Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 17.419825] ================================================================== [ 17.419887] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.419941] Read of size 1 at addr fff00000c77a60c8 by task kunit_try_catch/208 [ 17.420024] [ 17.420059] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.420140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.420166] Hardware name: linux,dummy-virt (DT) [ 17.420197] Call trace: [ 17.420219] show_stack+0x20/0x38 (C) [ 17.420419] dump_stack_lvl+0x8c/0xd0 [ 17.420570] print_report+0x118/0x608 [ 17.420638] kasan_report+0xdc/0x128 [ 17.420683] __asan_report_load1_noabort+0x20/0x30 [ 17.420734] kmem_cache_oob+0x344/0x430 [ 17.420778] kunit_try_run_case+0x170/0x3f0 [ 17.420842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.420915] kthread+0x328/0x630 [ 17.420962] ret_from_fork+0x10/0x20 [ 17.421048] [ 17.421087] Allocated by task 208: [ 17.421133] kasan_save_stack+0x3c/0x68 [ 17.421182] kasan_save_track+0x20/0x40 [ 17.421238] kasan_save_alloc_info+0x40/0x58 [ 17.421294] __kasan_slab_alloc+0xa8/0xb0 [ 17.421332] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.421378] kmem_cache_oob+0x12c/0x430 [ 17.421413] kunit_try_run_case+0x170/0x3f0 [ 17.421451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.421498] kthread+0x328/0x630 [ 17.421530] ret_from_fork+0x10/0x20 [ 17.421566] [ 17.421584] The buggy address belongs to the object at fff00000c77a6000 [ 17.421584] which belongs to the cache test_cache of size 200 [ 17.421802] The buggy address is located 0 bytes to the right of [ 17.421802] allocated 200-byte region [fff00000c77a6000, fff00000c77a60c8) [ 17.421873] [ 17.421921] The buggy address belongs to the physical page: [ 17.421953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a6 [ 17.422045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.422096] page_type: f5(slab) [ 17.422170] raw: 0bfffe0000000000 fff00000c5d09140 dead000000000122 0000000000000000 [ 17.422222] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.422279] page dumped because: kasan: bad access detected [ 17.422320] [ 17.422358] Memory state around the buggy address: [ 17.422406] fff00000c77a5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.422450] fff00000c77a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.422493] >fff00000c77a6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.422530] ^ [ 17.422754] fff00000c77a6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.422830] fff00000c77a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.422968] ==================================================================
[ 17.211740] ================================================================== [ 17.212783] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.213180] Read of size 1 at addr fff00000c77db0c8 by task kunit_try_catch/208 [ 17.213304] [ 17.213404] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.213491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.213519] Hardware name: linux,dummy-virt (DT) [ 17.213592] Call trace: [ 17.213666] show_stack+0x20/0x38 (C) [ 17.213759] dump_stack_lvl+0x8c/0xd0 [ 17.213817] print_report+0x118/0x608 [ 17.214276] kasan_report+0xdc/0x128 [ 17.214394] __asan_report_load1_noabort+0x20/0x30 [ 17.214531] kmem_cache_oob+0x344/0x430 [ 17.216931] kunit_try_run_case+0x170/0x3f0 [ 17.217008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.218177] kthread+0x328/0x630 [ 17.218250] ret_from_fork+0x10/0x20 [ 17.218300] [ 17.218319] Allocated by task 208: [ 17.218351] kasan_save_stack+0x3c/0x68 [ 17.218390] kasan_save_track+0x20/0x40 [ 17.218428] kasan_save_alloc_info+0x40/0x58 [ 17.218467] __kasan_slab_alloc+0xa8/0xb0 [ 17.218504] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.218543] kmem_cache_oob+0x12c/0x430 [ 17.218578] kunit_try_run_case+0x170/0x3f0 [ 17.218613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.218657] kthread+0x328/0x630 [ 17.218687] ret_from_fork+0x10/0x20 [ 17.218723] [ 17.218742] The buggy address belongs to the object at fff00000c77db000 [ 17.218742] which belongs to the cache test_cache of size 200 [ 17.218798] The buggy address is located 0 bytes to the right of [ 17.218798] allocated 200-byte region [fff00000c77db000, fff00000c77db0c8) [ 17.218863] [ 17.218884] The buggy address belongs to the physical page: [ 17.219149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077db [ 17.219218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.219268] page_type: f5(slab) [ 17.219309] raw: 0bfffe0000000000 fff00000c77d9000 dead000000000122 0000000000000000 [ 17.220622] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.223931] page dumped because: kasan: bad access detected [ 17.224057] [ 17.224179] Memory state around the buggy address: [ 17.224346] fff00000c77daf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224421] fff00000c77db000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.224523] >fff00000c77db080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.224644] ^ [ 17.224744] fff00000c77db100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224796] fff00000c77db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224834] ==================================================================
[ 14.089207] ================================================================== [ 14.089457] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 14.090032] Read of size 1 at addr ffff888102ab20c8 by task kunit_try_catch/225 [ 14.090387] [ 14.090567] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.090660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.090682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.090721] Call Trace: [ 14.090746] <TASK> [ 14.090774] dump_stack_lvl+0x73/0xb0 [ 14.090830] print_report+0xd1/0x650 [ 14.090864] ? __virt_addr_valid+0x1db/0x2d0 [ 14.090902] ? kmem_cache_oob+0x402/0x530 [ 14.090941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.090986] ? kmem_cache_oob+0x402/0x530 [ 14.091024] kasan_report+0x141/0x180 [ 14.091061] ? kmem_cache_oob+0x402/0x530 [ 14.091110] __asan_report_load1_noabort+0x18/0x20 [ 14.091148] kmem_cache_oob+0x402/0x530 [ 14.091182] ? trace_hardirqs_on+0x37/0xe0 [ 14.091225] ? __pfx_kmem_cache_oob+0x10/0x10 [ 14.091266] ? finish_task_switch.isra.0+0x153/0x700 [ 14.091304] ? __switch_to+0x47/0xf50 [ 14.091354] ? __pfx_read_tsc+0x10/0x10 [ 14.091386] ? ktime_get_ts64+0x86/0x230 [ 14.091427] kunit_try_run_case+0x1a5/0x480 [ 14.091467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.091538] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.091575] ? __kthread_parkme+0x82/0x180 [ 14.091608] ? preempt_count_sub+0x50/0x80 [ 14.091805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.091925] kthread+0x337/0x6f0 [ 14.091946] ? trace_preempt_on+0x20/0xc0 [ 14.091968] ? __pfx_kthread+0x10/0x10 [ 14.091986] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.092006] ? calculate_sigpending+0x7b/0xa0 [ 14.092028] ? __pfx_kthread+0x10/0x10 [ 14.092047] ret_from_fork+0x116/0x1d0 [ 14.092063] ? __pfx_kthread+0x10/0x10 [ 14.092081] ret_from_fork_asm+0x1a/0x30 [ 14.092130] </TASK> [ 14.092146] [ 14.102451] Allocated by task 225: [ 14.102769] kasan_save_stack+0x45/0x70 [ 14.103083] kasan_save_track+0x18/0x40 [ 14.103342] kasan_save_alloc_info+0x3b/0x50 [ 14.103644] __kasan_slab_alloc+0x91/0xa0 [ 14.103828] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.104147] kmem_cache_oob+0x157/0x530 [ 14.104461] kunit_try_run_case+0x1a5/0x480 [ 14.104903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.105265] kthread+0x337/0x6f0 [ 14.105461] ret_from_fork+0x116/0x1d0 [ 14.105857] ret_from_fork_asm+0x1a/0x30 [ 14.106084] [ 14.106268] The buggy address belongs to the object at ffff888102ab2000 [ 14.106268] which belongs to the cache test_cache of size 200 [ 14.106843] The buggy address is located 0 bytes to the right of [ 14.106843] allocated 200-byte region [ffff888102ab2000, ffff888102ab20c8) [ 14.108686] [ 14.109165] The buggy address belongs to the physical page: [ 14.110082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab2 [ 14.111702] flags: 0x200000000000000(node=0|zone=2) [ 14.111961] page_type: f5(slab) [ 14.112098] raw: 0200000000000000 ffff888100a55b40 dead000000000122 0000000000000000 [ 14.113852] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.115306] page dumped because: kasan: bad access detected [ 14.116448] [ 14.116728] Memory state around the buggy address: [ 14.116911] ffff888102ab1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.117138] ffff888102ab2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.117359] >ffff888102ab2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 14.117566] ^ [ 14.117762] ffff888102ab2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.118005] ffff888102ab2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.118201] ==================================================================
[ 14.242383] ================================================================== [ 14.243318] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 14.244079] Read of size 1 at addr ffff8881031c90c8 by task kunit_try_catch/224 [ 14.245016] [ 14.245331] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.245383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.245395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.245416] Call Trace: [ 14.245429] <TASK> [ 14.245447] dump_stack_lvl+0x73/0xb0 [ 14.245479] print_report+0xd1/0x650 [ 14.245502] ? __virt_addr_valid+0x1db/0x2d0 [ 14.245529] ? kmem_cache_oob+0x402/0x530 [ 14.245552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.245577] ? kmem_cache_oob+0x402/0x530 [ 14.245600] kasan_report+0x141/0x180 [ 14.245623] ? kmem_cache_oob+0x402/0x530 [ 14.245651] __asan_report_load1_noabort+0x18/0x20 [ 14.245675] kmem_cache_oob+0x402/0x530 [ 14.245916] ? trace_hardirqs_on+0x37/0xe0 [ 14.245973] ? __pfx_kmem_cache_oob+0x10/0x10 [ 14.245998] ? finish_task_switch.isra.0+0x153/0x700 [ 14.246020] ? __switch_to+0x47/0xf50 [ 14.246061] ? __pfx_read_tsc+0x10/0x10 [ 14.246083] ? ktime_get_ts64+0x86/0x230 [ 14.246108] kunit_try_run_case+0x1a5/0x480 [ 14.246134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.246156] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.246180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.246203] ? __kthread_parkme+0x82/0x180 [ 14.246222] ? preempt_count_sub+0x50/0x80 [ 14.246245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.246268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.246290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.246313] kthread+0x337/0x6f0 [ 14.246333] ? trace_preempt_on+0x20/0xc0 [ 14.246355] ? __pfx_kthread+0x10/0x10 [ 14.246376] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.246396] ? calculate_sigpending+0x7b/0xa0 [ 14.246420] ? __pfx_kthread+0x10/0x10 [ 14.246441] ret_from_fork+0x116/0x1d0 [ 14.246459] ? __pfx_kthread+0x10/0x10 [ 14.246480] ret_from_fork_asm+0x1a/0x30 [ 14.246511] </TASK> [ 14.246523] [ 14.263060] Allocated by task 224: [ 14.263702] kasan_save_stack+0x45/0x70 [ 14.264270] kasan_save_track+0x18/0x40 [ 14.264622] kasan_save_alloc_info+0x3b/0x50 [ 14.265269] __kasan_slab_alloc+0x91/0xa0 [ 14.265809] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.266272] kmem_cache_oob+0x157/0x530 [ 14.266458] kunit_try_run_case+0x1a5/0x480 [ 14.267105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.267679] kthread+0x337/0x6f0 [ 14.268079] ret_from_fork+0x116/0x1d0 [ 14.268469] ret_from_fork_asm+0x1a/0x30 [ 14.268616] [ 14.268689] The buggy address belongs to the object at ffff8881031c9000 [ 14.268689] which belongs to the cache test_cache of size 200 [ 14.270261] The buggy address is located 0 bytes to the right of [ 14.270261] allocated 200-byte region [ffff8881031c9000, ffff8881031c90c8) [ 14.271347] [ 14.271488] The buggy address belongs to the physical page: [ 14.272032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c9 [ 14.272427] flags: 0x200000000000000(node=0|zone=2) [ 14.272598] page_type: f5(slab) [ 14.272722] raw: 0200000000000000 ffff888101985500 dead000000000122 0000000000000000 [ 14.272980] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.273214] page dumped because: kasan: bad access detected [ 14.273386] [ 14.273457] Memory state around the buggy address: [ 14.273619] ffff8881031c8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.274296] ffff8881031c9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.275017] >ffff8881031c9080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 14.275885] ^ [ 14.276488] ffff8881031c9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.277200] ffff8881031c9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.277965] ==================================================================
[ 32.745574] ================================================================== [ 32.756420] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 32.763121] Read of size 1 at addr ffff88810561e0c8 by task kunit_try_catch/248 [ 32.770426] [ 32.771928] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 32.771936] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 32.771939] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 32.771943] Call Trace: [ 32.771944] <TASK> [ 32.771946] dump_stack_lvl+0x73/0xb0 [ 32.771951] print_report+0xd1/0x650 [ 32.771955] ? __virt_addr_valid+0x1db/0x2d0 [ 32.771959] ? kmem_cache_oob+0x402/0x530 [ 32.771963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.771968] ? kmem_cache_oob+0x402/0x530 [ 32.771973] kasan_report+0x141/0x180 [ 32.771977] ? kmem_cache_oob+0x402/0x530 [ 32.771982] __asan_report_load1_noabort+0x18/0x20 [ 32.771986] kmem_cache_oob+0x402/0x530 [ 32.771990] ? trace_hardirqs_on+0x37/0xe0 [ 32.771994] ? __pfx_kmem_cache_oob+0x10/0x10 [ 32.771998] ? finish_task_switch.isra.0+0x153/0x700 [ 32.772002] ? __switch_to+0x544/0xf50 [ 32.772009] ? ktime_get_ts64+0x83/0x230 [ 32.772013] kunit_try_run_case+0x1a2/0x480 [ 32.772017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.772021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.772026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.772030] ? __kthread_parkme+0x82/0x180 [ 32.772033] ? preempt_count_sub+0x50/0x80 [ 32.772037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.772042] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.772046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.772050] kthread+0x334/0x6f0 [ 32.772053] ? trace_preempt_on+0x20/0xc0 [ 32.772057] ? __pfx_kthread+0x10/0x10 [ 32.772061] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.772065] ? calculate_sigpending+0x7b/0xa0 [ 32.772069] ? __pfx_kthread+0x10/0x10 [ 32.772073] ret_from_fork+0x113/0x1d0 [ 32.772076] ? __pfx_kthread+0x10/0x10 [ 32.772080] ret_from_fork_asm+0x1a/0x30 [ 32.772086] </TASK> [ 32.772087] [ 32.944558] Allocated by task 248: [ 32.947964] kasan_save_stack+0x45/0x70 [ 32.951802] kasan_save_track+0x18/0x40 [ 32.955641] kasan_save_alloc_info+0x3b/0x50 [ 32.959916] __kasan_slab_alloc+0x91/0xa0 [ 32.963928] kmem_cache_alloc_noprof+0x123/0x3f0 [ 32.968547] kmem_cache_oob+0x157/0x530 [ 32.972414] kunit_try_run_case+0x1a2/0x480 [ 32.976605] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.982006] kthread+0x334/0x6f0 [ 32.985237] ret_from_fork+0x113/0x1d0 [ 32.988991] ret_from_fork_asm+0x1a/0x30 [ 32.992915] [ 32.994429] The buggy address belongs to the object at ffff88810561e000 [ 32.994429] which belongs to the cache test_cache of size 200 [ 33.006853] The buggy address is located 0 bytes to the right of [ 33.006853] allocated 200-byte region [ffff88810561e000, ffff88810561e0c8) [ 33.019800] [ 33.021301] The buggy address belongs to the physical page: [ 33.026875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561e [ 33.034880] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.042533] flags: 0x200000000000040(head|node=0|zone=2) [ 33.047847] page_type: f5(slab) [ 33.050993] raw: 0200000000000040 ffff888105612500 dead000000000122 0000000000000000 [ 33.058741] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.066489] head: 0200000000000040 ffff888105612500 dead000000000122 0000000000000000 [ 33.074314] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.082176] head: 0200000000000001 ffffea0004158781 00000000ffffffff 00000000ffffffff [ 33.090010] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.097834] page dumped because: kasan: bad access detected [ 33.103422] [ 33.104917] Memory state around the buggy address: [ 33.109708] ffff88810561df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.116928] ffff88810561e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.124147] >ffff88810561e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.131378] ^ [ 33.136983] ffff88810561e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.144202] ffff88810561e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.151426] ==================================================================