Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 91.758117] ================================================================== [ 91.759783] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x1e0 [ 91.760874] Write of size 1 at addr ffff0000c1755f00 by task kunit_try_catch/133 [ 91.762496] [ 91.763199] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 91.764173] Hardware name: linux,dummy-virt (DT) [ 91.765021] Call trace: [ 91.765495] dump_backtrace+0x9c/0x128 [ 91.766243] show_stack+0x20/0x38 [ 91.766956] dump_stack_lvl+0x60/0xb0 [ 91.767427] print_report+0xf8/0x5e8 [ 91.767973] kasan_report+0xdc/0x128 [ 91.769042] __asan_store1+0x60/0x70 [ 91.769805] kmalloc_large_oob_right+0xc8/0x1e0 [ 91.770635] kunit_try_run_case+0x114/0x298 [ 91.771576] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.772381] kthread+0x18c/0x1a8 [ 91.773181] ret_from_fork+0x10/0x20 [ 91.774014] [ 91.774390] Allocated by task 133: [ 91.775113] kasan_save_stack+0x3c/0x68 [ 91.776033] kasan_set_track+0x2c/0x40 [ 91.776871] kasan_save_alloc_info+0x24/0x38 [ 91.777642] __kasan_kmalloc+0xd4/0xd8 [ 91.778313] kmalloc_trace+0x68/0x130 [ 91.778941] kmalloc_large_oob_right+0x9c/0x1e0 [ 91.779772] kunit_try_run_case+0x114/0x298 [ 91.780930] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.781722] kthread+0x18c/0x1a8 [ 91.782483] ret_from_fork+0x10/0x20 [ 91.783580] [ 91.784017] The buggy address belongs to the object at ffff0000c1754000 [ 91.784017] which belongs to the cache kmalloc-8k of size 8192 [ 91.785693] The buggy address is located 0 bytes to the right of [ 91.785693] allocated 7936-byte region [ffff0000c1754000, ffff0000c1755f00) [ 91.787388] [ 91.787951] The buggy address belongs to the physical page: [ 91.788923] page:00000000eb75becb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101750 [ 91.790312] head:00000000eb75becb order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 91.791509] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 91.792811] page_type: 0xffffffff() [ 91.793663] raw: 0bfffc0000000840 ffff0000c0002280 dead000000000122 0000000000000000 [ 91.794813] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 91.796141] page dumped because: kasan: bad access detected [ 91.797155] [ 91.797496] Memory state around the buggy address: [ 91.798221] ffff0000c1755e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 91.799609] ffff0000c1755e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 91.800859] >ffff0000c1755f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.801806] ^ [ 91.802352] ffff0000c1755f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.803872] ffff0000c1756000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.804964] ==================================================================
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
[ 33.351115] ================================================================== [ 33.351717] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd0/0x1e0 [ 33.352230] Write of size 1 at addr ffff8881026ddf00 by task kunit_try_catch/148 [ 33.353241] [ 33.353437] CPU: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 33.354169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.354794] Call Trace: [ 33.355149] <TASK> [ 33.355436] dump_stack_lvl+0x4e/0x90 [ 33.355885] print_report+0xd2/0x650 [ 33.356303] ? __virt_addr_valid+0x156/0x1e0 [ 33.356621] ? kmalloc_large_oob_right+0xd0/0x1e0 [ 33.357103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.357646] ? kmalloc_large_oob_right+0xd0/0x1e0 [ 33.358259] kasan_report+0x147/0x180 [ 33.358583] ? kmalloc_large_oob_right+0xd0/0x1e0 [ 33.359103] __asan_store1+0x69/0x70 [ 33.359514] kmalloc_large_oob_right+0xd0/0x1e0 [ 33.359996] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 33.360338] ? __schedule+0x715/0x11a0 [ 33.360586] ? ktime_get_ts64+0x118/0x140 [ 33.361133] kunit_try_run_case+0x120/0x290 [ 33.361602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.362425] ? __kasan_check_write+0x18/0x20 [ 33.362707] ? trace_preempt_on+0x20/0xa0 [ 33.362984] ? __kthread_parkme+0x4f/0xd0 [ 33.363248] ? preempt_count_sub+0x50/0x80 [ 33.363509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.364090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.364677] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.365304] kthread+0x19e/0x1e0 [ 33.365694] ? __pfx_kthread+0x10/0x10 [ 33.366274] ret_from_fork+0x41/0x70 [ 33.366729] ? __pfx_kthread+0x10/0x10 [ 33.367182] ret_from_fork_asm+0x1b/0x30 [ 33.367642] </TASK> [ 33.367886] [ 33.368023] Allocated by task 148: [ 33.368223] kasan_save_stack+0x44/0x70 [ 33.368476] kasan_set_track+0x29/0x40 [ 33.368707] kasan_save_alloc_info+0x22/0x30 [ 33.369462] __kasan_kmalloc+0xb7/0xc0 [ 33.369755] kmalloc_trace+0x4c/0xb0 [ 33.370250] kmalloc_large_oob_right+0x9d/0x1e0 [ 33.370932] kunit_try_run_case+0x120/0x290 [ 33.371460] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.371850] kthread+0x19e/0x1e0 [ 33.372235] ret_from_fork+0x41/0x70 [ 33.372470] ret_from_fork_asm+0x1b/0x30 [ 33.372910] [ 33.373168] The buggy address belongs to the object at ffff8881026dc000 [ 33.373168] which belongs to the cache kmalloc-8k of size 8192 [ 33.374368] The buggy address is located 0 bytes to the right of [ 33.374368] allocated 7936-byte region [ffff8881026dc000, ffff8881026ddf00) [ 33.375458] [ 33.375602] The buggy address belongs to the physical page: [ 33.376056] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d8 [ 33.376583] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.377223] flags: 0x200000000000840(slab|head|node=0|zone=2) [ 33.378042] page_type: 0xffffffff() [ 33.378524] raw: 0200000000000840 ffff888100042280 dead000000000122 0000000000000000 [ 33.379076] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 33.379470] page dumped because: kasan: bad access detected [ 33.380003] [ 33.380247] Memory state around the buggy address: [ 33.380711] ffff8881026dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.381248] ffff8881026dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.381778] >ffff8881026ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.382528] ^ [ 33.382935] ffff8881026ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.383324] ffff8881026de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.383689] ==================================================================
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure