Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.083816] ================================================================== [ 18.084418] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 18.084488] Read of size 1 at addr fff00000c58cb0d8 by task kunit_try_catch/258 [ 18.084541] [ 18.084575] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.084659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.084686] Hardware name: linux,dummy-virt (DT) [ 18.084719] Call trace: [ 18.084742] show_stack+0x20/0x38 (C) [ 18.084793] dump_stack_lvl+0x8c/0xd0 [ 18.084888] print_report+0x118/0x5d0 [ 18.084935] kasan_report+0xdc/0x128 [ 18.085031] __asan_report_load1_noabort+0x20/0x30 [ 18.085162] memcmp+0x198/0x1d8 [ 18.085283] kasan_memcmp+0x16c/0x300 [ 18.085359] kunit_try_run_case+0x170/0x3f0 [ 18.085423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.085479] kthread+0x328/0x630 [ 18.085544] ret_from_fork+0x10/0x20 [ 18.085595] [ 18.085615] Allocated by task 258: [ 18.085671] kasan_save_stack+0x3c/0x68 [ 18.085802] kasan_save_track+0x20/0x40 [ 18.085906] kasan_save_alloc_info+0x40/0x58 [ 18.085972] __kasan_kmalloc+0xd4/0xd8 [ 18.086046] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.086123] kasan_memcmp+0xbc/0x300 [ 18.086194] kunit_try_run_case+0x170/0x3f0 [ 18.086298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.086387] kthread+0x328/0x630 [ 18.086476] ret_from_fork+0x10/0x20 [ 18.086596] [ 18.086665] The buggy address belongs to the object at fff00000c58cb0c0 [ 18.086665] which belongs to the cache kmalloc-32 of size 32 [ 18.086804] The buggy address is located 0 bytes to the right of [ 18.086804] allocated 24-byte region [fff00000c58cb0c0, fff00000c58cb0d8) [ 18.086884] [ 18.087130] The buggy address belongs to the physical page: [ 18.087306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cb [ 18.087528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.087586] page_type: f5(slab) [ 18.087645] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.087708] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.087754] page dumped because: kasan: bad access detected [ 18.087787] [ 18.087817] Memory state around the buggy address: [ 18.087861] fff00000c58caf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.087910] fff00000c58cb000: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.087956] >fff00000c58cb080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.088006] ^ [ 18.088047] fff00000c58cb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.088102] fff00000c58cb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.088173] ==================================================================
[ 18.866937] ================================================================== [ 18.867001] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 18.867057] Read of size 1 at addr fff00000c5ae3a98 by task kunit_try_catch/258 [ 18.867110] [ 18.867145] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.867797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.868206] Hardware name: linux,dummy-virt (DT) [ 18.868465] Call trace: [ 18.868740] show_stack+0x20/0x38 (C) [ 18.868830] dump_stack_lvl+0x8c/0xd0 [ 18.869197] print_report+0x118/0x5d0 [ 18.869394] kasan_report+0xdc/0x128 [ 18.869557] __asan_report_load1_noabort+0x20/0x30 [ 18.869661] memcmp+0x198/0x1d8 [ 18.869740] kasan_memcmp+0x16c/0x300 [ 18.870196] kunit_try_run_case+0x170/0x3f0 [ 18.870307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.870422] kthread+0x328/0x630 [ 18.870586] ret_from_fork+0x10/0x20 [ 18.872175] [ 18.872330] Allocated by task 258: [ 18.872461] kasan_save_stack+0x3c/0x68 [ 18.872558] kasan_save_track+0x20/0x40 [ 18.872690] kasan_save_alloc_info+0x40/0x58 [ 18.872777] __kasan_kmalloc+0xd4/0xd8 [ 18.872886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.873253] kasan_memcmp+0xbc/0x300 [ 18.874226] kunit_try_run_case+0x170/0x3f0 [ 18.874294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.874344] kthread+0x328/0x630 [ 18.874474] ret_from_fork+0x10/0x20 [ 18.874675] [ 18.874721] The buggy address belongs to the object at fff00000c5ae3a80 [ 18.874721] which belongs to the cache kmalloc-32 of size 32 [ 18.874794] The buggy address is located 0 bytes to the right of [ 18.874794] allocated 24-byte region [fff00000c5ae3a80, fff00000c5ae3a98) [ 18.874976] [ 18.875102] The buggy address belongs to the physical page: [ 18.875162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae3 [ 18.875261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.875337] page_type: f5(slab) [ 18.875420] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.875476] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.875526] page dumped because: kasan: bad access detected [ 18.875560] [ 18.875579] Memory state around the buggy address: [ 18.875615] fff00000c5ae3980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.875660] fff00000c5ae3a00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.875706] >fff00000c5ae3a80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.875748] ^ [ 18.875780] fff00000c5ae3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.875850] fff00000c5ae3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.875978] ==================================================================
[ 14.522497] ================================================================== [ 14.523314] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0 [ 14.523951] Read of size 1 at addr ffff8881026d0c58 by task kunit_try_catch/275 [ 14.524274] [ 14.524389] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.524778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.524794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.524816] Call Trace: [ 14.524829] <TASK> [ 14.524845] dump_stack_lvl+0x73/0xb0 [ 14.524875] print_report+0xd1/0x610 [ 14.524908] ? __virt_addr_valid+0x1db/0x2d0 [ 14.524932] ? memcmp+0x1b4/0x1d0 [ 14.524950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.524975] ? memcmp+0x1b4/0x1d0 [ 14.524993] kasan_report+0x141/0x180 [ 14.525015] ? memcmp+0x1b4/0x1d0 [ 14.525038] __asan_report_load1_noabort+0x18/0x20 [ 14.525064] memcmp+0x1b4/0x1d0 [ 14.525084] kasan_memcmp+0x18f/0x390 [ 14.525104] ? trace_hardirqs_on+0x37/0xe0 [ 14.525129] ? __pfx_kasan_memcmp+0x10/0x10 [ 14.525150] ? finish_task_switch.isra.0+0x153/0x700 [ 14.525174] ? __switch_to+0x47/0xf50 [ 14.525204] ? __pfx_read_tsc+0x10/0x10 [ 14.525225] ? ktime_get_ts64+0x86/0x230 [ 14.525250] kunit_try_run_case+0x1a5/0x480 [ 14.525276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.525301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.525326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.525351] ? __kthread_parkme+0x82/0x180 [ 14.525372] ? preempt_count_sub+0x50/0x80 [ 14.525396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.525466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.525493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.525519] kthread+0x337/0x6f0 [ 14.525539] ? trace_preempt_on+0x20/0xc0 [ 14.525563] ? __pfx_kthread+0x10/0x10 [ 14.525584] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.525607] ? calculate_sigpending+0x7b/0xa0 [ 14.525633] ? __pfx_kthread+0x10/0x10 [ 14.525656] ret_from_fork+0x116/0x1d0 [ 14.525676] ? __pfx_kthread+0x10/0x10 [ 14.525698] ret_from_fork_asm+0x1a/0x30 [ 14.525730] </TASK> [ 14.525741] [ 14.536234] Allocated by task 275: [ 14.536749] kasan_save_stack+0x45/0x70 [ 14.537031] kasan_save_track+0x18/0x40 [ 14.537326] kasan_save_alloc_info+0x3b/0x50 [ 14.537721] __kasan_kmalloc+0xb7/0xc0 [ 14.538034] __kmalloc_cache_noprof+0x189/0x420 [ 14.538262] kasan_memcmp+0xb7/0x390 [ 14.538653] kunit_try_run_case+0x1a5/0x480 [ 14.538903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.539265] kthread+0x337/0x6f0 [ 14.539637] ret_from_fork+0x116/0x1d0 [ 14.539889] ret_from_fork_asm+0x1a/0x30 [ 14.540086] [ 14.540179] The buggy address belongs to the object at ffff8881026d0c40 [ 14.540179] which belongs to the cache kmalloc-32 of size 32 [ 14.541030] The buggy address is located 0 bytes to the right of [ 14.541030] allocated 24-byte region [ffff8881026d0c40, ffff8881026d0c58) [ 14.541910] [ 14.542012] The buggy address belongs to the physical page: [ 14.542250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d0 [ 14.542959] flags: 0x200000000000000(node=0|zone=2) [ 14.543276] page_type: f5(slab) [ 14.543599] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.543923] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.544230] page dumped because: kasan: bad access detected [ 14.544686] [ 14.544918] Memory state around the buggy address: [ 14.545248] ffff8881026d0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.545929] ffff8881026d0b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.546356] >ffff8881026d0c00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.546898] ^ [ 14.547164] ffff8881026d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.547688] ffff8881026d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.548215] ==================================================================
[ 14.743482] ================================================================== [ 14.744952] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0 [ 14.745267] Read of size 1 at addr ffff8881025b0358 by task kunit_try_catch/275 [ 14.745574] [ 14.745668] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.745712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.745725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.745748] Call Trace: [ 14.745761] <TASK> [ 14.745777] dump_stack_lvl+0x73/0xb0 [ 14.745805] print_report+0xd1/0x610 [ 14.745829] ? __virt_addr_valid+0x1db/0x2d0 [ 14.745853] ? memcmp+0x1b4/0x1d0 [ 14.745871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.745895] ? memcmp+0x1b4/0x1d0 [ 14.745914] kasan_report+0x141/0x180 [ 14.745937] ? memcmp+0x1b4/0x1d0 [ 14.745959] __asan_report_load1_noabort+0x18/0x20 [ 14.745985] memcmp+0x1b4/0x1d0 [ 14.746005] kasan_memcmp+0x18f/0x390 [ 14.746026] ? trace_hardirqs_on+0x37/0xe0 [ 14.746062] ? __pfx_kasan_memcmp+0x10/0x10 [ 14.746084] ? finish_task_switch.isra.0+0x153/0x700 [ 14.746108] ? __switch_to+0x47/0xf50 [ 14.746138] ? __pfx_read_tsc+0x10/0x10 [ 14.746160] ? ktime_get_ts64+0x86/0x230 [ 14.746184] kunit_try_run_case+0x1a5/0x480 [ 14.746211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.746260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.746285] ? __kthread_parkme+0x82/0x180 [ 14.746307] ? preempt_count_sub+0x50/0x80 [ 14.746330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.746382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.746408] kthread+0x337/0x6f0 [ 14.746428] ? trace_preempt_on+0x20/0xc0 [ 14.746451] ? __pfx_kthread+0x10/0x10 [ 14.746473] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.746494] ? calculate_sigpending+0x7b/0xa0 [ 14.746520] ? __pfx_kthread+0x10/0x10 [ 14.746542] ret_from_fork+0x116/0x1d0 [ 14.746562] ? __pfx_kthread+0x10/0x10 [ 14.746583] ret_from_fork_asm+0x1a/0x30 [ 14.746614] </TASK> [ 14.746625] [ 14.757484] Allocated by task 275: [ 14.757722] kasan_save_stack+0x45/0x70 [ 14.757945] kasan_save_track+0x18/0x40 [ 14.758122] kasan_save_alloc_info+0x3b/0x50 [ 14.758275] __kasan_kmalloc+0xb7/0xc0 [ 14.758460] __kmalloc_cache_noprof+0x189/0x420 [ 14.758868] kasan_memcmp+0xb7/0x390 [ 14.759080] kunit_try_run_case+0x1a5/0x480 [ 14.759345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.759585] kthread+0x337/0x6f0 [ 14.759830] ret_from_fork+0x116/0x1d0 [ 14.760026] ret_from_fork_asm+0x1a/0x30 [ 14.760270] [ 14.760350] The buggy address belongs to the object at ffff8881025b0340 [ 14.760350] which belongs to the cache kmalloc-32 of size 32 [ 14.760780] The buggy address is located 0 bytes to the right of [ 14.760780] allocated 24-byte region [ffff8881025b0340, ffff8881025b0358) [ 14.761263] [ 14.761338] The buggy address belongs to the physical page: [ 14.761648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b0 [ 14.762037] flags: 0x200000000000000(node=0|zone=2) [ 14.762395] page_type: f5(slab) [ 14.762518] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.762939] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.763357] page dumped because: kasan: bad access detected [ 14.763616] [ 14.763710] Memory state around the buggy address: [ 14.763935] ffff8881025b0200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 14.764311] ffff8881025b0280: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 14.764597] >ffff8881025b0300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.764904] ^ [ 14.765188] ffff8881025b0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.765407] ffff8881025b0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.765717] ==================================================================