Date
July 25, 2025, 3:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.360141] ================================================================== [ 32.360423] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 32.360486] Write of size 16 at addr fff00000c85ecd60 by task kunit_try_catch/198 [ 32.360565] [ 32.360614] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.360744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.360774] Hardware name: linux,dummy-virt (DT) [ 32.360804] Call trace: [ 32.360852] show_stack+0x20/0x38 (C) [ 32.360902] dump_stack_lvl+0x8c/0xd0 [ 32.360948] print_report+0x118/0x5e8 [ 32.361147] kasan_report+0xdc/0x128 [ 32.361201] __asan_report_store16_noabort+0x20/0x30 [ 32.361268] kmalloc_oob_16+0x3a0/0x3f8 [ 32.361323] kunit_try_run_case+0x170/0x3f0 [ 32.361397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.361449] kthread+0x328/0x630 [ 32.361490] ret_from_fork+0x10/0x20 [ 32.361537] [ 32.361555] Allocated by task 198: [ 32.361742] kasan_save_stack+0x3c/0x68 [ 32.361803] kasan_save_track+0x20/0x40 [ 32.361874] kasan_save_alloc_info+0x40/0x58 [ 32.361952] __kasan_kmalloc+0xd4/0xd8 [ 32.361985] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.362043] kmalloc_oob_16+0xb4/0x3f8 [ 32.362079] kunit_try_run_case+0x170/0x3f0 [ 32.362124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.362181] kthread+0x328/0x630 [ 32.362229] ret_from_fork+0x10/0x20 [ 32.362264] [ 32.362301] The buggy address belongs to the object at fff00000c85ecd60 [ 32.362301] which belongs to the cache kmalloc-16 of size 16 [ 32.362372] The buggy address is located 0 bytes inside of [ 32.362372] allocated 13-byte region [fff00000c85ecd60, fff00000c85ecd6d) [ 32.362657] [ 32.362817] The buggy address belongs to the physical page: [ 32.362874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec [ 32.362928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.363030] page_type: f5(slab) [ 32.363071] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.363120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.363258] page dumped because: kasan: bad access detected [ 32.363362] [ 32.363468] Memory state around the buggy address: [ 32.363565] fff00000c85ecc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.363681] fff00000c85ecc80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.363778] >fff00000c85ecd00: fa fb fc fc fa fb fc fc 00 00 fc fc 00 05 fc fc [ 32.363826] ^ [ 32.363863] fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.364047] fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.364179] ==================================================================
[ 25.725402] ================================================================== [ 25.726367] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 25.726647] Write of size 16 at addr ffff888105f9f180 by task kunit_try_catch/215 [ 25.727034] [ 25.727169] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 25.727219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.727231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.727251] Call Trace: [ 25.727264] <TASK> [ 25.727280] dump_stack_lvl+0x73/0xb0 [ 25.727309] print_report+0xd1/0x640 [ 25.727332] ? __virt_addr_valid+0x1db/0x2d0 [ 25.727355] ? kmalloc_oob_16+0x452/0x4a0 [ 25.727376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.727402] ? kmalloc_oob_16+0x452/0x4a0 [ 25.727423] kasan_report+0x141/0x180 [ 25.727446] ? kmalloc_oob_16+0x452/0x4a0 [ 25.727471] __asan_report_store16_noabort+0x1b/0x30 [ 25.727497] kmalloc_oob_16+0x452/0x4a0 [ 25.727518] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 25.727541] ? __schedule+0x10da/0x2b60 [ 25.727562] ? __pfx_read_tsc+0x10/0x10 [ 25.727584] ? ktime_get_ts64+0x86/0x230 [ 25.727610] kunit_try_run_case+0x1a5/0x480 [ 25.727636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.727659] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.727682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.727708] ? __kthread_parkme+0x82/0x180 [ 25.727729] ? preempt_count_sub+0x50/0x80 [ 25.727752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.727858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.727887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.727911] kthread+0x337/0x6f0 [ 25.727931] ? trace_preempt_on+0x20/0xc0 [ 25.727969] ? __pfx_kthread+0x10/0x10 [ 25.727990] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.728014] ? calculate_sigpending+0x7b/0xa0 [ 25.728038] ? __pfx_kthread+0x10/0x10 [ 25.728079] ret_from_fork+0x116/0x1d0 [ 25.728099] ? __pfx_kthread+0x10/0x10 [ 25.728119] ret_from_fork_asm+0x1a/0x30 [ 25.728150] </TASK> [ 25.728162] [ 25.735621] Allocated by task 215: [ 25.735873] kasan_save_stack+0x45/0x70 [ 25.736104] kasan_save_track+0x18/0x40 [ 25.736291] kasan_save_alloc_info+0x3b/0x50 [ 25.736483] __kasan_kmalloc+0xb7/0xc0 [ 25.736648] __kmalloc_cache_noprof+0x189/0x420 [ 25.736920] kmalloc_oob_16+0xa8/0x4a0 [ 25.737134] kunit_try_run_case+0x1a5/0x480 [ 25.737325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.737558] kthread+0x337/0x6f0 [ 25.737705] ret_from_fork+0x116/0x1d0 [ 25.737998] ret_from_fork_asm+0x1a/0x30 [ 25.738211] [ 25.738302] The buggy address belongs to the object at ffff888105f9f180 [ 25.738302] which belongs to the cache kmalloc-16 of size 16 [ 25.738887] The buggy address is located 0 bytes inside of [ 25.738887] allocated 13-byte region [ffff888105f9f180, ffff888105f9f18d) [ 25.739441] [ 25.739539] The buggy address belongs to the physical page: [ 25.739752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9f [ 25.740204] flags: 0x200000000000000(node=0|zone=2) [ 25.740408] page_type: f5(slab) [ 25.740567] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.740954] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.741290] page dumped because: kasan: bad access detected [ 25.741468] [ 25.741533] Memory state around the buggy address: [ 25.741689] ffff888105f9f080: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 25.742144] ffff888105f9f100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.742442] >ffff888105f9f180: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.742739] ^ [ 25.743001] ffff888105f9f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.743353] ffff888105f9f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.743676] ==================================================================