Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 104.726053] ================================================================== [ 104.727309] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xec/0x350 [ 104.729174] Write of size 1 at addr ffff0000c67f6178 by task kunit_try_catch/204 [ 104.730104] [ 104.730318] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 104.730889] Hardware name: linux,dummy-virt (DT) [ 104.731223] Call trace: [ 104.731453] dump_backtrace+0xe0/0x134 [ 104.732886] show_stack+0x20/0x2c [ 104.733511] dump_stack_lvl+0x88/0xb4 [ 104.734522] print_report+0x158/0x44c [ 104.735410] kasan_report+0xc8/0x180 [ 104.736373] __asan_store1+0x68/0x7c [ 104.737383] kmalloc_oob_right+0xec/0x350 [ 104.738435] kunit_try_run_case+0x8c/0x124 [ 104.739465] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.741065] kthread+0x15c/0x170 [ 104.741772] ret_from_fork+0x10/0x20 [ 104.742739] [ 104.743609] Allocated by task 204: [ 104.744250] kasan_save_stack+0x3c/0x70 [ 104.745336] kasan_set_track+0x2c/0x40 [ 104.746321] kasan_save_alloc_info+0x24/0x34 [ 104.747380] __kasan_kmalloc+0xd4/0xe0 [ 104.748360] kmalloc_trace+0x8c/0x150 [ 104.749576] kmalloc_oob_right+0xa0/0x350 [ 104.750272] kunit_try_run_case+0x8c/0x124 [ 104.751279] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.752223] kthread+0x15c/0x170 [ 104.753227] ret_from_fork+0x10/0x20 [ 104.754182] [ 104.754808] The buggy address belongs to the object at ffff0000c67f6100 [ 104.754808] which belongs to the cache kmalloc-128 of size 128 [ 104.756714] The buggy address is located 120 bytes inside of [ 104.756714] 128-byte region [ffff0000c67f6100, ffff0000c67f6180) [ 104.757784] [ 104.757995] The buggy address belongs to the physical page: [ 104.758645] page:00000000e3cb17d3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067f6 [ 104.759354] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 104.759998] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 104.761067] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 104.762098] page dumped because: kasan: bad access detected [ 104.762866] [ 104.763156] Memory state around the buggy address: [ 104.763775] ffff0000c67f6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.764682] ffff0000c67f6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.765621] >ffff0000c67f6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 104.766356] ^ [ 104.767252] ffff0000c67f6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.768134] ffff0000c67f6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.768839] ================================================================== [ 104.769685] ================================================================== [ 104.770189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x110/0x350 [ 104.770989] Read of size 1 at addr ffff0000c67f6180 by task kunit_try_catch/204 [ 104.771509] [ 104.771704] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 104.773547] Hardware name: linux,dummy-virt (DT) [ 104.774163] Call trace: [ 104.774533] dump_backtrace+0xe0/0x134 [ 104.775114] show_stack+0x20/0x2c [ 104.775629] dump_stack_lvl+0x88/0xb4 [ 104.776251] print_report+0x158/0x44c [ 104.776829] kasan_report+0xc8/0x180 [ 104.777447] __asan_load1+0x68/0x74 [ 104.778122] kmalloc_oob_right+0x110/0x350 [ 104.778797] kunit_try_run_case+0x8c/0x124 [ 104.779428] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.780138] kthread+0x15c/0x170 [ 104.780535] ret_from_fork+0x10/0x20 [ 104.781168] [ 104.781446] Allocated by task 204: [ 104.781946] kasan_save_stack+0x3c/0x70 [ 104.782544] kasan_set_track+0x2c/0x40 [ 104.782964] kasan_save_alloc_info+0x24/0x34 [ 104.783380] __kasan_kmalloc+0xd4/0xe0 [ 104.783761] kmalloc_trace+0x8c/0x150 [ 104.784381] kmalloc_oob_right+0xa0/0x350 [ 104.785084] kunit_try_run_case+0x8c/0x124 [ 104.785900] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.786675] kthread+0x15c/0x170 [ 104.787216] ret_from_fork+0x10/0x20 [ 104.787786] [ 104.788058] The buggy address belongs to the object at ffff0000c67f6100 [ 104.788058] which belongs to the cache kmalloc-128 of size 128 [ 104.789727] The buggy address is located 0 bytes to the right of [ 104.789727] 128-byte region [ffff0000c67f6100, ffff0000c67f6180) [ 104.791454] [ 104.791709] The buggy address belongs to the physical page: [ 104.792092] page:00000000e3cb17d3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067f6 [ 104.793129] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 104.794284] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 104.795360] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 104.796357] page dumped because: kasan: bad access detected [ 104.797403] [ 104.797848] Memory state around the buggy address: [ 104.798572] ffff0000c67f6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.799701] ffff0000c67f6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 104.800677] >ffff0000c67f6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.801611] ^ [ 104.802192] ffff0000c67f6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.803290] ffff0000c67f6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.804161] ================================================================== [ 104.685407] ================================================================== [ 104.686238] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc8/0x350 [ 104.687616] Write of size 1 at addr ffff0000c67f6173 by task kunit_try_catch/204 [ 104.688167] [ 104.688871] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 104.690951] Hardware name: linux,dummy-virt (DT) [ 104.691959] Call trace: [ 104.692672] dump_backtrace+0xe0/0x134 [ 104.693595] show_stack+0x20/0x2c [ 104.694245] dump_stack_lvl+0x88/0xb4 [ 104.695048] print_report+0x158/0x44c [ 104.695800] kasan_report+0xc8/0x180 [ 104.696563] __asan_store1+0x68/0x7c [ 104.697369] kmalloc_oob_right+0xc8/0x350 [ 104.698234] kunit_try_run_case+0x8c/0x124 [ 104.699157] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.700080] kthread+0x15c/0x170 [ 104.700938] ret_from_fork+0x10/0x20 [ 104.701891] [ 104.702389] Allocated by task 204: [ 104.703094] kasan_save_stack+0x3c/0x70 [ 104.703597] kasan_set_track+0x2c/0x40 [ 104.704028] kasan_save_alloc_info+0x24/0x34 [ 104.704760] __kasan_kmalloc+0xd4/0xe0 [ 104.705202] kmalloc_trace+0x8c/0x150 [ 104.705871] kmalloc_oob_right+0xa0/0x350 [ 104.706513] kunit_try_run_case+0x8c/0x124 [ 104.706939] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.707424] kthread+0x15c/0x170 [ 104.707790] ret_from_fork+0x10/0x20 [ 104.708384] [ 104.708755] The buggy address belongs to the object at ffff0000c67f6100 [ 104.708755] which belongs to the cache kmalloc-128 of size 128 [ 104.710420] The buggy address is located 115 bytes inside of [ 104.710420] 128-byte region [ffff0000c67f6100, ffff0000c67f6180) [ 104.711813] [ 104.712185] The buggy address belongs to the physical page: [ 104.713191] page:00000000e3cb17d3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067f6 [ 104.714639] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 104.715974] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 104.717064] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 104.717732] page dumped because: kasan: bad access detected [ 104.718148] [ 104.718341] Memory state around the buggy address: [ 104.718877] ffff0000c67f6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.719559] ffff0000c67f6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.720067] >ffff0000c67f6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 104.720581] ^ [ 104.721250] ffff0000c67f6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.722225] ffff0000c67f6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.723113] ==================================================================
[ 74.520063] ================================================================== [ 74.520901] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264 [ 74.522261] Write of size 1 at addr ffff0000c598a973 by task kunit_try_catch/120 [ 74.523270] [ 74.524001] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 74.524860] Hardware name: linux,dummy-virt (DT) [ 74.525694] Call trace: [ 74.526030] dump_backtrace+0xf8/0x118 [ 74.526676] show_stack+0x18/0x24 [ 74.527244] __dump_stack+0x28/0x38 [ 74.527700] dump_stack_lvl+0x54/0x6c [ 74.528205] print_address_description+0x7c/0x1ec [ 74.528952] print_report+0x50/0x68 [ 74.529406] kasan_report+0xac/0x100 [ 74.529841] __asan_store1+0x6c/0x70 [ 74.530308] kmalloc_oob_right+0x9c/0x264 [ 74.530712] kunit_try_run_case+0x80/0x184 [ 74.531146] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.531637] kthread+0x16c/0x21c [ 74.532027] ret_from_fork+0x10/0x20 [ 74.532581] [ 74.532965] Allocated by task 120: [ 74.533450] kasan_set_track+0x4c/0x80 [ 74.533992] kasan_save_alloc_info+0x28/0x34 [ 74.534449] __kasan_kmalloc+0x88/0xa0 [ 74.534996] kmalloc_trace+0x54/0x68 [ 74.535577] kmalloc_oob_right+0x48/0x264 [ 74.536203] kunit_try_run_case+0x80/0x184 [ 74.536911] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.537840] kthread+0x16c/0x21c [ 74.538414] ret_from_fork+0x10/0x20 [ 74.538869] [ 74.539108] The buggy address belongs to the object at ffff0000c598a900 [ 74.539108] which belongs to the cache kmalloc-128 of size 128 [ 74.539886] The buggy address is located 115 bytes inside of [ 74.539886] 128-byte region [ffff0000c598a900, ffff0000c598a980) [ 74.541421] [ 74.541833] The buggy address belongs to the physical page: [ 74.542824] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 74.544199] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.545980] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.547001] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.547955] page dumped because: kasan: bad access detected [ 74.548696] [ 74.549153] Memory state around the buggy address: [ 74.549862] ffff0000c598a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.550398] ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.551035] >ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 74.551932] ^ [ 74.552904] ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.553876] ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.554770] ================================================================== [ 74.556988] ================================================================== [ 74.557978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264 [ 74.558898] Write of size 1 at addr ffff0000c598a978 by task kunit_try_catch/120 [ 74.559796] [ 74.560074] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.561374] Hardware name: linux,dummy-virt (DT) [ 74.561722] Call trace: [ 74.561967] dump_backtrace+0xf8/0x118 [ 74.562392] show_stack+0x18/0x24 [ 74.562801] __dump_stack+0x28/0x38 [ 74.563367] dump_stack_lvl+0x54/0x6c [ 74.563960] print_address_description+0x7c/0x1ec [ 74.564894] print_report+0x50/0x68 [ 74.565521] kasan_report+0xac/0x100 [ 74.566144] __asan_store1+0x6c/0x70 [ 74.566768] kmalloc_oob_right+0xe8/0x264 [ 74.567390] kunit_try_run_case+0x80/0x184 [ 74.568043] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.569029] kthread+0x16c/0x21c [ 74.569608] ret_from_fork+0x10/0x20 [ 74.570195] [ 74.570464] Allocated by task 120: [ 74.570942] kasan_set_track+0x4c/0x80 [ 74.571563] kasan_save_alloc_info+0x28/0x34 [ 74.572225] __kasan_kmalloc+0x88/0xa0 [ 74.573042] kmalloc_trace+0x54/0x68 [ 74.573638] kmalloc_oob_right+0x48/0x264 [ 74.574264] kunit_try_run_case+0x80/0x184 [ 74.574899] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.575402] kthread+0x16c/0x21c [ 74.575786] ret_from_fork+0x10/0x20 [ 74.576158] [ 74.576342] The buggy address belongs to the object at ffff0000c598a900 [ 74.576342] which belongs to the cache kmalloc-128 of size 128 [ 74.578133] The buggy address is located 120 bytes inside of [ 74.578133] 128-byte region [ffff0000c598a900, ffff0000c598a980) [ 74.579037] [ 74.579223] The buggy address belongs to the physical page: [ 74.579582] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 74.580311] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.580947] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.581748] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.582630] page dumped because: kasan: bad access detected [ 74.583137] [ 74.583316] Memory state around the buggy address: [ 74.583982] ffff0000c598a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.584934] ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.585862] >ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 74.586357] ^ [ 74.586829] ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.587310] ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.587784] ================================================================== [ 74.589225] ================================================================== [ 74.590090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264 [ 74.591017] Read of size 1 at addr ffff0000c598a980 by task kunit_try_catch/120 [ 74.591921] [ 74.592224] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.593377] Hardware name: linux,dummy-virt (DT) [ 74.594008] Call trace: [ 74.594376] dump_backtrace+0xf8/0x118 [ 74.595015] show_stack+0x18/0x24 [ 74.595590] __dump_stack+0x28/0x38 [ 74.596166] dump_stack_lvl+0x54/0x6c [ 74.596953] print_address_description+0x7c/0x1ec [ 74.597702] print_report+0x50/0x68 [ 74.598319] kasan_report+0xac/0x100 [ 74.598946] __asan_load1+0x6c/0x70 [ 74.599549] kmalloc_oob_right+0x134/0x264 [ 74.600192] kunit_try_run_case+0x80/0x184 [ 74.601020] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.601882] kthread+0x16c/0x21c [ 74.602450] ret_from_fork+0x10/0x20 [ 74.602877] [ 74.603061] Allocated by task 120: [ 74.603347] kasan_set_track+0x4c/0x80 [ 74.603773] kasan_save_alloc_info+0x28/0x34 [ 74.604196] __kasan_kmalloc+0x88/0xa0 [ 74.604714] kmalloc_trace+0x54/0x68 [ 74.605386] kmalloc_oob_right+0x48/0x264 [ 74.605872] kunit_try_run_case+0x80/0x184 [ 74.606349] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.606930] kthread+0x16c/0x21c [ 74.607342] ret_from_fork+0x10/0x20 [ 74.607774] [ 74.607970] The buggy address belongs to the object at ffff0000c598a900 [ 74.607970] which belongs to the cache kmalloc-128 of size 128 [ 74.609708] The buggy address is located 0 bytes to the right of [ 74.609708] 128-byte region [ffff0000c598a900, ffff0000c598a980) [ 74.610645] [ 74.610871] The buggy address belongs to the physical page: [ 74.611322] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 74.612149] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.612986] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.613664] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.614267] page dumped because: kasan: bad access detected [ 74.614726] [ 74.614983] Memory state around the buggy address: [ 74.615420] ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.616079] ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 74.616929] >ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.617537] ^ [ 74.617906] ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.618527] ffff0000c598aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.619145] ==================================================================
[ 73.526441] ================================================================== [ 73.527022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264 [ 73.528556] Write of size 1 at addr ffff0000c5926278 by task kunit_try_catch/120 [ 73.529124] [ 73.529347] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.530417] Hardware name: linux,dummy-virt (DT) [ 73.530780] Call trace: [ 73.531018] dump_backtrace+0xf4/0x114 [ 73.531565] show_stack+0x18/0x24 [ 73.532278] __dump_stack+0x28/0x38 [ 73.532821] dump_stack_lvl+0x50/0x68 [ 73.533280] print_address_description+0x7c/0x1ec [ 73.533829] print_report+0x50/0x68 [ 73.534298] kasan_report+0xac/0xfc [ 73.534755] __asan_store1+0x6c/0x70 [ 73.535196] kmalloc_oob_right+0xe8/0x264 [ 73.535634] kunit_try_run_case+0x80/0x184 [ 73.536129] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.536752] kthread+0x16c/0x21c [ 73.537157] ret_from_fork+0x10/0x20 [ 73.537595] [ 73.537791] Allocated by task 120: [ 73.538143] kasan_set_track+0x4c/0x80 [ 73.538607] kasan_save_alloc_info+0x28/0x34 [ 73.539107] __kasan_kmalloc+0x88/0xa0 [ 73.539548] kmalloc_trace+0x54/0x68 [ 73.539971] kmalloc_oob_right+0x48/0x264 [ 73.540485] kunit_try_run_case+0x80/0x184 [ 73.540993] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.541580] kthread+0x16c/0x21c [ 73.542023] ret_from_fork+0x10/0x20 [ 73.542416] [ 73.542629] The buggy address belongs to the object at ffff0000c5926200 [ 73.542629] which belongs to the cache kmalloc-128 of size 128 [ 73.543495] The buggy address is located 120 bytes inside of [ 73.543495] 128-byte region [ffff0000c5926200, ffff0000c5926280) [ 73.544629] [ 73.544919] The buggy address belongs to the physical page: [ 73.545400] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 73.546088] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.546829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.547481] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.548229] page dumped because: kasan: bad access detected [ 73.548723] [ 73.548978] Memory state around the buggy address: [ 73.549384] ffff0000c5926100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.550088] ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.550683] >ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 73.551306] ^ [ 73.551966] ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.552644] ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.553403] ================================================================== [ 73.487546] ================================================================== [ 73.488859] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264 [ 73.490373] Write of size 1 at addr ffff0000c5926273 by task kunit_try_catch/120 [ 73.491229] [ 73.491652] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 73.493002] Hardware name: linux,dummy-virt (DT) [ 73.493833] Call trace: [ 73.494268] dump_backtrace+0xf4/0x114 [ 73.494978] show_stack+0x18/0x24 [ 73.495564] __dump_stack+0x28/0x38 [ 73.496206] dump_stack_lvl+0x50/0x68 [ 73.496816] print_address_description+0x7c/0x1ec [ 73.497563] print_report+0x50/0x68 [ 73.498178] kasan_report+0xac/0xfc [ 73.498681] __asan_store1+0x6c/0x70 [ 73.499362] kmalloc_oob_right+0x9c/0x264 [ 73.500123] kunit_try_run_case+0x80/0x184 [ 73.500714] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.501236] kthread+0x16c/0x21c [ 73.501632] ret_from_fork+0x10/0x20 [ 73.502324] [ 73.502650] Allocated by task 120: [ 73.503224] kasan_set_track+0x4c/0x80 [ 73.504082] kasan_save_alloc_info+0x28/0x34 [ 73.504772] __kasan_kmalloc+0x88/0xa0 [ 73.505408] kmalloc_trace+0x54/0x68 [ 73.506003] kmalloc_oob_right+0x48/0x264 [ 73.506627] kunit_try_run_case+0x80/0x184 [ 73.507284] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.508193] kthread+0x16c/0x21c [ 73.508829] ret_from_fork+0x10/0x20 [ 73.509455] [ 73.509798] The buggy address belongs to the object at ffff0000c5926200 [ 73.509798] which belongs to the cache kmalloc-128 of size 128 [ 73.511256] The buggy address is located 115 bytes inside of [ 73.511256] 128-byte region [ffff0000c5926200, ffff0000c5926280) [ 73.512698] [ 73.513158] The buggy address belongs to the physical page: [ 73.514036] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 73.515033] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.516223] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.517252] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.518225] page dumped because: kasan: bad access detected [ 73.518949] [ 73.519260] Memory state around the buggy address: [ 73.520112] ffff0000c5926100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.521060] ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.521995] >ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 73.522885] ^ [ 73.523848] ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.524693] ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.525216] ================================================================== [ 73.554437] ================================================================== [ 73.554988] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264 [ 73.555647] Read of size 1 at addr ffff0000c5926280 by task kunit_try_catch/120 [ 73.556425] [ 73.556647] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.557399] Hardware name: linux,dummy-virt (DT) [ 73.557956] Call trace: [ 73.558237] dump_backtrace+0xf4/0x114 [ 73.558749] show_stack+0x18/0x24 [ 73.559170] __dump_stack+0x28/0x38 [ 73.559603] dump_stack_lvl+0x50/0x68 [ 73.560191] print_address_description+0x7c/0x1ec [ 73.560723] print_report+0x50/0x68 [ 73.561173] kasan_report+0xac/0xfc [ 73.561662] __asan_load1+0x6c/0x70 [ 73.562123] kmalloc_oob_right+0x134/0x264 [ 73.562567] kunit_try_run_case+0x80/0x184 [ 73.563031] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.563595] kthread+0x16c/0x21c [ 73.564191] ret_from_fork+0x10/0x20 [ 73.564598] [ 73.564813] Allocated by task 120: [ 73.565179] kasan_set_track+0x4c/0x80 [ 73.565682] kasan_save_alloc_info+0x28/0x34 [ 73.566180] __kasan_kmalloc+0x88/0xa0 [ 73.566681] kmalloc_trace+0x54/0x68 [ 73.567106] kmalloc_oob_right+0x48/0x264 [ 73.567544] kunit_try_run_case+0x80/0x184 [ 73.568176] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.568751] kthread+0x16c/0x21c [ 73.569243] ret_from_fork+0x10/0x20 [ 73.569658] [ 73.569887] The buggy address belongs to the object at ffff0000c5926200 [ 73.569887] which belongs to the cache kmalloc-128 of size 128 [ 73.570793] The buggy address is located 0 bytes to the right of [ 73.570793] 128-byte region [ffff0000c5926200, ffff0000c5926280) [ 73.571902] [ 73.572134] The buggy address belongs to the physical page: [ 73.572599] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 73.573382] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.574072] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.574750] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.575338] page dumped because: kasan: bad access detected [ 73.576342] [ 73.576568] Memory state around the buggy address: [ 73.577020] ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.577688] ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 73.578334] >ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.578934] ^ [ 73.579283] ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.580083] ffff0000c5926380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.580703] ==================================================================
[ 72.148829] ================================================================== [ 72.150409] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc0/0x340 [ 72.151968] Write of size 1 at addr ffff0000c5966d73 by task kunit_try_catch/120 [ 72.152886] [ 72.153376] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 72.154702] Hardware name: linux,dummy-virt (DT) [ 72.155509] Call trace: [ 72.155911] dump_backtrace.part.0+0xdc/0xf0 [ 72.156425] show_stack+0x18/0x30 [ 72.156790] dump_stack_lvl+0x64/0x80 [ 72.157133] print_report+0x158/0x438 [ 72.157505] kasan_report+0xb4/0xf4 [ 72.158048] __asan_store1+0x68/0x7c [ 72.158642] kmalloc_oob_right+0xc0/0x340 [ 72.159252] kunit_try_run_case+0x84/0x120 [ 72.159877] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.160635] kthread+0x180/0x190 [ 72.161135] ret_from_fork+0x10/0x20 [ 72.161802] [ 72.162274] Allocated by task 120: [ 72.162825] kasan_save_stack+0x3c/0x70 [ 72.163507] kasan_set_track+0x2c/0x40 [ 72.164079] kasan_save_alloc_info+0x24/0x34 [ 72.164704] __kasan_kmalloc+0xb8/0xc0 [ 72.165240] kmalloc_trace+0x58/0x6c [ 72.165797] kmalloc_oob_right+0x98/0x340 [ 72.167165] kunit_try_run_case+0x84/0x120 [ 72.167818] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.168403] kthread+0x180/0x190 [ 72.168725] ret_from_fork+0x10/0x20 [ 72.169100] [ 72.169315] The buggy address belongs to the object at ffff0000c5966d00 [ 72.169315] which belongs to the cache kmalloc-128 of size 128 [ 72.170551] The buggy address is located 115 bytes inside of [ 72.170551] 128-byte region [ffff0000c5966d00, ffff0000c5966d80) [ 72.171890] [ 72.172257] The buggy address belongs to the physical page: [ 72.173081] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966 [ 72.174736] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.176028] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.177012] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.178127] page dumped because: kasan: bad access detected [ 72.178833] [ 72.179064] Memory state around the buggy address: [ 72.179599] ffff0000c5966c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.180096] ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.180736] >ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 72.181578] ^ [ 72.182693] ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.183587] ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.184450] ================================================================== [ 72.219228] ================================================================== [ 72.219836] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x340 [ 72.220532] Read of size 1 at addr ffff0000c5966d80 by task kunit_try_catch/120 [ 72.221096] [ 72.221327] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.222664] Hardware name: linux,dummy-virt (DT) [ 72.223067] Call trace: [ 72.223370] dump_backtrace.part.0+0xdc/0xf0 [ 72.223937] show_stack+0x18/0x30 [ 72.224349] dump_stack_lvl+0x64/0x80 [ 72.224793] print_report+0x158/0x438 [ 72.225242] kasan_report+0xb4/0xf4 [ 72.225647] __asan_load1+0x68/0x74 [ 72.226194] kmalloc_oob_right+0x108/0x340 [ 72.226686] kunit_try_run_case+0x84/0x120 [ 72.227123] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.227703] kthread+0x180/0x190 [ 72.228076] ret_from_fork+0x10/0x20 [ 72.228485] [ 72.228657] Allocated by task 120: [ 72.228992] kasan_save_stack+0x3c/0x70 [ 72.229440] kasan_set_track+0x2c/0x40 [ 72.229828] kasan_save_alloc_info+0x24/0x34 [ 72.230288] __kasan_kmalloc+0xb8/0xc0 [ 72.230849] kmalloc_trace+0x58/0x6c [ 72.231271] kmalloc_oob_right+0x98/0x340 [ 72.231700] kunit_try_run_case+0x84/0x120 [ 72.232154] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.232691] kthread+0x180/0x190 [ 72.233079] ret_from_fork+0x10/0x20 [ 72.233485] [ 72.233698] The buggy address belongs to the object at ffff0000c5966d00 [ 72.233698] which belongs to the cache kmalloc-128 of size 128 [ 72.234773] The buggy address is located 0 bytes to the right of [ 72.234773] 128-byte region [ffff0000c5966d00, ffff0000c5966d80) [ 72.235714] [ 72.235930] The buggy address belongs to the physical page: [ 72.236375] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966 [ 72.237144] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.237775] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.238540] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.239114] page dumped because: kasan: bad access detected [ 72.239583] [ 72.239786] Memory state around the buggy address: [ 72.240212] ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.240786] ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 72.241408] >ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.242644] ^ [ 72.242943] ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.243419] ffff0000c5966e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.244021] ================================================================== [ 72.187391] ================================================================== [ 72.188233] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe4/0x340 [ 72.189146] Write of size 1 at addr ffff0000c5966d78 by task kunit_try_catch/120 [ 72.189745] [ 72.190295] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.191294] Hardware name: linux,dummy-virt (DT) [ 72.191645] Call trace: [ 72.191861] dump_backtrace.part.0+0xdc/0xf0 [ 72.192282] show_stack+0x18/0x30 [ 72.192836] dump_stack_lvl+0x64/0x80 [ 72.193392] print_report+0x158/0x438 [ 72.194125] kasan_report+0xb4/0xf4 [ 72.194665] __asan_store1+0x68/0x7c [ 72.195192] kmalloc_oob_right+0xe4/0x340 [ 72.195813] kunit_try_run_case+0x84/0x120 [ 72.196431] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.197173] kthread+0x180/0x190 [ 72.197672] ret_from_fork+0x10/0x20 [ 72.198359] [ 72.198638] Allocated by task 120: [ 72.198999] kasan_save_stack+0x3c/0x70 [ 72.199345] kasan_set_track+0x2c/0x40 [ 72.199756] kasan_save_alloc_info+0x24/0x34 [ 72.200183] __kasan_kmalloc+0xb8/0xc0 [ 72.200616] kmalloc_trace+0x58/0x6c [ 72.201059] kmalloc_oob_right+0x98/0x340 [ 72.201537] kunit_try_run_case+0x84/0x120 [ 72.202255] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.202802] kthread+0x180/0x190 [ 72.203174] ret_from_fork+0x10/0x20 [ 72.203595] [ 72.203812] The buggy address belongs to the object at ffff0000c5966d00 [ 72.203812] which belongs to the cache kmalloc-128 of size 128 [ 72.204723] The buggy address is located 120 bytes inside of [ 72.204723] 128-byte region [ffff0000c5966d00, ffff0000c5966d80) [ 72.205582] [ 72.205777] The buggy address belongs to the physical page: [ 72.206881] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966 [ 72.207638] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.208289] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.208945] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.209496] page dumped because: kasan: bad access detected [ 72.210370] [ 72.211638] Memory state around the buggy address: [ 72.211983] ffff0000c5966c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.212459] ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.212913] >ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 72.213338] ^ [ 72.215198] ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.216546] ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.217961] ==================================================================
[ 63.902585] ================================================================== [ 63.903441] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x12c/0x328 [ 63.904418] Read of size 1 at addr ffff0000c586de80 by task kunit_try_catch/118 [ 63.905249] [ 63.905664] CPU: 1 PID: 118 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 63.906753] Hardware name: linux,dummy-virt (DT) [ 63.907322] Call trace: [ 63.907667] dump_backtrace+0x110/0x120 [ 63.908254] show_stack+0x18/0x28 [ 63.908736] dump_stack_lvl+0x68/0x84 [ 63.909079] print_report+0x158/0x484 [ 63.909401] kasan_report+0x98/0xe0 [ 63.909746] __asan_load1+0x68/0x78 [ 63.910052] kmalloc_oob_right+0x12c/0x328 [ 63.910782] kunit_try_run_case+0x7c/0x120 [ 63.911251] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 63.911772] kthread+0x1a4/0x1b8 [ 63.912095] ret_from_fork+0x10/0x20 [ 63.912496] [ 63.912665] Allocated by task 118: [ 63.913001] kasan_save_stack+0x2c/0x58 [ 63.913389] kasan_set_track+0x2c/0x40 [ 63.914070] kasan_save_alloc_info+0x24/0x38 [ 63.914518] __kasan_kmalloc+0xa0/0xb8 [ 63.914889] kmalloc_trace+0x50/0x68 [ 63.915265] kmalloc_oob_right+0xa8/0x328 [ 63.915702] kunit_try_run_case+0x7c/0x120 [ 63.916123] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 63.916630] kthread+0x1a4/0x1b8 [ 63.916956] ret_from_fork+0x10/0x20 [ 63.917351] [ 63.917689] The buggy address belongs to the object at ffff0000c586de00 [ 63.917689] which belongs to the cache kmalloc-128 of size 128 [ 63.918560] The buggy address is located 0 bytes to the right of [ 63.918560] 128-byte region [ffff0000c586de00, ffff0000c586de80) [ 63.919428] [ 63.919595] The buggy address belongs to the physical page: [ 63.920005] page:00000000f16aa132 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 63.920693] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 63.921307] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 63.922241] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 63.922773] page dumped because: kasan: bad access detected [ 63.923193] [ 63.923370] Memory state around the buggy address: [ 63.923784] ffff0000c586dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.924333] ffff0000c586de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 63.924902] >ffff0000c586de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.926244] ^ [ 63.926557] ffff0000c586df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.927108] ffff0000c586df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.927637] ================================================================== [ 63.876042] ================================================================== [ 63.876847] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x328 [ 63.877785] Write of size 1 at addr ffff0000c586de78 by task kunit_try_catch/118 [ 63.878805] [ 63.879081] CPU: 1 PID: 118 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 63.879879] Hardware name: linux,dummy-virt (DT) [ 63.880181] Call trace: [ 63.880412] dump_backtrace+0x110/0x120 [ 63.880844] show_stack+0x18/0x28 [ 63.881175] dump_stack_lvl+0x68/0x84 [ 63.881752] print_report+0x158/0x484 [ 63.882349] kasan_report+0x98/0xe0 [ 63.882851] __asan_store1+0x68/0x78 [ 63.883363] kmalloc_oob_right+0x100/0x328 [ 63.883951] kunit_try_run_case+0x7c/0x120 [ 63.884547] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 63.885269] kthread+0x1a4/0x1b8 [ 63.885746] ret_from_fork+0x10/0x20 [ 63.886222] [ 63.886394] Allocated by task 118: [ 63.886642] kasan_save_stack+0x2c/0x58 [ 63.886958] kasan_set_track+0x2c/0x40 [ 63.887276] kasan_save_alloc_info+0x24/0x38 [ 63.887750] __kasan_kmalloc+0xa0/0xb8 [ 63.888128] kmalloc_trace+0x50/0x68 [ 63.888517] kmalloc_oob_right+0xa8/0x328 [ 63.888902] kunit_try_run_case+0x7c/0x120 [ 63.889368] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 63.889975] kthread+0x1a4/0x1b8 [ 63.890279] ret_from_fork+0x10/0x20 [ 63.890585] [ 63.890745] The buggy address belongs to the object at ffff0000c586de00 [ 63.890745] which belongs to the cache kmalloc-128 of size 128 [ 63.891387] The buggy address is located 120 bytes inside of [ 63.891387] 128-byte region [ffff0000c586de00, ffff0000c586de80) [ 63.892006] [ 63.892162] The buggy address belongs to the physical page: [ 63.892579] page:00000000f16aa132 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 63.893126] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 63.893629] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 63.894626] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 63.895628] page dumped because: kasan: bad access detected [ 63.896271] [ 63.896514] Memory state around the buggy address: [ 63.897097] ffff0000c586dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.897925] ffff0000c586dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.898874] >ffff0000c586de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 63.899729] ^ [ 63.900431] ffff0000c586de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.900864] ffff0000c586df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.901307] ================================================================== [ 63.843339] ================================================================== [ 63.844264] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xd4/0x328 [ 63.845371] Write of size 1 at addr ffff0000c586de73 by task kunit_try_catch/118 [ 63.846125] [ 63.846684] CPU: 1 PID: 118 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 63.847766] Hardware name: linux,dummy-virt (DT) [ 63.848278] Call trace: [ 63.848512] dump_backtrace+0x110/0x120 [ 63.848908] show_stack+0x18/0x28 [ 63.849256] dump_stack_lvl+0x68/0x84 [ 63.849627] print_report+0x158/0x484 [ 63.850305] kasan_report+0x98/0xe0 [ 63.850767] __asan_store1+0x68/0x78 [ 63.851154] kmalloc_oob_right+0xd4/0x328 [ 63.851685] kunit_try_run_case+0x7c/0x120 [ 63.852043] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 63.852669] kthread+0x1a4/0x1b8 [ 63.852971] ret_from_fork+0x10/0x20 [ 63.853403] [ 63.853609] Allocated by task 118: [ 63.854073] kasan_save_stack+0x2c/0x58 [ 63.854733] kasan_set_track+0x2c/0x40 [ 63.855264] kasan_save_alloc_info+0x24/0x38 [ 63.855844] __kasan_kmalloc+0xa0/0xb8 [ 63.856362] kmalloc_trace+0x50/0x68 [ 63.856868] kmalloc_oob_right+0xa8/0x328 [ 63.857481] kunit_try_run_case+0x7c/0x120 [ 63.858077] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 63.858812] kthread+0x1a4/0x1b8 [ 63.859292] ret_from_fork+0x10/0x20 [ 63.859849] [ 63.860150] The buggy address belongs to the object at ffff0000c586de00 [ 63.860150] which belongs to the cache kmalloc-128 of size 128 [ 63.860834] The buggy address is located 115 bytes inside of [ 63.860834] 128-byte region [ffff0000c586de00, ffff0000c586de80) [ 63.861651] [ 63.862251] The buggy address belongs to the physical page: [ 63.862756] page:00000000f16aa132 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 63.863732] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 63.864978] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 63.866029] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 63.866958] page dumped because: kasan: bad access detected [ 63.867642] [ 63.867898] Memory state around the buggy address: [ 63.868655] ffff0000c586dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.869545] ffff0000c586dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.870524] >ffff0000c586de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 63.871340] ^ [ 63.872179] ffff0000c586de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.872894] ffff0000c586df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.873359] ==================================================================
[ 30.228966] ================================================================== [ 30.229459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xfd/0x310 [ 30.229823] Write of size 1 at addr ffff8881030daf78 by task kunit_try_catch/224 [ 30.230136] [ 30.230297] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 30.230772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.231354] Call Trace: [ 30.231520] <TASK> [ 30.231661] dump_stack_lvl+0x49/0x62 [ 30.231858] print_report+0x189/0x492 [ 30.232065] ? kasan_complete_mode_report_info+0x3c/0x200 [ 30.232489] ? kmalloc_oob_right+0xfd/0x310 [ 30.232750] kasan_report+0x10c/0x190 [ 30.232980] ? kmalloc_oob_right+0xfd/0x310 [ 30.233239] __asan_store1+0x65/0x70 [ 30.233565] kmalloc_oob_right+0xfd/0x310 [ 30.233817] ? kmalloc_oob_left+0x1e0/0x1e0 [ 30.234038] ? __kunit_add_resource+0xd1/0x100 [ 30.234365] kunit_try_run_case+0x8f/0xd0 [ 30.234648] ? kunit_catch_run_case+0x80/0x80 [ 30.234849] ? kunit_try_catch_throw+0x40/0x40 [ 30.235085] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.235494] kthread+0x17b/0x1b0 [ 30.235662] ? kthread_complete_and_exit+0x30/0x30 [ 30.236174] ret_from_fork+0x22/0x30 [ 30.236459] </TASK> [ 30.236593] [ 30.236693] Allocated by task 224: [ 30.236840] kasan_save_stack+0x41/0x70 [ 30.237073] kasan_set_track+0x25/0x40 [ 30.237362] kasan_save_alloc_info+0x1e/0x30 [ 30.237621] __kasan_kmalloc+0xb6/0xc0 [ 30.237844] kmalloc_trace+0x48/0xb0 [ 30.238027] kmalloc_oob_right+0x9b/0x310 [ 30.238339] kunit_try_run_case+0x8f/0xd0 [ 30.238595] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.238860] kthread+0x17b/0x1b0 [ 30.239041] ret_from_fork+0x22/0x30 [ 30.239233] [ 30.239320] The buggy address belongs to the object at ffff8881030daf00 [ 30.239320] which belongs to the cache kmalloc-128 of size 128 [ 30.239933] The buggy address is located 120 bytes inside of [ 30.239933] 128-byte region [ffff8881030daf00, ffff8881030daf80) [ 30.240588] [ 30.240751] The buggy address belongs to the physical page: [ 30.241013] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030da [ 30.241452] flags: 0x200000000000200(slab|node=0|zone=2) [ 30.241754] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0 [ 30.242169] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 30.242576] page dumped because: kasan: bad access detected [ 30.242785] [ 30.242871] Memory state around the buggy address: [ 30.243124] ffff8881030dae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.243764] ffff8881030dae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244019] >ffff8881030daf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.244822] ^ [ 30.245745] ffff8881030daf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.246524] ffff8881030db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 30.246942] ================================================================== [ 30.200455] ================================================================== [ 30.201366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcb/0x310 [ 30.202474] Write of size 1 at addr ffff8881030daf73 by task kunit_try_catch/224 [ 30.203234] [ 30.203814] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 30.204291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.205534] Call Trace: [ 30.205878] <TASK> [ 30.206126] dump_stack_lvl+0x49/0x62 [ 30.206796] print_report+0x189/0x492 [ 30.207290] ? kasan_complete_mode_report_info+0x3c/0x200 [ 30.207933] ? kmalloc_oob_right+0xcb/0x310 [ 30.208141] kasan_report+0x10c/0x190 [ 30.208575] ? kmalloc_oob_right+0xcb/0x310 [ 30.209100] __asan_store1+0x65/0x70 [ 30.209563] kmalloc_oob_right+0xcb/0x310 [ 30.209828] ? kmalloc_oob_left+0x1e0/0x1e0 [ 30.210303] ? __kunit_add_resource+0xd1/0x100 [ 30.210857] kunit_try_run_case+0x8f/0xd0 [ 30.211146] ? kunit_catch_run_case+0x80/0x80 [ 30.211668] ? kunit_try_catch_throw+0x40/0x40 [ 30.211885] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.212117] kthread+0x17b/0x1b0 [ 30.212438] ? kthread_complete_and_exit+0x30/0x30 [ 30.213002] ret_from_fork+0x22/0x30 [ 30.213508] </TASK> [ 30.213813] [ 30.214020] Allocated by task 224: [ 30.214509] kasan_save_stack+0x41/0x70 [ 30.214945] kasan_set_track+0x25/0x40 [ 30.215401] kasan_save_alloc_info+0x1e/0x30 [ 30.215668] __kasan_kmalloc+0xb6/0xc0 [ 30.215857] kmalloc_trace+0x48/0xb0 [ 30.216025] kmalloc_oob_right+0x9b/0x310 [ 30.216250] kunit_try_run_case+0x8f/0xd0 [ 30.216723] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.217289] kthread+0x17b/0x1b0 [ 30.217638] ret_from_fork+0x22/0x30 [ 30.217844] [ 30.217985] The buggy address belongs to the object at ffff8881030daf00 [ 30.217985] which belongs to the cache kmalloc-128 of size 128 [ 30.218996] The buggy address is located 115 bytes inside of [ 30.218996] 128-byte region [ffff8881030daf00, ffff8881030daf80) [ 30.220261] [ 30.220587] The buggy address belongs to the physical page: [ 30.221400] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030da [ 30.222722] flags: 0x200000000000200(slab|node=0|zone=2) [ 30.223885] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0 [ 30.224225] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 30.224575] page dumped because: kasan: bad access detected [ 30.224844] [ 30.224965] Memory state around the buggy address: [ 30.225453] ffff8881030dae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.225805] ffff8881030dae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.226173] >ffff8881030daf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.226529] ^ [ 30.226928] ffff8881030daf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227309] ffff8881030db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 30.227736] ================================================================== [ 30.247945] ================================================================== [ 30.248364] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x132/0x310 [ 30.248753] Read of size 1 at addr ffff8881030daf80 by task kunit_try_catch/224 [ 30.249016] [ 30.249134] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 30.249909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.250356] Call Trace: [ 30.250482] <TASK> [ 30.250663] dump_stack_lvl+0x49/0x62 [ 30.251067] print_report+0x189/0x492 [ 30.251493] ? kasan_complete_mode_report_info+0x3c/0x200 [ 30.251803] ? kmalloc_oob_right+0x132/0x310 [ 30.252047] kasan_report+0x10c/0x190 [ 30.252431] ? kmalloc_oob_right+0x132/0x310 [ 30.252737] __asan_load1+0x62/0x70 [ 30.252968] kmalloc_oob_right+0x132/0x310 [ 30.253249] ? kmalloc_oob_left+0x1e0/0x1e0 [ 30.253681] ? __kunit_add_resource+0xd1/0x100 [ 30.253929] kunit_try_run_case+0x8f/0xd0 [ 30.254233] ? kunit_catch_run_case+0x80/0x80 [ 30.254458] ? kunit_try_catch_throw+0x40/0x40 [ 30.254756] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.255123] kthread+0x17b/0x1b0 [ 30.255406] ? kthread_complete_and_exit+0x30/0x30 [ 30.255678] ret_from_fork+0x22/0x30 [ 30.255908] </TASK> [ 30.256055] [ 30.256224] Allocated by task 224: [ 30.256391] kasan_save_stack+0x41/0x70 [ 30.256639] kasan_set_track+0x25/0x40 [ 30.256850] kasan_save_alloc_info+0x1e/0x30 [ 30.257077] __kasan_kmalloc+0xb6/0xc0 [ 30.257419] kmalloc_trace+0x48/0xb0 [ 30.257600] kmalloc_oob_right+0x9b/0x310 [ 30.257782] kunit_try_run_case+0x8f/0xd0 [ 30.257964] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.258474] kthread+0x17b/0x1b0 [ 30.258681] ret_from_fork+0x22/0x30 [ 30.259069] [ 30.259204] The buggy address belongs to the object at ffff8881030daf00 [ 30.259204] which belongs to the cache kmalloc-128 of size 128 [ 30.260347] The buggy address is located 0 bytes to the right of [ 30.260347] 128-byte region [ffff8881030daf00, ffff8881030daf80) [ 30.261065] [ 30.261526] The buggy address belongs to the physical page: [ 30.261808] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030da [ 30.262449] flags: 0x200000000000200(slab|node=0|zone=2) [ 30.262908] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0 [ 30.263459] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 30.263843] page dumped because: kasan: bad access detected [ 30.264629] [ 30.264815] Memory state around the buggy address: [ 30.265570] ffff8881030dae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.266594] ffff8881030daf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.267422] >ffff8881030daf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.268078] ^ [ 30.268391] ffff8881030db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 30.269021] ffff8881030db080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 30.269447] ==================================================================