Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.949415] ================================================================== [ 16.949478] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 16.949529] Write of size 4 at addr fff00000c635ac75 by task kunit_try_catch/175 [ 16.949577] [ 16.949610] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.949700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.949725] Hardware name: linux,dummy-virt (DT) [ 16.949753] Call trace: [ 16.949774] show_stack+0x20/0x38 (C) [ 16.949818] dump_stack_lvl+0x8c/0xd0 [ 16.949862] print_report+0x118/0x608 [ 16.949905] kasan_report+0xdc/0x128 [ 16.949947] kasan_check_range+0x100/0x1a8 [ 16.950008] __asan_memset+0x34/0x78 [ 16.950123] kmalloc_oob_memset_4+0x150/0x300 [ 16.950178] kunit_try_run_case+0x170/0x3f0 [ 16.950253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.950329] kthread+0x328/0x630 [ 16.950396] ret_from_fork+0x10/0x20 [ 16.950458] [ 16.950476] Allocated by task 175: [ 16.950503] kasan_save_stack+0x3c/0x68 [ 16.950568] kasan_save_track+0x20/0x40 [ 16.950605] kasan_save_alloc_info+0x40/0x58 [ 16.950680] __kasan_kmalloc+0xd4/0xd8 [ 16.950715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.950776] kmalloc_oob_memset_4+0xb0/0x300 [ 16.950815] kunit_try_run_case+0x170/0x3f0 [ 16.950852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.950894] kthread+0x328/0x630 [ 16.951063] ret_from_fork+0x10/0x20 [ 16.951264] [ 16.951317] The buggy address belongs to the object at fff00000c635ac00 [ 16.951317] which belongs to the cache kmalloc-128 of size 128 [ 16.951448] The buggy address is located 117 bytes inside of [ 16.951448] allocated 120-byte region [fff00000c635ac00, fff00000c635ac78) [ 16.951519] [ 16.951539] The buggy address belongs to the physical page: [ 16.951568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.951628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.951683] page_type: f5(slab) [ 16.951720] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.951776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.951814] page dumped because: kasan: bad access detected [ 16.951844] [ 16.951861] Memory state around the buggy address: [ 16.951902] fff00000c635ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.951942] fff00000c635ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952288] >fff00000c635ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.952465] ^ [ 16.952561] fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952602] fff00000c635ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952640] ==================================================================
[ 16.893636] ================================================================== [ 16.893761] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 16.893940] Write of size 4 at addr fff00000c63cdb75 by task kunit_try_catch/175 [ 16.894031] [ 16.894277] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.894501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.894528] Hardware name: linux,dummy-virt (DT) [ 16.894557] Call trace: [ 16.894580] show_stack+0x20/0x38 (C) [ 16.894791] dump_stack_lvl+0x8c/0xd0 [ 16.894880] print_report+0x118/0x608 [ 16.894943] kasan_report+0xdc/0x128 [ 16.894987] kasan_check_range+0x100/0x1a8 [ 16.895033] __asan_memset+0x34/0x78 [ 16.895073] kmalloc_oob_memset_4+0x150/0x300 [ 16.895140] kunit_try_run_case+0x170/0x3f0 [ 16.895413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.895480] kthread+0x328/0x630 [ 16.895532] ret_from_fork+0x10/0x20 [ 16.895800] [ 16.895819] Allocated by task 175: [ 16.895846] kasan_save_stack+0x3c/0x68 [ 16.895886] kasan_save_track+0x20/0x40 [ 16.895942] kasan_save_alloc_info+0x40/0x58 [ 16.896038] __kasan_kmalloc+0xd4/0xd8 [ 16.896075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.896453] kmalloc_oob_memset_4+0xb0/0x300 [ 16.896813] kunit_try_run_case+0x170/0x3f0 [ 16.896852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.896894] kthread+0x328/0x630 [ 16.896985] ret_from_fork+0x10/0x20 [ 16.897173] [ 16.897237] The buggy address belongs to the object at fff00000c63cdb00 [ 16.897237] which belongs to the cache kmalloc-128 of size 128 [ 16.897330] The buggy address is located 117 bytes inside of [ 16.897330] allocated 120-byte region [fff00000c63cdb00, fff00000c63cdb78) [ 16.897393] [ 16.897419] The buggy address belongs to the physical page: [ 16.897539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd [ 16.897627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.897768] page_type: f5(slab) [ 16.897869] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.897925] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.897963] page dumped because: kasan: bad access detected [ 16.898018] [ 16.898036] Memory state around the buggy address: [ 16.898066] fff00000c63cda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.898107] fff00000c63cda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.898234] >fff00000c63cdb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.898559] ^ [ 16.898795] fff00000c63cdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.898995] fff00000c63cdc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.899117] ==================================================================
[ 13.454702] ================================================================== [ 13.455541] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 13.456208] Write of size 4 at addr ffff888102aa0675 by task kunit_try_catch/192 [ 13.456458] [ 13.456660] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.456759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.456797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.456837] Call Trace: [ 13.456874] <TASK> [ 13.456902] dump_stack_lvl+0x73/0xb0 [ 13.456988] print_report+0xd1/0x650 [ 13.457195] ? __virt_addr_valid+0x1db/0x2d0 [ 13.457254] ? kmalloc_oob_memset_4+0x166/0x330 [ 13.457297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.457337] ? kmalloc_oob_memset_4+0x166/0x330 [ 13.457363] kasan_report+0x141/0x180 [ 13.457384] ? kmalloc_oob_memset_4+0x166/0x330 [ 13.457408] kasan_check_range+0x10c/0x1c0 [ 13.457429] __asan_memset+0x27/0x50 [ 13.457446] kmalloc_oob_memset_4+0x166/0x330 [ 13.457466] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 13.457486] ? __schedule+0x10cc/0x2b60 [ 13.457512] ? __pfx_read_tsc+0x10/0x10 [ 13.457540] ? ktime_get_ts64+0x86/0x230 [ 13.457574] kunit_try_run_case+0x1a5/0x480 [ 13.457608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.457646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.457669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.457689] ? __kthread_parkme+0x82/0x180 [ 13.457707] ? preempt_count_sub+0x50/0x80 [ 13.457727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.457748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.457769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.457788] kthread+0x337/0x6f0 [ 13.457806] ? trace_preempt_on+0x20/0xc0 [ 13.457826] ? __pfx_kthread+0x10/0x10 [ 13.457845] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.457863] ? calculate_sigpending+0x7b/0xa0 [ 13.457884] ? __pfx_kthread+0x10/0x10 [ 13.457902] ret_from_fork+0x116/0x1d0 [ 13.457929] ? __pfx_kthread+0x10/0x10 [ 13.457949] ret_from_fork_asm+0x1a/0x30 [ 13.457977] </TASK> [ 13.457989] [ 13.469682] Allocated by task 192: [ 13.470050] kasan_save_stack+0x45/0x70 [ 13.470363] kasan_save_track+0x18/0x40 [ 13.470673] kasan_save_alloc_info+0x3b/0x50 [ 13.471365] __kasan_kmalloc+0xb7/0xc0 [ 13.471691] __kmalloc_cache_noprof+0x189/0x420 [ 13.472306] kmalloc_oob_memset_4+0xac/0x330 [ 13.472719] kunit_try_run_case+0x1a5/0x480 [ 13.473224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.473637] kthread+0x337/0x6f0 [ 13.474082] ret_from_fork+0x116/0x1d0 [ 13.474678] ret_from_fork_asm+0x1a/0x30 [ 13.474786] [ 13.474840] The buggy address belongs to the object at ffff888102aa0600 [ 13.474840] which belongs to the cache kmalloc-128 of size 128 [ 13.475026] The buggy address is located 117 bytes inside of [ 13.475026] allocated 120-byte region [ffff888102aa0600, ffff888102aa0678) [ 13.475312] [ 13.475419] The buggy address belongs to the physical page: [ 13.475707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0 [ 13.476327] flags: 0x200000000000000(node=0|zone=2) [ 13.476580] page_type: f5(slab) [ 13.476737] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.476962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.477477] page dumped because: kasan: bad access detected [ 13.478073] [ 13.478314] Memory state around the buggy address: [ 13.478771] ffff888102aa0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.479273] ffff888102aa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.479484] >ffff888102aa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.480083] ^ [ 13.480401] ffff888102aa0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.481015] ffff888102aa0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.481322] ==================================================================
[ 13.618915] ================================================================== [ 13.620371] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 13.621336] Write of size 4 at addr ffff8881031acf75 by task kunit_try_catch/191 [ 13.621622] [ 13.621978] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.622028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.622041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.622076] Call Trace: [ 13.622089] <TASK> [ 13.622105] dump_stack_lvl+0x73/0xb0 [ 13.622136] print_report+0xd1/0x650 [ 13.622157] ? __virt_addr_valid+0x1db/0x2d0 [ 13.622179] ? kmalloc_oob_memset_4+0x166/0x330 [ 13.622199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.622224] ? kmalloc_oob_memset_4+0x166/0x330 [ 13.622245] kasan_report+0x141/0x180 [ 13.622266] ? kmalloc_oob_memset_4+0x166/0x330 [ 13.622292] kasan_check_range+0x10c/0x1c0 [ 13.622315] __asan_memset+0x27/0x50 [ 13.622333] kmalloc_oob_memset_4+0x166/0x330 [ 13.622355] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 13.622377] ? __schedule+0x10cc/0x2b60 [ 13.622398] ? __pfx_read_tsc+0x10/0x10 [ 13.622419] ? ktime_get_ts64+0x86/0x230 [ 13.622444] kunit_try_run_case+0x1a5/0x480 [ 13.622468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.622488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.622510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.622532] ? __kthread_parkme+0x82/0x180 [ 13.622551] ? preempt_count_sub+0x50/0x80 [ 13.622575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.622597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.622618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.622639] kthread+0x337/0x6f0 [ 13.622658] ? trace_preempt_on+0x20/0xc0 [ 13.622681] ? __pfx_kthread+0x10/0x10 [ 13.622708] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.622728] ? calculate_sigpending+0x7b/0xa0 [ 13.622750] ? __pfx_kthread+0x10/0x10 [ 13.622771] ret_from_fork+0x116/0x1d0 [ 13.622788] ? __pfx_kthread+0x10/0x10 [ 13.622808] ret_from_fork_asm+0x1a/0x30 [ 13.622839] </TASK> [ 13.622850] [ 13.635703] Allocated by task 191: [ 13.635905] kasan_save_stack+0x45/0x70 [ 13.636161] kasan_save_track+0x18/0x40 [ 13.636355] kasan_save_alloc_info+0x3b/0x50 [ 13.636573] __kasan_kmalloc+0xb7/0xc0 [ 13.636762] __kmalloc_cache_noprof+0x189/0x420 [ 13.636932] kmalloc_oob_memset_4+0xac/0x330 [ 13.637118] kunit_try_run_case+0x1a5/0x480 [ 13.637391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.637770] kthread+0x337/0x6f0 [ 13.637936] ret_from_fork+0x116/0x1d0 [ 13.638133] ret_from_fork_asm+0x1a/0x30 [ 13.638369] [ 13.638475] The buggy address belongs to the object at ffff8881031acf00 [ 13.638475] which belongs to the cache kmalloc-128 of size 128 [ 13.638939] The buggy address is located 117 bytes inside of [ 13.638939] allocated 120-byte region [ffff8881031acf00, ffff8881031acf78) [ 13.639634] [ 13.639778] The buggy address belongs to the physical page: [ 13.640022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031ac [ 13.640297] flags: 0x200000000000000(node=0|zone=2) [ 13.640476] page_type: f5(slab) [ 13.640607] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.640968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.641337] page dumped because: kasan: bad access detected [ 13.641614] [ 13.641718] Memory state around the buggy address: [ 13.641889] ffff8881031ace00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.642142] ffff8881031ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.642482] >ffff8881031acf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.642822] ^ [ 13.643164] ffff8881031acf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.643442] ffff8881031ad000: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc [ 13.643679] ==================================================================
[ 25.414888] ================================================================== [ 25.426215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 25.433441] Write of size 4 at addr ffff8881066f8375 by task kunit_try_catch/215 [ 25.440834] [ 25.442363] CPU: 3 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 25.442372] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 25.442387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.442390] Call Trace: [ 25.442392] <TASK> [ 25.442393] dump_stack_lvl+0x73/0xb0 [ 25.442398] print_report+0xd1/0x650 [ 25.442402] ? __virt_addr_valid+0x1db/0x2d0 [ 25.442406] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.442410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.442415] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.442419] kasan_report+0x141/0x180 [ 25.442422] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.442427] kasan_check_range+0x10c/0x1c0 [ 25.442432] __asan_memset+0x27/0x50 [ 25.442435] kmalloc_oob_memset_4+0x166/0x330 [ 25.442439] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 25.442443] ? __schedule+0x10cc/0x2b60 [ 25.442447] ? ktime_get_ts64+0x83/0x230 [ 25.442451] kunit_try_run_case+0x1a2/0x480 [ 25.442456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.442460] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.442464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.442468] ? __kthread_parkme+0x82/0x180 [ 25.442471] ? preempt_count_sub+0x50/0x80 [ 25.442475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.442480] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.442484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.442488] kthread+0x334/0x6f0 [ 25.442491] ? trace_preempt_on+0x20/0xc0 [ 25.442495] ? __pfx_kthread+0x10/0x10 [ 25.442499] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.442503] ? calculate_sigpending+0x7b/0xa0 [ 25.442507] ? __pfx_kthread+0x10/0x10 [ 25.442511] ret_from_fork+0x113/0x1d0 [ 25.442514] ? __pfx_kthread+0x10/0x10 [ 25.442518] ret_from_fork_asm+0x1a/0x30 [ 25.442523] </TASK> [ 25.442525] [ 25.611567] Allocated by task 215: [ 25.614973] kasan_save_stack+0x45/0x70 [ 25.618813] kasan_save_track+0x18/0x40 [ 25.622654] kasan_save_alloc_info+0x3b/0x50 [ 25.626932] __kasan_kmalloc+0xb7/0xc0 [ 25.630686] __kmalloc_cache_noprof+0x189/0x420 [ 25.635218] kmalloc_oob_memset_4+0xac/0x330 [ 25.639493] kunit_try_run_case+0x1a2/0x480 [ 25.643686] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.649084] kthread+0x334/0x6f0 [ 25.652318] ret_from_fork+0x113/0x1d0 [ 25.656096] ret_from_fork_asm+0x1a/0x30 [ 25.660022] [ 25.661521] The buggy address belongs to the object at ffff8881066f8300 [ 25.661521] which belongs to the cache kmalloc-128 of size 128 [ 25.674028] The buggy address is located 117 bytes inside of [ 25.674028] allocated 120-byte region [ffff8881066f8300, ffff8881066f8378) [ 25.686629] [ 25.688130] The buggy address belongs to the physical page: [ 25.693700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 25.701701] flags: 0x200000000000000(node=0|zone=2) [ 25.706581] page_type: f5(slab) [ 25.709727] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 25.717476] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.725222] page dumped because: kasan: bad access detected [ 25.730795] [ 25.732295] Memory state around the buggy address: [ 25.737087] ffff8881066f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.744307] ffff8881066f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.751533] >ffff8881066f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.758754] ^ [ 25.765886] ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.773106] ffff8881066f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.780324] ==================================================================