Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 107.020204] ================================================================== [ 107.021814] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80 [ 107.022407] Read of size 1 at addr ffff0000c66ad218 by task kunit_try_catch/246 [ 107.023009] [ 107.023265] CPU: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.023993] Hardware name: linux,dummy-virt (DT) [ 107.024507] Call trace: [ 107.024884] dump_backtrace+0xe0/0x134 [ 107.025498] show_stack+0x20/0x2c [ 107.025917] dump_stack_lvl+0x88/0xb4 [ 107.026353] print_report+0x158/0x44c [ 107.026776] kasan_report+0xc8/0x180 [ 107.027211] __asan_load1+0x68/0x74 [ 107.027612] memchr+0x28/0x80 [ 107.027987] kasan_memchr+0xd4/0x200 [ 107.028438] kunit_try_run_case+0x8c/0x124 [ 107.029003] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.029561] kthread+0x15c/0x170 [ 107.030003] ret_from_fork+0x10/0x20 [ 107.030407] [ 107.030605] Allocated by task 246: [ 107.030959] kasan_save_stack+0x3c/0x70 [ 107.031418] kasan_set_track+0x2c/0x40 [ 107.031824] kasan_save_alloc_info+0x24/0x34 [ 107.032286] __kasan_kmalloc+0xd4/0xe0 [ 107.032871] kmalloc_trace+0x8c/0x150 [ 107.033313] kasan_memchr+0xa0/0x200 [ 107.033728] kunit_try_run_case+0x8c/0x124 [ 107.034208] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.034814] kthread+0x15c/0x170 [ 107.035206] ret_from_fork+0x10/0x20 [ 107.035627] [ 107.035854] The buggy address belongs to the object at ffff0000c66ad200 [ 107.035854] which belongs to the cache kmalloc-128 of size 128 [ 107.037038] The buggy address is located 24 bytes inside of [ 107.037038] 128-byte region [ffff0000c66ad200, ffff0000c66ad280) [ 107.037886] [ 107.038077] The buggy address belongs to the physical page: [ 107.038447] page:00000000f51d9fab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad [ 107.039367] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.040297] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.041978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.042576] page dumped because: kasan: bad access detected [ 107.043070] [ 107.043291] Memory state around the buggy address: [ 107.043716] ffff0000c66ad100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.044393] ffff0000c66ad180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.045157] >ffff0000c66ad200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.045863] ^ [ 107.046453] ffff0000c66ad280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.047191] ffff0000c66ad300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.047649] ==================================================================
[ 76.728121] ================================================================== [ 76.728973] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64 [ 76.730182] Read of size 1 at addr ffff0000c5a87518 by task kunit_try_catch/162 [ 76.731070] [ 76.731276] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.732056] Hardware name: linux,dummy-virt (DT) [ 76.732753] Call trace: [ 76.733289] dump_backtrace+0xf8/0x118 [ 76.734001] show_stack+0x18/0x24 [ 76.734637] __dump_stack+0x28/0x38 [ 76.735269] dump_stack_lvl+0x54/0x6c [ 76.735900] print_address_description+0x7c/0x1ec [ 76.736664] print_report+0x50/0x68 [ 76.737435] kasan_report+0xac/0x100 [ 76.738096] __asan_load1+0x6c/0x70 [ 76.738729] memchr+0x34/0x64 [ 76.739264] kasan_memchr+0xa8/0x158 [ 76.739795] kunit_try_run_case+0x80/0x184 [ 76.740235] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.740736] kthread+0x16c/0x21c [ 76.741142] ret_from_fork+0x10/0x20 [ 76.741607] [ 76.741869] Allocated by task 162: [ 76.742268] kasan_set_track+0x4c/0x80 [ 76.742769] kasan_save_alloc_info+0x28/0x34 [ 76.743264] __kasan_kmalloc+0x88/0xa0 [ 76.743753] kmalloc_trace+0x54/0x68 [ 76.744285] kasan_memchr+0x48/0x158 [ 76.745116] kunit_try_run_case+0x80/0x184 [ 76.746321] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.747166] kthread+0x16c/0x21c [ 76.747779] ret_from_fork+0x10/0x20 [ 76.748378] [ 76.748669] The buggy address belongs to the object at ffff0000c5a87500 [ 76.748669] which belongs to the cache kmalloc-128 of size 128 [ 76.749411] The buggy address is located 24 bytes inside of [ 76.749411] 128-byte region [ffff0000c5a87500, ffff0000c5a87580) [ 76.750289] [ 76.750529] The buggy address belongs to the physical page: [ 76.751040] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 76.751947] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.752659] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.753386] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.754018] page dumped because: kasan: bad access detected [ 76.754491] [ 76.754675] Memory state around the buggy address: [ 76.755636] ffff0000c5a87400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.756307] ffff0000c5a87480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.756950] >ffff0000c5a87500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.757546] ^ [ 76.757969] ffff0000c5a87580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.758589] ffff0000c5a87600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.759207] ==================================================================
[ 75.837771] ================================================================== [ 75.838719] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64 [ 75.839322] Read of size 1 at addr ffff0000c58a7118 by task kunit_try_catch/162 [ 75.840487] [ 75.840708] CPU: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.841555] Hardware name: linux,dummy-virt (DT) [ 75.841930] Call trace: [ 75.842174] dump_backtrace+0xf4/0x114 [ 75.842601] show_stack+0x18/0x24 [ 75.843584] __dump_stack+0x28/0x38 [ 75.844464] dump_stack_lvl+0x50/0x68 [ 75.845237] print_address_description+0x7c/0x1ec [ 75.846142] print_report+0x50/0x68 [ 75.846919] kasan_report+0xac/0xfc [ 75.847711] __asan_load1+0x6c/0x70 [ 75.848599] memchr+0x34/0x64 [ 75.849263] kasan_memchr+0xa8/0x158 [ 75.849918] kunit_try_run_case+0x80/0x184 [ 75.850597] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.851429] kthread+0x16c/0x21c [ 75.852260] ret_from_fork+0x10/0x20 [ 75.852902] [ 75.853201] Allocated by task 162: [ 75.853703] kasan_set_track+0x4c/0x80 [ 75.854373] kasan_save_alloc_info+0x28/0x34 [ 75.854854] __kasan_kmalloc+0x88/0xa0 [ 75.855280] kmalloc_trace+0x54/0x68 [ 75.855663] kasan_memchr+0x48/0x158 [ 75.856377] kunit_try_run_case+0x80/0x184 [ 75.857180] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.858069] kthread+0x16c/0x21c [ 75.858656] ret_from_fork+0x10/0x20 [ 75.859269] [ 75.859566] The buggy address belongs to the object at ffff0000c58a7100 [ 75.859566] which belongs to the cache kmalloc-128 of size 128 [ 75.861204] The buggy address is located 24 bytes inside of [ 75.861204] 128-byte region [ffff0000c58a7100, ffff0000c58a7180) [ 75.862625] [ 75.862936] The buggy address belongs to the physical page: [ 75.863638] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 75.864930] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.865993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.866995] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.867584] page dumped because: kasan: bad access detected [ 75.868307] [ 75.868662] Memory state around the buggy address: [ 75.869331] ffff0000c58a7000: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.870257] ffff0000c58a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.871178] >ffff0000c58a7100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.871998] ^ [ 75.872684] ffff0000c58a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.873385] ffff0000c58a7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.873872] ==================================================================
[ 74.433459] ================================================================== [ 74.434376] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80 [ 74.435023] Read of size 1 at addr ffff0000c5938418 by task kunit_try_catch/162 [ 74.435743] [ 74.436250] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.437035] Hardware name: linux,dummy-virt (DT) [ 74.437525] Call trace: [ 74.438611] dump_backtrace.part.0+0xdc/0xf0 [ 74.439388] show_stack+0x18/0x30 [ 74.440121] dump_stack_lvl+0x64/0x80 [ 74.440779] print_report+0x158/0x438 [ 74.441618] kasan_report+0xb4/0xf4 [ 74.442361] __asan_load1+0x68/0x74 [ 74.443132] memchr+0x28/0x80 [ 74.443778] kasan_memchr+0xcc/0x200 [ 74.444627] kunit_try_run_case+0x84/0x120 [ 74.445178] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.446248] kthread+0x180/0x190 [ 74.447104] ret_from_fork+0x10/0x20 [ 74.447940] [ 74.448302] Allocated by task 162: [ 74.448863] kasan_save_stack+0x3c/0x70 [ 74.449237] kasan_set_track+0x2c/0x40 [ 74.450050] kasan_save_alloc_info+0x24/0x34 [ 74.450963] __kasan_kmalloc+0xb8/0xc0 [ 74.451806] kmalloc_trace+0x58/0x6c [ 74.452587] kasan_memchr+0x98/0x200 [ 74.453380] kunit_try_run_case+0x84/0x120 [ 74.454362] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.455455] kthread+0x180/0x190 [ 74.456242] ret_from_fork+0x10/0x20 [ 74.456833] [ 74.457016] The buggy address belongs to the object at ffff0000c5938400 [ 74.457016] which belongs to the cache kmalloc-128 of size 128 [ 74.458669] The buggy address is located 24 bytes inside of [ 74.458669] 128-byte region [ffff0000c5938400, ffff0000c5938480) [ 74.460327] [ 74.460786] The buggy address belongs to the physical page: [ 74.461660] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.462254] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.463092] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.463878] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.464908] page dumped because: kasan: bad access detected [ 74.465447] [ 74.465615] Memory state around the buggy address: [ 74.465958] ffff0000c5938300: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.466434] ffff0000c5938380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.467060] >ffff0000c5938400: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.467621] ^ [ 74.467931] ffff0000c5938480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.468387] ffff0000c5938500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.468951] ==================================================================
[ 65.885096] ================================================================== [ 65.886546] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x78 [ 65.887356] Read of size 1 at addr ffff0000c586c218 by task kunit_try_catch/160 [ 65.888242] [ 65.888535] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 65.889521] Hardware name: linux,dummy-virt (DT) [ 65.890104] Call trace: [ 65.890483] dump_backtrace+0x110/0x120 [ 65.891092] show_stack+0x18/0x28 [ 65.891646] dump_stack_lvl+0x68/0x84 [ 65.892221] print_report+0x158/0x484 [ 65.892771] kasan_report+0x98/0xe0 [ 65.893185] __asan_load1+0x68/0x78 [ 65.893512] memchr+0x28/0x78 [ 65.893800] kasan_memchr+0xe0/0x1f0 [ 65.894172] kunit_try_run_case+0x7c/0x120 [ 65.894701] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 65.895280] kthread+0x1a4/0x1b8 [ 65.895686] ret_from_fork+0x10/0x20 [ 65.896100] [ 65.896318] Allocated by task 160: [ 65.896662] kasan_save_stack+0x2c/0x58 [ 65.897096] kasan_set_track+0x2c/0x40 [ 65.897510] kasan_save_alloc_info+0x24/0x38 [ 65.897945] __kasan_kmalloc+0xa0/0xb8 [ 65.898329] kmalloc_trace+0x50/0x68 [ 65.898688] kasan_memchr+0xa8/0x1f0 [ 65.899073] kunit_try_run_case+0x7c/0x120 [ 65.899482] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 65.900031] kthread+0x1a4/0x1b8 [ 65.900383] ret_from_fork+0x10/0x20 [ 65.900776] [ 65.900982] The buggy address belongs to the object at ffff0000c586c200 [ 65.900982] which belongs to the cache kmalloc-128 of size 128 [ 65.901869] The buggy address is located 24 bytes inside of [ 65.901869] 128-byte region [ffff0000c586c200, ffff0000c586c280) [ 65.902676] [ 65.902887] The buggy address belongs to the physical page: [ 65.903320] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 65.904025] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 65.904615] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 65.905204] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 65.905758] page dumped because: kasan: bad access detected [ 65.906127] [ 65.906327] Memory state around the buggy address: [ 65.906773] ffff0000c586c100: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.907364] ffff0000c586c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.907953] >ffff0000c586c200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.908510] ^ [ 65.908907] ffff0000c586c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.909464] ffff0000c586c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.910037] ==================================================================
[ 32.025608] ================================================================== [ 32.026182] BUG: KASAN: slab-out-of-bounds in memchr+0x23/0x50 [ 32.026907] Read of size 1 at addr ffff888103734158 by task kunit_try_catch/266 [ 32.027372] [ 32.027495] CPU: 1 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.028186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.028809] Call Trace: [ 32.029069] <TASK> [ 32.029223] dump_stack_lvl+0x49/0x62 [ 32.029638] print_report+0x189/0x492 [ 32.029996] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.030449] ? memchr+0x23/0x50 [ 32.030771] kasan_report+0x10c/0x190 [ 32.031107] ? memchr+0x23/0x50 [ 32.031470] __asan_load1+0x62/0x70 [ 32.031701] memchr+0x23/0x50 [ 32.031894] kasan_memchr+0xd9/0x1e0 [ 32.032107] ? kasan_memcmp+0x260/0x260 [ 32.032636] ? kasan_memcmp+0x260/0x260 [ 32.032946] ? kunit_try_run_case+0x84/0xd0 [ 32.033295] ? __kunit_add_resource+0xd1/0x100 [ 32.033649] kunit_try_run_case+0x8f/0xd0 [ 32.033965] ? kunit_catch_run_case+0x80/0x80 [ 32.034368] ? kunit_try_catch_throw+0x40/0x40 [ 32.034720] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.035018] kthread+0x17b/0x1b0 [ 32.035228] ? kthread_complete_and_exit+0x30/0x30 [ 32.035656] ret_from_fork+0x22/0x30 [ 32.035975] </TASK> [ 32.036199] [ 32.036368] Allocated by task 266: [ 32.036561] kasan_save_stack+0x41/0x70 [ 32.036924] kasan_set_track+0x25/0x40 [ 32.037239] kasan_save_alloc_info+0x1e/0x30 [ 32.037506] __kasan_kmalloc+0xb6/0xc0 [ 32.037739] kmalloc_trace+0x48/0xb0 [ 32.037939] kasan_memchr+0x9b/0x1e0 [ 32.038138] kunit_try_run_case+0x8f/0xd0 [ 32.038670] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.038943] kthread+0x17b/0x1b0 [ 32.039280] ret_from_fork+0x22/0x30 [ 32.039578] [ 32.039673] The buggy address belongs to the object at ffff888103734140 [ 32.039673] which belongs to the cache kmalloc-32 of size 32 [ 32.040461] The buggy address is located 24 bytes inside of [ 32.040461] 32-byte region [ffff888103734140, ffff888103734160) [ 32.041111] [ 32.041232] The buggy address belongs to the physical page: [ 32.041715] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734 [ 32.042140] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.042671] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500 [ 32.043129] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000 [ 32.043593] page dumped because: kasan: bad access detected [ 32.043958] [ 32.044170] Memory state around the buggy address: [ 32.044546] ffff888103734000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.044962] ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.045486] >ffff888103734100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.045904] ^ [ 32.046332] ffff888103734180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.046663] ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.046983] ==================================================================