Date
June 17, 2025, 3:40 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 20.968298] ================================================================== [ 20.968444] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 20.968605] Read of size 1 at addr fff00000c4799880 by task kunit_try_catch/138 [ 20.968763] [ 20.968840] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 20.969018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.969087] Hardware name: linux,dummy-virt (DT) [ 20.969162] Call trace: [ 20.969206] show_stack+0x20/0x38 (C) [ 20.969324] dump_stack_lvl+0x8c/0xd0 [ 20.969433] print_report+0x118/0x608 [ 20.969550] kasan_report+0xdc/0x128 [ 20.969661] __asan_report_load1_noabort+0x20/0x30 [ 20.969880] kmalloc_oob_right+0x5d0/0x660 [ 20.969994] kunit_try_run_case+0x170/0x3f0 [ 20.970095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.970215] kthread+0x328/0x630 [ 20.970306] ret_from_fork+0x10/0x20 [ 20.970411] [ 20.970457] Allocated by task 138: [ 20.970516] kasan_save_stack+0x3c/0x68 [ 20.970591] kasan_save_track+0x20/0x40 [ 20.970703] kasan_save_alloc_info+0x40/0x58 [ 20.970802] __kasan_kmalloc+0xd4/0xd8 [ 20.970879] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.970971] kmalloc_oob_right+0xb0/0x660 [ 20.971150] kunit_try_run_case+0x170/0x3f0 [ 20.971308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.971459] kthread+0x328/0x630 [ 20.971551] ret_from_fork+0x10/0x20 [ 20.971642] [ 20.971713] The buggy address belongs to the object at fff00000c4799800 [ 20.971713] which belongs to the cache kmalloc-128 of size 128 [ 20.971873] The buggy address is located 13 bytes to the right of [ 20.971873] allocated 115-byte region [fff00000c4799800, fff00000c4799873) [ 20.972036] [ 20.972088] The buggy address belongs to the physical page: [ 20.972175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104799 [ 20.972308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.972431] page_type: f5(slab) [ 20.972531] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.972658] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.972772] page dumped because: kasan: bad access detected [ 20.972852] [ 20.972896] Memory state around the buggy address: [ 20.972977] fff00000c4799780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.973088] fff00000c4799800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.973198] >fff00000c4799880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.973296] ^ [ 20.973367] fff00000c4799900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.973489] fff00000c4799980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.973590] ================================================================== [ 20.958634] ================================================================== [ 20.958782] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 20.958926] Write of size 1 at addr fff00000c4799878 by task kunit_try_catch/138 [ 20.959122] [ 20.959214] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 20.959567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.959652] Hardware name: linux,dummy-virt (DT) [ 20.959723] Call trace: [ 20.959784] show_stack+0x20/0x38 (C) [ 20.960388] dump_stack_lvl+0x8c/0xd0 [ 20.960830] print_report+0x118/0x608 [ 20.960963] kasan_report+0xdc/0x128 [ 20.961965] __asan_report_store1_noabort+0x20/0x30 [ 20.962136] kmalloc_oob_right+0x538/0x660 [ 20.962231] kunit_try_run_case+0x170/0x3f0 [ 20.962330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.962442] kthread+0x328/0x630 [ 20.962542] ret_from_fork+0x10/0x20 [ 20.962649] [ 20.962691] Allocated by task 138: [ 20.962770] kasan_save_stack+0x3c/0x68 [ 20.962857] kasan_save_track+0x20/0x40 [ 20.963494] kasan_save_alloc_info+0x40/0x58 [ 20.963609] __kasan_kmalloc+0xd4/0xd8 [ 20.963712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.963828] kmalloc_oob_right+0xb0/0x660 [ 20.963914] kunit_try_run_case+0x170/0x3f0 [ 20.964004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.965060] kthread+0x328/0x630 [ 20.965197] ret_from_fork+0x10/0x20 [ 20.965391] [ 20.965443] The buggy address belongs to the object at fff00000c4799800 [ 20.965443] which belongs to the cache kmalloc-128 of size 128 [ 20.965584] The buggy address is located 5 bytes to the right of [ 20.965584] allocated 115-byte region [fff00000c4799800, fff00000c4799873) [ 20.965706] [ 20.965758] The buggy address belongs to the physical page: [ 20.965842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104799 [ 20.965957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.966062] page_type: f5(slab) [ 20.966143] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.966251] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.966344] page dumped because: kasan: bad access detected [ 20.966408] [ 20.966441] Memory state around the buggy address: [ 20.966509] fff00000c4799700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.966642] fff00000c4799780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.966764] >fff00000c4799800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.966859] ^ [ 20.966966] fff00000c4799880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967065] fff00000c4799900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967191] ================================================================== [ 20.943413] ================================================================== [ 20.944102] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 20.946924] Write of size 1 at addr fff00000c4799873 by task kunit_try_catch/138 [ 20.947140] [ 20.948807] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.3-rc1 #1 PREEMPT [ 20.949133] Tainted: [N]=TEST [ 20.949210] Hardware name: linux,dummy-virt (DT) [ 20.949670] Call trace: [ 20.950040] show_stack+0x20/0x38 (C) [ 20.950331] dump_stack_lvl+0x8c/0xd0 [ 20.950475] print_report+0x118/0x608 [ 20.950575] kasan_report+0xdc/0x128 [ 20.950661] __asan_report_store1_noabort+0x20/0x30 [ 20.951094] kmalloc_oob_right+0x5a4/0x660 [ 20.951216] kunit_try_run_case+0x170/0x3f0 [ 20.951337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.951457] kthread+0x328/0x630 [ 20.951559] ret_from_fork+0x10/0x20 [ 20.952082] [ 20.952182] Allocated by task 138: [ 20.952428] kasan_save_stack+0x3c/0x68 [ 20.952575] kasan_save_track+0x20/0x40 [ 20.952659] kasan_save_alloc_info+0x40/0x58 [ 20.952764] __kasan_kmalloc+0xd4/0xd8 [ 20.952842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.952940] kmalloc_oob_right+0xb0/0x660 [ 20.953028] kunit_try_run_case+0x170/0x3f0 [ 20.953156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.953263] kthread+0x328/0x630 [ 20.953395] ret_from_fork+0x10/0x20 [ 20.953570] [ 20.953748] The buggy address belongs to the object at fff00000c4799800 [ 20.953748] which belongs to the cache kmalloc-128 of size 128 [ 20.953997] The buggy address is located 0 bytes to the right of [ 20.953997] allocated 115-byte region [fff00000c4799800, fff00000c4799873) [ 20.954230] [ 20.954608] The buggy address belongs to the physical page: [ 20.955006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104799 [ 20.955378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.955769] page_type: f5(slab) [ 20.956187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.956264] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.956401] page dumped because: kasan: bad access detected [ 20.956451] [ 20.956482] Memory state around the buggy address: [ 20.956773] fff00000c4799700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.956859] fff00000c4799780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.956924] >fff00000c4799800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.956986] ^ [ 20.957087] fff00000c4799880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.957135] fff00000c4799900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.957210] ==================================================================