Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.684351] ================================================================== [ 16.684417] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.684480] Write of size 1 at addr fff00000c653200a by task kunit_try_catch/147 [ 16.684537] [ 16.684605] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.684722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.684747] Hardware name: linux,dummy-virt (DT) [ 16.684776] Call trace: [ 16.684814] show_stack+0x20/0x38 (C) [ 16.684943] dump_stack_lvl+0x8c/0xd0 [ 16.685030] print_report+0x118/0x608 [ 16.685090] kasan_report+0xdc/0x128 [ 16.685134] __asan_report_store1_noabort+0x20/0x30 [ 16.685193] kmalloc_large_oob_right+0x278/0x2b8 [ 16.685249] kunit_try_run_case+0x170/0x3f0 [ 16.685294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.685353] kthread+0x328/0x630 [ 16.685392] ret_from_fork+0x10/0x20 [ 16.685445] [ 16.685488] The buggy address belongs to the physical page: [ 16.685520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 16.685570] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.685621] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.685677] page_type: f8(unknown) [ 16.685713] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.685809] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.685911] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.686067] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.686211] head: 0bfffe0000000002 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff [ 16.686304] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.686418] page dumped because: kasan: bad access detected [ 16.686477] [ 16.686528] Memory state around the buggy address: [ 16.686961] fff00000c6531f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.687021] fff00000c6531f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.687062] >fff00000c6532000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.687098] ^ [ 16.687126] fff00000c6532080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.687166] fff00000c6532100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.687202] ==================================================================
[ 16.618531] ================================================================== [ 16.618628] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.618977] Write of size 1 at addr fff00000c770a00a by task kunit_try_catch/147 [ 16.619029] [ 16.619060] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.619140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.619164] Hardware name: linux,dummy-virt (DT) [ 16.619193] Call trace: [ 16.619224] show_stack+0x20/0x38 (C) [ 16.619388] dump_stack_lvl+0x8c/0xd0 [ 16.619452] print_report+0x118/0x608 [ 16.619498] kasan_report+0xdc/0x128 [ 16.619596] __asan_report_store1_noabort+0x20/0x30 [ 16.619645] kmalloc_large_oob_right+0x278/0x2b8 [ 16.619690] kunit_try_run_case+0x170/0x3f0 [ 16.620100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.620265] kthread+0x328/0x630 [ 16.620332] ret_from_fork+0x10/0x20 [ 16.620379] [ 16.620416] The buggy address belongs to the physical page: [ 16.620447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107708 [ 16.620509] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.620556] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.621080] page_type: f8(unknown) [ 16.621126] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.621174] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.621222] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.621268] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.621315] head: 0bfffe0000000002 ffffc1ffc31dc201 00000000ffffffff 00000000ffffffff [ 16.621513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.621712] page dumped because: kasan: bad access detected [ 16.621743] [ 16.621760] Memory state around the buggy address: [ 16.621792] fff00000c7709f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.621838] fff00000c7709f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.622040] >fff00000c770a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.622078] ^ [ 16.622105] fff00000c770a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.622145] fff00000c770a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.622181] ==================================================================
[ 12.695959] ================================================================== [ 12.696416] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 12.697028] Write of size 1 at addr ffff88810263e00a by task kunit_try_catch/164 [ 12.697558] [ 12.697800] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.697877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.697899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.697939] Call Trace: [ 12.697966] <TASK> [ 12.697996] dump_stack_lvl+0x73/0xb0 [ 12.698058] print_report+0xd1/0x650 [ 12.698097] ? __virt_addr_valid+0x1db/0x2d0 [ 12.698131] ? kmalloc_large_oob_right+0x2e9/0x330 [ 12.698151] ? kasan_addr_to_slab+0x11/0xa0 [ 12.698169] ? kmalloc_large_oob_right+0x2e9/0x330 [ 12.698189] kasan_report+0x141/0x180 [ 12.698208] ? kmalloc_large_oob_right+0x2e9/0x330 [ 12.698233] __asan_report_store1_noabort+0x1b/0x30 [ 12.698268] kmalloc_large_oob_right+0x2e9/0x330 [ 12.698290] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 12.698312] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 12.698336] kunit_try_run_case+0x1a5/0x480 [ 12.698359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.698379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.698401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.698421] ? __kthread_parkme+0x82/0x180 [ 12.698441] ? preempt_count_sub+0x50/0x80 [ 12.698464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.698486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.698550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.698584] kthread+0x337/0x6f0 [ 12.698638] ? trace_preempt_on+0x20/0xc0 [ 12.698676] ? __pfx_kthread+0x10/0x10 [ 12.698711] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.698747] ? calculate_sigpending+0x7b/0xa0 [ 12.698790] ? __pfx_kthread+0x10/0x10 [ 12.698830] ret_from_fork+0x116/0x1d0 [ 12.698866] ? __pfx_kthread+0x10/0x10 [ 12.698905] ret_from_fork_asm+0x1a/0x30 [ 12.698967] </TASK> [ 12.698991] [ 12.710992] The buggy address belongs to the physical page: [ 12.711786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10263c [ 12.712648] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.712981] flags: 0x200000000000040(head|node=0|zone=2) [ 12.713338] page_type: f8(unknown) [ 12.713824] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.714066] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.714823] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.715462] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.715892] head: 0200000000000002 ffffea0004098f01 00000000ffffffff 00000000ffffffff [ 12.716678] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.717002] page dumped because: kasan: bad access detected [ 12.717456] [ 12.717964] Memory state around the buggy address: [ 12.718311] ffff88810263df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.718532] ffff88810263df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.718863] >ffff88810263e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.719668] ^ [ 12.719937] ffff88810263e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.720148] ffff88810263e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.721041] ==================================================================
[ 12.952398] ================================================================== [ 12.953416] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 12.953686] Write of size 1 at addr ffff8881029ea00a by task kunit_try_catch/163 [ 12.955396] [ 12.955799] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.955847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.955858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.955879] Call Trace: [ 12.955892] <TASK> [ 12.955906] dump_stack_lvl+0x73/0xb0 [ 12.955934] print_report+0xd1/0x650 [ 12.955956] ? __virt_addr_valid+0x1db/0x2d0 [ 12.955978] ? kmalloc_large_oob_right+0x2e9/0x330 [ 12.955998] ? kasan_addr_to_slab+0x11/0xa0 [ 12.956018] ? kmalloc_large_oob_right+0x2e9/0x330 [ 12.956039] kasan_report+0x141/0x180 [ 12.956073] ? kmalloc_large_oob_right+0x2e9/0x330 [ 12.956100] __asan_report_store1_noabort+0x1b/0x30 [ 12.956123] kmalloc_large_oob_right+0x2e9/0x330 [ 12.956144] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 12.956166] ? __schedule+0x10cc/0x2b60 [ 12.956187] ? __pfx_read_tsc+0x10/0x10 [ 12.956208] ? ktime_get_ts64+0x86/0x230 [ 12.956233] kunit_try_run_case+0x1a5/0x480 [ 12.956256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.956277] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.956299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.956321] ? __kthread_parkme+0x82/0x180 [ 12.956340] ? preempt_count_sub+0x50/0x80 [ 12.956363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.956385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.956407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.956428] kthread+0x337/0x6f0 [ 12.956447] ? trace_preempt_on+0x20/0xc0 [ 12.956470] ? __pfx_kthread+0x10/0x10 [ 12.956490] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.956510] ? calculate_sigpending+0x7b/0xa0 [ 12.956533] ? __pfx_kthread+0x10/0x10 [ 12.956553] ret_from_fork+0x116/0x1d0 [ 12.956571] ? __pfx_kthread+0x10/0x10 [ 12.956591] ret_from_fork_asm+0x1a/0x30 [ 12.956621] </TASK> [ 12.956632] [ 12.976060] The buggy address belongs to the physical page: [ 12.976333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8 [ 12.976680] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.977034] flags: 0x200000000000040(head|node=0|zone=2) [ 12.977423] page_type: f8(unknown) [ 12.977573] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.978047] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.978448] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.978980] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.979349] head: 0200000000000002 ffffea00040a7a01 00000000ffffffff 00000000ffffffff [ 12.979691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.980159] page dumped because: kasan: bad access detected [ 12.980380] [ 12.980484] Memory state around the buggy address: [ 12.980807] ffff8881029e9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.981128] ffff8881029e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.981470] >ffff8881029ea000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.981892] ^ [ 12.982111] ffff8881029ea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.982446] ffff8881029ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.982883] ==================================================================
[ 16.393939] ================================================================== [ 16.405271] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 16.412758] Write of size 1 at addr ffff888104ffa00a by task kunit_try_catch/187 [ 16.420159] [ 16.421659] CPU: 3 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.421668] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 16.421670] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.421674] Call Trace: [ 16.421676] <TASK> [ 16.421678] dump_stack_lvl+0x73/0xb0 [ 16.421682] print_report+0xd1/0x650 [ 16.421686] ? __virt_addr_valid+0x1db/0x2d0 [ 16.421690] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.421694] ? kasan_addr_to_slab+0x11/0xa0 [ 16.421698] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.421702] kasan_report+0x141/0x180 [ 16.421706] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.421710] __asan_report_store1_noabort+0x1b/0x30 [ 16.421715] kmalloc_large_oob_right+0x2e9/0x330 [ 16.421719] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 16.421723] ? __schedule+0x10cc/0x2b60 [ 16.421727] ? ktime_get_ts64+0x83/0x230 [ 16.421731] kunit_try_run_case+0x1a2/0x480 [ 16.421736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.421740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.421744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.421748] ? __kthread_parkme+0x82/0x180 [ 16.421752] ? preempt_count_sub+0x50/0x80 [ 16.421756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.421760] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.421764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.421768] kthread+0x334/0x6f0 [ 16.421772] ? trace_preempt_on+0x20/0xc0 [ 16.421776] ? __pfx_kthread+0x10/0x10 [ 16.421780] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.421783] ? calculate_sigpending+0x7b/0xa0 [ 16.421788] ? __pfx_kthread+0x10/0x10 [ 16.421792] ret_from_fork+0x113/0x1d0 [ 16.421795] ? __pfx_kthread+0x10/0x10 [ 16.421799] ret_from_fork_asm+0x1a/0x30 [ 16.421804] </TASK> [ 16.421806] [ 16.588102] The buggy address belongs to the physical page: [ 16.593674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8 [ 16.601683] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.609361] flags: 0x200000000000040(head|node=0|zone=2) [ 16.614723] page_type: f8(unknown) [ 16.618133] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.625878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.633618] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.641446] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.649280] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff [ 16.657114] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.664937] page dumped because: kasan: bad access detected [ 16.670510] [ 16.672004] Memory state around the buggy address: [ 16.676794] ffff888104ff9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.684013] ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.691235] >ffff888104ffa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.698453] ^ [ 16.701945] ffff888104ffa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.709164] ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.716412] ==================================================================