Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.247266] ================================================================== [ 31.248719] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.249530] Write of size 128 at addr fff00000c5685000 by task kunit_try_catch/159 [ 31.249954] [ 31.250306] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.251335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.251845] Hardware name: linux,dummy-virt (DT) [ 31.252529] Call trace: [ 31.252957] show_stack+0x20/0x38 (C) [ 31.253521] dump_stack_lvl+0x8c/0xd0 [ 31.254483] print_report+0x118/0x5e0 [ 31.255144] kasan_report+0xc8/0x118 [ 31.255764] kasan_check_range+0x100/0x1a8 [ 31.256655] __asan_memset+0x34/0x78 [ 31.257283] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.257989] kunit_try_run_case+0x14c/0x3d0 [ 31.258578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.259380] kthread+0x24c/0x2d0 [ 31.259986] ret_from_fork+0x10/0x20 [ 31.260869] [ 31.261239] Allocated by task 159: [ 31.261655] kasan_save_stack+0x3c/0x68 [ 31.262282] kasan_save_track+0x20/0x40 [ 31.262897] kasan_save_alloc_info+0x40/0x58 [ 31.263504] __kasan_kmalloc+0xd4/0xd8 [ 31.264119] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.265979] kmalloc_oob_in_memset+0xb0/0x2d0 [ 31.266533] kunit_try_run_case+0x14c/0x3d0 [ 31.267182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.267866] kthread+0x24c/0x2d0 [ 31.268627] ret_from_fork+0x10/0x20 [ 31.269149] [ 31.269515] The buggy address belongs to the object at fff00000c5685000 [ 31.269515] which belongs to the cache kmalloc-128 of size 128 [ 31.270713] The buggy address is located 0 bytes inside of [ 31.270713] allocated 120-byte region [fff00000c5685000, fff00000c5685078) [ 31.272004] [ 31.272327] The buggy address belongs to the physical page: [ 31.273292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105685 [ 31.274187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.275722] page_type: f5(slab) [ 31.276236] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.277429] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.278522] page dumped because: kasan: bad access detected [ 31.279119] [ 31.279481] Memory state around the buggy address: [ 31.280149] fff00000c5684f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.281057] fff00000c5684f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.281857] >fff00000c5685000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.282755] ^ [ 31.283484] fff00000c5685080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.284960] fff00000c5685100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.285530] ==================================================================
[ 31.223054] ================================================================== [ 31.224110] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.224955] Write of size 128 at addr fff00000c64d9c00 by task kunit_try_catch/159 [ 31.225685] [ 31.226073] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.227662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.228131] Hardware name: linux,dummy-virt (DT) [ 31.228822] Call trace: [ 31.229240] show_stack+0x20/0x38 (C) [ 31.229961] dump_stack_lvl+0x8c/0xd0 [ 31.230634] print_report+0x118/0x5e0 [ 31.231160] kasan_report+0xc8/0x118 [ 31.232029] kasan_check_range+0x100/0x1a8 [ 31.232750] __asan_memset+0x34/0x78 [ 31.233379] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.234591] kunit_try_run_case+0x14c/0x3d0 [ 31.235171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.235896] kthread+0x24c/0x2d0 [ 31.236501] ret_from_fork+0x10/0x20 [ 31.237108] [ 31.237447] Allocated by task 159: [ 31.237913] kasan_save_stack+0x3c/0x68 [ 31.238799] kasan_save_track+0x20/0x40 [ 31.239427] kasan_save_alloc_info+0x40/0x58 [ 31.240103] __kasan_kmalloc+0xd4/0xd8 [ 31.240736] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.241348] kmalloc_oob_in_memset+0xb0/0x2d0 [ 31.242920] kunit_try_run_case+0x14c/0x3d0 [ 31.243596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.244404] kthread+0x24c/0x2d0 [ 31.244778] ret_from_fork+0x10/0x20 [ 31.245370] [ 31.245967] The buggy address belongs to the object at fff00000c64d9c00 [ 31.245967] which belongs to the cache kmalloc-128 of size 128 [ 31.247207] The buggy address is located 0 bytes inside of [ 31.247207] allocated 120-byte region [fff00000c64d9c00, fff00000c64d9c78) [ 31.248442] [ 31.248944] The buggy address belongs to the physical page: [ 31.250067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9 [ 31.251250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.252147] page_type: f5(slab) [ 31.252882] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.254164] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.255255] page dumped because: kasan: bad access detected [ 31.256172] [ 31.256774] Memory state around the buggy address: [ 31.257478] fff00000c64d9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.258762] fff00000c64d9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.259870] >fff00000c64d9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.260983] ^ [ 31.262011] fff00000c64d9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263576] fff00000c64d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.264421] ==================================================================
[ 25.376604] ================================================================== [ 25.377210] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x160/0x320 [ 25.377210] Write of size 128 at addr ffff888102938700 by task kunit_try_catch/179 [ 25.377210] [ 25.377210] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.377210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.377210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.377210] Call Trace: [ 25.377210] <TASK> [ 25.377210] dump_stack_lvl+0x73/0xb0 [ 25.377210] print_report+0xd1/0x640 [ 25.377210] ? __virt_addr_valid+0x1db/0x2d0 [ 25.377210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.377210] kasan_report+0x102/0x140 [ 25.377210] ? kmalloc_oob_in_memset+0x160/0x320 [ 25.377210] ? kmalloc_oob_in_memset+0x160/0x320 [ 25.377210] kasan_check_range+0x10c/0x1c0 [ 25.377210] __asan_memset+0x27/0x50 [ 25.377210] kmalloc_oob_in_memset+0x160/0x320 [ 25.377210] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 25.377210] ? __schedule+0xc3e/0x2790 [ 25.377210] ? ktime_get_ts64+0x84/0x230 [ 25.377210] kunit_try_run_case+0x1b3/0x490 [ 25.377210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.377210] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.377210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.377210] ? __kthread_parkme+0x82/0x160 [ 25.377210] ? preempt_count_sub+0x50/0x80 [ 25.377210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.377210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.377210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.377210] kthread+0x257/0x310 [ 25.377210] ? __pfx_kthread+0x10/0x10 [ 25.377210] ret_from_fork+0x41/0x80 [ 25.377210] ? __pfx_kthread+0x10/0x10 [ 25.377210] ret_from_fork_asm+0x1a/0x30 [ 25.377210] </TASK> [ 25.377210] [ 25.377210] Allocated by task 179: [ 25.377210] kasan_save_stack+0x3d/0x60 [ 25.377210] kasan_save_track+0x18/0x40 [ 25.377210] kasan_save_alloc_info+0x3b/0x50 [ 25.377210] __kasan_kmalloc+0xb7/0xc0 [ 25.377210] __kmalloc_cache_noprof+0x184/0x410 [ 25.377210] kmalloc_oob_in_memset+0xad/0x320 [ 25.377210] kunit_try_run_case+0x1b3/0x490 [ 25.377210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.377210] kthread+0x257/0x310 [ 25.377210] ret_from_fork+0x41/0x80 [ 25.377210] ret_from_fork_asm+0x1a/0x30 [ 25.377210] [ 25.377210] The buggy address belongs to the object at ffff888102938700 [ 25.377210] which belongs to the cache kmalloc-128 of size 128 [ 25.377210] The buggy address is located 0 bytes inside of [ 25.377210] allocated 120-byte region [ffff888102938700, ffff888102938778) [ 25.377210] [ 25.377210] The buggy address belongs to the physical page: [ 25.377210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102938 [ 25.377210] flags: 0x200000000000000(node=0|zone=2) [ 25.377210] page_type: f5(slab) [ 25.377210] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.377210] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.377210] page dumped because: kasan: bad access detected [ 25.377210] [ 25.377210] Memory state around the buggy address: [ 25.377210] ffff888102938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 25.377210] ffff888102938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.377210] >ffff888102938700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.377210] ^ [ 25.377210] ffff888102938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.377210] ffff888102938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.377210] ==================================================================
[ 20.405805] ================================================================== [ 20.406800] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x160/0x320 [ 20.407863] Write of size 128 at addr ffff8881028b7600 by task kunit_try_catch/177 [ 20.408340] [ 20.408620] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 20.409477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.410016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.410785] Call Trace: [ 20.411103] <TASK> [ 20.411849] dump_stack_lvl+0x73/0xb0 [ 20.412335] print_report+0xd1/0x640 [ 20.412743] ? __virt_addr_valid+0x1db/0x2d0 [ 20.413549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.414037] kasan_report+0x102/0x140 [ 20.414335] ? kmalloc_oob_in_memset+0x160/0x320 [ 20.415403] ? kmalloc_oob_in_memset+0x160/0x320 [ 20.415934] kasan_check_range+0x10c/0x1c0 [ 20.416679] __asan_memset+0x27/0x50 [ 20.417091] kmalloc_oob_in_memset+0x160/0x320 [ 20.417766] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 20.418284] ? __schedule+0xc3e/0x2790 [ 20.419867] ? __pfx_read_tsc+0x10/0x10 [ 20.420547] ? ktime_get_ts64+0x84/0x230 [ 20.421007] kunit_try_run_case+0x1b3/0x490 [ 20.421321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.421926] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.422463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.423070] ? __kthread_parkme+0x82/0x160 [ 20.423617] ? preempt_count_sub+0x50/0x80 [ 20.424348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.425314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.426603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.427242] kthread+0x257/0x310 [ 20.427636] ? __pfx_kthread+0x10/0x10 [ 20.427922] ret_from_fork+0x41/0x80 [ 20.428322] ? __pfx_kthread+0x10/0x10 [ 20.429133] ret_from_fork_asm+0x1a/0x30 [ 20.429757] </TASK> [ 20.430012] [ 20.430214] Allocated by task 177: [ 20.430548] kasan_save_stack+0x3d/0x60 [ 20.431265] kasan_save_track+0x18/0x40 [ 20.431859] kasan_save_alloc_info+0x3b/0x50 [ 20.432345] __kasan_kmalloc+0xb7/0xc0 [ 20.432940] __kmalloc_cache_noprof+0x184/0x410 [ 20.433346] kmalloc_oob_in_memset+0xad/0x320 [ 20.434351] kunit_try_run_case+0x1b3/0x490 [ 20.434796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.435530] kthread+0x257/0x310 [ 20.436133] ret_from_fork+0x41/0x80 [ 20.436608] ret_from_fork_asm+0x1a/0x30 [ 20.437269] [ 20.437773] The buggy address belongs to the object at ffff8881028b7600 [ 20.437773] which belongs to the cache kmalloc-128 of size 128 [ 20.439967] The buggy address is located 0 bytes inside of [ 20.439967] allocated 120-byte region [ffff8881028b7600, ffff8881028b7678) [ 20.441082] [ 20.441312] The buggy address belongs to the physical page: [ 20.441713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 [ 20.442304] flags: 0x200000000000000(node=0|zone=2) [ 20.443298] page_type: f5(slab) [ 20.443652] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.444550] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.445283] page dumped because: kasan: bad access detected [ 20.445812] [ 20.446293] Memory state around the buggy address: [ 20.446856] ffff8881028b7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.447550] ffff8881028b7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.448121] >ffff8881028b7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.448707] ^ [ 20.449786] ffff8881028b7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.450707] ffff8881028b7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.451825] ==================================================================