Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.966470] ==================================================================
[   16.966612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   16.966667] Write of size 16 at addr fff00000c635ae69 by task kunit_try_catch/179
[   16.966803] 
[   16.966890] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.967031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.967100] Hardware name: linux,dummy-virt (DT)
[   16.967221] Call trace:
[   16.967288]  show_stack+0x20/0x38 (C)
[   16.967395]  dump_stack_lvl+0x8c/0xd0
[   16.967514]  print_report+0x118/0x608
[   16.967591]  kasan_report+0xdc/0x128
[   16.967646]  kasan_check_range+0x100/0x1a8
[   16.967692]  __asan_memset+0x34/0x78
[   16.967732]  kmalloc_oob_memset_16+0x150/0x2f8
[   16.967775]  kunit_try_run_case+0x170/0x3f0
[   16.967864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.967918]  kthread+0x328/0x630
[   16.967957]  ret_from_fork+0x10/0x20
[   16.968013] 
[   16.968031] Allocated by task 179:
[   16.968057]  kasan_save_stack+0x3c/0x68
[   16.968097]  kasan_save_track+0x20/0x40
[   16.968271]  kasan_save_alloc_info+0x40/0x58
[   16.968315]  __kasan_kmalloc+0xd4/0xd8
[   16.968363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.968461]  kmalloc_oob_memset_16+0xb0/0x2f8
[   16.968508]  kunit_try_run_case+0x170/0x3f0
[   16.968594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.968669]  kthread+0x328/0x630
[   16.968804]  ret_from_fork+0x10/0x20
[   16.968859] 
[   16.968878] The buggy address belongs to the object at fff00000c635ae00
[   16.968878]  which belongs to the cache kmalloc-128 of size 128
[   16.968988] The buggy address is located 105 bytes inside of
[   16.968988]  allocated 120-byte region [fff00000c635ae00, fff00000c635ae78)
[   16.969060] 
[   16.969097] The buggy address belongs to the physical page:
[   16.969149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.969222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.969285] page_type: f5(slab)
[   16.969322] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.969392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.969664] page dumped because: kasan: bad access detected
[   16.969725] 
[   16.969776] Memory state around the buggy address:
[   16.969828]  fff00000c635ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.969897]  fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.969964] >fff00000c635ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.970010]                                                                 ^
[   16.970083]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.970204]  fff00000c635af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.970273] ==================================================================

[   16.923893] ==================================================================
[   16.923961] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   16.924012] Write of size 16 at addr fff00000c63cdd69 by task kunit_try_catch/179
[   16.924060] 
[   16.924412] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.924569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.924664] Hardware name: linux,dummy-virt (DT)
[   16.924694] Call trace:
[   16.924747]  show_stack+0x20/0x38 (C)
[   16.924813]  dump_stack_lvl+0x8c/0xd0
[   16.925138]  print_report+0x118/0x608
[   16.925322]  kasan_report+0xdc/0x128
[   16.925366]  kasan_check_range+0x100/0x1a8
[   16.925412]  __asan_memset+0x34/0x78
[   16.925452]  kmalloc_oob_memset_16+0x150/0x2f8
[   16.925507]  kunit_try_run_case+0x170/0x3f0
[   16.925555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.925743]  kthread+0x328/0x630
[   16.925785]  ret_from_fork+0x10/0x20
[   16.926382] 
[   16.926405] Allocated by task 179:
[   16.926551]  kasan_save_stack+0x3c/0x68
[   16.926594]  kasan_save_track+0x20/0x40
[   16.926641]  kasan_save_alloc_info+0x40/0x58
[   16.926680]  __kasan_kmalloc+0xd4/0xd8
[   16.926853]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.927054]  kmalloc_oob_memset_16+0xb0/0x2f8
[   16.927112]  kunit_try_run_case+0x170/0x3f0
[   16.927148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.927191]  kthread+0x328/0x630
[   16.927223]  ret_from_fork+0x10/0x20
[   16.927305] 
[   16.927325] The buggy address belongs to the object at fff00000c63cdd00
[   16.927325]  which belongs to the cache kmalloc-128 of size 128
[   16.927428] The buggy address is located 105 bytes inside of
[   16.927428]  allocated 120-byte region [fff00000c63cdd00, fff00000c63cdd78)
[   16.927488] 
[   16.927508] The buggy address belongs to the physical page:
[   16.927544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   16.927769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.927832] page_type: f5(slab)
[   16.927868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.927926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.927985] page dumped because: kasan: bad access detected
[   16.928064] 
[   16.928082] Memory state around the buggy address:
[   16.928185]  fff00000c63cdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.928375]  fff00000c63cdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.928511] >fff00000c63cdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.928549]                                                                 ^
[   16.928586]  fff00000c63cdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.928639]  fff00000c63cde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.928675] ==================================================================

[   13.516417] ==================================================================
[   13.517091] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   13.517415] Write of size 16 at addr ffff88810254d469 by task kunit_try_catch/196
[   13.517694] 
[   13.517813] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.517888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.517909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.517955] Call Trace:
[   13.517980]  <TASK>
[   13.518007]  dump_stack_lvl+0x73/0xb0
[   13.518060]  print_report+0xd1/0x650
[   13.518100]  ? __virt_addr_valid+0x1db/0x2d0
[   13.518136]  ? kmalloc_oob_memset_16+0x166/0x330
[   13.518600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.518694]  ? kmalloc_oob_memset_16+0x166/0x330
[   13.518728]  kasan_report+0x141/0x180
[   13.518762]  ? kmalloc_oob_memset_16+0x166/0x330
[   13.518800]  kasan_check_range+0x10c/0x1c0
[   13.518837]  __asan_memset+0x27/0x50
[   13.518870]  kmalloc_oob_memset_16+0x166/0x330
[   13.518907]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   13.518948]  ? __schedule+0x10cc/0x2b60
[   13.518991]  ? __pfx_read_tsc+0x10/0x10
[   13.519028]  ? ktime_get_ts64+0x86/0x230
[   13.519074]  kunit_try_run_case+0x1a5/0x480
[   13.519129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.519166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.519208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.519250]  ? __kthread_parkme+0x82/0x180
[   13.519288]  ? preempt_count_sub+0x50/0x80
[   13.519333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.519375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.519417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.519456]  kthread+0x337/0x6f0
[   13.519483]  ? trace_preempt_on+0x20/0xc0
[   13.519510]  ? __pfx_kthread+0x10/0x10
[   13.519546]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.519573]  ? calculate_sigpending+0x7b/0xa0
[   13.519604]  ? __pfx_kthread+0x10/0x10
[   13.519649]  ret_from_fork+0x116/0x1d0
[   13.519669]  ? __pfx_kthread+0x10/0x10
[   13.519687]  ret_from_fork_asm+0x1a/0x30
[   13.519715]  </TASK>
[   13.519727] 
[   13.529840] Allocated by task 196:
[   13.530299]  kasan_save_stack+0x45/0x70
[   13.530744]  kasan_save_track+0x18/0x40
[   13.531284]  kasan_save_alloc_info+0x3b/0x50
[   13.531735]  __kasan_kmalloc+0xb7/0xc0
[   13.532036]  __kmalloc_cache_noprof+0x189/0x420
[   13.532664]  kmalloc_oob_memset_16+0xac/0x330
[   13.532994]  kunit_try_run_case+0x1a5/0x480
[   13.533276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.533526]  kthread+0x337/0x6f0
[   13.533698]  ret_from_fork+0x116/0x1d0
[   13.533859]  ret_from_fork_asm+0x1a/0x30
[   13.534035] 
[   13.534137] The buggy address belongs to the object at ffff88810254d400
[   13.534137]  which belongs to the cache kmalloc-128 of size 128
[   13.534966] The buggy address is located 105 bytes inside of
[   13.534966]  allocated 120-byte region [ffff88810254d400, ffff88810254d478)
[   13.535802] 
[   13.535959] The buggy address belongs to the physical page:
[   13.537061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   13.537406] flags: 0x200000000000000(node=0|zone=2)
[   13.537612] page_type: f5(slab)
[   13.537781] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.538035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.538274] page dumped because: kasan: bad access detected
[   13.538632] 
[   13.538807] Memory state around the buggy address:
[   13.539133]  ffff88810254d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.539803]  ffff88810254d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.540342] >ffff88810254d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.541043]                                                                 ^
[   13.541670]  ffff88810254d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.542921]  ffff88810254d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.543500] ==================================================================

[   13.672457] ==================================================================
[   13.674185] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   13.675311] Write of size 16 at addr ffff888102c3fc69 by task kunit_try_catch/195
[   13.676330] 
[   13.676693] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.676772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.676785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.676807] Call Trace:
[   13.676821]  <TASK>
[   13.676840]  dump_stack_lvl+0x73/0xb0
[   13.676871]  print_report+0xd1/0x650
[   13.676893]  ? __virt_addr_valid+0x1db/0x2d0
[   13.676917]  ? kmalloc_oob_memset_16+0x166/0x330
[   13.676937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.676962]  ? kmalloc_oob_memset_16+0x166/0x330
[   13.676984]  kasan_report+0x141/0x180
[   13.677005]  ? kmalloc_oob_memset_16+0x166/0x330
[   13.677032]  kasan_check_range+0x10c/0x1c0
[   13.677070]  __asan_memset+0x27/0x50
[   13.677089]  kmalloc_oob_memset_16+0x166/0x330
[   13.677111]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   13.677134]  ? __schedule+0x10cc/0x2b60
[   13.677156]  ? __pfx_read_tsc+0x10/0x10
[   13.677177]  ? ktime_get_ts64+0x86/0x230
[   13.677202]  kunit_try_run_case+0x1a5/0x480
[   13.677233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.677255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.677278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.677300]  ? __kthread_parkme+0x82/0x180
[   13.677320]  ? preempt_count_sub+0x50/0x80
[   13.677344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.677367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.677389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.677410]  kthread+0x337/0x6f0
[   13.677429]  ? trace_preempt_on+0x20/0xc0
[   13.677452]  ? __pfx_kthread+0x10/0x10
[   13.677472]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.677492]  ? calculate_sigpending+0x7b/0xa0
[   13.677517]  ? __pfx_kthread+0x10/0x10
[   13.677542]  ret_from_fork+0x116/0x1d0
[   13.677560]  ? __pfx_kthread+0x10/0x10
[   13.677581]  ret_from_fork_asm+0x1a/0x30
[   13.677613]  </TASK>
[   13.677624] 
[   13.688359] Allocated by task 195:
[   13.689354]  kasan_save_stack+0x45/0x70
[   13.689558]  kasan_save_track+0x18/0x40
[   13.690133]  kasan_save_alloc_info+0x3b/0x50
[   13.690926]  __kasan_kmalloc+0xb7/0xc0
[   13.691390]  __kmalloc_cache_noprof+0x189/0x420
[   13.691569]  kmalloc_oob_memset_16+0xac/0x330
[   13.692292]  kunit_try_run_case+0x1a5/0x480
[   13.692693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.693529]  kthread+0x337/0x6f0
[   13.693880]  ret_from_fork+0x116/0x1d0
[   13.694087]  ret_from_fork_asm+0x1a/0x30
[   13.694439] 
[   13.694521] The buggy address belongs to the object at ffff888102c3fc00
[   13.694521]  which belongs to the cache kmalloc-128 of size 128
[   13.695898] The buggy address is located 105 bytes inside of
[   13.695898]  allocated 120-byte region [ffff888102c3fc00, ffff888102c3fc78)
[   13.697029] 
[   13.697341] The buggy address belongs to the physical page:
[   13.698032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f
[   13.698318] flags: 0x200000000000000(node=0|zone=2)
[   13.698504] page_type: f5(slab)
[   13.698639] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.699666] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.700533] page dumped because: kasan: bad access detected
[   13.701158] 
[   13.701330] Memory state around the buggy address:
[   13.701916]  ffff888102c3fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.702170]  ffff888102c3fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.702400] >ffff888102c3fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.702632]                                                                 ^
[   13.703363]  ffff888102c3fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.704120]  ffff888102c3fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.704891] ==================================================================

[   26.161061] ==================================================================
[   26.172413] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   26.179727] Write of size 16 at addr ffff8881066f8469 by task kunit_try_catch/219
[   26.187213] 
[   26.188715] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   26.188724] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   26.188727] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.188730] Call Trace:
[   26.188732]  <TASK>
[   26.188734]  dump_stack_lvl+0x73/0xb0
[   26.188738]  print_report+0xd1/0x650
[   26.188742]  ? __virt_addr_valid+0x1db/0x2d0
[   26.188746]  ? kmalloc_oob_memset_16+0x166/0x330
[   26.188750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.188755]  ? kmalloc_oob_memset_16+0x166/0x330
[   26.188759]  kasan_report+0x141/0x180
[   26.188763]  ? kmalloc_oob_memset_16+0x166/0x330
[   26.188768]  kasan_check_range+0x10c/0x1c0
[   26.188772]  __asan_memset+0x27/0x50
[   26.188775]  kmalloc_oob_memset_16+0x166/0x330
[   26.188779]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   26.188783]  ? __schedule+0x10cc/0x2b60
[   26.188787]  ? ktime_get_ts64+0x83/0x230
[   26.188792]  kunit_try_run_case+0x1a2/0x480
[   26.188796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.188800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.188804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.188808]  ? __kthread_parkme+0x82/0x180
[   26.188812]  ? preempt_count_sub+0x50/0x80
[   26.188816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.188820]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.188824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.188829]  kthread+0x334/0x6f0
[   26.188832]  ? trace_preempt_on+0x20/0xc0
[   26.188836]  ? __pfx_kthread+0x10/0x10
[   26.188840]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.188843]  ? calculate_sigpending+0x7b/0xa0
[   26.188848]  ? __pfx_kthread+0x10/0x10
[   26.188852]  ret_from_fork+0x113/0x1d0
[   26.188855]  ? __pfx_kthread+0x10/0x10
[   26.188859]  ret_from_fork_asm+0x1a/0x30
[   26.188864]  </TASK>
[   26.188866] 
[   26.358303] Allocated by task 219:
[   26.361706]  kasan_save_stack+0x45/0x70
[   26.365548]  kasan_save_track+0x18/0x40
[   26.369417]  kasan_save_alloc_info+0x3b/0x50
[   26.373695]  __kasan_kmalloc+0xb7/0xc0
[   26.377445]  __kmalloc_cache_noprof+0x189/0x420
[   26.381977]  kmalloc_oob_memset_16+0xac/0x330
[   26.386360]  kunit_try_run_case+0x1a2/0x480
[   26.390595]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.395993]  kthread+0x334/0x6f0
[   26.399224]  ret_from_fork+0x113/0x1d0
[   26.402977]  ret_from_fork_asm+0x1a/0x30
[   26.406903] 
[   26.408421] The buggy address belongs to the object at ffff8881066f8400
[   26.408421]  which belongs to the cache kmalloc-128 of size 128
[   26.420937] The buggy address is located 105 bytes inside of
[   26.420937]  allocated 120-byte region [ffff8881066f8400, ffff8881066f8478)
[   26.433546] 
[   26.435044] The buggy address belongs to the physical page:
[   26.440618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   26.448624] flags: 0x200000000000000(node=0|zone=2)
[   26.453506] page_type: f5(slab)
[   26.456651] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   26.464416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.472154] page dumped because: kasan: bad access detected
[   26.477727] 
[   26.479227] Memory state around the buggy address:
[   26.484019]  ffff8881066f8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.491239]  ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.498458] >ffff8881066f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.505677]                                                                 ^
[   26.512810]  ffff8881066f8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.520029]  ffff8881066f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.527248] ==================================================================