Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.949415] ==================================================================
[   16.949478] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   16.949529] Write of size 4 at addr fff00000c635ac75 by task kunit_try_catch/175
[   16.949577] 
[   16.949610] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.949700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.949725] Hardware name: linux,dummy-virt (DT)
[   16.949753] Call trace:
[   16.949774]  show_stack+0x20/0x38 (C)
[   16.949818]  dump_stack_lvl+0x8c/0xd0
[   16.949862]  print_report+0x118/0x608
[   16.949905]  kasan_report+0xdc/0x128
[   16.949947]  kasan_check_range+0x100/0x1a8
[   16.950008]  __asan_memset+0x34/0x78
[   16.950123]  kmalloc_oob_memset_4+0x150/0x300
[   16.950178]  kunit_try_run_case+0x170/0x3f0
[   16.950253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.950329]  kthread+0x328/0x630
[   16.950396]  ret_from_fork+0x10/0x20
[   16.950458] 
[   16.950476] Allocated by task 175:
[   16.950503]  kasan_save_stack+0x3c/0x68
[   16.950568]  kasan_save_track+0x20/0x40
[   16.950605]  kasan_save_alloc_info+0x40/0x58
[   16.950680]  __kasan_kmalloc+0xd4/0xd8
[   16.950715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.950776]  kmalloc_oob_memset_4+0xb0/0x300
[   16.950815]  kunit_try_run_case+0x170/0x3f0
[   16.950852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.950894]  kthread+0x328/0x630
[   16.951063]  ret_from_fork+0x10/0x20
[   16.951264] 
[   16.951317] The buggy address belongs to the object at fff00000c635ac00
[   16.951317]  which belongs to the cache kmalloc-128 of size 128
[   16.951448] The buggy address is located 117 bytes inside of
[   16.951448]  allocated 120-byte region [fff00000c635ac00, fff00000c635ac78)
[   16.951519] 
[   16.951539] The buggy address belongs to the physical page:
[   16.951568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.951628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.951683] page_type: f5(slab)
[   16.951720] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.951776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.951814] page dumped because: kasan: bad access detected
[   16.951844] 
[   16.951861] Memory state around the buggy address:
[   16.951902]  fff00000c635ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.951942]  fff00000c635ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952288] >fff00000c635ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.952465]                                                                 ^
[   16.952561]  fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952602]  fff00000c635ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952640] ==================================================================

[   16.893636] ==================================================================
[   16.893761] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   16.893940] Write of size 4 at addr fff00000c63cdb75 by task kunit_try_catch/175
[   16.894031] 
[   16.894277] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.894501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.894528] Hardware name: linux,dummy-virt (DT)
[   16.894557] Call trace:
[   16.894580]  show_stack+0x20/0x38 (C)
[   16.894791]  dump_stack_lvl+0x8c/0xd0
[   16.894880]  print_report+0x118/0x608
[   16.894943]  kasan_report+0xdc/0x128
[   16.894987]  kasan_check_range+0x100/0x1a8
[   16.895033]  __asan_memset+0x34/0x78
[   16.895073]  kmalloc_oob_memset_4+0x150/0x300
[   16.895140]  kunit_try_run_case+0x170/0x3f0
[   16.895413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.895480]  kthread+0x328/0x630
[   16.895532]  ret_from_fork+0x10/0x20
[   16.895800] 
[   16.895819] Allocated by task 175:
[   16.895846]  kasan_save_stack+0x3c/0x68
[   16.895886]  kasan_save_track+0x20/0x40
[   16.895942]  kasan_save_alloc_info+0x40/0x58
[   16.896038]  __kasan_kmalloc+0xd4/0xd8
[   16.896075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.896453]  kmalloc_oob_memset_4+0xb0/0x300
[   16.896813]  kunit_try_run_case+0x170/0x3f0
[   16.896852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.896894]  kthread+0x328/0x630
[   16.896985]  ret_from_fork+0x10/0x20
[   16.897173] 
[   16.897237] The buggy address belongs to the object at fff00000c63cdb00
[   16.897237]  which belongs to the cache kmalloc-128 of size 128
[   16.897330] The buggy address is located 117 bytes inside of
[   16.897330]  allocated 120-byte region [fff00000c63cdb00, fff00000c63cdb78)
[   16.897393] 
[   16.897419] The buggy address belongs to the physical page:
[   16.897539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   16.897627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.897768] page_type: f5(slab)
[   16.897869] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.897925] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.897963] page dumped because: kasan: bad access detected
[   16.898018] 
[   16.898036] Memory state around the buggy address:
[   16.898066]  fff00000c63cda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.898107]  fff00000c63cda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.898234] >fff00000c63cdb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.898559]                                                                 ^
[   16.898795]  fff00000c63cdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.898995]  fff00000c63cdc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.899117] ==================================================================

[   13.454702] ==================================================================
[   13.455541] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   13.456208] Write of size 4 at addr ffff888102aa0675 by task kunit_try_catch/192
[   13.456458] 
[   13.456660] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.456759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.456797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.456837] Call Trace:
[   13.456874]  <TASK>
[   13.456902]  dump_stack_lvl+0x73/0xb0
[   13.456988]  print_report+0xd1/0x650
[   13.457195]  ? __virt_addr_valid+0x1db/0x2d0
[   13.457254]  ? kmalloc_oob_memset_4+0x166/0x330
[   13.457297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.457337]  ? kmalloc_oob_memset_4+0x166/0x330
[   13.457363]  kasan_report+0x141/0x180
[   13.457384]  ? kmalloc_oob_memset_4+0x166/0x330
[   13.457408]  kasan_check_range+0x10c/0x1c0
[   13.457429]  __asan_memset+0x27/0x50
[   13.457446]  kmalloc_oob_memset_4+0x166/0x330
[   13.457466]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   13.457486]  ? __schedule+0x10cc/0x2b60
[   13.457512]  ? __pfx_read_tsc+0x10/0x10
[   13.457540]  ? ktime_get_ts64+0x86/0x230
[   13.457574]  kunit_try_run_case+0x1a5/0x480
[   13.457608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.457646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.457669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.457689]  ? __kthread_parkme+0x82/0x180
[   13.457707]  ? preempt_count_sub+0x50/0x80
[   13.457727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.457748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.457769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.457788]  kthread+0x337/0x6f0
[   13.457806]  ? trace_preempt_on+0x20/0xc0
[   13.457826]  ? __pfx_kthread+0x10/0x10
[   13.457845]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.457863]  ? calculate_sigpending+0x7b/0xa0
[   13.457884]  ? __pfx_kthread+0x10/0x10
[   13.457902]  ret_from_fork+0x116/0x1d0
[   13.457929]  ? __pfx_kthread+0x10/0x10
[   13.457949]  ret_from_fork_asm+0x1a/0x30
[   13.457977]  </TASK>
[   13.457989] 
[   13.469682] Allocated by task 192:
[   13.470050]  kasan_save_stack+0x45/0x70
[   13.470363]  kasan_save_track+0x18/0x40
[   13.470673]  kasan_save_alloc_info+0x3b/0x50
[   13.471365]  __kasan_kmalloc+0xb7/0xc0
[   13.471691]  __kmalloc_cache_noprof+0x189/0x420
[   13.472306]  kmalloc_oob_memset_4+0xac/0x330
[   13.472719]  kunit_try_run_case+0x1a5/0x480
[   13.473224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.473637]  kthread+0x337/0x6f0
[   13.474082]  ret_from_fork+0x116/0x1d0
[   13.474678]  ret_from_fork_asm+0x1a/0x30
[   13.474786] 
[   13.474840] The buggy address belongs to the object at ffff888102aa0600
[   13.474840]  which belongs to the cache kmalloc-128 of size 128
[   13.475026] The buggy address is located 117 bytes inside of
[   13.475026]  allocated 120-byte region [ffff888102aa0600, ffff888102aa0678)
[   13.475312] 
[   13.475419] The buggy address belongs to the physical page:
[   13.475707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   13.476327] flags: 0x200000000000000(node=0|zone=2)
[   13.476580] page_type: f5(slab)
[   13.476737] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.476962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.477477] page dumped because: kasan: bad access detected
[   13.478073] 
[   13.478314] Memory state around the buggy address:
[   13.478771]  ffff888102aa0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.479273]  ffff888102aa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.479484] >ffff888102aa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.480083]                                                                 ^
[   13.480401]  ffff888102aa0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.481015]  ffff888102aa0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.481322] ==================================================================

[   13.618915] ==================================================================
[   13.620371] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   13.621336] Write of size 4 at addr ffff8881031acf75 by task kunit_try_catch/191
[   13.621622] 
[   13.621978] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.622028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.622041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.622076] Call Trace:
[   13.622089]  <TASK>
[   13.622105]  dump_stack_lvl+0x73/0xb0
[   13.622136]  print_report+0xd1/0x650
[   13.622157]  ? __virt_addr_valid+0x1db/0x2d0
[   13.622179]  ? kmalloc_oob_memset_4+0x166/0x330
[   13.622199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.622224]  ? kmalloc_oob_memset_4+0x166/0x330
[   13.622245]  kasan_report+0x141/0x180
[   13.622266]  ? kmalloc_oob_memset_4+0x166/0x330
[   13.622292]  kasan_check_range+0x10c/0x1c0
[   13.622315]  __asan_memset+0x27/0x50
[   13.622333]  kmalloc_oob_memset_4+0x166/0x330
[   13.622355]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   13.622377]  ? __schedule+0x10cc/0x2b60
[   13.622398]  ? __pfx_read_tsc+0x10/0x10
[   13.622419]  ? ktime_get_ts64+0x86/0x230
[   13.622444]  kunit_try_run_case+0x1a5/0x480
[   13.622468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.622488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.622510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.622532]  ? __kthread_parkme+0x82/0x180
[   13.622551]  ? preempt_count_sub+0x50/0x80
[   13.622575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.622597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.622618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.622639]  kthread+0x337/0x6f0
[   13.622658]  ? trace_preempt_on+0x20/0xc0
[   13.622681]  ? __pfx_kthread+0x10/0x10
[   13.622708]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.622728]  ? calculate_sigpending+0x7b/0xa0
[   13.622750]  ? __pfx_kthread+0x10/0x10
[   13.622771]  ret_from_fork+0x116/0x1d0
[   13.622788]  ? __pfx_kthread+0x10/0x10
[   13.622808]  ret_from_fork_asm+0x1a/0x30
[   13.622839]  </TASK>
[   13.622850] 
[   13.635703] Allocated by task 191:
[   13.635905]  kasan_save_stack+0x45/0x70
[   13.636161]  kasan_save_track+0x18/0x40
[   13.636355]  kasan_save_alloc_info+0x3b/0x50
[   13.636573]  __kasan_kmalloc+0xb7/0xc0
[   13.636762]  __kmalloc_cache_noprof+0x189/0x420
[   13.636932]  kmalloc_oob_memset_4+0xac/0x330
[   13.637118]  kunit_try_run_case+0x1a5/0x480
[   13.637391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.637770]  kthread+0x337/0x6f0
[   13.637936]  ret_from_fork+0x116/0x1d0
[   13.638133]  ret_from_fork_asm+0x1a/0x30
[   13.638369] 
[   13.638475] The buggy address belongs to the object at ffff8881031acf00
[   13.638475]  which belongs to the cache kmalloc-128 of size 128
[   13.638939] The buggy address is located 117 bytes inside of
[   13.638939]  allocated 120-byte region [ffff8881031acf00, ffff8881031acf78)
[   13.639634] 
[   13.639778] The buggy address belongs to the physical page:
[   13.640022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031ac
[   13.640297] flags: 0x200000000000000(node=0|zone=2)
[   13.640476] page_type: f5(slab)
[   13.640607] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.640968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.641337] page dumped because: kasan: bad access detected
[   13.641614] 
[   13.641718] Memory state around the buggy address:
[   13.641889]  ffff8881031ace00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.642142]  ffff8881031ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.642482] >ffff8881031acf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.642822]                                                                 ^
[   13.643164]  ffff8881031acf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.643442]  ffff8881031ad000: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
[   13.643679] ==================================================================

[   25.414888] ==================================================================
[   25.426215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   25.433441] Write of size 4 at addr ffff8881066f8375 by task kunit_try_catch/215
[   25.440834] 
[   25.442363] CPU: 3 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   25.442372] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   25.442387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.442390] Call Trace:
[   25.442392]  <TASK>
[   25.442393]  dump_stack_lvl+0x73/0xb0
[   25.442398]  print_report+0xd1/0x650
[   25.442402]  ? __virt_addr_valid+0x1db/0x2d0
[   25.442406]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.442410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.442415]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.442419]  kasan_report+0x141/0x180
[   25.442422]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.442427]  kasan_check_range+0x10c/0x1c0
[   25.442432]  __asan_memset+0x27/0x50
[   25.442435]  kmalloc_oob_memset_4+0x166/0x330
[   25.442439]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   25.442443]  ? __schedule+0x10cc/0x2b60
[   25.442447]  ? ktime_get_ts64+0x83/0x230
[   25.442451]  kunit_try_run_case+0x1a2/0x480
[   25.442456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.442460]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.442464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.442468]  ? __kthread_parkme+0x82/0x180
[   25.442471]  ? preempt_count_sub+0x50/0x80
[   25.442475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.442480]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.442484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.442488]  kthread+0x334/0x6f0
[   25.442491]  ? trace_preempt_on+0x20/0xc0
[   25.442495]  ? __pfx_kthread+0x10/0x10
[   25.442499]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.442503]  ? calculate_sigpending+0x7b/0xa0
[   25.442507]  ? __pfx_kthread+0x10/0x10
[   25.442511]  ret_from_fork+0x113/0x1d0
[   25.442514]  ? __pfx_kthread+0x10/0x10
[   25.442518]  ret_from_fork_asm+0x1a/0x30
[   25.442523]  </TASK>
[   25.442525] 
[   25.611567] Allocated by task 215:
[   25.614973]  kasan_save_stack+0x45/0x70
[   25.618813]  kasan_save_track+0x18/0x40
[   25.622654]  kasan_save_alloc_info+0x3b/0x50
[   25.626932]  __kasan_kmalloc+0xb7/0xc0
[   25.630686]  __kmalloc_cache_noprof+0x189/0x420
[   25.635218]  kmalloc_oob_memset_4+0xac/0x330
[   25.639493]  kunit_try_run_case+0x1a2/0x480
[   25.643686]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.649084]  kthread+0x334/0x6f0
[   25.652318]  ret_from_fork+0x113/0x1d0
[   25.656096]  ret_from_fork_asm+0x1a/0x30
[   25.660022] 
[   25.661521] The buggy address belongs to the object at ffff8881066f8300
[   25.661521]  which belongs to the cache kmalloc-128 of size 128
[   25.674028] The buggy address is located 117 bytes inside of
[   25.674028]  allocated 120-byte region [ffff8881066f8300, ffff8881066f8378)
[   25.686629] 
[   25.688130] The buggy address belongs to the physical page:
[   25.693700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   25.701701] flags: 0x200000000000000(node=0|zone=2)
[   25.706581] page_type: f5(slab)
[   25.709727] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   25.717476] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.725222] page dumped because: kasan: bad access detected
[   25.730795] 
[   25.732295] Memory state around the buggy address:
[   25.737087]  ffff8881066f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.744307]  ffff8881066f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.751533] >ffff8881066f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.758754]                                                                 ^
[   25.765886]  ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.773106]  ffff8881066f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.780324] ==================================================================