Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.966470] ================================================================== [ 16.966612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 16.966667] Write of size 16 at addr fff00000c635ae69 by task kunit_try_catch/179 [ 16.966803] [ 16.966890] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.967031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.967100] Hardware name: linux,dummy-virt (DT) [ 16.967221] Call trace: [ 16.967288] show_stack+0x20/0x38 (C) [ 16.967395] dump_stack_lvl+0x8c/0xd0 [ 16.967514] print_report+0x118/0x608 [ 16.967591] kasan_report+0xdc/0x128 [ 16.967646] kasan_check_range+0x100/0x1a8 [ 16.967692] __asan_memset+0x34/0x78 [ 16.967732] kmalloc_oob_memset_16+0x150/0x2f8 [ 16.967775] kunit_try_run_case+0x170/0x3f0 [ 16.967864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.967918] kthread+0x328/0x630 [ 16.967957] ret_from_fork+0x10/0x20 [ 16.968013] [ 16.968031] Allocated by task 179: [ 16.968057] kasan_save_stack+0x3c/0x68 [ 16.968097] kasan_save_track+0x20/0x40 [ 16.968271] kasan_save_alloc_info+0x40/0x58 [ 16.968315] __kasan_kmalloc+0xd4/0xd8 [ 16.968363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.968461] kmalloc_oob_memset_16+0xb0/0x2f8 [ 16.968508] kunit_try_run_case+0x170/0x3f0 [ 16.968594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.968669] kthread+0x328/0x630 [ 16.968804] ret_from_fork+0x10/0x20 [ 16.968859] [ 16.968878] The buggy address belongs to the object at fff00000c635ae00 [ 16.968878] which belongs to the cache kmalloc-128 of size 128 [ 16.968988] The buggy address is located 105 bytes inside of [ 16.968988] allocated 120-byte region [fff00000c635ae00, fff00000c635ae78) [ 16.969060] [ 16.969097] The buggy address belongs to the physical page: [ 16.969149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.969222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.969285] page_type: f5(slab) [ 16.969322] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.969392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.969664] page dumped because: kasan: bad access detected [ 16.969725] [ 16.969776] Memory state around the buggy address: [ 16.969828] fff00000c635ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.969897] fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.969964] >fff00000c635ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.970010] ^ [ 16.970083] fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.970204] fff00000c635af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.970273] ==================================================================
[ 16.923893] ================================================================== [ 16.923961] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 16.924012] Write of size 16 at addr fff00000c63cdd69 by task kunit_try_catch/179 [ 16.924060] [ 16.924412] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.924569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.924664] Hardware name: linux,dummy-virt (DT) [ 16.924694] Call trace: [ 16.924747] show_stack+0x20/0x38 (C) [ 16.924813] dump_stack_lvl+0x8c/0xd0 [ 16.925138] print_report+0x118/0x608 [ 16.925322] kasan_report+0xdc/0x128 [ 16.925366] kasan_check_range+0x100/0x1a8 [ 16.925412] __asan_memset+0x34/0x78 [ 16.925452] kmalloc_oob_memset_16+0x150/0x2f8 [ 16.925507] kunit_try_run_case+0x170/0x3f0 [ 16.925555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.925743] kthread+0x328/0x630 [ 16.925785] ret_from_fork+0x10/0x20 [ 16.926382] [ 16.926405] Allocated by task 179: [ 16.926551] kasan_save_stack+0x3c/0x68 [ 16.926594] kasan_save_track+0x20/0x40 [ 16.926641] kasan_save_alloc_info+0x40/0x58 [ 16.926680] __kasan_kmalloc+0xd4/0xd8 [ 16.926853] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.927054] kmalloc_oob_memset_16+0xb0/0x2f8 [ 16.927112] kunit_try_run_case+0x170/0x3f0 [ 16.927148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.927191] kthread+0x328/0x630 [ 16.927223] ret_from_fork+0x10/0x20 [ 16.927305] [ 16.927325] The buggy address belongs to the object at fff00000c63cdd00 [ 16.927325] which belongs to the cache kmalloc-128 of size 128 [ 16.927428] The buggy address is located 105 bytes inside of [ 16.927428] allocated 120-byte region [fff00000c63cdd00, fff00000c63cdd78) [ 16.927488] [ 16.927508] The buggy address belongs to the physical page: [ 16.927544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd [ 16.927769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.927832] page_type: f5(slab) [ 16.927868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.927926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.927985] page dumped because: kasan: bad access detected [ 16.928064] [ 16.928082] Memory state around the buggy address: [ 16.928185] fff00000c63cdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.928375] fff00000c63cdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.928511] >fff00000c63cdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.928549] ^ [ 16.928586] fff00000c63cdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.928639] fff00000c63cde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.928675] ==================================================================
[ 13.516417] ================================================================== [ 13.517091] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 13.517415] Write of size 16 at addr ffff88810254d469 by task kunit_try_catch/196 [ 13.517694] [ 13.517813] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.517888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.517909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.517955] Call Trace: [ 13.517980] <TASK> [ 13.518007] dump_stack_lvl+0x73/0xb0 [ 13.518060] print_report+0xd1/0x650 [ 13.518100] ? __virt_addr_valid+0x1db/0x2d0 [ 13.518136] ? kmalloc_oob_memset_16+0x166/0x330 [ 13.518600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.518694] ? kmalloc_oob_memset_16+0x166/0x330 [ 13.518728] kasan_report+0x141/0x180 [ 13.518762] ? kmalloc_oob_memset_16+0x166/0x330 [ 13.518800] kasan_check_range+0x10c/0x1c0 [ 13.518837] __asan_memset+0x27/0x50 [ 13.518870] kmalloc_oob_memset_16+0x166/0x330 [ 13.518907] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 13.518948] ? __schedule+0x10cc/0x2b60 [ 13.518991] ? __pfx_read_tsc+0x10/0x10 [ 13.519028] ? ktime_get_ts64+0x86/0x230 [ 13.519074] kunit_try_run_case+0x1a5/0x480 [ 13.519129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.519166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.519208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.519250] ? __kthread_parkme+0x82/0x180 [ 13.519288] ? preempt_count_sub+0x50/0x80 [ 13.519333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.519375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.519417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.519456] kthread+0x337/0x6f0 [ 13.519483] ? trace_preempt_on+0x20/0xc0 [ 13.519510] ? __pfx_kthread+0x10/0x10 [ 13.519546] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.519573] ? calculate_sigpending+0x7b/0xa0 [ 13.519604] ? __pfx_kthread+0x10/0x10 [ 13.519649] ret_from_fork+0x116/0x1d0 [ 13.519669] ? __pfx_kthread+0x10/0x10 [ 13.519687] ret_from_fork_asm+0x1a/0x30 [ 13.519715] </TASK> [ 13.519727] [ 13.529840] Allocated by task 196: [ 13.530299] kasan_save_stack+0x45/0x70 [ 13.530744] kasan_save_track+0x18/0x40 [ 13.531284] kasan_save_alloc_info+0x3b/0x50 [ 13.531735] __kasan_kmalloc+0xb7/0xc0 [ 13.532036] __kmalloc_cache_noprof+0x189/0x420 [ 13.532664] kmalloc_oob_memset_16+0xac/0x330 [ 13.532994] kunit_try_run_case+0x1a5/0x480 [ 13.533276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.533526] kthread+0x337/0x6f0 [ 13.533698] ret_from_fork+0x116/0x1d0 [ 13.533859] ret_from_fork_asm+0x1a/0x30 [ 13.534035] [ 13.534137] The buggy address belongs to the object at ffff88810254d400 [ 13.534137] which belongs to the cache kmalloc-128 of size 128 [ 13.534966] The buggy address is located 105 bytes inside of [ 13.534966] allocated 120-byte region [ffff88810254d400, ffff88810254d478) [ 13.535802] [ 13.535959] The buggy address belongs to the physical page: [ 13.537061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 13.537406] flags: 0x200000000000000(node=0|zone=2) [ 13.537612] page_type: f5(slab) [ 13.537781] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.538035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.538274] page dumped because: kasan: bad access detected [ 13.538632] [ 13.538807] Memory state around the buggy address: [ 13.539133] ffff88810254d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.539803] ffff88810254d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.540342] >ffff88810254d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.541043] ^ [ 13.541670] ffff88810254d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.542921] ffff88810254d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.543500] ==================================================================
[ 13.672457] ================================================================== [ 13.674185] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 13.675311] Write of size 16 at addr ffff888102c3fc69 by task kunit_try_catch/195 [ 13.676330] [ 13.676693] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.676772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.676785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.676807] Call Trace: [ 13.676821] <TASK> [ 13.676840] dump_stack_lvl+0x73/0xb0 [ 13.676871] print_report+0xd1/0x650 [ 13.676893] ? __virt_addr_valid+0x1db/0x2d0 [ 13.676917] ? kmalloc_oob_memset_16+0x166/0x330 [ 13.676937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.676962] ? kmalloc_oob_memset_16+0x166/0x330 [ 13.676984] kasan_report+0x141/0x180 [ 13.677005] ? kmalloc_oob_memset_16+0x166/0x330 [ 13.677032] kasan_check_range+0x10c/0x1c0 [ 13.677070] __asan_memset+0x27/0x50 [ 13.677089] kmalloc_oob_memset_16+0x166/0x330 [ 13.677111] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 13.677134] ? __schedule+0x10cc/0x2b60 [ 13.677156] ? __pfx_read_tsc+0x10/0x10 [ 13.677177] ? ktime_get_ts64+0x86/0x230 [ 13.677202] kunit_try_run_case+0x1a5/0x480 [ 13.677233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.677255] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.677278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.677300] ? __kthread_parkme+0x82/0x180 [ 13.677320] ? preempt_count_sub+0x50/0x80 [ 13.677344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.677367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.677389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.677410] kthread+0x337/0x6f0 [ 13.677429] ? trace_preempt_on+0x20/0xc0 [ 13.677452] ? __pfx_kthread+0x10/0x10 [ 13.677472] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.677492] ? calculate_sigpending+0x7b/0xa0 [ 13.677517] ? __pfx_kthread+0x10/0x10 [ 13.677542] ret_from_fork+0x116/0x1d0 [ 13.677560] ? __pfx_kthread+0x10/0x10 [ 13.677581] ret_from_fork_asm+0x1a/0x30 [ 13.677613] </TASK> [ 13.677624] [ 13.688359] Allocated by task 195: [ 13.689354] kasan_save_stack+0x45/0x70 [ 13.689558] kasan_save_track+0x18/0x40 [ 13.690133] kasan_save_alloc_info+0x3b/0x50 [ 13.690926] __kasan_kmalloc+0xb7/0xc0 [ 13.691390] __kmalloc_cache_noprof+0x189/0x420 [ 13.691569] kmalloc_oob_memset_16+0xac/0x330 [ 13.692292] kunit_try_run_case+0x1a5/0x480 [ 13.692693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.693529] kthread+0x337/0x6f0 [ 13.693880] ret_from_fork+0x116/0x1d0 [ 13.694087] ret_from_fork_asm+0x1a/0x30 [ 13.694439] [ 13.694521] The buggy address belongs to the object at ffff888102c3fc00 [ 13.694521] which belongs to the cache kmalloc-128 of size 128 [ 13.695898] The buggy address is located 105 bytes inside of [ 13.695898] allocated 120-byte region [ffff888102c3fc00, ffff888102c3fc78) [ 13.697029] [ 13.697341] The buggy address belongs to the physical page: [ 13.698032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f [ 13.698318] flags: 0x200000000000000(node=0|zone=2) [ 13.698504] page_type: f5(slab) [ 13.698639] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.699666] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.700533] page dumped because: kasan: bad access detected [ 13.701158] [ 13.701330] Memory state around the buggy address: [ 13.701916] ffff888102c3fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.702170] ffff888102c3fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.702400] >ffff888102c3fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.702632] ^ [ 13.703363] ffff888102c3fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.704120] ffff888102c3fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.704891] ==================================================================
[ 26.161061] ================================================================== [ 26.172413] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 26.179727] Write of size 16 at addr ffff8881066f8469 by task kunit_try_catch/219 [ 26.187213] [ 26.188715] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 26.188724] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 26.188727] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.188730] Call Trace: [ 26.188732] <TASK> [ 26.188734] dump_stack_lvl+0x73/0xb0 [ 26.188738] print_report+0xd1/0x650 [ 26.188742] ? __virt_addr_valid+0x1db/0x2d0 [ 26.188746] ? kmalloc_oob_memset_16+0x166/0x330 [ 26.188750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.188755] ? kmalloc_oob_memset_16+0x166/0x330 [ 26.188759] kasan_report+0x141/0x180 [ 26.188763] ? kmalloc_oob_memset_16+0x166/0x330 [ 26.188768] kasan_check_range+0x10c/0x1c0 [ 26.188772] __asan_memset+0x27/0x50 [ 26.188775] kmalloc_oob_memset_16+0x166/0x330 [ 26.188779] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 26.188783] ? __schedule+0x10cc/0x2b60 [ 26.188787] ? ktime_get_ts64+0x83/0x230 [ 26.188792] kunit_try_run_case+0x1a2/0x480 [ 26.188796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.188800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.188804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.188808] ? __kthread_parkme+0x82/0x180 [ 26.188812] ? preempt_count_sub+0x50/0x80 [ 26.188816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.188820] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.188824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.188829] kthread+0x334/0x6f0 [ 26.188832] ? trace_preempt_on+0x20/0xc0 [ 26.188836] ? __pfx_kthread+0x10/0x10 [ 26.188840] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.188843] ? calculate_sigpending+0x7b/0xa0 [ 26.188848] ? __pfx_kthread+0x10/0x10 [ 26.188852] ret_from_fork+0x113/0x1d0 [ 26.188855] ? __pfx_kthread+0x10/0x10 [ 26.188859] ret_from_fork_asm+0x1a/0x30 [ 26.188864] </TASK> [ 26.188866] [ 26.358303] Allocated by task 219: [ 26.361706] kasan_save_stack+0x45/0x70 [ 26.365548] kasan_save_track+0x18/0x40 [ 26.369417] kasan_save_alloc_info+0x3b/0x50 [ 26.373695] __kasan_kmalloc+0xb7/0xc0 [ 26.377445] __kmalloc_cache_noprof+0x189/0x420 [ 26.381977] kmalloc_oob_memset_16+0xac/0x330 [ 26.386360] kunit_try_run_case+0x1a2/0x480 [ 26.390595] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.395993] kthread+0x334/0x6f0 [ 26.399224] ret_from_fork+0x113/0x1d0 [ 26.402977] ret_from_fork_asm+0x1a/0x30 [ 26.406903] [ 26.408421] The buggy address belongs to the object at ffff8881066f8400 [ 26.408421] which belongs to the cache kmalloc-128 of size 128 [ 26.420937] The buggy address is located 105 bytes inside of [ 26.420937] allocated 120-byte region [ffff8881066f8400, ffff8881066f8478) [ 26.433546] [ 26.435044] The buggy address belongs to the physical page: [ 26.440618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 26.448624] flags: 0x200000000000000(node=0|zone=2) [ 26.453506] page_type: f5(slab) [ 26.456651] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 26.464416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.472154] page dumped because: kasan: bad access detected [ 26.477727] [ 26.479227] Memory state around the buggy address: [ 26.484019] ffff8881066f8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.491239] ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.498458] >ffff8881066f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.505677] ^ [ 26.512810] ffff8881066f8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.520029] ffff8881066f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.527248] ==================================================================