Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.861775] ================================================================== [ 17.861998] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 17.862052] Write of size 128 at addr fff00000c63d6100 by task kunit_try_catch/172 [ 17.862294] [ 17.862430] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.862624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.862687] Hardware name: linux,dummy-virt (DT) [ 17.862720] Call trace: [ 17.862744] show_stack+0x20/0x38 (C) [ 17.862824] dump_stack_lvl+0x8c/0xd0 [ 17.862881] print_report+0x118/0x608 [ 17.862925] kasan_report+0xdc/0x128 [ 17.863113] kasan_check_range+0x100/0x1a8 [ 17.863378] __asan_memset+0x34/0x78 [ 17.863473] kmalloc_oob_in_memset+0x144/0x2d0 [ 17.863521] kunit_try_run_case+0x170/0x3f0 [ 17.863576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.863651] kthread+0x328/0x630 [ 17.863844] ret_from_fork+0x10/0x20 [ 17.863976] [ 17.863995] Allocated by task 172: [ 17.864253] kasan_save_stack+0x3c/0x68 [ 17.864304] kasan_save_track+0x20/0x40 [ 17.864455] kasan_save_alloc_info+0x40/0x58 [ 17.864594] __kasan_kmalloc+0xd4/0xd8 [ 17.864635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.864674] kmalloc_oob_in_memset+0xb0/0x2d0 [ 17.864713] kunit_try_run_case+0x170/0x3f0 [ 17.864751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.864794] kthread+0x328/0x630 [ 17.864830] ret_from_fork+0x10/0x20 [ 17.864866] [ 17.864886] The buggy address belongs to the object at fff00000c63d6100 [ 17.864886] which belongs to the cache kmalloc-128 of size 128 [ 17.864941] The buggy address is located 0 bytes inside of [ 17.864941] allocated 120-byte region [fff00000c63d6100, fff00000c63d6178) [ 17.865294] [ 17.865319] The buggy address belongs to the physical page: [ 17.865396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 17.865453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.865580] page_type: f5(slab) [ 17.865642] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.865708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.865776] page dumped because: kasan: bad access detected [ 17.865860] [ 17.865878] Memory state around the buggy address: [ 17.865915] fff00000c63d6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.866086] fff00000c63d6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.866144] >fff00000c63d6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.866237] ^ [ 17.866277] fff00000c63d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.866323] fff00000c63d6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.866469] ==================================================================
[ 11.308149] ================================================================== [ 11.308658] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 11.309190] Write of size 128 at addr ffff8881035ebd00 by task kunit_try_catch/190 [ 11.309712] [ 11.309830] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.310009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.310022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.310045] Call Trace: [ 11.310059] <TASK> [ 11.310075] dump_stack_lvl+0x73/0xb0 [ 11.310103] print_report+0xd1/0x650 [ 11.310127] ? __virt_addr_valid+0x1db/0x2d0 [ 11.310164] ? kmalloc_oob_in_memset+0x15f/0x320 [ 11.310187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.310210] ? kmalloc_oob_in_memset+0x15f/0x320 [ 11.310233] kasan_report+0x141/0x180 [ 11.310256] ? kmalloc_oob_in_memset+0x15f/0x320 [ 11.310283] kasan_check_range+0x10c/0x1c0 [ 11.310304] __asan_memset+0x27/0x50 [ 11.310324] kmalloc_oob_in_memset+0x15f/0x320 [ 11.310347] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 11.310371] ? __schedule+0x207f/0x2b60 [ 11.310395] ? __pfx_read_tsc+0x10/0x10 [ 11.310416] ? ktime_get_ts64+0x86/0x230 [ 11.310442] kunit_try_run_case+0x1a5/0x480 [ 11.310465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.310483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.310552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.310580] ? __kthread_parkme+0x82/0x180 [ 11.310603] ? preempt_count_sub+0x50/0x80 [ 11.310629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.310650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.310675] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.310699] kthread+0x337/0x6f0 [ 11.310716] ? trace_preempt_on+0x20/0xc0 [ 11.310741] ? __pfx_kthread+0x10/0x10 [ 11.310759] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.310782] ? calculate_sigpending+0x7b/0xa0 [ 11.310804] ? __pfx_kthread+0x10/0x10 [ 11.310822] ret_from_fork+0x41/0x80 [ 11.310895] ? __pfx_kthread+0x10/0x10 [ 11.310916] ret_from_fork_asm+0x1a/0x30 [ 11.310947] </TASK> [ 11.310959] [ 11.321906] Allocated by task 190: [ 11.322054] kasan_save_stack+0x45/0x70 [ 11.322253] kasan_save_track+0x18/0x40 [ 11.322393] kasan_save_alloc_info+0x3b/0x50 [ 11.322601] __kasan_kmalloc+0xb7/0xc0 [ 11.322868] __kmalloc_cache_noprof+0x189/0x420 [ 11.323192] kmalloc_oob_in_memset+0xac/0x320 [ 11.323453] kunit_try_run_case+0x1a5/0x480 [ 11.323915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.324396] kthread+0x337/0x6f0 [ 11.324586] ret_from_fork+0x41/0x80 [ 11.324751] ret_from_fork_asm+0x1a/0x30 [ 11.324934] [ 11.325184] The buggy address belongs to the object at ffff8881035ebd00 [ 11.325184] which belongs to the cache kmalloc-128 of size 128 [ 11.325826] The buggy address is located 0 bytes inside of [ 11.325826] allocated 120-byte region [ffff8881035ebd00, ffff8881035ebd78) [ 11.326524] [ 11.326613] The buggy address belongs to the physical page: [ 11.326829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb [ 11.327406] flags: 0x200000000000000(node=0|zone=2) [ 11.327762] page_type: f5(slab) [ 11.327964] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.328438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.328916] page dumped because: kasan: bad access detected [ 11.329226] [ 11.329311] Memory state around the buggy address: [ 11.329509] ffff8881035ebc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.329888] ffff8881035ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.330371] >ffff8881035ebd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.330674] ^ [ 11.330980] ffff8881035ebd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.331280] ffff8881035ebe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.331594] ==================================================================