Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.629316] ================================================================== [ 16.629653] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.629757] Write of size 1 at addr fff00000c65b200a by task kunit_try_catch/146 [ 16.629816] [ 16.629880] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.630001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.630028] Hardware name: linux,dummy-virt (DT) [ 16.630068] Call trace: [ 16.630092] show_stack+0x20/0x38 (C) [ 16.630393] dump_stack_lvl+0x8c/0xd0 [ 16.630461] print_report+0x118/0x5d0 [ 16.630558] kasan_report+0xdc/0x128 [ 16.630624] __asan_report_store1_noabort+0x20/0x30 [ 16.630676] kmalloc_large_oob_right+0x278/0x2b8 [ 16.630721] kunit_try_run_case+0x170/0x3f0 [ 16.630769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.630819] kthread+0x328/0x630 [ 16.630882] ret_from_fork+0x10/0x20 [ 16.631202] [ 16.631294] The buggy address belongs to the physical page: [ 16.631330] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0 [ 16.631429] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.631496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.631620] page_type: f8(unknown) [ 16.631695] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.631743] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.631800] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.631860] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.631908] head: 0bfffe0000000002 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff [ 16.631955] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.632368] page dumped because: kasan: bad access detected [ 16.632450] [ 16.632502] Memory state around the buggy address: [ 16.632620] fff00000c65b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.632713] fff00000c65b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.632755] >fff00000c65b2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.632791] ^ [ 16.632822] fff00000c65b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.632873] fff00000c65b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.633046] ==================================================================
[ 16.323521] ================================================================== [ 16.323693] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.323748] Write of size 1 at addr fff00000c669e00a by task kunit_try_catch/146 [ 16.323797] [ 16.324203] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.324350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.324377] Hardware name: linux,dummy-virt (DT) [ 16.324408] Call trace: [ 16.324459] show_stack+0x20/0x38 (C) [ 16.324583] dump_stack_lvl+0x8c/0xd0 [ 16.324664] print_report+0x118/0x5d0 [ 16.324709] kasan_report+0xdc/0x128 [ 16.324833] __asan_report_store1_noabort+0x20/0x30 [ 16.324909] kmalloc_large_oob_right+0x278/0x2b8 [ 16.324956] kunit_try_run_case+0x170/0x3f0 [ 16.325238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.325298] kthread+0x328/0x630 [ 16.325404] ret_from_fork+0x10/0x20 [ 16.325464] [ 16.325526] The buggy address belongs to the physical page: [ 16.325558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c [ 16.325666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.325723] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.325782] page_type: f8(unknown) [ 16.325821] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.325869] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.326092] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.326387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.326438] head: 0bfffe0000000002 ffffc1ffc319a701 00000000ffffffff 00000000ffffffff [ 16.326625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.326788] page dumped because: kasan: bad access detected [ 16.326915] [ 16.326933] Memory state around the buggy address: [ 16.327022] fff00000c669df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.327064] fff00000c669df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.327219] >fff00000c669e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.327400] ^ [ 16.327648] fff00000c669e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.327744] fff00000c669e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.327780] ==================================================================
[ 16.357384] ================================================================== [ 16.357457] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.357510] Write of size 1 at addr fff00000c76d600a by task kunit_try_catch/146 [ 16.357895] [ 16.358118] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.358226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.358323] Hardware name: linux,dummy-virt (DT) [ 16.358357] Call trace: [ 16.358428] show_stack+0x20/0x38 (C) [ 16.358526] dump_stack_lvl+0x8c/0xd0 [ 16.358736] print_report+0x118/0x5d0 [ 16.358790] kasan_report+0xdc/0x128 [ 16.358882] __asan_report_store1_noabort+0x20/0x30 [ 16.359176] kmalloc_large_oob_right+0x278/0x2b8 [ 16.359229] kunit_try_run_case+0x170/0x3f0 [ 16.359277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.359584] kthread+0x328/0x630 [ 16.359727] ret_from_fork+0x10/0x20 [ 16.360106] [ 16.360292] The buggy address belongs to the physical page: [ 16.360738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d4 [ 16.360900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.361040] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.361227] page_type: f8(unknown) [ 16.361457] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.361833] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.361918] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.362049] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.362134] head: 0bfffe0000000002 ffffc1ffc31db501 00000000ffffffff 00000000ffffffff [ 16.362248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.362295] page dumped because: kasan: bad access detected [ 16.362326] [ 16.362351] Memory state around the buggy address: [ 16.362394] fff00000c76d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.362435] fff00000c76d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.362476] >fff00000c76d6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.362512] ^ [ 16.362563] fff00000c76d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.362603] fff00000c76d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.362640] ==================================================================
[ 11.487915] ================================================================== [ 11.488399] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 11.488736] Write of size 1 at addr ffff888102be600a by task kunit_try_catch/164 [ 11.489125] [ 11.489252] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.489295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.489305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.489326] Call Trace: [ 11.489338] <TASK> [ 11.489352] dump_stack_lvl+0x73/0xb0 [ 11.489381] print_report+0xd1/0x610 [ 11.489404] ? __virt_addr_valid+0x1db/0x2d0 [ 11.489427] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.489460] ? kasan_addr_to_slab+0x11/0xa0 [ 11.489480] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.489503] kasan_report+0x141/0x180 [ 11.489525] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.489553] __asan_report_store1_noabort+0x1b/0x30 [ 11.489578] kmalloc_large_oob_right+0x2e9/0x330 [ 11.489647] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 11.489672] ? __schedule+0x10cc/0x2b60 [ 11.489696] ? __pfx_read_tsc+0x10/0x10 [ 11.489718] ? ktime_get_ts64+0x86/0x230 [ 11.489742] kunit_try_run_case+0x1a5/0x480 [ 11.489767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.489789] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.489814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.489839] ? __kthread_parkme+0x82/0x180 [ 11.489859] ? preempt_count_sub+0x50/0x80 [ 11.489883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.489906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.489930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.489954] kthread+0x337/0x6f0 [ 11.489973] ? trace_preempt_on+0x20/0xc0 [ 11.489995] ? __pfx_kthread+0x10/0x10 [ 11.490015] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.490037] ? calculate_sigpending+0x7b/0xa0 [ 11.490061] ? __pfx_kthread+0x10/0x10 [ 11.490083] ret_from_fork+0x116/0x1d0 [ 11.490101] ? __pfx_kthread+0x10/0x10 [ 11.490121] ret_from_fork_asm+0x1a/0x30 [ 11.490153] </TASK> [ 11.490163] [ 11.497856] The buggy address belongs to the physical page: [ 11.498077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be4 [ 11.498365] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.498615] flags: 0x200000000000040(head|node=0|zone=2) [ 11.499122] page_type: f8(unknown) [ 11.499336] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.499900] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.500250] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.500571] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.500955] head: 0200000000000002 ffffea00040af901 00000000ffffffff 00000000ffffffff [ 11.501291] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.501540] page dumped because: kasan: bad access detected [ 11.501739] [ 11.501828] Memory state around the buggy address: [ 11.502058] ffff888102be5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.502474] ffff888102be5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.502905] >ffff888102be6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.503193] ^ [ 11.503346] ffff888102be6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.503664] ffff888102be6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.504066] ==================================================================
[ 11.593553] ================================================================== [ 11.595186] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 11.596362] Write of size 1 at addr ffff888102a0200a by task kunit_try_catch/163 [ 11.596831] [ 11.596938] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.596989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.597001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.597035] Call Trace: [ 11.597051] <TASK> [ 11.597071] dump_stack_lvl+0x73/0xb0 [ 11.597105] print_report+0xd1/0x610 [ 11.597129] ? __virt_addr_valid+0x1db/0x2d0 [ 11.597155] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.597177] ? kasan_addr_to_slab+0x11/0xa0 [ 11.597216] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.597239] kasan_report+0x141/0x180 [ 11.597260] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.597298] __asan_report_store1_noabort+0x1b/0x30 [ 11.597322] kmalloc_large_oob_right+0x2e9/0x330 [ 11.597344] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 11.597387] ? __schedule+0x10cc/0x2b60 [ 11.597411] ? __pfx_read_tsc+0x10/0x10 [ 11.597432] ? ktime_get_ts64+0x86/0x230 [ 11.597469] kunit_try_run_case+0x1a5/0x480 [ 11.597496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.597519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.597543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.597566] ? __kthread_parkme+0x82/0x180 [ 11.597588] ? preempt_count_sub+0x50/0x80 [ 11.597612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.597635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.597669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.597693] kthread+0x337/0x6f0 [ 11.597711] ? trace_preempt_on+0x20/0xc0 [ 11.597735] ? __pfx_kthread+0x10/0x10 [ 11.597754] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.597775] ? calculate_sigpending+0x7b/0xa0 [ 11.597799] ? __pfx_kthread+0x10/0x10 [ 11.597819] ret_from_fork+0x116/0x1d0 [ 11.597837] ? __pfx_kthread+0x10/0x10 [ 11.597856] ret_from_fork_asm+0x1a/0x30 [ 11.597887] </TASK> [ 11.597899] [ 11.612052] The buggy address belongs to the physical page: [ 11.612745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a00 [ 11.613023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.613253] flags: 0x200000000000040(head|node=0|zone=2) [ 11.613544] page_type: f8(unknown) [ 11.613973] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.614934] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.615788] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.616628] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.617641] head: 0200000000000002 ffffea00040a8001 00000000ffffffff 00000000ffffffff [ 11.617885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.618291] page dumped because: kasan: bad access detected [ 11.618849] [ 11.619052] Memory state around the buggy address: [ 11.619584] ffff888102a01f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.620263] ffff888102a01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.621032] >ffff888102a02000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.621698] ^ [ 11.621828] ffff888102a02080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.622304] ffff888102a02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.623018] ==================================================================
[ 11.695619] ================================================================== [ 11.696254] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 11.696506] Write of size 1 at addr ffff8881039da00a by task kunit_try_catch/163 [ 11.697386] [ 11.697716] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.697765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.697775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.697835] Call Trace: [ 11.697847] <TASK> [ 11.697863] dump_stack_lvl+0x73/0xb0 [ 11.697915] print_report+0xd1/0x610 [ 11.697938] ? __virt_addr_valid+0x1db/0x2d0 [ 11.697961] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.697983] ? kasan_addr_to_slab+0x11/0xa0 [ 11.698002] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.698024] kasan_report+0x141/0x180 [ 11.698046] ? kmalloc_large_oob_right+0x2e9/0x330 [ 11.698106] __asan_report_store1_noabort+0x1b/0x30 [ 11.698131] kmalloc_large_oob_right+0x2e9/0x330 [ 11.698153] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 11.698188] ? __schedule+0x10cc/0x2b60 [ 11.698209] ? __pfx_read_tsc+0x10/0x10 [ 11.698230] ? ktime_get_ts64+0x86/0x230 [ 11.698255] kunit_try_run_case+0x1a5/0x480 [ 11.698279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.698301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.698324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.698347] ? __kthread_parkme+0x82/0x180 [ 11.698367] ? preempt_count_sub+0x50/0x80 [ 11.698391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.698415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.698438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.698461] kthread+0x337/0x6f0 [ 11.698479] ? trace_preempt_on+0x20/0xc0 [ 11.698503] ? __pfx_kthread+0x10/0x10 [ 11.698522] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.698558] ? calculate_sigpending+0x7b/0xa0 [ 11.698582] ? __pfx_kthread+0x10/0x10 [ 11.698603] ret_from_fork+0x116/0x1d0 [ 11.698620] ? __pfx_kthread+0x10/0x10 [ 11.698640] ret_from_fork_asm+0x1a/0x30 [ 11.698672] </TASK> [ 11.698683] [ 11.708021] The buggy address belongs to the physical page: [ 11.708254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d8 [ 11.708546] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.708776] flags: 0x200000000000040(head|node=0|zone=2) [ 11.708980] page_type: f8(unknown) [ 11.709142] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.709488] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.710003] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.710254] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.710627] head: 0200000000000002 ffffea00040e7601 00000000ffffffff 00000000ffffffff [ 11.710911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.711361] page dumped because: kasan: bad access detected [ 11.711688] [ 11.711772] Memory state around the buggy address: [ 11.711975] ffff8881039d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.712281] ffff8881039d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.712517] >ffff8881039da000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.712837] ^ [ 11.713039] ffff8881039da080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.713331] ffff8881039da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.713822] ==================================================================