Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 105.553261] ================================================================== [ 105.554013] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x2a0 [ 105.554872] Write of size 16 at addr ffff0000c67f5600 by task kunit_try_catch/218 [ 105.555371] [ 105.555567] CPU: 1 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 105.556248] Hardware name: linux,dummy-virt (DT) [ 105.556691] Call trace: [ 105.557014] dump_backtrace+0xe0/0x134 [ 105.557695] show_stack+0x20/0x2c [ 105.558177] dump_stack_lvl+0x88/0xb4 [ 105.558670] print_report+0x158/0x44c [ 105.559258] kasan_report+0xc8/0x180 [ 105.559725] __asan_store16+0x68/0x94 [ 105.560125] kmalloc_oob_16+0xf8/0x2a0 [ 105.560552] kunit_try_run_case+0x8c/0x124 [ 105.561109] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.561703] kthread+0x15c/0x170 [ 105.562138] ret_from_fork+0x10/0x20 [ 105.562575] [ 105.562797] Allocated by task 218: [ 105.563158] kasan_save_stack+0x3c/0x70 [ 105.563597] kasan_set_track+0x2c/0x40 [ 105.564235] kasan_save_alloc_info+0x24/0x34 [ 105.564906] __kasan_kmalloc+0xd4/0xe0 [ 105.565346] kmalloc_trace+0x8c/0x150 [ 105.565791] kmalloc_oob_16+0xa4/0x2a0 [ 105.566227] kunit_try_run_case+0x8c/0x124 [ 105.566660] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.567225] kthread+0x15c/0x170 [ 105.567644] ret_from_fork+0x10/0x20 [ 105.568081] [ 105.568270] The buggy address belongs to the object at ffff0000c67f5600 [ 105.568270] which belongs to the cache kmalloc-128 of size 128 [ 105.569333] The buggy address is located 0 bytes inside of [ 105.569333] 128-byte region [ffff0000c67f5600, ffff0000c67f5680) [ 105.570258] [ 105.570455] The buggy address belongs to the physical page: [ 105.570916] page:00000000678f5464 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067f5 [ 105.571709] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 105.572408] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 105.573283] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 105.573887] page dumped because: kasan: bad access detected [ 105.574363] [ 105.574569] Memory state around the buggy address: [ 105.575048] ffff0000c67f5500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.575649] ffff0000c67f5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.576278] >ffff0000c67f5600: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.576923] ^ [ 105.577280] ffff0000c67f5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.577911] ffff0000c67f5700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.578490] ==================================================================
[ 75.306674] ================================================================== [ 75.307583] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac [ 75.308248] Write of size 16 at addr ffff0000c5a47900 by task kunit_try_catch/134 [ 75.309389] [ 75.309729] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.311036] Hardware name: linux,dummy-virt (DT) [ 75.311831] Call trace: [ 75.312074] dump_backtrace+0xf8/0x118 [ 75.312507] show_stack+0x18/0x24 [ 75.313434] __dump_stack+0x28/0x38 [ 75.313868] dump_stack_lvl+0x54/0x6c [ 75.314292] print_address_description+0x7c/0x1ec [ 75.314840] print_report+0x50/0x68 [ 75.315285] kasan_report+0xac/0x100 [ 75.315762] kasan_check_range+0x260/0x2a0 [ 75.316257] memcpy+0x60/0x90 [ 75.316612] kmalloc_oob_16+0xfc/0x1ac [ 75.317232] kunit_try_run_case+0x80/0x184 [ 75.317738] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.318308] kthread+0x16c/0x21c [ 75.318741] ret_from_fork+0x10/0x20 [ 75.319189] [ 75.319374] Allocated by task 134: [ 75.319723] kasan_set_track+0x4c/0x80 [ 75.320173] kasan_save_alloc_info+0x28/0x34 [ 75.320807] __kasan_kmalloc+0x88/0xa0 [ 75.321279] kmalloc_trace+0x54/0x68 [ 75.321737] kmalloc_oob_16+0x48/0x1ac [ 75.322207] kunit_try_run_case+0x80/0x184 [ 75.322663] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.323228] kthread+0x16c/0x21c [ 75.323655] ret_from_fork+0x10/0x20 [ 75.324089] [ 75.324281] The buggy address belongs to the object at ffff0000c5a47900 [ 75.324281] which belongs to the cache kmalloc-128 of size 128 [ 75.325368] The buggy address is located 0 bytes inside of [ 75.325368] 128-byte region [ffff0000c5a47900, ffff0000c5a47980) [ 75.326246] [ 75.326472] The buggy address belongs to the physical page: [ 75.327418] page:000000003f689bbf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a47 [ 75.328234] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.329150] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.329814] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.330427] page dumped because: kasan: bad access detected [ 75.330901] [ 75.331082] Memory state around the buggy address: [ 75.331539] ffff0000c5a47800: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.332165] ffff0000c5a47880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.332963] >ffff0000c5a47900: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.333560] ^ [ 75.333942] ffff0000c5a47980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.334556] ffff0000c5a47a00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.335151] ==================================================================
[ 74.324555] ================================================================== [ 74.325410] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac [ 74.326046] Write of size 16 at addr ffff0000c5a07e00 by task kunit_try_catch/134 [ 74.326593] [ 74.326852] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.327580] Hardware name: linux,dummy-virt (DT) [ 74.328365] Call trace: [ 74.328638] dump_backtrace+0xf4/0x114 [ 74.329168] show_stack+0x18/0x24 [ 74.329615] __dump_stack+0x28/0x38 [ 74.330059] dump_stack_lvl+0x50/0x68 [ 74.330507] print_address_description+0x7c/0x1ec [ 74.331059] print_report+0x50/0x68 [ 74.331493] kasan_report+0xac/0xfc [ 74.331978] kasan_check_range+0x258/0x290 [ 74.332456] memcpy+0x60/0x90 [ 74.332846] kmalloc_oob_16+0xfc/0x1ac [ 74.333269] kunit_try_run_case+0x80/0x184 [ 74.334009] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.334596] kthread+0x16c/0x21c [ 74.335027] ret_from_fork+0x10/0x20 [ 74.335473] [ 74.335668] Allocated by task 134: [ 74.336264] kasan_set_track+0x4c/0x80 [ 74.336711] kasan_save_alloc_info+0x28/0x34 [ 74.337208] __kasan_kmalloc+0x88/0xa0 [ 74.337656] kmalloc_trace+0x54/0x68 [ 74.338090] kmalloc_oob_16+0x48/0x1ac [ 74.338532] kunit_try_run_case+0x80/0x184 [ 74.339006] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.339563] kthread+0x16c/0x21c [ 74.340257] ret_from_fork+0x10/0x20 [ 74.340701] [ 74.340945] The buggy address belongs to the object at ffff0000c5a07e00 [ 74.340945] which belongs to the cache kmalloc-128 of size 128 [ 74.341925] The buggy address is located 0 bytes inside of [ 74.341925] 128-byte region [ffff0000c5a07e00, ffff0000c5a07e80) [ 74.342850] [ 74.343075] The buggy address belongs to the physical page: [ 74.343539] page:0000000022d5f3f2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07 [ 74.344630] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.345345] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.346013] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.346595] page dumped because: kasan: bad access detected [ 74.347075] [ 74.347275] Memory state around the buggy address: [ 74.347710] ffff0000c5a07d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.348330] ffff0000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.349217] >ffff0000c5a07e00: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.349848] ^ [ 74.350223] ffff0000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.350872] ffff0000c5a07f00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.351458] ==================================================================
[ 72.932298] ================================================================== [ 72.933147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf0/0x290 [ 72.933764] Write of size 16 at addr ffff0000c5952c00 by task kunit_try_catch/134 [ 72.934441] [ 72.934682] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.935305] Hardware name: linux,dummy-virt (DT) [ 72.936510] Call trace: [ 72.936751] dump_backtrace.part.0+0xdc/0xf0 [ 72.937185] show_stack+0x18/0x30 [ 72.937558] dump_stack_lvl+0x64/0x80 [ 72.938643] print_report+0x158/0x438 [ 72.939331] kasan_report+0xb4/0xf4 [ 72.939922] __asan_store16+0x68/0x94 [ 72.940513] kmalloc_oob_16+0xf0/0x290 [ 72.941144] kunit_try_run_case+0x84/0x120 [ 72.941850] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.942738] kthread+0x180/0x190 [ 72.943283] ret_from_fork+0x10/0x20 [ 72.943897] [ 72.944171] Allocated by task 134: [ 72.944657] kasan_save_stack+0x3c/0x70 [ 72.945255] kasan_set_track+0x2c/0x40 [ 72.945878] kasan_save_alloc_info+0x24/0x34 [ 72.946594] __kasan_kmalloc+0xb8/0xc0 [ 72.947170] kmalloc_trace+0x58/0x6c [ 72.947759] kmalloc_oob_16+0x9c/0x290 [ 72.948368] kunit_try_run_case+0x84/0x120 [ 72.949014] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.949811] kthread+0x180/0x190 [ 72.950459] ret_from_fork+0x10/0x20 [ 72.951039] [ 72.951257] The buggy address belongs to the object at ffff0000c5952c00 [ 72.951257] which belongs to the cache kmalloc-128 of size 128 [ 72.952140] The buggy address is located 0 bytes inside of [ 72.952140] 128-byte region [ffff0000c5952c00, ffff0000c5952c80) [ 72.953345] [ 72.953624] The buggy address belongs to the physical page: [ 72.954448] page:000000000a751a16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105952 [ 72.955678] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.956720] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.957666] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.958677] page dumped because: kasan: bad access detected [ 72.959383] [ 72.959637] Memory state around the buggy address: [ 72.960328] ffff0000c5952b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 72.960993] ffff0000c5952b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.961473] >ffff0000c5952c00: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.962373] ^ [ 72.962867] ffff0000c5952c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.963330] ffff0000c5952d00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.963867] ==================================================================
[ 64.530617] ================================================================== [ 64.531428] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x104/0x278 [ 64.532027] Write of size 16 at addr ffff0000c58b8200 by task kunit_try_catch/132 [ 64.532551] [ 64.532771] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.533424] Hardware name: linux,dummy-virt (DT) [ 64.533825] Call trace: [ 64.534064] dump_backtrace+0x110/0x120 [ 64.534521] show_stack+0x18/0x28 [ 64.534913] dump_stack_lvl+0x68/0x84 [ 64.535324] print_report+0x158/0x484 [ 64.535684] kasan_report+0x98/0xe0 [ 64.536043] __asan_store16+0x7c/0xa8 [ 64.536433] kmalloc_oob_16+0x104/0x278 [ 64.536830] kunit_try_run_case+0x7c/0x120 [ 64.537284] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.537853] kthread+0x1a4/0x1b8 [ 64.538224] ret_from_fork+0x10/0x20 [ 64.538609] [ 64.538828] Allocated by task 132: [ 64.539118] kasan_save_stack+0x2c/0x58 [ 64.539563] kasan_set_track+0x2c/0x40 [ 64.539932] kasan_save_alloc_info+0x24/0x38 [ 64.540425] __kasan_kmalloc+0xa0/0xb8 [ 64.540799] kmalloc_trace+0x50/0x68 [ 64.541174] kmalloc_oob_16+0xac/0x278 [ 64.541640] kunit_try_run_case+0x7c/0x120 [ 64.542063] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.542564] kthread+0x1a4/0x1b8 [ 64.542897] ret_from_fork+0x10/0x20 [ 64.543272] [ 64.543449] The buggy address belongs to the object at ffff0000c58b8200 [ 64.543449] which belongs to the cache kmalloc-128 of size 128 [ 64.544299] The buggy address is located 0 bytes inside of [ 64.544299] 128-byte region [ffff0000c58b8200, ffff0000c58b8280) [ 64.545089] [ 64.545261] The buggy address belongs to the physical page: [ 64.545707] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8 [ 64.546367] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 64.547050] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 64.547648] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 64.548372] page dumped because: kasan: bad access detected [ 64.548805] [ 64.548998] Memory state around the buggy address: [ 64.549384] ffff0000c58b8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.550099] ffff0000c58b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.550792] >ffff0000c58b8200: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.551296] ^ [ 64.551676] ffff0000c58b8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.552180] ffff0000c58b8300: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.552744] ==================================================================
[ 30.814614] ================================================================== [ 30.815754] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xef/0x250 [ 30.816768] Write of size 16 at addr ffff888102f54ae0 by task kunit_try_catch/238 [ 30.817632] [ 30.817834] CPU: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 30.818831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.819981] Call Trace: [ 30.820409] <TASK> [ 30.820783] dump_stack_lvl+0x49/0x62 [ 30.821229] print_report+0x189/0x492 [ 30.821738] ? kasan_complete_mode_report_info+0x3c/0x200 [ 30.822294] ? kmalloc_oob_16+0xef/0x250 [ 30.822521] kasan_report+0x10c/0x190 [ 30.822956] ? kmalloc_oob_16+0xef/0x250 [ 30.823403] __asan_store16+0x68/0x90 [ 30.823900] kmalloc_oob_16+0xef/0x250 [ 30.824246] ? kmalloc_uaf_16+0x250/0x250 [ 30.824636] ? __kunit_add_resource+0xd1/0x100 [ 30.824860] ? kasan_test_init+0x13e/0x1b0 [ 30.825059] kunit_try_run_case+0x8f/0xd0 [ 30.825320] ? kunit_catch_run_case+0x80/0x80 [ 30.825646] ? kunit_try_catch_throw+0x40/0x40 [ 30.826138] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.826831] kthread+0x17b/0x1b0 [ 30.827011] ? kthread_complete_and_exit+0x30/0x30 [ 30.827237] ret_from_fork+0x22/0x30 [ 30.827660] </TASK> [ 30.827931] [ 30.828113] Allocated by task 238: [ 30.828574] kasan_save_stack+0x41/0x70 [ 30.829009] kasan_set_track+0x25/0x40 [ 30.829445] kasan_save_alloc_info+0x1e/0x30 [ 30.829966] __kasan_kmalloc+0xb6/0xc0 [ 30.830520] kmalloc_trace+0x48/0xb0 [ 30.831038] kmalloc_oob_16+0x8b/0x250 [ 30.831538] kunit_try_run_case+0x8f/0xd0 [ 30.831730] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.831951] kthread+0x17b/0x1b0 [ 30.832103] ret_from_fork+0x22/0x30 [ 30.832286] [ 30.832378] The buggy address belongs to the object at ffff888102f54ae0 [ 30.832378] which belongs to the cache kmalloc-16 of size 16 [ 30.832964] The buggy address is located 0 bytes inside of [ 30.832964] 16-byte region [ffff888102f54ae0, ffff888102f54af0) [ 30.833467] [ 30.833558] The buggy address belongs to the physical page: [ 30.833985] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 30.834730] flags: 0x200000000000200(slab|node=0|zone=2) [ 30.835092] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 30.835590] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 30.835949] page dumped because: kasan: bad access detected [ 30.836794] [ 30.836917] Memory state around the buggy address: [ 30.837143] ffff888102f54980: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 30.837785] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 30.838244] >ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 30.838893] ^ [ 30.839375] ffff888102f54b00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.839837] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.840271] ==================================================================