Date
July 9, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.745590] ================================================================== [ 16.745659] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 16.745717] Write of size 2 at addr fff00000c638b977 by task kunit_try_catch/172 [ 16.745765] [ 16.745806] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.745889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.745915] Hardware name: linux,dummy-virt (DT) [ 16.745959] Call trace: [ 16.745982] show_stack+0x20/0x38 (C) [ 16.746057] dump_stack_lvl+0x8c/0xd0 [ 16.746151] print_report+0x118/0x608 [ 16.746197] kasan_report+0xdc/0x128 [ 16.746241] kasan_check_range+0x100/0x1a8 [ 16.746287] __asan_memset+0x34/0x78 [ 16.746327] kmalloc_oob_memset_2+0x150/0x2f8 [ 16.746372] kunit_try_run_case+0x170/0x3f0 [ 16.746420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.746470] kthread+0x328/0x630 [ 16.746518] ret_from_fork+0x10/0x20 [ 16.746774] [ 16.746793] Allocated by task 172: [ 16.746820] kasan_save_stack+0x3c/0x68 [ 16.746859] kasan_save_track+0x20/0x40 [ 16.746901] kasan_save_alloc_info+0x40/0x58 [ 16.748037] __kasan_kmalloc+0xd4/0xd8 [ 16.748099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.748438] kmalloc_oob_memset_2+0xb0/0x2f8 [ 16.748492] kunit_try_run_case+0x170/0x3f0 [ 16.748529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.748571] kthread+0x328/0x630 [ 16.748602] ret_from_fork+0x10/0x20 [ 16.748638] [ 16.748658] The buggy address belongs to the object at fff00000c638b900 [ 16.748658] which belongs to the cache kmalloc-128 of size 128 [ 16.748715] The buggy address is located 119 bytes inside of [ 16.748715] allocated 120-byte region [fff00000c638b900, fff00000c638b978) [ 16.748776] [ 16.748797] The buggy address belongs to the physical page: [ 16.748828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b [ 16.748880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.748929] page_type: f5(slab) [ 16.748967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.749018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.749056] page dumped because: kasan: bad access detected [ 16.749089] [ 16.749106] Memory state around the buggy address: [ 16.749150] fff00000c638b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.749194] fff00000c638b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.749235] >fff00000c638b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.749272] ^ [ 16.749311] fff00000c638b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.749354] fff00000c638ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.749392] ==================================================================
[ 12.638755] ================================================================== [ 12.639351] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 12.639661] Write of size 2 at addr ffff8881031db977 by task kunit_try_catch/189 [ 12.640005] [ 12.640189] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.640232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.640243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.640262] Call Trace: [ 12.640273] <TASK> [ 12.640288] dump_stack_lvl+0x73/0xb0 [ 12.640325] print_report+0xd1/0x650 [ 12.640346] ? __virt_addr_valid+0x1db/0x2d0 [ 12.640367] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.640388] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.640411] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.640456] kasan_report+0x141/0x180 [ 12.640478] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.640504] kasan_check_range+0x10c/0x1c0 [ 12.640540] __asan_memset+0x27/0x50 [ 12.640558] kmalloc_oob_memset_2+0x166/0x330 [ 12.640581] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 12.640603] ? __schedule+0x10cc/0x2b60 [ 12.640625] ? __pfx_read_tsc+0x10/0x10 [ 12.640647] ? ktime_get_ts64+0x86/0x230 [ 12.640670] kunit_try_run_case+0x1a5/0x480 [ 12.640712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.640735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.640759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.640793] ? __kthread_parkme+0x82/0x180 [ 12.640814] ? preempt_count_sub+0x50/0x80 [ 12.640838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.640862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.640885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.640910] kthread+0x337/0x6f0 [ 12.640929] ? trace_preempt_on+0x20/0xc0 [ 12.640952] ? __pfx_kthread+0x10/0x10 [ 12.640972] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.640993] ? calculate_sigpending+0x7b/0xa0 [ 12.641017] ? __pfx_kthread+0x10/0x10 [ 12.641055] ret_from_fork+0x116/0x1d0 [ 12.641073] ? __pfx_kthread+0x10/0x10 [ 12.641093] ret_from_fork_asm+0x1a/0x30 [ 12.641124] </TASK> [ 12.641133] [ 12.648974] Allocated by task 189: [ 12.649117] kasan_save_stack+0x45/0x70 [ 12.649264] kasan_save_track+0x18/0x40 [ 12.649606] kasan_save_alloc_info+0x3b/0x50 [ 12.649838] __kasan_kmalloc+0xb7/0xc0 [ 12.650064] __kmalloc_cache_noprof+0x189/0x420 [ 12.650289] kmalloc_oob_memset_2+0xac/0x330 [ 12.650436] kunit_try_run_case+0x1a5/0x480 [ 12.650620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.650886] kthread+0x337/0x6f0 [ 12.651083] ret_from_fork+0x116/0x1d0 [ 12.651268] ret_from_fork_asm+0x1a/0x30 [ 12.651440] [ 12.651548] The buggy address belongs to the object at ffff8881031db900 [ 12.651548] which belongs to the cache kmalloc-128 of size 128 [ 12.652121] The buggy address is located 119 bytes inside of [ 12.652121] allocated 120-byte region [ffff8881031db900, ffff8881031db978) [ 12.652635] [ 12.652720] The buggy address belongs to the physical page: [ 12.652890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031db [ 12.653441] flags: 0x200000000000000(node=0|zone=2) [ 12.653786] page_type: f5(slab) [ 12.653918] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.654555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.654910] page dumped because: kasan: bad access detected [ 12.655133] [ 12.655327] Memory state around the buggy address: [ 12.655578] ffff8881031db800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.655815] ffff8881031db880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.656088] >ffff8881031db900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.656439] ^ [ 12.656794] ffff8881031db980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.657264] ffff8881031dba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.657509] ==================================================================