Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.616062] ================================================================== [ 16.616269] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 16.616324] Write of size 4 at addr fff00000c3edd675 by task kunit_try_catch/174 [ 16.616374] [ 16.617029] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.617502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.617532] Hardware name: linux,dummy-virt (DT) [ 16.617565] Call trace: [ 16.617684] show_stack+0x20/0x38 (C) [ 16.617780] dump_stack_lvl+0x8c/0xd0 [ 16.618149] print_report+0x118/0x5d0 [ 16.618476] kasan_report+0xdc/0x128 [ 16.618838] kasan_check_range+0x100/0x1a8 [ 16.618996] __asan_memset+0x34/0x78 [ 16.619199] kmalloc_oob_memset_4+0x150/0x300 [ 16.619428] kunit_try_run_case+0x170/0x3f0 [ 16.619869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.619952] kthread+0x328/0x630 [ 16.619996] ret_from_fork+0x10/0x20 [ 16.620693] [ 16.620719] Allocated by task 174: [ 16.620750] kasan_save_stack+0x3c/0x68 [ 16.621048] kasan_save_track+0x20/0x40 [ 16.621222] kasan_save_alloc_info+0x40/0x58 [ 16.621263] __kasan_kmalloc+0xd4/0xd8 [ 16.621299] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.621574] kmalloc_oob_memset_4+0xb0/0x300 [ 16.621877] kunit_try_run_case+0x170/0x3f0 [ 16.621935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.621978] kthread+0x328/0x630 [ 16.622010] ret_from_fork+0x10/0x20 [ 16.622329] [ 16.622402] The buggy address belongs to the object at fff00000c3edd600 [ 16.622402] which belongs to the cache kmalloc-128 of size 128 [ 16.622671] The buggy address is located 117 bytes inside of [ 16.622671] allocated 120-byte region [fff00000c3edd600, fff00000c3edd678) [ 16.622752] [ 16.622773] The buggy address belongs to the physical page: [ 16.622810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103edd [ 16.623128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.623517] page_type: f5(slab) [ 16.623852] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.624083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.624442] page dumped because: kasan: bad access detected [ 16.624533] [ 16.624645] Memory state around the buggy address: [ 16.624805] fff00000c3edd500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.624895] fff00000c3edd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.625048] >fff00000c3edd600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.625135] ^ [ 16.625187] fff00000c3edd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.625408] fff00000c3edd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.625449] ==================================================================
[ 16.599680] ================================================================== [ 16.599736] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 16.599790] Write of size 4 at addr fff00000c58dca75 by task kunit_try_catch/174 [ 16.599838] [ 16.599886] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.599968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.599993] Hardware name: linux,dummy-virt (DT) [ 16.600024] Call trace: [ 16.600047] show_stack+0x20/0x38 (C) [ 16.600095] dump_stack_lvl+0x8c/0xd0 [ 16.600152] print_report+0x118/0x5d0 [ 16.600206] kasan_report+0xdc/0x128 [ 16.600251] kasan_check_range+0x100/0x1a8 [ 16.600298] __asan_memset+0x34/0x78 [ 16.600340] kmalloc_oob_memset_4+0x150/0x300 [ 16.600386] kunit_try_run_case+0x170/0x3f0 [ 16.600433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.600493] kthread+0x328/0x630 [ 16.600538] ret_from_fork+0x10/0x20 [ 16.600589] [ 16.600608] Allocated by task 174: [ 16.601448] kasan_save_stack+0x3c/0x68 [ 16.601518] kasan_save_track+0x20/0x40 [ 16.601595] kasan_save_alloc_info+0x40/0x58 [ 16.601793] __kasan_kmalloc+0xd4/0xd8 [ 16.601852] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.601986] kmalloc_oob_memset_4+0xb0/0x300 [ 16.602086] kunit_try_run_case+0x170/0x3f0 [ 16.602350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.602716] kthread+0x328/0x630 [ 16.602808] ret_from_fork+0x10/0x20 [ 16.602957] [ 16.602989] The buggy address belongs to the object at fff00000c58dca00 [ 16.602989] which belongs to the cache kmalloc-128 of size 128 [ 16.603122] The buggy address is located 117 bytes inside of [ 16.603122] allocated 120-byte region [fff00000c58dca00, fff00000c58dca78) [ 16.603433] [ 16.603538] The buggy address belongs to the physical page: [ 16.603608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058dc [ 16.603806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.603904] page_type: f5(slab) [ 16.604047] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.604131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.604181] page dumped because: kasan: bad access detected [ 16.604211] [ 16.604408] Memory state around the buggy address: [ 16.604655] fff00000c58dc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.604821] fff00000c58dc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.604966] >fff00000c58dca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.605099] ^ [ 16.605167] fff00000c58dca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605209] fff00000c58dcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605247] ==================================================================
[ 12.758820] ================================================================== [ 12.759366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 12.759717] Write of size 4 at addr ffff88810313a675 by task kunit_try_catch/192 [ 12.760027] [ 12.760160] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.760244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.760258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.760278] Call Trace: [ 12.760291] <TASK> [ 12.760307] dump_stack_lvl+0x73/0xb0 [ 12.760350] print_report+0xd1/0x610 [ 12.760373] ? __virt_addr_valid+0x1db/0x2d0 [ 12.760426] ? kmalloc_oob_memset_4+0x166/0x330 [ 12.760447] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.760468] ? kmalloc_oob_memset_4+0x166/0x330 [ 12.760490] kasan_report+0x141/0x180 [ 12.760522] ? kmalloc_oob_memset_4+0x166/0x330 [ 12.760549] kasan_check_range+0x10c/0x1c0 [ 12.760573] __asan_memset+0x27/0x50 [ 12.760593] kmalloc_oob_memset_4+0x166/0x330 [ 12.760616] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 12.760638] ? __schedule+0x2079/0x2b60 [ 12.760662] ? __pfx_read_tsc+0x10/0x10 [ 12.760688] ? ktime_get_ts64+0x86/0x230 [ 12.760713] kunit_try_run_case+0x1a5/0x480 [ 12.760738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.760770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.760804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.760828] ? __kthread_parkme+0x82/0x180 [ 12.760849] ? preempt_count_sub+0x50/0x80 [ 12.760883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.760907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.760930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.760953] kthread+0x337/0x6f0 [ 12.760972] ? trace_preempt_on+0x20/0xc0 [ 12.760995] ? __pfx_kthread+0x10/0x10 [ 12.761016] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.761052] ? calculate_sigpending+0x7b/0xa0 [ 12.761076] ? __pfx_kthread+0x10/0x10 [ 12.761097] ret_from_fork+0x116/0x1d0 [ 12.761115] ? __pfx_kthread+0x10/0x10 [ 12.761136] ret_from_fork_asm+0x1a/0x30 [ 12.761168] </TASK> [ 12.761178] [ 12.769321] Allocated by task 192: [ 12.769510] kasan_save_stack+0x45/0x70 [ 12.769686] kasan_save_track+0x18/0x40 [ 12.769824] kasan_save_alloc_info+0x3b/0x50 [ 12.769974] __kasan_kmalloc+0xb7/0xc0 [ 12.770302] __kmalloc_cache_noprof+0x189/0x420 [ 12.770758] kmalloc_oob_memset_4+0xac/0x330 [ 12.770983] kunit_try_run_case+0x1a5/0x480 [ 12.771485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.771685] kthread+0x337/0x6f0 [ 12.771868] ret_from_fork+0x116/0x1d0 [ 12.772051] ret_from_fork_asm+0x1a/0x30 [ 12.772314] [ 12.772428] The buggy address belongs to the object at ffff88810313a600 [ 12.772428] which belongs to the cache kmalloc-128 of size 128 [ 12.772946] The buggy address is located 117 bytes inside of [ 12.772946] allocated 120-byte region [ffff88810313a600, ffff88810313a678) [ 12.773533] [ 12.773648] The buggy address belongs to the physical page: [ 12.773833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a [ 12.774078] flags: 0x200000000000000(node=0|zone=2) [ 12.774244] page_type: f5(slab) [ 12.774368] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.774755] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.775085] page dumped because: kasan: bad access detected [ 12.775334] [ 12.775477] Memory state around the buggy address: [ 12.775633] ffff88810313a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.775848] ffff88810313a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.776500] >ffff88810313a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.777142] ^ [ 12.777706] ffff88810313a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.777987] ffff88810313a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.778488] ==================================================================
[ 12.877795] ================================================================== [ 12.878370] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 12.878719] Write of size 4 at addr ffff888102a3ef75 by task kunit_try_catch/191 [ 12.879247] [ 12.879360] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.879408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.879420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.879441] Call Trace: [ 12.879456] <TASK> [ 12.879473] dump_stack_lvl+0x73/0xb0 [ 12.879503] print_report+0xd1/0x610 [ 12.879525] ? __virt_addr_valid+0x1db/0x2d0 [ 12.879548] ? kmalloc_oob_memset_4+0x166/0x330 [ 12.879568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.879590] ? kmalloc_oob_memset_4+0x166/0x330 [ 12.879611] kasan_report+0x141/0x180 [ 12.879632] ? kmalloc_oob_memset_4+0x166/0x330 [ 12.879657] kasan_check_range+0x10c/0x1c0 [ 12.879680] __asan_memset+0x27/0x50 [ 12.879698] kmalloc_oob_memset_4+0x166/0x330 [ 12.879720] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 12.879742] ? __schedule+0x10c6/0x2b60 [ 12.879764] ? __pfx_read_tsc+0x10/0x10 [ 12.879783] ? ktime_get_ts64+0x86/0x230 [ 12.879807] kunit_try_run_case+0x1a5/0x480 [ 12.879831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.879900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.879925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.879948] ? __kthread_parkme+0x82/0x180 [ 12.879968] ? preempt_count_sub+0x50/0x80 [ 12.879991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.880014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.880037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.880059] kthread+0x337/0x6f0 [ 12.880078] ? trace_preempt_on+0x20/0xc0 [ 12.880100] ? __pfx_kthread+0x10/0x10 [ 12.880120] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.880141] ? calculate_sigpending+0x7b/0xa0 [ 12.880175] ? __pfx_kthread+0x10/0x10 [ 12.880196] ret_from_fork+0x116/0x1d0 [ 12.880213] ? __pfx_kthread+0x10/0x10 [ 12.880233] ret_from_fork_asm+0x1a/0x30 [ 12.880263] </TASK> [ 12.880273] [ 12.887968] Allocated by task 191: [ 12.888160] kasan_save_stack+0x45/0x70 [ 12.888459] kasan_save_track+0x18/0x40 [ 12.888783] kasan_save_alloc_info+0x3b/0x50 [ 12.889103] __kasan_kmalloc+0xb7/0xc0 [ 12.889685] __kmalloc_cache_noprof+0x189/0x420 [ 12.890693] kmalloc_oob_memset_4+0xac/0x330 [ 12.891056] kunit_try_run_case+0x1a5/0x480 [ 12.891269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.891762] kthread+0x337/0x6f0 [ 12.892130] ret_from_fork+0x116/0x1d0 [ 12.892533] ret_from_fork_asm+0x1a/0x30 [ 12.892744] [ 12.892843] The buggy address belongs to the object at ffff888102a3ef00 [ 12.892843] which belongs to the cache kmalloc-128 of size 128 [ 12.894340] The buggy address is located 117 bytes inside of [ 12.894340] allocated 120-byte region [ffff888102a3ef00, ffff888102a3ef78) [ 12.895069] [ 12.895184] The buggy address belongs to the physical page: [ 12.895623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3e [ 12.896307] flags: 0x200000000000000(node=0|zone=2) [ 12.896555] page_type: f5(slab) [ 12.896708] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.897484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.898238] page dumped because: kasan: bad access detected [ 12.898704] [ 12.898801] Memory state around the buggy address: [ 12.899475] ffff888102a3ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.900160] ffff888102a3ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.900743] >ffff888102a3ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.901140] ^ [ 12.901692] ffff888102a3ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.902668] ffff888102a3f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.903161] ==================================================================