Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.900347] ================================================================== [ 16.900523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.900577] Write of size 128 at addr fff00000c635aa00 by task kunit_try_catch/171 [ 16.900625] [ 16.900917] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.901178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.901212] Hardware name: linux,dummy-virt (DT) [ 16.901313] Call trace: [ 16.901334] show_stack+0x20/0x38 (C) [ 16.901488] dump_stack_lvl+0x8c/0xd0 [ 16.901559] print_report+0x118/0x608 [ 16.901699] kasan_report+0xdc/0x128 [ 16.901792] kasan_check_range+0x100/0x1a8 [ 16.901842] __asan_memset+0x34/0x78 [ 16.902178] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.902279] kunit_try_run_case+0x170/0x3f0 [ 16.902325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.902375] kthread+0x328/0x630 [ 16.902717] ret_from_fork+0x10/0x20 [ 16.903049] [ 16.903069] Allocated by task 171: [ 16.903096] kasan_save_stack+0x3c/0x68 [ 16.903136] kasan_save_track+0x20/0x40 [ 16.903172] kasan_save_alloc_info+0x40/0x58 [ 16.903519] __kasan_kmalloc+0xd4/0xd8 [ 16.903650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.903725] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.903762] kunit_try_run_case+0x170/0x3f0 [ 16.903798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.904128] kthread+0x328/0x630 [ 16.904225] ret_from_fork+0x10/0x20 [ 16.904316] [ 16.904348] The buggy address belongs to the object at fff00000c635aa00 [ 16.904348] which belongs to the cache kmalloc-128 of size 128 [ 16.904440] The buggy address is located 0 bytes inside of [ 16.904440] allocated 120-byte region [fff00000c635aa00, fff00000c635aa78) [ 16.904519] [ 16.904626] The buggy address belongs to the physical page: [ 16.904705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.904764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.904857] page_type: f5(slab) [ 16.904894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.904941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.904990] page dumped because: kasan: bad access detected [ 16.905019] [ 16.905037] Memory state around the buggy address: [ 16.905068] fff00000c635a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.905109] fff00000c635a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.905150] >fff00000c635aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.905279] ^ [ 16.905575] fff00000c635aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.905772] fff00000c635ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.905812] ==================================================================
[ 16.864065] ================================================================== [ 16.864127] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.864182] Write of size 128 at addr fff00000c63cd900 by task kunit_try_catch/171 [ 16.864231] [ 16.864536] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.864917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.865108] Hardware name: linux,dummy-virt (DT) [ 16.865174] Call trace: [ 16.865281] show_stack+0x20/0x38 (C) [ 16.865399] dump_stack_lvl+0x8c/0xd0 [ 16.865446] print_report+0x118/0x608 [ 16.865490] kasan_report+0xdc/0x128 [ 16.865532] kasan_check_range+0x100/0x1a8 [ 16.865578] __asan_memset+0x34/0x78 [ 16.865628] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.865673] kunit_try_run_case+0x170/0x3f0 [ 16.866173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.866231] kthread+0x328/0x630 [ 16.866271] ret_from_fork+0x10/0x20 [ 16.866320] [ 16.866338] Allocated by task 171: [ 16.866391] kasan_save_stack+0x3c/0x68 [ 16.866583] kasan_save_track+0x20/0x40 [ 16.866805] kasan_save_alloc_info+0x40/0x58 [ 16.866976] __kasan_kmalloc+0xd4/0xd8 [ 16.867014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.867219] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.867256] kunit_try_run_case+0x170/0x3f0 [ 16.867293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.867341] kthread+0x328/0x630 [ 16.867963] ret_from_fork+0x10/0x20 [ 16.868107] [ 16.868243] The buggy address belongs to the object at fff00000c63cd900 [ 16.868243] which belongs to the cache kmalloc-128 of size 128 [ 16.868631] The buggy address is located 0 bytes inside of [ 16.868631] allocated 120-byte region [fff00000c63cd900, fff00000c63cd978) [ 16.868859] [ 16.868881] The buggy address belongs to the physical page: [ 16.868920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd [ 16.868973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.869032] page_type: f5(slab) [ 16.869076] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.869424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.869669] page dumped because: kasan: bad access detected [ 16.869702] [ 16.869784] Memory state around the buggy address: [ 16.869864] fff00000c63cd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.869906] fff00000c63cd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.869958] >fff00000c63cd900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.870042] ^ [ 16.870082] fff00000c63cd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.870284] fff00000c63cda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.870322] ==================================================================
[ 13.388779] ================================================================== [ 13.389254] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 13.390312] Write of size 128 at addr ffff888102aa0500 by task kunit_try_catch/188 [ 13.390744] [ 13.390954] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.391024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.391037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.391064] Call Trace: [ 13.391080] <TASK> [ 13.391098] dump_stack_lvl+0x73/0xb0 [ 13.391148] print_report+0xd1/0x650 [ 13.391172] ? __virt_addr_valid+0x1db/0x2d0 [ 13.391193] ? kmalloc_oob_in_memset+0x15f/0x320 [ 13.391213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.391236] ? kmalloc_oob_in_memset+0x15f/0x320 [ 13.391256] kasan_report+0x141/0x180 [ 13.391276] ? kmalloc_oob_in_memset+0x15f/0x320 [ 13.391300] kasan_check_range+0x10c/0x1c0 [ 13.391321] __asan_memset+0x27/0x50 [ 13.391338] kmalloc_oob_in_memset+0x15f/0x320 [ 13.391358] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 13.391378] ? __schedule+0x10cc/0x2b60 [ 13.391398] ? __pfx_read_tsc+0x10/0x10 [ 13.391417] ? ktime_get_ts64+0x86/0x230 [ 13.391440] kunit_try_run_case+0x1a5/0x480 [ 13.391463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.391483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.391508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.391538] ? __kthread_parkme+0x82/0x180 [ 13.391566] ? preempt_count_sub+0x50/0x80 [ 13.391605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.391662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.391704] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.391744] kthread+0x337/0x6f0 [ 13.391781] ? trace_preempt_on+0x20/0xc0 [ 13.391825] ? __pfx_kthread+0x10/0x10 [ 13.391864] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.391902] ? calculate_sigpending+0x7b/0xa0 [ 13.391939] ? __pfx_kthread+0x10/0x10 [ 13.391968] ret_from_fork+0x116/0x1d0 [ 13.391995] ? __pfx_kthread+0x10/0x10 [ 13.392024] ret_from_fork_asm+0x1a/0x30 [ 13.392053] </TASK> [ 13.392066] [ 13.404155] Allocated by task 188: [ 13.404514] kasan_save_stack+0x45/0x70 [ 13.405496] kasan_save_track+0x18/0x40 [ 13.406236] kasan_save_alloc_info+0x3b/0x50 [ 13.406496] __kasan_kmalloc+0xb7/0xc0 [ 13.406969] __kmalloc_cache_noprof+0x189/0x420 [ 13.407239] kmalloc_oob_in_memset+0xac/0x320 [ 13.407443] kunit_try_run_case+0x1a5/0x480 [ 13.408231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.408788] kthread+0x337/0x6f0 [ 13.409093] ret_from_fork+0x116/0x1d0 [ 13.409416] ret_from_fork_asm+0x1a/0x30 [ 13.409897] [ 13.410019] The buggy address belongs to the object at ffff888102aa0500 [ 13.410019] which belongs to the cache kmalloc-128 of size 128 [ 13.410689] The buggy address is located 0 bytes inside of [ 13.410689] allocated 120-byte region [ffff888102aa0500, ffff888102aa0578) [ 13.411195] [ 13.411355] The buggy address belongs to the physical page: [ 13.412235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0 [ 13.412610] flags: 0x200000000000000(node=0|zone=2) [ 13.413484] page_type: f5(slab) [ 13.413780] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.414001] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.414549] page dumped because: kasan: bad access detected [ 13.414816] [ 13.414916] Memory state around the buggy address: [ 13.415096] ffff888102aa0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.415504] ffff888102aa0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.415942] >ffff888102aa0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.416235] ^ [ 13.416680] ffff888102aa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.416906] ffff888102aa0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.417144] ==================================================================
[ 13.543439] ================================================================== [ 13.544869] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 13.545415] Write of size 128 at addr ffff888102c3fa00 by task kunit_try_catch/187 [ 13.545674] [ 13.545783] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.545829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.545841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.545862] Call Trace: [ 13.545875] <TASK> [ 13.545891] dump_stack_lvl+0x73/0xb0 [ 13.545921] print_report+0xd1/0x650 [ 13.545944] ? __virt_addr_valid+0x1db/0x2d0 [ 13.545968] ? kmalloc_oob_in_memset+0x15f/0x320 [ 13.545990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.546015] ? kmalloc_oob_in_memset+0x15f/0x320 [ 13.546037] kasan_report+0x141/0x180 [ 13.546081] ? kmalloc_oob_in_memset+0x15f/0x320 [ 13.546109] kasan_check_range+0x10c/0x1c0 [ 13.546132] __asan_memset+0x27/0x50 [ 13.546152] kmalloc_oob_in_memset+0x15f/0x320 [ 13.546173] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 13.546196] ? __schedule+0x10cc/0x2b60 [ 13.546218] ? __pfx_read_tsc+0x10/0x10 [ 13.546239] ? ktime_get_ts64+0x86/0x230 [ 13.546264] kunit_try_run_case+0x1a5/0x480 [ 13.546290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.546312] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.546335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.546357] ? __kthread_parkme+0x82/0x180 [ 13.546377] ? preempt_count_sub+0x50/0x80 [ 13.546401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.546424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.546737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.546777] kthread+0x337/0x6f0 [ 13.546798] ? trace_preempt_on+0x20/0xc0 [ 13.546823] ? __pfx_kthread+0x10/0x10 [ 13.546843] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.546864] ? calculate_sigpending+0x7b/0xa0 [ 13.546888] ? __pfx_kthread+0x10/0x10 [ 13.546909] ret_from_fork+0x116/0x1d0 [ 13.546927] ? __pfx_kthread+0x10/0x10 [ 13.546948] ret_from_fork_asm+0x1a/0x30 [ 13.546980] </TASK> [ 13.546991] [ 13.563297] Allocated by task 187: [ 13.563438] kasan_save_stack+0x45/0x70 [ 13.563588] kasan_save_track+0x18/0x40 [ 13.563737] kasan_save_alloc_info+0x3b/0x50 [ 13.564491] __kasan_kmalloc+0xb7/0xc0 [ 13.564901] __kmalloc_cache_noprof+0x189/0x420 [ 13.565558] kmalloc_oob_in_memset+0xac/0x320 [ 13.566154] kunit_try_run_case+0x1a5/0x480 [ 13.566652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.567386] kthread+0x337/0x6f0 [ 13.567865] ret_from_fork+0x116/0x1d0 [ 13.568382] ret_from_fork_asm+0x1a/0x30 [ 13.568787] [ 13.569118] The buggy address belongs to the object at ffff888102c3fa00 [ 13.569118] which belongs to the cache kmalloc-128 of size 128 [ 13.569629] The buggy address is located 0 bytes inside of [ 13.569629] allocated 120-byte region [ffff888102c3fa00, ffff888102c3fa78) [ 13.570998] [ 13.571184] The buggy address belongs to the physical page: [ 13.571834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f [ 13.572873] flags: 0x200000000000000(node=0|zone=2) [ 13.573306] page_type: f5(slab) [ 13.573438] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.573682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.574668] page dumped because: kasan: bad access detected [ 13.575321] [ 13.575615] Memory state around the buggy address: [ 13.576240] ffff888102c3f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.577023] ffff888102c3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.577796] >ffff888102c3fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.578259] ^ [ 13.579012] ffff888102c3fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.579512] ffff888102c3fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.579774] ==================================================================
[ 24.668454] ================================================================== [ 24.679274] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 24.686589] Write of size 128 at addr ffff8881066f8100 by task kunit_try_catch/211 [ 24.694160] [ 24.695663] CPU: 3 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 24.695672] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 24.695675] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.695678] Call Trace: [ 24.695680] <TASK> [ 24.695682] dump_stack_lvl+0x73/0xb0 [ 24.695686] print_report+0xd1/0x650 [ 24.695690] ? __virt_addr_valid+0x1db/0x2d0 [ 24.695694] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.695698] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.695703] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.695707] kasan_report+0x141/0x180 [ 24.695711] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.695716] kasan_check_range+0x10c/0x1c0 [ 24.695721] __asan_memset+0x27/0x50 [ 24.695724] kmalloc_oob_in_memset+0x15f/0x320 [ 24.695728] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 24.695732] ? __schedule+0x10cc/0x2b60 [ 24.695736] ? ktime_get_ts64+0x83/0x230 [ 24.695740] kunit_try_run_case+0x1a2/0x480 [ 24.695745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.695749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.695753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.695757] ? __kthread_parkme+0x82/0x180 [ 24.695761] ? preempt_count_sub+0x50/0x80 [ 24.695765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.695769] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.695773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.695777] kthread+0x334/0x6f0 [ 24.695781] ? trace_preempt_on+0x20/0xc0 [ 24.695785] ? __pfx_kthread+0x10/0x10 [ 24.695789] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.695792] ? calculate_sigpending+0x7b/0xa0 [ 24.695797] ? __pfx_kthread+0x10/0x10 [ 24.695801] ret_from_fork+0x113/0x1d0 [ 24.695804] ? __pfx_kthread+0x10/0x10 [ 24.695807] ret_from_fork_asm+0x1a/0x30 [ 24.695813] </TASK> [ 24.695815] [ 24.865224] Allocated by task 211: [ 24.868629] kasan_save_stack+0x45/0x70 [ 24.872468] kasan_save_track+0x18/0x40 [ 24.876310] kasan_save_alloc_info+0x3b/0x50 [ 24.880589] __kasan_kmalloc+0xb7/0xc0 [ 24.884368] __kmalloc_cache_noprof+0x189/0x420 [ 24.888927] kmalloc_oob_in_memset+0xac/0x320 [ 24.893285] kunit_try_run_case+0x1a2/0x480 [ 24.897471] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.902870] kthread+0x334/0x6f0 [ 24.906104] ret_from_fork+0x113/0x1d0 [ 24.909856] ret_from_fork_asm+0x1a/0x30 [ 24.913782] [ 24.915283] The buggy address belongs to the object at ffff8881066f8100 [ 24.915283] which belongs to the cache kmalloc-128 of size 128 [ 24.927799] The buggy address is located 0 bytes inside of [ 24.927799] allocated 120-byte region [ffff8881066f8100, ffff8881066f8178) [ 24.940234] [ 24.941733] The buggy address belongs to the physical page: [ 24.947305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 24.955306] flags: 0x200000000000000(node=0|zone=2) [ 24.960185] page_type: f5(slab) [ 24.963349] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 24.971148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.978886] page dumped because: kasan: bad access detected [ 24.984461] [ 24.985957] Memory state around the buggy address: [ 24.990752] ffff8881066f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.997980] ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.005199] >ffff8881066f8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.012418] ^ [ 25.019549] ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.026770] ffff8881066f8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.033990] ==================================================================