Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.225895] ================================================================== [ 15.225965] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 15.226379] Write of size 1 at addr fff00000c3ec5f78 by task kunit_try_catch/145 [ 15.226455] [ 15.226577] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.226715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.226748] Hardware name: linux,dummy-virt (DT) [ 15.227104] Call trace: [ 15.227283] show_stack+0x20/0x38 (C) [ 15.227478] dump_stack_lvl+0x8c/0xd0 [ 15.227714] print_report+0x118/0x608 [ 15.227987] kasan_report+0xdc/0x128 [ 15.228499] __asan_report_store1_noabort+0x20/0x30 [ 15.228644] kmalloc_track_caller_oob_right+0x40c/0x488 [ 15.229167] kunit_try_run_case+0x170/0x3f0 [ 15.229242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.229753] kthread+0x328/0x630 [ 15.230012] ret_from_fork+0x10/0x20 [ 15.230076] [ 15.230472] Allocated by task 145: [ 15.230807] kasan_save_stack+0x3c/0x68 [ 15.230881] kasan_save_track+0x20/0x40 [ 15.231074] kasan_save_alloc_info+0x40/0x58 [ 15.231199] __kasan_kmalloc+0xd4/0xd8 [ 15.231263] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 15.231458] kmalloc_track_caller_oob_right+0xa8/0x488 [ 15.231591] kunit_try_run_case+0x170/0x3f0 [ 15.231671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.231856] kthread+0x328/0x630 [ 15.232093] ret_from_fork+0x10/0x20 [ 15.232204] [ 15.232342] The buggy address belongs to the object at fff00000c3ec5f00 [ 15.232342] which belongs to the cache kmalloc-128 of size 128 [ 15.232573] The buggy address is located 0 bytes to the right of [ 15.232573] allocated 120-byte region [fff00000c3ec5f00, fff00000c3ec5f78) [ 15.232685] [ 15.232732] The buggy address belongs to the physical page: [ 15.232915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.233111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.233165] page_type: f5(slab) [ 15.233249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.233300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.233377] page dumped because: kasan: bad access detected [ 15.233408] [ 15.233425] Memory state around the buggy address: [ 15.233465] fff00000c3ec5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.233507] fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233557] >fff00000c3ec5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.233593] ^ [ 15.233641] fff00000c3ec5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233688] fff00000c3ec6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.233723] ================================================================== [ 15.235376] ================================================================== [ 15.235433] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 15.235480] Write of size 1 at addr fff00000c7811078 by task kunit_try_catch/145 [ 15.235830] [ 15.235987] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.236284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.236327] Hardware name: linux,dummy-virt (DT) [ 15.236421] Call trace: [ 15.236446] show_stack+0x20/0x38 (C) [ 15.236533] dump_stack_lvl+0x8c/0xd0 [ 15.236703] print_report+0x118/0x608 [ 15.236764] kasan_report+0xdc/0x128 [ 15.237071] __asan_report_store1_noabort+0x20/0x30 [ 15.237311] kmalloc_track_caller_oob_right+0x418/0x488 [ 15.237383] kunit_try_run_case+0x170/0x3f0 [ 15.237470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.237523] kthread+0x328/0x630 [ 15.237653] ret_from_fork+0x10/0x20 [ 15.237702] [ 15.237720] Allocated by task 145: [ 15.238046] kasan_save_stack+0x3c/0x68 [ 15.238110] kasan_save_track+0x20/0x40 [ 15.238146] kasan_save_alloc_info+0x40/0x58 [ 15.238311] __kasan_kmalloc+0xd4/0xd8 [ 15.238392] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 15.238464] kmalloc_track_caller_oob_right+0x184/0x488 [ 15.238519] kunit_try_run_case+0x170/0x3f0 [ 15.238556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.238597] kthread+0x328/0x630 [ 15.238631] ret_from_fork+0x10/0x20 [ 15.238665] [ 15.238683] The buggy address belongs to the object at fff00000c7811000 [ 15.238683] which belongs to the cache kmalloc-128 of size 128 [ 15.238737] The buggy address is located 0 bytes to the right of [ 15.238737] allocated 120-byte region [fff00000c7811000, fff00000c7811078) [ 15.238797] [ 15.239304] The buggy address belongs to the physical page: [ 15.239459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.239553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.239679] page_type: f5(slab) [ 15.239718] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.240046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.240182] page dumped because: kasan: bad access detected [ 15.240290] [ 15.240350] Memory state around the buggy address: [ 15.240483] fff00000c7810f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240556] fff00000c7810f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240607] >fff00000c7811000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.240644] ^ [ 15.240978] fff00000c7811080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241134] fff00000c7811100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241341] ==================================================================
[ 10.611836] ================================================================== [ 10.612251] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.613524] Write of size 1 at addr ffff888103138c78 by task kunit_try_catch/161 [ 10.614382] [ 10.614477] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.614522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.614534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.614553] Call Trace: [ 10.614565] <TASK> [ 10.614580] dump_stack_lvl+0x73/0xb0 [ 10.614606] print_report+0xd1/0x650 [ 10.614627] ? __virt_addr_valid+0x1db/0x2d0 [ 10.614649] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.614670] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.614692] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.614713] kasan_report+0x141/0x180 [ 10.614735] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.614761] __asan_report_store1_noabort+0x1b/0x30 [ 10.614782] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.614803] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 10.614825] ? __schedule+0x10cc/0x2b60 [ 10.614848] ? __pfx_read_tsc+0x10/0x10 [ 10.614868] ? ktime_get_ts64+0x86/0x230 [ 10.614893] kunit_try_run_case+0x1a5/0x480 [ 10.614917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.614938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.614962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.614985] ? __kthread_parkme+0x82/0x180 [ 10.615006] ? preempt_count_sub+0x50/0x80 [ 10.615031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.615054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.615076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.615098] kthread+0x337/0x6f0 [ 10.615115] ? trace_preempt_on+0x20/0xc0 [ 10.615137] ? __pfx_kthread+0x10/0x10 [ 10.615155] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.615176] ? calculate_sigpending+0x7b/0xa0 [ 10.615197] ? __pfx_kthread+0x10/0x10 [ 10.615215] ret_from_fork+0x41/0x80 [ 10.615235] ? __pfx_kthread+0x10/0x10 [ 10.615275] ret_from_fork_asm+0x1a/0x30 [ 10.615305] </TASK> [ 10.615315] [ 10.629707] Allocated by task 161: [ 10.630037] kasan_save_stack+0x45/0x70 [ 10.630423] kasan_save_track+0x18/0x40 [ 10.630725] kasan_save_alloc_info+0x3b/0x50 [ 10.631061] __kasan_kmalloc+0xb7/0xc0 [ 10.631191] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 10.631421] kmalloc_track_caller_oob_right+0x99/0x520 [ 10.631904] kunit_try_run_case+0x1a5/0x480 [ 10.632315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.632842] kthread+0x337/0x6f0 [ 10.633144] ret_from_fork+0x41/0x80 [ 10.633544] ret_from_fork_asm+0x1a/0x30 [ 10.633918] [ 10.633992] The buggy address belongs to the object at ffff888103138c00 [ 10.633992] which belongs to the cache kmalloc-128 of size 128 [ 10.634350] The buggy address is located 0 bytes to the right of [ 10.634350] allocated 120-byte region [ffff888103138c00, ffff888103138c78) [ 10.634991] [ 10.635159] The buggy address belongs to the physical page: [ 10.635783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103138 [ 10.636436] flags: 0x200000000000000(node=0|zone=2) [ 10.636662] page_type: f5(slab) [ 10.636796] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.637103] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.637414] page dumped because: kasan: bad access detected [ 10.637709] [ 10.637794] Memory state around the buggy address: [ 10.637981] ffff888103138b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.638312] ffff888103138b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.638537] >ffff888103138c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 10.638843] ^ [ 10.639290] ffff888103138c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.639701] ffff888103138d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.640168] ================================================================== [ 10.641045] ================================================================== [ 10.641551] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.641938] Write of size 1 at addr ffff888103138d78 by task kunit_try_catch/161 [ 10.642347] [ 10.642473] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.642517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.642529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.642549] Call Trace: [ 10.642561] <TASK> [ 10.642576] dump_stack_lvl+0x73/0xb0 [ 10.642601] print_report+0xd1/0x650 [ 10.642624] ? __virt_addr_valid+0x1db/0x2d0 [ 10.642645] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.642668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.642690] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.642712] kasan_report+0x141/0x180 [ 10.642734] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.642760] __asan_report_store1_noabort+0x1b/0x30 [ 10.642781] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.642802] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 10.642825] ? __schedule+0x10cc/0x2b60 [ 10.642847] ? __pfx_read_tsc+0x10/0x10 [ 10.642867] ? ktime_get_ts64+0x86/0x230 [ 10.642891] kunit_try_run_case+0x1a5/0x480 [ 10.642916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.642938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.642961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.642998] ? __kthread_parkme+0x82/0x180 [ 10.643020] ? preempt_count_sub+0x50/0x80 [ 10.643045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.643080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.643103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.643125] kthread+0x337/0x6f0 [ 10.643142] ? trace_preempt_on+0x20/0xc0 [ 10.643164] ? __pfx_kthread+0x10/0x10 [ 10.643182] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.643204] ? calculate_sigpending+0x7b/0xa0 [ 10.643226] ? __pfx_kthread+0x10/0x10 [ 10.643254] ret_from_fork+0x41/0x80 [ 10.643274] ? __pfx_kthread+0x10/0x10 [ 10.643301] ret_from_fork_asm+0x1a/0x30 [ 10.643331] </TASK> [ 10.643341] [ 10.651464] Allocated by task 161: [ 10.651633] kasan_save_stack+0x45/0x70 [ 10.651777] kasan_save_track+0x18/0x40 [ 10.651959] kasan_save_alloc_info+0x3b/0x50 [ 10.652178] __kasan_kmalloc+0xb7/0xc0 [ 10.652428] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 10.652827] kmalloc_track_caller_oob_right+0x19a/0x520 [ 10.653081] kunit_try_run_case+0x1a5/0x480 [ 10.653256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.653571] kthread+0x337/0x6f0 [ 10.653821] ret_from_fork+0x41/0x80 [ 10.654006] ret_from_fork_asm+0x1a/0x30 [ 10.654193] [ 10.654331] The buggy address belongs to the object at ffff888103138d00 [ 10.654331] which belongs to the cache kmalloc-128 of size 128 [ 10.654904] The buggy address is located 0 bytes to the right of [ 10.654904] allocated 120-byte region [ffff888103138d00, ffff888103138d78) [ 10.655449] [ 10.655628] The buggy address belongs to the physical page: [ 10.655823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103138 [ 10.656066] flags: 0x200000000000000(node=0|zone=2) [ 10.656287] page_type: f5(slab) [ 10.656582] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.657113] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.657617] page dumped because: kasan: bad access detected [ 10.657906] [ 10.658014] Memory state around the buggy address: [ 10.658194] ffff888103138c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.658463] ffff888103138c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.658917] >ffff888103138d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 10.659255] ^ [ 10.659578] ffff888103138d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.659948] ffff888103138e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.660183] ==================================================================