Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 105.732955] ================================================================== [ 105.733717] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x200 [ 105.734458] Write of size 8 at addr ffff0000c66f6271 by task kunit_try_catch/223 [ 105.734964] [ 105.735162] CPU: 1 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 105.735713] Hardware name: linux,dummy-virt (DT) [ 105.738126] Call trace: [ 105.738837] dump_backtrace+0xe0/0x134 [ 105.739646] show_stack+0x20/0x2c [ 105.740435] dump_stack_lvl+0x88/0xb4 [ 105.741171] print_report+0x158/0x44c [ 105.741737] kasan_report+0xc8/0x180 [ 105.742130] kasan_check_range+0xe4/0x190 [ 105.742699] memset+0x40/0x70 [ 105.743124] kmalloc_oob_memset_8+0xd8/0x200 [ 105.743563] kunit_try_run_case+0x8c/0x124 [ 105.744110] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.744783] kthread+0x15c/0x170 [ 105.745566] ret_from_fork+0x10/0x20 [ 105.746011] [ 105.746252] Allocated by task 223: [ 105.746626] kasan_save_stack+0x3c/0x70 [ 105.747083] kasan_set_track+0x2c/0x40 [ 105.747546] kasan_save_alloc_info+0x24/0x34 [ 105.748029] __kasan_kmalloc+0xd4/0xe0 [ 105.748500] kmalloc_trace+0x8c/0x150 [ 105.748960] kmalloc_oob_memset_8+0xa0/0x200 [ 105.749456] kunit_try_run_case+0x8c/0x124 [ 105.750343] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.751011] kthread+0x15c/0x170 [ 105.751425] ret_from_fork+0x10/0x20 [ 105.751894] [ 105.752132] The buggy address belongs to the object at ffff0000c66f6200 [ 105.752132] which belongs to the cache kmalloc-128 of size 128 [ 105.753289] The buggy address is located 113 bytes inside of [ 105.753289] 128-byte region [ffff0000c66f6200, ffff0000c66f6280) [ 105.754208] [ 105.754623] The buggy address belongs to the physical page: [ 105.755068] page:000000008cb3a959 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f6 [ 105.755855] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 105.756580] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 105.757372] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 105.758023] page dumped because: kasan: bad access detected [ 105.758511] [ 105.758716] Memory state around the buggy address: [ 105.759645] ffff0000c66f6100: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.760306] ffff0000c66f6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.761280] >ffff0000c66f6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 105.761877] ^ [ 105.762458] ffff0000c66f6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.763072] ffff0000c66f6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.763666] ==================================================================
[ 75.489407] ================================================================== [ 75.490172] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154 [ 75.490741] Write of size 8 at addr ffff0000c5a46371 by task kunit_try_catch/139 [ 75.491788] [ 75.492117] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.493342] Hardware name: linux,dummy-virt (DT) [ 75.494078] Call trace: [ 75.494488] dump_backtrace+0xf8/0x118 [ 75.495169] show_stack+0x18/0x24 [ 75.495813] __dump_stack+0x28/0x38 [ 75.496454] dump_stack_lvl+0x54/0x6c [ 75.497136] print_address_description+0x7c/0x1ec [ 75.497917] print_report+0x50/0x68 [ 75.498541] kasan_report+0xac/0x100 [ 75.499160] kasan_check_range+0x260/0x2a0 [ 75.499841] memset+0x40/0x70 [ 75.500356] kmalloc_oob_memset_8+0xac/0x154 [ 75.501115] kunit_try_run_case+0x80/0x184 [ 75.501889] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.502708] kthread+0x16c/0x21c [ 75.503310] ret_from_fork+0x10/0x20 [ 75.503841] [ 75.504133] Allocated by task 139: [ 75.504680] kasan_set_track+0x4c/0x80 [ 75.505144] kasan_save_alloc_info+0x28/0x34 [ 75.505545] __kasan_kmalloc+0x88/0xa0 [ 75.506020] kmalloc_trace+0x54/0x68 [ 75.506402] kmalloc_oob_memset_8+0x48/0x154 [ 75.506882] kunit_try_run_case+0x80/0x184 [ 75.507550] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.508375] kthread+0x16c/0x21c [ 75.509061] ret_from_fork+0x10/0x20 [ 75.509673] [ 75.509979] The buggy address belongs to the object at ffff0000c5a46300 [ 75.509979] which belongs to the cache kmalloc-128 of size 128 [ 75.511406] The buggy address is located 113 bytes inside of [ 75.511406] 128-byte region [ffff0000c5a46300, ffff0000c5a46380) [ 75.512870] [ 75.513206] The buggy address belongs to the physical page: [ 75.513985] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.514884] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.515441] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.516218] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.517269] page dumped because: kasan: bad access detected [ 75.518064] [ 75.518356] Memory state around the buggy address: [ 75.519004] ffff0000c5a46200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.519921] ffff0000c5a46280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.520906] >ffff0000c5a46300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.521954] ^ [ 75.522824] ffff0000c5a46380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.523739] ffff0000c5a46400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.524637] ==================================================================
[ 74.524566] ================================================================== [ 74.525467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154 [ 74.526121] Write of size 8 at addr ffff0000c5a09c71 by task kunit_try_catch/139 [ 74.526747] [ 74.526961] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.527708] Hardware name: linux,dummy-virt (DT) [ 74.528480] Call trace: [ 74.528879] dump_backtrace+0xf4/0x114 [ 74.529460] show_stack+0x18/0x24 [ 74.530006] __dump_stack+0x28/0x38 [ 74.530530] dump_stack_lvl+0x50/0x68 [ 74.531067] print_address_description+0x7c/0x1ec [ 74.531877] print_report+0x50/0x68 [ 74.532468] kasan_report+0xac/0xfc [ 74.532896] kasan_check_range+0x258/0x290 [ 74.533574] memset+0x40/0x70 [ 74.534043] kmalloc_oob_memset_8+0xac/0x154 [ 74.534590] kunit_try_run_case+0x80/0x184 [ 74.535110] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.535729] kthread+0x16c/0x21c [ 74.536341] ret_from_fork+0x10/0x20 [ 74.536838] [ 74.537056] Allocated by task 139: [ 74.537430] kasan_set_track+0x4c/0x80 [ 74.537973] kasan_save_alloc_info+0x28/0x34 [ 74.538462] __kasan_kmalloc+0x88/0xa0 [ 74.538944] kmalloc_trace+0x54/0x68 [ 74.539350] kmalloc_oob_memset_8+0x48/0x154 [ 74.539850] kunit_try_run_case+0x80/0x184 [ 74.540556] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.541170] kthread+0x16c/0x21c [ 74.541578] ret_from_fork+0x10/0x20 [ 74.542004] [ 74.542203] The buggy address belongs to the object at ffff0000c5a09c00 [ 74.542203] which belongs to the cache kmalloc-128 of size 128 [ 74.543092] The buggy address is located 113 bytes inside of [ 74.543092] 128-byte region [ffff0000c5a09c00, ffff0000c5a09c80) [ 74.544098] [ 74.544291] The buggy address belongs to the physical page: [ 74.544817] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.545575] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.546388] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.547075] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.547858] page dumped because: kasan: bad access detected [ 74.548308] [ 74.548526] Memory state around the buggy address: [ 74.548952] ffff0000c5a09b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.549591] ffff0000c5a09b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.550411] >ffff0000c5a09c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 74.551008] ^ [ 74.551586] ffff0000c5a09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.552685] ffff0000c5a09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.553304] ==================================================================
[ 73.121147] ================================================================== [ 73.122270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd0/0x200 [ 73.123404] Write of size 8 at addr ffff0000c5916f71 by task kunit_try_catch/139 [ 73.124335] [ 73.124547] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.125081] Hardware name: linux,dummy-virt (DT) [ 73.125418] Call trace: [ 73.125926] dump_backtrace.part.0+0xdc/0xf0 [ 73.126744] show_stack+0x18/0x30 [ 73.127358] dump_stack_lvl+0x64/0x80 [ 73.127982] print_report+0x158/0x438 [ 73.128610] kasan_report+0xb4/0xf4 [ 73.129178] kasan_check_range+0xe4/0x190 [ 73.129850] memset+0x40/0x70 [ 73.130463] kmalloc_oob_memset_8+0xd0/0x200 [ 73.131141] kunit_try_run_case+0x84/0x120 [ 73.131802] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.132579] kthread+0x180/0x190 [ 73.133098] ret_from_fork+0x10/0x20 [ 73.133665] [ 73.133994] Allocated by task 139: [ 73.134557] kasan_save_stack+0x3c/0x70 [ 73.135213] kasan_set_track+0x2c/0x40 [ 73.135858] kasan_save_alloc_info+0x24/0x34 [ 73.136513] __kasan_kmalloc+0xb8/0xc0 [ 73.137065] kmalloc_trace+0x58/0x6c [ 73.137640] kmalloc_oob_memset_8+0x98/0x200 [ 73.138321] kunit_try_run_case+0x84/0x120 [ 73.139010] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.139786] kthread+0x180/0x190 [ 73.140171] ret_from_fork+0x10/0x20 [ 73.140522] [ 73.140687] The buggy address belongs to the object at ffff0000c5916f00 [ 73.140687] which belongs to the cache kmalloc-128 of size 128 [ 73.141368] The buggy address is located 113 bytes inside of [ 73.141368] 128-byte region [ffff0000c5916f00, ffff0000c5916f80) [ 73.142913] [ 73.143207] The buggy address belongs to the physical page: [ 73.143975] page:00000000a76cf208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916 [ 73.145069] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.146002] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.147061] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.147986] page dumped because: kasan: bad access detected [ 73.148660] [ 73.148934] Memory state around the buggy address: [ 73.149552] ffff0000c5916e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.150553] ffff0000c5916e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.151540] >ffff0000c5916f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 73.152380] ^ [ 73.153165] ffff0000c5916f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.153641] ffff0000c5917000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.154618] ==================================================================
[ 64.667980] ================================================================== [ 64.668754] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xe4/0x1f0 [ 64.669440] Write of size 8 at addr ffff0000c58b8971 by task kunit_try_catch/137 [ 64.669927] [ 64.670125] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.670835] Hardware name: linux,dummy-virt (DT) [ 64.671195] Call trace: [ 64.671471] dump_backtrace+0x110/0x120 [ 64.671938] show_stack+0x18/0x28 [ 64.672360] dump_stack_lvl+0x68/0x84 [ 64.672838] print_report+0x158/0x484 [ 64.673194] kasan_report+0x98/0xe0 [ 64.673639] kasan_check_range+0x160/0x1d8 [ 64.674034] memset+0x3c/0x80 [ 64.674416] kmalloc_oob_memset_8+0xe4/0x1f0 [ 64.674953] kunit_try_run_case+0x7c/0x120 [ 64.675370] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.675889] kthread+0x1a4/0x1b8 [ 64.676435] ret_from_fork+0x10/0x20 [ 64.676772] [ 64.676964] Allocated by task 137: [ 64.677297] kasan_save_stack+0x2c/0x58 [ 64.677713] kasan_set_track+0x2c/0x40 [ 64.678078] kasan_save_alloc_info+0x24/0x38 [ 64.678473] __kasan_kmalloc+0xa0/0xb8 [ 64.678839] kmalloc_trace+0x50/0x68 [ 64.679211] kmalloc_oob_memset_8+0xa8/0x1f0 [ 64.679682] kunit_try_run_case+0x7c/0x120 [ 64.680082] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.680563] kthread+0x1a4/0x1b8 [ 64.680894] ret_from_fork+0x10/0x20 [ 64.681264] [ 64.681507] The buggy address belongs to the object at ffff0000c58b8900 [ 64.681507] which belongs to the cache kmalloc-128 of size 128 [ 64.682322] The buggy address is located 113 bytes inside of [ 64.682322] 128-byte region [ffff0000c58b8900, ffff0000c58b8980) [ 64.683126] [ 64.683337] The buggy address belongs to the physical page: [ 64.683769] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8 [ 64.684446] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 64.685076] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 64.685736] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 64.686314] page dumped because: kasan: bad access detected [ 64.686708] [ 64.686893] Memory state around the buggy address: [ 64.687298] ffff0000c58b8800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.687826] ffff0000c58b8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.688369] >ffff0000c58b8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.688854] ^ [ 64.689384] ffff0000c58b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.689933] ffff0000c58b8a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.690511] ==================================================================
[ 30.966446] ================================================================== [ 30.967638] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd9/0x1d0 [ 30.968383] Write of size 8 at addr ffff8881030def71 by task kunit_try_catch/243 [ 30.968985] [ 30.969095] CPU: 1 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 30.969862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.970981] Call Trace: [ 30.971276] <TASK> [ 30.971620] dump_stack_lvl+0x49/0x62 [ 30.971845] print_report+0x189/0x492 [ 30.972032] ? kasan_complete_mode_report_info+0x3c/0x200 [ 30.972328] ? kmalloc_oob_memset_8+0xd9/0x1d0 [ 30.972870] kasan_report+0x10c/0x190 [ 30.973309] ? kmalloc_oob_memset_8+0xd9/0x1d0 [ 30.973839] kasan_check_range+0x10b/0x1c0 [ 30.974270] memset+0x23/0x50 [ 30.974650] kmalloc_oob_memset_8+0xd9/0x1d0 [ 30.975075] ? kmalloc_oob_memset_16+0x1d0/0x1d0 [ 30.975799] ? __kunit_add_resource+0xd1/0x100 [ 30.976029] kunit_try_run_case+0x8f/0xd0 [ 30.976238] ? kunit_catch_run_case+0x80/0x80 [ 30.976489] ? kunit_try_catch_throw+0x40/0x40 [ 30.976852] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.977174] kthread+0x17b/0x1b0 [ 30.977404] ? kthread_complete_and_exit+0x30/0x30 [ 30.977773] ret_from_fork+0x22/0x30 [ 30.978026] </TASK> [ 30.978179] [ 30.978266] Allocated by task 243: [ 30.978491] kasan_save_stack+0x41/0x70 [ 30.978775] kasan_set_track+0x25/0x40 [ 30.979005] kasan_save_alloc_info+0x1e/0x30 [ 30.979282] __kasan_kmalloc+0xb6/0xc0 [ 30.979515] kmalloc_trace+0x48/0xb0 [ 30.979838] kmalloc_oob_memset_8+0x9b/0x1d0 [ 30.980038] kunit_try_run_case+0x8f/0xd0 [ 30.980292] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.980849] kthread+0x17b/0x1b0 [ 30.981068] ret_from_fork+0x22/0x30 [ 30.981299] [ 30.981504] The buggy address belongs to the object at ffff8881030def00 [ 30.981504] which belongs to the cache kmalloc-128 of size 128 [ 30.982040] The buggy address is located 113 bytes inside of [ 30.982040] 128-byte region [ffff8881030def00, ffff8881030def80) [ 30.982501] [ 30.982620] The buggy address belongs to the physical page: [ 30.983099] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030de [ 30.983609] flags: 0x200000000000200(slab|node=0|zone=2) [ 30.983970] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0 [ 30.984371] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 30.984710] page dumped because: kasan: bad access detected [ 30.984992] [ 30.985094] Memory state around the buggy address: [ 30.985429] ffff8881030dee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.985742] ffff8881030dee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.986073] >ffff8881030def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.986381] ^ [ 30.986997] ffff8881030def80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.987336] ffff8881030df000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.987738] ==================================================================