Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.877009] ================================================================== [ 30.877116] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.877170] Write of size 16 at addr fff00000c91f0069 by task kunit_try_catch/211 [ 30.877238] [ 30.877301] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 30.877406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.877433] Hardware name: linux,dummy-virt (DT) [ 30.877469] Call trace: [ 30.877546] show_stack+0x20/0x38 (C) [ 30.877615] dump_stack_lvl+0x8c/0xd0 [ 30.877671] print_report+0x118/0x608 [ 30.877758] kasan_report+0xdc/0x128 [ 30.877806] kasan_check_range+0x100/0x1a8 [ 30.877850] __asan_memset+0x34/0x78 [ 30.877896] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.877982] kunit_try_run_case+0x170/0x3f0 [ 30.878031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.878210] kthread+0x328/0x630 [ 30.878306] ret_from_fork+0x10/0x20 [ 30.878512] [ 30.878559] Allocated by task 211: [ 30.878589] kasan_save_stack+0x3c/0x68 [ 30.878634] kasan_save_track+0x20/0x40 [ 30.878887] kasan_save_alloc_info+0x40/0x58 [ 30.879061] __kasan_kmalloc+0xd4/0xd8 [ 30.879139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.879189] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.879395] kunit_try_run_case+0x170/0x3f0 [ 30.879615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.879679] kthread+0x328/0x630 [ 30.879955] ret_from_fork+0x10/0x20 [ 30.880140] [ 30.880184] The buggy address belongs to the object at fff00000c91f0000 [ 30.880184] which belongs to the cache kmalloc-128 of size 128 [ 30.880324] The buggy address is located 105 bytes inside of [ 30.880324] allocated 120-byte region [fff00000c91f0000, fff00000c91f0078) [ 30.880417] [ 30.880564] The buggy address belongs to the physical page: [ 30.880620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0 [ 30.880676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.880747] page_type: f5(slab) [ 30.880803] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.880864] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.880914] page dumped because: kasan: bad access detected [ 30.880959] [ 30.880977] Memory state around the buggy address: [ 30.881009] fff00000c91eff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881063] fff00000c91eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881106] >fff00000c91f0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.881145] ^ [ 30.881195] fff00000c91f0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881239] fff00000c91f0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881286] ==================================================================
[ 32.642241] ================================================================== [ 32.642301] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 32.642351] Write of size 16 at addr fff00000c63fbb69 by task kunit_try_catch/209 [ 32.642647] [ 32.642708] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.642795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.642828] Hardware name: linux,dummy-virt (DT) [ 32.642888] Call trace: [ 32.642925] show_stack+0x20/0x38 (C) [ 32.642977] dump_stack_lvl+0x8c/0xd0 [ 32.643042] print_report+0x118/0x608 [ 32.643963] kasan_report+0xdc/0x128 [ 32.644029] kasan_check_range+0x100/0x1a8 [ 32.644077] __asan_memset+0x34/0x78 [ 32.644121] kmalloc_oob_memset_16+0x150/0x2f8 [ 32.644181] kunit_try_run_case+0x170/0x3f0 [ 32.644230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.644284] kthread+0x328/0x630 [ 32.644328] ret_from_fork+0x10/0x20 [ 32.644374] [ 32.644392] Allocated by task 209: [ 32.644421] kasan_save_stack+0x3c/0x68 [ 32.644464] kasan_save_track+0x20/0x40 [ 32.644502] kasan_save_alloc_info+0x40/0x58 [ 32.644541] __kasan_kmalloc+0xd4/0xd8 [ 32.644579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.644618] kmalloc_oob_memset_16+0xb0/0x2f8 [ 32.644657] kunit_try_run_case+0x170/0x3f0 [ 32.644695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.644742] kthread+0x328/0x630 [ 32.644777] ret_from_fork+0x10/0x20 [ 32.644814] [ 32.644833] The buggy address belongs to the object at fff00000c63fbb00 [ 32.644833] which belongs to the cache kmalloc-128 of size 128 [ 32.644891] The buggy address is located 105 bytes inside of [ 32.644891] allocated 120-byte region [fff00000c63fbb00, fff00000c63fbb78) [ 32.644955] [ 32.644975] The buggy address belongs to the physical page: [ 32.645007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 32.645058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.645106] page_type: f5(slab) [ 32.645143] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.645202] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.645243] page dumped because: kasan: bad access detected [ 32.645276] [ 32.645294] Memory state around the buggy address: [ 32.645324] fff00000c63fba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.645367] fff00000c63fba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.645410] >fff00000c63fbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.645449] ^ [ 32.645494] fff00000c63fbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.645536] fff00000c63fbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.645572] ==================================================================
[ 23.208990] ================================================================== [ 23.209447] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 23.209919] Write of size 16 at addr ffff888105898069 by task kunit_try_catch/226 [ 23.210387] [ 23.210507] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.210557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.210571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.210592] Call Trace: [ 23.210606] <TASK> [ 23.210623] dump_stack_lvl+0x73/0xb0 [ 23.210652] print_report+0xd1/0x650 [ 23.210806] ? __virt_addr_valid+0x1db/0x2d0 [ 23.210944] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.210968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.210993] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.211016] kasan_report+0x141/0x180 [ 23.211038] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.211064] kasan_check_range+0x10c/0x1c0 [ 23.211086] __asan_memset+0x27/0x50 [ 23.211109] kmalloc_oob_memset_16+0x166/0x330 [ 23.211130] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 23.211152] ? __schedule+0x10cc/0x2b60 [ 23.211172] ? __pfx_read_tsc+0x10/0x10 [ 23.211193] ? ktime_get_ts64+0x86/0x230 [ 23.211217] kunit_try_run_case+0x1a5/0x480 [ 23.211242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.211264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.211285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.211318] ? __kthread_parkme+0x82/0x180 [ 23.211338] ? preempt_count_sub+0x50/0x80 [ 23.211360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.211384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.211409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.211432] kthread+0x337/0x6f0 [ 23.211451] ? trace_preempt_on+0x20/0xc0 [ 23.211473] ? __pfx_kthread+0x10/0x10 [ 23.211504] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.211527] ? calculate_sigpending+0x7b/0xa0 [ 23.211549] ? __pfx_kthread+0x10/0x10 [ 23.211570] ret_from_fork+0x116/0x1d0 [ 23.211589] ? __pfx_kthread+0x10/0x10 [ 23.211608] ret_from_fork_asm+0x1a/0x30 [ 23.211638] </TASK> [ 23.211650] [ 23.219085] Allocated by task 226: [ 23.219261] kasan_save_stack+0x45/0x70 [ 23.219472] kasan_save_track+0x18/0x40 [ 23.220525] kasan_save_alloc_info+0x3b/0x50 [ 23.221144] __kasan_kmalloc+0xb7/0xc0 [ 23.221360] __kmalloc_cache_noprof+0x189/0x420 [ 23.221809] kmalloc_oob_memset_16+0xac/0x330 [ 23.221989] kunit_try_run_case+0x1a5/0x480 [ 23.222264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.222749] kthread+0x337/0x6f0 [ 23.222899] ret_from_fork+0x116/0x1d0 [ 23.223215] ret_from_fork_asm+0x1a/0x30 [ 23.223559] [ 23.223809] The buggy address belongs to the object at ffff888105898000 [ 23.223809] which belongs to the cache kmalloc-128 of size 128 [ 23.224325] The buggy address is located 105 bytes inside of [ 23.224325] allocated 120-byte region [ffff888105898000, ffff888105898078) [ 23.225176] [ 23.225388] The buggy address belongs to the physical page: [ 23.225657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105898 [ 23.226272] flags: 0x200000000000000(node=0|zone=2) [ 23.226623] page_type: f5(slab) [ 23.226852] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.227272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.227804] page dumped because: kasan: bad access detected [ 23.228130] [ 23.228249] Memory state around the buggy address: [ 23.228718] ffff888105897f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.229147] ffff888105897f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.229561] >ffff888105898000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.230081] ^ [ 23.230401] ffff888105898080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.230894] ffff888105898100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.231373] ==================================================================
[ 23.495699] ================================================================== [ 23.496220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 23.496771] Write of size 16 at addr ffff8881049c5b69 by task kunit_try_catch/227 [ 23.497103] [ 23.497222] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.497278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.497291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.497315] Call Trace: [ 23.497329] <TASK> [ 23.497350] dump_stack_lvl+0x73/0xb0 [ 23.497384] print_report+0xd1/0x650 [ 23.497407] ? __virt_addr_valid+0x1db/0x2d0 [ 23.497434] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.497454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.497480] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.497501] kasan_report+0x141/0x180 [ 23.497523] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.497548] kasan_check_range+0x10c/0x1c0 [ 23.497571] __asan_memset+0x27/0x50 [ 23.497594] kmalloc_oob_memset_16+0x166/0x330 [ 23.497615] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 23.497637] ? __schedule+0x10cc/0x2b60 [ 23.497659] ? __pfx_read_tsc+0x10/0x10 [ 23.497681] ? ktime_get_ts64+0x86/0x230 [ 23.497708] kunit_try_run_case+0x1a5/0x480 [ 23.497736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.497758] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.497780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.497801] ? __kthread_parkme+0x82/0x180 [ 23.497829] ? preempt_count_sub+0x50/0x80 [ 23.497853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.497877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.497901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.497925] kthread+0x337/0x6f0 [ 23.498076] ? trace_preempt_on+0x20/0xc0 [ 23.498104] ? __pfx_kthread+0x10/0x10 [ 23.498124] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.498246] ? calculate_sigpending+0x7b/0xa0 [ 23.498276] ? __pfx_kthread+0x10/0x10 [ 23.498298] ret_from_fork+0x116/0x1d0 [ 23.498318] ? __pfx_kthread+0x10/0x10 [ 23.498338] ret_from_fork_asm+0x1a/0x30 [ 23.498370] </TASK> [ 23.498383] [ 23.506028] Allocated by task 227: [ 23.506310] kasan_save_stack+0x45/0x70 [ 23.506497] kasan_save_track+0x18/0x40 [ 23.506669] kasan_save_alloc_info+0x3b/0x50 [ 23.506841] __kasan_kmalloc+0xb7/0xc0 [ 23.507037] __kmalloc_cache_noprof+0x189/0x420 [ 23.507347] kmalloc_oob_memset_16+0xac/0x330 [ 23.507539] kunit_try_run_case+0x1a5/0x480 [ 23.507681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.507873] kthread+0x337/0x6f0 [ 23.508054] ret_from_fork+0x116/0x1d0 [ 23.508515] ret_from_fork_asm+0x1a/0x30 [ 23.508726] [ 23.508796] The buggy address belongs to the object at ffff8881049c5b00 [ 23.508796] which belongs to the cache kmalloc-128 of size 128 [ 23.509430] The buggy address is located 105 bytes inside of [ 23.509430] allocated 120-byte region [ffff8881049c5b00, ffff8881049c5b78) [ 23.509963] [ 23.510070] The buggy address belongs to the physical page: [ 23.510400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049c5 [ 23.510631] flags: 0x200000000000000(node=0|zone=2) [ 23.510784] page_type: f5(slab) [ 23.510899] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.511204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.511524] page dumped because: kasan: bad access detected [ 23.511762] [ 23.511848] Memory state around the buggy address: [ 23.512355] ffff8881049c5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.512633] ffff8881049c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.512834] >ffff8881049c5b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.513160] ^ [ 23.513470] ffff8881049c5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.513760] ffff8881049c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.514128] ==================================================================