] Memory state around the buggy address: [ 73.259695] ffff0000c5915b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.260161] ffff0000c5915b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.261942] >ffff0000c5915c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.263423] ^ [ 73.264313] ffff0000c5915c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.265588] ffff0000c5915d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.266952] ==================================================================
[ 64.748850] ================================================================== [ 64.750542] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xf0/0x1e8 [ 64.751929] Read of size 64 at addr ffff0000c58b8f04 by task kunit_try_catch/140 [ 64.753169] [ 64.753515] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.754613] Hardware name: linux,dummy-virt (DT) [ 64.755115] Call trace: [ 64.755336] dump_backtrace+0x110/0x120 [ 64.755700] show_stack+0x18/0x28 [ 64.756026] dump_stack_lvl+0x68/0x84 [ 64.756648] print_report+0x158/0x484 [ 64.757202] kasan_report+0x98/0xe0 [ 64.757838] kasan_check_range+0x160/0x1d8 [ 64.758527] memmove+0x44/0xb0 [ 64.759032] kmalloc_memmove_invalid_size+0xf0/0x1e8 [ 64.759744] kunit_try_run_case+0x7c/0x120 [ 64.760356] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.761089] kthread+0x1a4/0x1b8 [ 64.761609] ret_from_fork+0x10/0x20 [ 64.762199] [ 64.762481] Allocated by task 140: [ 64.762932] kasan_save_stack+0x2c/0x58 [ 64.763482] kasan_set_track+0x2c/0x40 [ 64.764028] kasan_save_alloc_info+0x24/0x38 [ 64.764651] __kasan_kmalloc+0xa0/0xb8 [ 64.765167] kmalloc_trace+0x50/0x68 [ 64.765737] kmalloc_memmove_invalid_size+0xa8/0x1e8 [ 64.766485] kunit_try_run_case+0x7c/0x120 [ 64.767150] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.767914] kthread+0x1a4/0x1b8 [ 64.768414] ret_from_fork+0x10/0x20 [ 64.768932] [ 64.769199] The buggy address belongs to the object at ffff0000c58b8f00 [ 64.769199] which belongs to the cache kmalloc-128 of size 128 [ 64.770703] The buggy address is located 4 bytes inside of [ 64.770703] 128-byte region [ffff0000c58b8f00, ffff0000c58b8f80) [ 64.771501] [ 64.771662] The buggy address belongs to the physical page: [ 64.771987] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8 [ 64.772509] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 64.772992] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 64.773729] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 64.774168] page dumped because: kasan: bad access detected [ 64.774518] [ 64.774671] Memory state around the buggy address: [ 64.774984] ffff0000c58b8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.775529] ffff0000c58b8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.776157] >ffff0000c58b8f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.776716] ^ [ 64.777168] ffff0000c58b8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.777697] ffff0000c58b9000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.778437] ==================================================================
[ 31.037298] ================================================================== [ 31.037795] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe6/0x1e0 [ 31.039270] Read of size 64 at addr ffff8881030dcc84 by task kunit_try_catch/246 [ 31.039874] [ 31.039991] CPU: 1 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.040402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.040859] Call Trace: [ 31.041035] <TASK> [ 31.041196] dump_stack_lvl+0x49/0x62 [ 31.041454] print_report+0x189/0x492 [ 31.041782] ? kasan_complete_mode_report_info+0x3c/0x200 [ 31.042138] ? kmalloc_memmove_invalid_size+0xe6/0x1e0 [ 31.042586] kasan_report+0x10c/0x190 [ 31.042817] ? kmalloc_memmove_invalid_size+0xe6/0x1e0 [ 31.043104] kasan_check_range+0x10b/0x1c0 [ 31.043597] memmove+0x23/0x70 [ 31.043852] kmalloc_memmove_invalid_size+0xe6/0x1e0 [ 31.044125] ? kmem_cache_accounted+0x140/0x140 [ 31.044538] ? __kunit_add_resource+0xd1/0x100 [ 31.044838] kunit_try_run_case+0x8f/0xd0 [ 31.045104] ? kunit_catch_run_case+0x80/0x80 [ 31.045419] ? kunit_try_catch_throw+0x40/0x40 [ 31.045644] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.045950] kthread+0x17b/0x1b0 [ 31.046176] ? kthread_complete_and_exit+0x30/0x30 [ 31.046418] ret_from_fork+0x22/0x30 [ 31.046747] </TASK> [ 31.047083] [ 31.047368] Allocated by task 246: [ 31.047531] kasan_save_stack+0x41/0x70 [ 31.047961] kasan_set_track+0x25/0x40 [ 31.048420] kasan_save_alloc_info+0x1e/0x30 [ 31.048769] __kasan_kmalloc+0xb6/0xc0 [ 31.049109] kmalloc_trace+0x48/0xb0 [ 31.049445] kmalloc_memmove_invalid_size+0x9b/0x1e0 [ 31.049706] kunit_try_run_case+0x8f/0xd0 [ 31.049918] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.050223] kthread+0x17b/0x1b0 [ 31.050839] ret_from_fork+0x22/0x30 [ 31.051030] [ 31.051338] The buggy address belongs to the object at ffff8881030dcc80 [ 31.051338] which belongs to the cache kmalloc-64 of size 64 [ 31.052243] The buggy address is located 4 bytes inside of [ 31.052243] 64-byte region [ffff8881030dcc80, ffff8881030dccc0) [ 31.053177] [ 31.053448] The buggy address belongs to the physical page: [ 31.053846] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030dc [ 31.054345] flags: 0x200000000000200(slab|node=0|zone=2) [ 31.054780] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640 [ 31.055150] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 31.055522] page dumped because: kasan: bad access detected [ 31.055879] [ 31.056056] Memory state around the buggy address: [ 31.056320] ffff8881030dcb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.056613] ffff8881030dcc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.056956] >ffff8881030dcc80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.057311] ^ [ 31.057514] ffff8881030dcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.057841] ffff8881030dcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.058169] ==================================================================