Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 106.035687] ================================================================== [ 106.038030] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xdc/0x260 [ 106.038681] Read of size 1 at addr ffff0000c65e00c8 by task kunit_try_catch/233 [ 106.039510] [ 106.039872] CPU: 1 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 106.040764] Hardware name: linux,dummy-virt (DT) [ 106.041384] Call trace: [ 106.041785] dump_backtrace+0xe0/0x134 [ 106.042364] show_stack+0x20/0x2c [ 106.042892] dump_stack_lvl+0x88/0xb4 [ 106.043343] print_report+0x158/0x44c [ 106.043769] kasan_report+0xc8/0x180 [ 106.044168] __asan_load1+0x68/0x74 [ 106.044973] kmem_cache_oob+0xdc/0x260 [ 106.045474] kunit_try_run_case+0x8c/0x124 [ 106.045939] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 106.046486] kthread+0x15c/0x170 [ 106.046892] ret_from_fork+0x10/0x20 [ 106.047373] [ 106.047599] Allocated by task 233: [ 106.047943] kasan_save_stack+0x3c/0x70 [ 106.048412] kasan_set_track+0x2c/0x40 [ 106.048853] kasan_save_alloc_info+0x24/0x34 [ 106.049328] __kasan_slab_alloc+0xa8/0xac [ 106.049783] kmem_cache_alloc+0x194/0x3b0 [ 106.050250] kmem_cache_oob+0xbc/0x260 [ 106.050680] kunit_try_run_case+0x8c/0x124 [ 106.051966] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 106.052882] kthread+0x15c/0x170 [ 106.053288] ret_from_fork+0x10/0x20 [ 106.053712] [ 106.053920] The buggy address belongs to the object at ffff0000c65e0000 [ 106.053920] which belongs to the cache test_cache of size 200 [ 106.054893] The buggy address is located 0 bytes to the right of [ 106.054893] 200-byte region [ffff0000c65e0000, ffff0000c65e00c8) [ 106.056033] [ 106.056315] The buggy address belongs to the physical page: [ 106.058253] page:000000006f441834 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e0 [ 106.058878] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 106.059714] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c6446300 [ 106.060412] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 106.061209] page dumped because: kasan: bad access detected [ 106.061959] [ 106.062157] Memory state around the buggy address: [ 106.062519] ffff0000c65dff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.063424] ffff0000c65e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.064352] >ffff0000c65e0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 106.066125] ^ [ 106.066861] ffff0000c65e0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 106.067761] ffff0000c65e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 106.068530] ==================================================================
[ 75.775864] ================================================================== [ 75.776789] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc [ 75.777554] Read of size 1 at addr ffff0000c59b50c8 by task kunit_try_catch/149 [ 75.778144] [ 75.778392] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.779145] Hardware name: linux,dummy-virt (DT) [ 75.779554] Call trace: [ 75.779847] dump_backtrace+0xf8/0x118 [ 75.780352] show_stack+0x18/0x24 [ 75.781465] __dump_stack+0x28/0x38 [ 75.781945] dump_stack_lvl+0x54/0x6c [ 75.782386] print_address_description+0x7c/0x1ec [ 75.782921] print_report+0x50/0x68 [ 75.783354] kasan_report+0xac/0x100 [ 75.783837] __asan_load1+0x6c/0x70 [ 75.784291] kmem_cache_oob+0xb0/0x1cc [ 75.784750] kunit_try_run_case+0x80/0x184 [ 75.785222] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.785842] kthread+0x16c/0x21c [ 75.786284] ret_from_fork+0x10/0x20 [ 75.786696] [ 75.786911] Allocated by task 149: [ 75.787220] kasan_set_track+0x4c/0x80 [ 75.787767] kasan_save_alloc_info+0x28/0x34 [ 75.788227] __kasan_slab_alloc+0x58/0x70 [ 75.789338] slab_post_alloc_hook+0x70/0x2f4 [ 75.789842] kmem_cache_alloc+0x168/0x260 [ 75.790302] kmem_cache_oob+0x94/0x1cc [ 75.790728] kunit_try_run_case+0x80/0x184 [ 75.791236] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.791813] kthread+0x16c/0x21c [ 75.792225] ret_from_fork+0x10/0x20 [ 75.792655] [ 75.792856] The buggy address belongs to the object at ffff0000c59b5000 [ 75.792856] which belongs to the cache test_cache of size 200 [ 75.793774] The buggy address is located 0 bytes to the right of [ 75.793774] 200-byte region [ffff0000c59b5000, ffff0000c59b50c8) [ 75.794704] [ 75.794951] The buggy address belongs to the physical page: [ 75.795615] page:000000006008d4ec refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b5 [ 75.796413] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.797829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0f61c80 [ 75.798508] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 75.799126] page dumped because: kasan: bad access detected [ 75.799595] [ 75.799811] Memory state around the buggy address: [ 75.800249] ffff0000c59b4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.800935] ffff0000c59b5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.801519] >ffff0000c59b5080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 75.802124] ^ [ 75.802625] ffff0000c59b5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.803268] ffff0000c59b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.803863] ==================================================================
[ 74.821072] ================================================================== [ 74.821972] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc [ 74.823215] Read of size 1 at addr ffff0000c3c320c8 by task kunit_try_catch/149 [ 74.824376] [ 74.824592] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.825204] Hardware name: linux,dummy-virt (DT) [ 74.825554] Call trace: [ 74.826122] dump_backtrace+0xf4/0x114 [ 74.827007] show_stack+0x18/0x24 [ 74.827894] __dump_stack+0x28/0x38 [ 74.828902] dump_stack_lvl+0x50/0x68 [ 74.829622] print_address_description+0x7c/0x1ec [ 74.830609] print_report+0x50/0x68 [ 74.831417] kasan_report+0xac/0xfc [ 74.832320] __asan_load1+0x6c/0x70 [ 74.833193] kmem_cache_oob+0xb0/0x1cc [ 74.834054] kunit_try_run_case+0x80/0x184 [ 74.834965] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.836245] kthread+0x16c/0x21c [ 74.836985] ret_from_fork+0x10/0x20 [ 74.837879] [ 74.838343] Allocated by task 149: [ 74.838971] kasan_set_track+0x4c/0x80 [ 74.840245] kasan_save_alloc_info+0x28/0x34 [ 74.841079] __kasan_slab_alloc+0x58/0x70 [ 74.842005] slab_post_alloc_hook+0x70/0x2e8 [ 74.842927] kmem_cache_alloc+0x164/0x254 [ 74.843874] kmem_cache_oob+0x94/0x1cc [ 74.844647] kunit_try_run_case+0x80/0x184 [ 74.845341] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.846269] kthread+0x16c/0x21c [ 74.847008] ret_from_fork+0x10/0x20 [ 74.847905] [ 74.848493] The buggy address belongs to the object at ffff0000c3c32000 [ 74.848493] which belongs to the cache test_cache of size 200 [ 74.850267] The buggy address is located 0 bytes to the right of [ 74.850267] 200-byte region [ffff0000c3c32000, ffff0000c3c320c8) [ 74.851919] [ 74.852443] The buggy address belongs to the physical page: [ 74.853250] page:00000000cdc41bd8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c32 [ 74.853917] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.854674] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159e780 [ 74.855388] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 74.856276] page dumped because: kasan: bad access detected [ 74.857085] [ 74.857395] Memory state around the buggy address: [ 74.858055] ffff0000c3c31f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.858678] ffff0000c3c32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.859596] >ffff0000c3c32080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 74.860611] ^ [ 74.861747] ffff0000c3c32100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.862325] ffff0000c3c32180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.862851] ==================================================================
[ 73.406015] ================================================================== [ 73.407006] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x250 [ 73.407835] Read of size 1 at addr ffff0000c59440c8 by task kunit_try_catch/149 [ 73.408804] [ 73.409128] CPU: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.409888] Hardware name: linux,dummy-virt (DT) [ 73.410331] Call trace: [ 73.410564] dump_backtrace.part.0+0xdc/0xf0 [ 73.410991] show_stack+0x18/0x30 [ 73.411348] dump_stack_lvl+0x64/0x80 [ 73.411711] print_report+0x158/0x438 [ 73.412077] kasan_report+0xb4/0xf4 [ 73.412426] __asan_load1+0x68/0x74 [ 73.413128] kmem_cache_oob+0xd4/0x250 [ 73.413724] kunit_try_run_case+0x84/0x120 [ 73.414715] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.415447] kthread+0x180/0x190 [ 73.415785] ret_from_fork+0x10/0x20 [ 73.416133] [ 73.416299] Allocated by task 149: [ 73.416791] kasan_save_stack+0x3c/0x70 [ 73.417375] kasan_set_track+0x2c/0x40 [ 73.417948] kasan_save_alloc_info+0x24/0x34 [ 73.418834] __kasan_slab_alloc+0x8c/0x90 [ 73.419666] kmem_cache_alloc+0x170/0x2c4 [ 73.420608] kmem_cache_oob+0xb4/0x250 [ 73.421310] kunit_try_run_case+0x84/0x120 [ 73.422468] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.423472] kthread+0x180/0x190 [ 73.424157] ret_from_fork+0x10/0x20 [ 73.424907] [ 73.425308] The buggy address belongs to the object at ffff0000c5944000 [ 73.425308] which belongs to the cache test_cache of size 200 [ 73.426448] The buggy address is located 0 bytes to the right of [ 73.426448] 200-byte region [ffff0000c5944000, ffff0000c59440c8) [ 73.427350] [ 73.427570] The buggy address belongs to the physical page: [ 73.428004] page:00000000b23089e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105944 [ 73.428770] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.429420] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398480 [ 73.430086] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 73.430688] page dumped because: kasan: bad access detected [ 73.431125] [ 73.431306] Memory state around the buggy address: [ 73.431741] ffff0000c5943f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.432342] ffff0000c5944000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.433008] >ffff0000c5944080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 73.433588] ^ [ 73.434225] ffff0000c5944100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.434843] ffff0000c5944180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.435426] ==================================================================
[ 64.913860] ================================================================== [ 64.915146] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xec/0x268 [ 64.915936] Read of size 1 at addr ffff0000c58b10c8 by task kunit_try_catch/147 [ 64.916733] [ 64.916994] CPU: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.918092] Hardware name: linux,dummy-virt (DT) [ 64.918812] Call trace: [ 64.919074] dump_backtrace+0x110/0x120 [ 64.919459] show_stack+0x18/0x28 [ 64.919792] dump_stack_lvl+0x68/0x84 [ 64.920138] print_report+0x158/0x484 [ 64.920460] kasan_report+0x98/0xe0 [ 64.920759] __asan_load1+0x68/0x78 [ 64.921056] kmem_cache_oob+0xec/0x268 [ 64.921685] kunit_try_run_case+0x7c/0x120 [ 64.922707] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.923440] kthread+0x1a4/0x1b8 [ 64.923925] ret_from_fork+0x10/0x20 [ 64.924451] [ 64.924691] Allocated by task 147: [ 64.924936] kasan_save_stack+0x2c/0x58 [ 64.925263] kasan_set_track+0x2c/0x40 [ 64.925861] kasan_save_alloc_info+0x24/0x38 [ 64.926480] __kasan_slab_alloc+0x74/0x90 [ 64.927023] slab_post_alloc_hook+0x6c/0x260 [ 64.927637] kmem_cache_alloc+0x164/0x270 [ 64.928214] kmem_cache_oob+0xc8/0x268 [ 64.928765] kunit_try_run_case+0x7c/0x120 [ 64.929351] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.930212] kthread+0x1a4/0x1b8 [ 64.930700] ret_from_fork+0x10/0x20 [ 64.931122] [ 64.931292] The buggy address belongs to the object at ffff0000c58b1000 [ 64.931292] which belongs to the cache test_cache of size 200 [ 64.931909] The buggy address is located 0 bytes to the right of [ 64.931909] 200-byte region [ffff0000c58b1000, ffff0000c58b10c8) [ 64.932921] [ 64.933168] The buggy address belongs to the physical page: [ 64.933862] page:00000000c4ca2d38 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b1 [ 64.935308] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 64.936184] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c59c6000 [ 64.937076] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 64.938022] page dumped because: kasan: bad access detected [ 64.938708] [ 64.938954] Memory state around the buggy address: [ 64.939543] ffff0000c58b0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.940383] ffff0000c58b1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.941191] >ffff0000c58b1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 64.942150] ^ [ 64.942726] ffff0000c58b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.943159] ffff0000c58b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.943658] ==================================================================
[ 31.157489] ================================================================== [ 31.157982] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xe4/0x210 [ 31.158453] Read of size 1 at addr ffff88810349b0c8 by task kunit_try_catch/253 [ 31.158782] [ 31.158918] CPU: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.159431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.159892] Call Trace: [ 31.160140] <TASK> [ 31.160396] dump_stack_lvl+0x49/0x62 [ 31.160640] print_report+0x189/0x492 [ 31.160878] ? kasan_complete_mode_report_info+0x3c/0x200 [ 31.161259] ? kmem_cache_oob+0xe4/0x210 [ 31.161526] kasan_report+0x10c/0x190 [ 31.161811] ? kasan_set_track+0x25/0x40 [ 31.162193] ? kmem_cache_oob+0xe4/0x210 [ 31.162484] __asan_load1+0x62/0x70 [ 31.162814] kmem_cache_oob+0xe4/0x210 [ 31.163184] ? kmem_cache_double_free+0x1e0/0x1e0 [ 31.163430] ? __kunit_add_resource+0xd1/0x100 [ 31.163845] kunit_try_run_case+0x8f/0xd0 [ 31.164051] ? kunit_catch_run_case+0x80/0x80 [ 31.164313] ? kunit_try_catch_throw+0x40/0x40 [ 31.164654] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.165134] kthread+0x17b/0x1b0 [ 31.165444] ? kthread_complete_and_exit+0x30/0x30 [ 31.165820] ret_from_fork+0x22/0x30 [ 31.166121] </TASK> [ 31.166326] [ 31.166437] Allocated by task 253: [ 31.166692] kasan_save_stack+0x41/0x70 [ 31.166985] kasan_set_track+0x25/0x40 [ 31.167261] kasan_save_alloc_info+0x1e/0x30 [ 31.167447] __kasan_slab_alloc+0x90/0xa0 [ 31.167744] kmem_cache_alloc+0x150/0x370 [ 31.168137] kmem_cache_oob+0xbd/0x210 [ 31.168512] kunit_try_run_case+0x8f/0xd0 [ 31.168708] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.169013] kthread+0x17b/0x1b0 [ 31.169277] ret_from_fork+0x22/0x30 [ 31.169589] [ 31.169703] The buggy address belongs to the object at ffff88810349b000 [ 31.169703] which belongs to the cache test_cache of size 200 [ 31.170231] The buggy address is located 0 bytes to the right of [ 31.170231] 200-byte region [ffff88810349b000, ffff88810349b0c8) [ 31.170895] [ 31.171009] The buggy address belongs to the physical page: [ 31.171460] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10349b [ 31.171865] flags: 0x200000000000200(slab|node=0|zone=2) [ 31.172186] raw: 0200000000000200 0000000000000000 dead000000000122 ffff88810316c3c0 [ 31.172586] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 31.172916] page dumped because: kasan: bad access detected [ 31.173271] [ 31.173472] Memory state around the buggy address: [ 31.173757] ffff88810349af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.174075] ffff88810349b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.174534] >ffff88810349b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.175072] ^ [ 31.175413] ffff88810349b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.175869] ffff88810349b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.176314] ==================================================================