Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.449329] ================================================================== [ 31.450516] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 31.451452] Write of size 16 at addr fff00000c5685469 by task kunit_try_catch/167 [ 31.452263] [ 31.453020] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.454206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.454743] Hardware name: linux,dummy-virt (DT) [ 31.455357] Call trace: [ 31.455803] show_stack+0x20/0x38 (C) [ 31.456550] dump_stack_lvl+0x8c/0xd0 [ 31.457497] print_report+0x118/0x5e0 [ 31.458140] kasan_report+0xc8/0x118 [ 31.458750] kasan_check_range+0x100/0x1a8 [ 31.459394] __asan_memset+0x34/0x78 [ 31.460021] kmalloc_oob_memset_16+0x150/0x2f8 [ 31.460995] kunit_try_run_case+0x14c/0x3d0 [ 31.461651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.462633] kthread+0x24c/0x2d0 [ 31.463342] ret_from_fork+0x10/0x20 [ 31.464121] [ 31.464731] Allocated by task 167: [ 31.465240] kasan_save_stack+0x3c/0x68 [ 31.465865] kasan_save_track+0x20/0x40 [ 31.466406] kasan_save_alloc_info+0x40/0x58 [ 31.467124] __kasan_kmalloc+0xd4/0xd8 [ 31.467696] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.468674] kmalloc_oob_memset_16+0xb0/0x2f8 [ 31.469256] kunit_try_run_case+0x14c/0x3d0 [ 31.469738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.470581] kthread+0x24c/0x2d0 [ 31.471186] ret_from_fork+0x10/0x20 [ 31.471758] [ 31.472113] The buggy address belongs to the object at fff00000c5685400 [ 31.472113] which belongs to the cache kmalloc-128 of size 128 [ 31.474034] The buggy address is located 105 bytes inside of [ 31.474034] allocated 120-byte region [fff00000c5685400, fff00000c5685478) [ 31.474926] [ 31.475875] The buggy address belongs to the physical page: [ 31.476801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105685 [ 31.477775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.478553] page_type: f5(slab) [ 31.479078] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.479884] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.480993] page dumped because: kasan: bad access detected [ 31.481652] [ 31.481940] Memory state around the buggy address: [ 31.482574] fff00000c5685300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.483367] fff00000c5685380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.484260] >fff00000c5685400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.485665] ^ [ 31.486734] fff00000c5685480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.487552] fff00000c5685500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.488340] ================================================================== [ 31.297147] ================================================================== [ 31.298121] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 31.299448] Write of size 2 at addr fff00000c648be77 by task kunit_try_catch/161 [ 31.300523] [ 31.300861] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.302204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.302815] Hardware name: linux,dummy-virt (DT) [ 31.303620] Call trace: [ 31.304211] show_stack+0x20/0x38 (C) [ 31.305081] dump_stack_lvl+0x8c/0xd0 [ 31.305691] print_report+0x118/0x5e0 [ 31.306574] kasan_report+0xc8/0x118 [ 31.307196] kasan_check_range+0x100/0x1a8 [ 31.307842] __asan_memset+0x34/0x78 [ 31.308839] kmalloc_oob_memset_2+0x150/0x2f8 [ 31.309451] kunit_try_run_case+0x14c/0x3d0 [ 31.310185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.310946] kthread+0x24c/0x2d0 [ 31.311547] ret_from_fork+0x10/0x20 [ 31.312151] [ 31.312942] Allocated by task 161: [ 31.313362] kasan_save_stack+0x3c/0x68 [ 31.314044] kasan_save_track+0x20/0x40 [ 31.314563] kasan_save_alloc_info+0x40/0x58 [ 31.315312] __kasan_kmalloc+0xd4/0xd8 [ 31.315968] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.316527] kmalloc_oob_memset_2+0xb0/0x2f8 [ 31.317469] kunit_try_run_case+0x14c/0x3d0 [ 31.318089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.318713] kthread+0x24c/0x2d0 [ 31.319526] ret_from_fork+0x10/0x20 [ 31.320044] [ 31.320841] The buggy address belongs to the object at fff00000c648be00 [ 31.320841] which belongs to the cache kmalloc-128 of size 128 [ 31.322113] The buggy address is located 119 bytes inside of [ 31.322113] allocated 120-byte region [fff00000c648be00, fff00000c648be78) [ 31.323427] [ 31.323823] The buggy address belongs to the physical page: [ 31.324699] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648b [ 31.325957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.326683] page_type: f5(slab) [ 31.327254] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.328541] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.329672] page dumped because: kasan: bad access detected [ 31.330150] [ 31.330353] Memory state around the buggy address: [ 31.330637] fff00000c648bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.331874] fff00000c648bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.332896] >fff00000c648be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.333512] ^ [ 31.334754] fff00000c648be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.335761] fff00000c648bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.336878] ================================================================== [ 31.347508] ================================================================== [ 31.348665] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 31.349419] Write of size 4 at addr fff00000c5685375 by task kunit_try_catch/163 [ 31.350304] [ 31.350715] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.352382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.353356] Hardware name: linux,dummy-virt (DT) [ 31.354071] Call trace: [ 31.354543] show_stack+0x20/0x38 (C) [ 31.355264] dump_stack_lvl+0x8c/0xd0 [ 31.355928] print_report+0x118/0x5e0 [ 31.356644] kasan_report+0xc8/0x118 [ 31.357215] kasan_check_range+0x100/0x1a8 [ 31.357813] __asan_memset+0x34/0x78 [ 31.358847] kmalloc_oob_memset_4+0x150/0x300 [ 31.359686] kunit_try_run_case+0x14c/0x3d0 [ 31.360672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.361631] kthread+0x24c/0x2d0 [ 31.362510] ret_from_fork+0x10/0x20 [ 31.363302] [ 31.363842] Allocated by task 163: [ 31.364342] kasan_save_stack+0x3c/0x68 [ 31.365353] kasan_save_track+0x20/0x40 [ 31.365897] kasan_save_alloc_info+0x40/0x58 [ 31.366488] __kasan_kmalloc+0xd4/0xd8 [ 31.367308] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.367928] kmalloc_oob_memset_4+0xb0/0x300 [ 31.368461] kunit_try_run_case+0x14c/0x3d0 [ 31.369406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.370081] kthread+0x24c/0x2d0 [ 31.370632] ret_from_fork+0x10/0x20 [ 31.371571] [ 31.371853] The buggy address belongs to the object at fff00000c5685300 [ 31.371853] which belongs to the cache kmalloc-128 of size 128 [ 31.373294] The buggy address is located 117 bytes inside of [ 31.373294] allocated 120-byte region [fff00000c5685300, fff00000c5685378) [ 31.374839] [ 31.375224] The buggy address belongs to the physical page: [ 31.375804] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105685 [ 31.377147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.378012] page_type: f5(slab) [ 31.378576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.379453] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.380226] page dumped because: kasan: bad access detected [ 31.381246] [ 31.381554] Memory state around the buggy address: [ 31.382177] fff00000c5685200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.382832] fff00000c5685280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.383741] >fff00000c5685300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.384884] ^ [ 31.385690] fff00000c5685380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.386535] fff00000c5685400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.387255] ================================================================== [ 31.397639] ================================================================== [ 31.398811] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 31.399602] Write of size 8 at addr fff00000c647b271 by task kunit_try_catch/165 [ 31.400726] [ 31.401069] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.402422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.403172] Hardware name: linux,dummy-virt (DT) [ 31.403897] Call trace: [ 31.404279] show_stack+0x20/0x38 (C) [ 31.405195] dump_stack_lvl+0x8c/0xd0 [ 31.405740] print_report+0x118/0x5e0 [ 31.406391] kasan_report+0xc8/0x118 [ 31.406974] kasan_check_range+0x100/0x1a8 [ 31.407544] __asan_memset+0x34/0x78 [ 31.408177] kmalloc_oob_memset_8+0x150/0x2f8 [ 31.408881] kunit_try_run_case+0x14c/0x3d0 [ 31.410039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.410872] kthread+0x24c/0x2d0 [ 31.411599] ret_from_fork+0x10/0x20 [ 31.412524] [ 31.412881] Allocated by task 165: [ 31.413444] kasan_save_stack+0x3c/0x68 [ 31.414223] kasan_save_track+0x20/0x40 [ 31.415024] kasan_save_alloc_info+0x40/0x58 [ 31.415728] __kasan_kmalloc+0xd4/0xd8 [ 31.416543] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.417340] kmalloc_oob_memset_8+0xb0/0x2f8 [ 31.418084] kunit_try_run_case+0x14c/0x3d0 [ 31.418526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.419495] kthread+0x24c/0x2d0 [ 31.419843] ret_from_fork+0x10/0x20 [ 31.420641] [ 31.421062] The buggy address belongs to the object at fff00000c647b200 [ 31.421062] which belongs to the cache kmalloc-128 of size 128 [ 31.422875] The buggy address is located 113 bytes inside of [ 31.422875] allocated 120-byte region [fff00000c647b200, fff00000c647b278) [ 31.424073] [ 31.424606] The buggy address belongs to the physical page: [ 31.425919] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647b [ 31.426977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.427840] page_type: f5(slab) [ 31.428521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.429570] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.430226] page dumped because: kasan: bad access detected [ 31.430920] [ 31.431316] Memory state around the buggy address: [ 31.432068] fff00000c647b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.433003] fff00000c647b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.434316] >fff00000c647b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.435369] ^ [ 31.436273] fff00000c647b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.437359] fff00000c647b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.437981] ==================================================================
[ 31.327145] ================================================================== [ 31.328221] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 31.329119] Write of size 4 at addr fff00000c64d9d75 by task kunit_try_catch/163 [ 31.329849] [ 31.331027] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.332668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.333388] Hardware name: linux,dummy-virt (DT) [ 31.334325] Call trace: [ 31.334771] show_stack+0x20/0x38 (C) [ 31.335354] dump_stack_lvl+0x8c/0xd0 [ 31.335872] print_report+0x118/0x5e0 [ 31.336509] kasan_report+0xc8/0x118 [ 31.337200] kasan_check_range+0x100/0x1a8 [ 31.337908] __asan_memset+0x34/0x78 [ 31.338768] kmalloc_oob_memset_4+0x150/0x300 [ 31.339422] kunit_try_run_case+0x14c/0x3d0 [ 31.340114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.340994] kthread+0x24c/0x2d0 [ 31.341878] ret_from_fork+0x10/0x20 [ 31.342480] [ 31.342825] Allocated by task 163: [ 31.343277] kasan_save_stack+0x3c/0x68 [ 31.343913] kasan_save_track+0x20/0x40 [ 31.344558] kasan_save_alloc_info+0x40/0x58 [ 31.345149] __kasan_kmalloc+0xd4/0xd8 [ 31.345971] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.346634] kmalloc_oob_memset_4+0xb0/0x300 [ 31.348182] kunit_try_run_case+0x14c/0x3d0 [ 31.348806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.349484] kthread+0x24c/0x2d0 [ 31.350486] ret_from_fork+0x10/0x20 [ 31.351015] [ 31.351348] The buggy address belongs to the object at fff00000c64d9d00 [ 31.351348] which belongs to the cache kmalloc-128 of size 128 [ 31.352740] The buggy address is located 117 bytes inside of [ 31.352740] allocated 120-byte region [fff00000c64d9d00, fff00000c64d9d78) [ 31.354587] [ 31.354955] The buggy address belongs to the physical page: [ 31.355673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9 [ 31.356647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.357567] page_type: f5(slab) [ 31.358059] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.359477] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.360366] page dumped because: kasan: bad access detected [ 31.361057] [ 31.361451] Memory state around the buggy address: [ 31.362594] fff00000c64d9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.363479] fff00000c64d9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.364225] >fff00000c64d9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.365143] ^ [ 31.366150] fff00000c64d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.367615] fff00000c64d9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.368454] ================================================================== [ 31.379551] ================================================================== [ 31.380753] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 31.381516] Write of size 8 at addr fff00000c64d9e71 by task kunit_try_catch/165 [ 31.383079] [ 31.383434] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.384640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.385396] Hardware name: linux,dummy-virt (DT) [ 31.385956] Call trace: [ 31.386451] show_stack+0x20/0x38 (C) [ 31.387085] dump_stack_lvl+0x8c/0xd0 [ 31.387785] print_report+0x118/0x5e0 [ 31.388389] kasan_report+0xc8/0x118 [ 31.389064] kasan_check_range+0x100/0x1a8 [ 31.389706] __asan_memset+0x34/0x78 [ 31.390271] kmalloc_oob_memset_8+0x150/0x2f8 [ 31.390871] kunit_try_run_case+0x14c/0x3d0 [ 31.391622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.392370] kthread+0x24c/0x2d0 [ 31.393001] ret_from_fork+0x10/0x20 [ 31.393580] [ 31.393980] Allocated by task 165: [ 31.394567] kasan_save_stack+0x3c/0x68 [ 31.395123] kasan_save_track+0x20/0x40 [ 31.395808] kasan_save_alloc_info+0x40/0x58 [ 31.396458] __kasan_kmalloc+0xd4/0xd8 [ 31.397052] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.397709] kmalloc_oob_memset_8+0xb0/0x2f8 [ 31.398401] kunit_try_run_case+0x14c/0x3d0 [ 31.399048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.399873] kthread+0x24c/0x2d0 [ 31.400383] ret_from_fork+0x10/0x20 [ 31.401045] [ 31.401434] The buggy address belongs to the object at fff00000c64d9e00 [ 31.401434] which belongs to the cache kmalloc-128 of size 128 [ 31.402325] The buggy address is located 113 bytes inside of [ 31.402325] allocated 120-byte region [fff00000c64d9e00, fff00000c64d9e78) [ 31.403224] [ 31.403582] The buggy address belongs to the physical page: [ 31.404100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9 [ 31.405194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.405808] page_type: f5(slab) [ 31.406211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.406947] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.407954] page dumped because: kasan: bad access detected [ 31.408743] [ 31.409126] Memory state around the buggy address: [ 31.409633] fff00000c64d9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.410566] fff00000c64d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.411484] >fff00000c64d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.412122] ^ [ 31.412882] fff00000c64d9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.413804] fff00000c64d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.414562] ================================================================== [ 31.274961] ================================================================== [ 31.275946] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 31.276835] Write of size 2 at addr fff00000c5e27277 by task kunit_try_catch/161 [ 31.277678] [ 31.278367] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.280454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.281043] Hardware name: linux,dummy-virt (DT) [ 31.281782] Call trace: [ 31.282144] show_stack+0x20/0x38 (C) [ 31.283509] dump_stack_lvl+0x8c/0xd0 [ 31.284174] print_report+0x118/0x5e0 [ 31.284861] kasan_report+0xc8/0x118 [ 31.285509] kasan_check_range+0x100/0x1a8 [ 31.286387] __asan_memset+0x34/0x78 [ 31.286993] kmalloc_oob_memset_2+0x150/0x2f8 [ 31.287634] kunit_try_run_case+0x14c/0x3d0 [ 31.288342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.289109] kthread+0x24c/0x2d0 [ 31.289677] ret_from_fork+0x10/0x20 [ 31.290924] [ 31.291267] Allocated by task 161: [ 31.291754] kasan_save_stack+0x3c/0x68 [ 31.292312] kasan_save_track+0x20/0x40 [ 31.292915] kasan_save_alloc_info+0x40/0x58 [ 31.293613] __kasan_kmalloc+0xd4/0xd8 [ 31.294218] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.294853] kmalloc_oob_memset_2+0xb0/0x2f8 [ 31.295517] kunit_try_run_case+0x14c/0x3d0 [ 31.296609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.297289] kthread+0x24c/0x2d0 [ 31.298267] ret_from_fork+0x10/0x20 [ 31.299092] [ 31.299594] The buggy address belongs to the object at fff00000c5e27200 [ 31.299594] which belongs to the cache kmalloc-128 of size 128 [ 31.300845] The buggy address is located 119 bytes inside of [ 31.300845] allocated 120-byte region [fff00000c5e27200, fff00000c5e27278) [ 31.302763] [ 31.303125] The buggy address belongs to the physical page: [ 31.303759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e27 [ 31.304673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.305417] page_type: f5(slab) [ 31.306485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.307389] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.308181] page dumped because: kasan: bad access detected [ 31.308977] [ 31.309347] Memory state around the buggy address: [ 31.310291] fff00000c5e27100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.311027] fff00000c5e27180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.312165] >fff00000c5e27200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.312894] ^ [ 31.314031] fff00000c5e27280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.314697] fff00000c5e27300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.315609] ================================================================== [ 31.428687] ================================================================== [ 31.429915] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 31.430901] Write of size 16 at addr fff00000c5e27869 by task kunit_try_catch/167 [ 31.431935] [ 31.433300] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.434577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.435607] Hardware name: linux,dummy-virt (DT) [ 31.436465] Call trace: [ 31.436890] show_stack+0x20/0x38 (C) [ 31.437589] dump_stack_lvl+0x8c/0xd0 [ 31.438449] print_report+0x118/0x5e0 [ 31.439332] kasan_report+0xc8/0x118 [ 31.439949] kasan_check_range+0x100/0x1a8 [ 31.440590] __asan_memset+0x34/0x78 [ 31.441244] kmalloc_oob_memset_16+0x150/0x2f8 [ 31.441922] kunit_try_run_case+0x14c/0x3d0 [ 31.442775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.443468] kthread+0x24c/0x2d0 [ 31.443950] ret_from_fork+0x10/0x20 [ 31.444675] [ 31.445086] Allocated by task 167: [ 31.445610] kasan_save_stack+0x3c/0x68 [ 31.446719] kasan_save_track+0x20/0x40 [ 31.447677] kasan_save_alloc_info+0x40/0x58 [ 31.448290] __kasan_kmalloc+0xd4/0xd8 [ 31.448951] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.449656] kmalloc_oob_memset_16+0xb0/0x2f8 [ 31.450474] kunit_try_run_case+0x14c/0x3d0 [ 31.450963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.451489] kthread+0x24c/0x2d0 [ 31.451930] ret_from_fork+0x10/0x20 [ 31.452378] [ 31.453827] The buggy address belongs to the object at fff00000c5e27800 [ 31.453827] which belongs to the cache kmalloc-128 of size 128 [ 31.455022] The buggy address is located 105 bytes inside of [ 31.455022] allocated 120-byte region [fff00000c5e27800, fff00000c5e27878) [ 31.456781] [ 31.457356] The buggy address belongs to the physical page: [ 31.458714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e27 [ 31.460291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.461469] page_type: f5(slab) [ 31.462666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.463572] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.464550] page dumped because: kasan: bad access detected [ 31.465200] [ 31.465568] Memory state around the buggy address: [ 31.466844] fff00000c5e27700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.468201] fff00000c5e27780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.469085] >fff00000c5e27800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.470127] ^ [ 31.471247] fff00000c5e27880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.472305] fff00000c5e27900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.473131] ==================================================================
[ 25.482617] ================================================================== [ 25.483266] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330 [ 25.483266] Write of size 4 at addr ffff888102938a75 by task kunit_try_catch/183 [ 25.483266] [ 25.483266] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.483266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.487915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.487915] Call Trace: [ 25.487915] <TASK> [ 25.487915] dump_stack_lvl+0x73/0xb0 [ 25.487915] print_report+0xd1/0x640 [ 25.487915] ? __virt_addr_valid+0x1db/0x2d0 [ 25.487915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.487915] kasan_report+0x102/0x140 [ 25.487915] ? kmalloc_oob_memset_4+0x167/0x330 [ 25.487915] ? kmalloc_oob_memset_4+0x167/0x330 [ 25.487915] kasan_check_range+0x10c/0x1c0 [ 25.487915] __asan_memset+0x27/0x50 [ 25.487915] kmalloc_oob_memset_4+0x167/0x330 [ 25.487915] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 25.487915] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 25.487915] kunit_try_run_case+0x1b3/0x490 [ 25.487915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.487915] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.487915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.487915] ? __kthread_parkme+0x82/0x160 [ 25.487915] ? preempt_count_sub+0x50/0x80 [ 25.487915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.487915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.487915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.487915] kthread+0x257/0x310 [ 25.487915] ? __pfx_kthread+0x10/0x10 [ 25.487915] ret_from_fork+0x41/0x80 [ 25.487915] ? __pfx_kthread+0x10/0x10 [ 25.487915] ret_from_fork_asm+0x1a/0x30 [ 25.487915] </TASK> [ 25.487915] [ 25.487915] Allocated by task 183: [ 25.487915] kasan_save_stack+0x3d/0x60 [ 25.487915] kasan_save_track+0x18/0x40 [ 25.487915] kasan_save_alloc_info+0x3b/0x50 [ 25.487915] __kasan_kmalloc+0xb7/0xc0 [ 25.487915] __kmalloc_cache_noprof+0x184/0x410 [ 25.487915] kmalloc_oob_memset_4+0xad/0x330 [ 25.487915] kunit_try_run_case+0x1b3/0x490 [ 25.487915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.487915] kthread+0x257/0x310 [ 25.487915] ret_from_fork+0x41/0x80 [ 25.487915] ret_from_fork_asm+0x1a/0x30 [ 25.487915] [ 25.487915] The buggy address belongs to the object at ffff888102938a00 [ 25.487915] which belongs to the cache kmalloc-128 of size 128 [ 25.487915] The buggy address is located 117 bytes inside of [ 25.487915] allocated 120-byte region [ffff888102938a00, ffff888102938a78) [ 25.487915] [ 25.487915] The buggy address belongs to the physical page: [ 25.487915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102938 [ 25.487915] flags: 0x200000000000000(node=0|zone=2) [ 25.487915] page_type: f5(slab) [ 25.487915] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.487915] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.487915] page dumped because: kasan: bad access detected [ 25.487915] [ 25.487915] Memory state around the buggy address: [ 25.487915] ffff888102938900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 25.487915] ffff888102938980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.487915] >ffff888102938a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.487915] ^ [ 25.487915] ffff888102938a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.487915] ffff888102938b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.487915] ================================================================== [ 25.436456] ================================================================== [ 25.437150] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330 [ 25.437161] Write of size 2 at addr ffff888102938877 by task kunit_try_catch/181 [ 25.437161] [ 25.437161] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.437161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.437161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.437161] Call Trace: [ 25.437161] <TASK> [ 25.437161] dump_stack_lvl+0x73/0xb0 [ 25.437161] print_report+0xd1/0x640 [ 25.437161] ? __virt_addr_valid+0x1db/0x2d0 [ 25.437161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.437161] kasan_report+0x102/0x140 [ 25.437161] ? kmalloc_oob_memset_2+0x167/0x330 [ 25.437161] ? kmalloc_oob_memset_2+0x167/0x330 [ 25.437161] kasan_check_range+0x10c/0x1c0 [ 25.437161] __asan_memset+0x27/0x50 [ 25.437161] kmalloc_oob_memset_2+0x167/0x330 [ 25.437161] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 25.437161] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 25.437161] kunit_try_run_case+0x1b3/0x490 [ 25.437161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.437161] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.437161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.437161] ? __kthread_parkme+0x82/0x160 [ 25.437161] ? preempt_count_sub+0x50/0x80 [ 25.437161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.437161] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.437161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.437161] kthread+0x257/0x310 [ 25.437161] ? __pfx_kthread+0x10/0x10 [ 25.437161] ret_from_fork+0x41/0x80 [ 25.437161] ? __pfx_kthread+0x10/0x10 [ 25.437161] ret_from_fork_asm+0x1a/0x30 [ 25.437161] </TASK> [ 25.437161] [ 25.437161] Allocated by task 181: [ 25.437161] kasan_save_stack+0x3d/0x60 [ 25.437161] kasan_save_track+0x18/0x40 [ 25.437161] kasan_save_alloc_info+0x3b/0x50 [ 25.437161] __kasan_kmalloc+0xb7/0xc0 [ 25.437161] __kmalloc_cache_noprof+0x184/0x410 [ 25.437161] kmalloc_oob_memset_2+0xad/0x330 [ 25.437161] kunit_try_run_case+0x1b3/0x490 [ 25.437161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.437161] kthread+0x257/0x310 [ 25.437161] ret_from_fork+0x41/0x80 [ 25.437161] ret_from_fork_asm+0x1a/0x30 [ 25.437161] [ 25.437161] The buggy address belongs to the object at ffff888102938800 [ 25.437161] which belongs to the cache kmalloc-128 of size 128 [ 25.437161] The buggy address is located 119 bytes inside of [ 25.437161] allocated 120-byte region [ffff888102938800, ffff888102938878) [ 25.437161] [ 25.437161] The buggy address belongs to the physical page: [ 25.437161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102938 [ 25.437161] flags: 0x200000000000000(node=0|zone=2) [ 25.437161] page_type: f5(slab) [ 25.437161] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.437161] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.437161] page dumped because: kasan: bad access detected [ 25.437161] [ 25.437161] Memory state around the buggy address: [ 25.437161] ffff888102938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.437161] ffff888102938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.437161] >ffff888102938800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.437161] ^ [ 25.437161] ffff888102938880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.437161] ffff888102938900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.437161] ================================================================== [ 25.575357] ================================================================== [ 25.576161] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330 [ 25.576161] Write of size 16 at addr ffff8881028e1069 by task kunit_try_catch/187 [ 25.576161] [ 25.576161] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.576161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.576161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.576161] Call Trace: [ 25.576161] <TASK> [ 25.576161] dump_stack_lvl+0x73/0xb0 [ 25.576161] print_report+0xd1/0x640 [ 25.576161] ? __virt_addr_valid+0x1db/0x2d0 [ 25.576161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.576161] kasan_report+0x102/0x140 [ 25.576161] ? kmalloc_oob_memset_16+0x167/0x330 [ 25.576161] ? kmalloc_oob_memset_16+0x167/0x330 [ 25.576161] kasan_check_range+0x10c/0x1c0 [ 25.576161] __asan_memset+0x27/0x50 [ 25.576161] kmalloc_oob_memset_16+0x167/0x330 [ 25.576161] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 25.576161] ? __schedule+0xc3e/0x2790 [ 25.576161] ? ktime_get_ts64+0x84/0x230 [ 25.576161] kunit_try_run_case+0x1b3/0x490 [ 25.576161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.576161] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.576161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.576161] ? __kthread_parkme+0x82/0x160 [ 25.576161] ? preempt_count_sub+0x50/0x80 [ 25.576161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.576161] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.576161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.576161] kthread+0x257/0x310 [ 25.576161] ? __pfx_kthread+0x10/0x10 [ 25.576161] ret_from_fork+0x41/0x80 [ 25.576161] ? __pfx_kthread+0x10/0x10 [ 25.576161] ret_from_fork_asm+0x1a/0x30 [ 25.576161] </TASK> [ 25.576161] [ 25.576161] Allocated by task 187: [ 25.576161] kasan_save_stack+0x3d/0x60 [ 25.576161] kasan_save_track+0x18/0x40 [ 25.576161] kasan_save_alloc_info+0x3b/0x50 [ 25.576161] __kasan_kmalloc+0xb7/0xc0 [ 25.576161] __kmalloc_cache_noprof+0x184/0x410 [ 25.576161] kmalloc_oob_memset_16+0xad/0x330 [ 25.576161] kunit_try_run_case+0x1b3/0x490 [ 25.576161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.576161] kthread+0x257/0x310 [ 25.576161] ret_from_fork+0x41/0x80 [ 25.576161] ret_from_fork_asm+0x1a/0x30 [ 25.576161] [ 25.576161] The buggy address belongs to the object at ffff8881028e1000 [ 25.576161] which belongs to the cache kmalloc-128 of size 128 [ 25.576161] The buggy address is located 105 bytes inside of [ 25.576161] allocated 120-byte region [ffff8881028e1000, ffff8881028e1078) [ 25.576161] [ 25.576161] The buggy address belongs to the physical page: [ 25.576161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e1 [ 25.576161] flags: 0x200000000000000(node=0|zone=2) [ 25.576161] page_type: f5(slab) [ 25.576161] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.576161] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.576161] page dumped because: kasan: bad access detected [ 25.576161] [ 25.576161] Memory state around the buggy address: [ 25.576161] ffff8881028e0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.576161] ffff8881028e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.576161] >ffff8881028e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.576161] ^ [ 25.576161] ffff8881028e1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.576161] ffff8881028e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.576161] ==================================================================
[ 20.511746] ================================================================== [ 20.513172] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330 [ 20.513852] Write of size 4 at addr ffff88810295eb75 by task kunit_try_catch/181 [ 20.515445] [ 20.516112] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 20.516990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.517219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.517630] Call Trace: [ 20.517807] <TASK> [ 20.517981] dump_stack_lvl+0x73/0xb0 [ 20.518271] print_report+0xd1/0x640 [ 20.518624] ? __virt_addr_valid+0x1db/0x2d0 [ 20.520400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.521377] kasan_report+0x102/0x140 [ 20.522621] ? kmalloc_oob_memset_4+0x167/0x330 [ 20.523043] ? kmalloc_oob_memset_4+0x167/0x330 [ 20.523336] kasan_check_range+0x10c/0x1c0 [ 20.523794] __asan_memset+0x27/0x50 [ 20.524362] kmalloc_oob_memset_4+0x167/0x330 [ 20.526315] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 20.527221] ? __schedule+0xc3e/0x2790 [ 20.527934] ? __pfx_read_tsc+0x10/0x10 [ 20.528733] ? ktime_get_ts64+0x84/0x230 [ 20.529244] kunit_try_run_case+0x1b3/0x490 [ 20.530017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.530335] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.530645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.531008] ? __kthread_parkme+0x82/0x160 [ 20.531688] ? preempt_count_sub+0x50/0x80 [ 20.532013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.532422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.533631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.534001] kthread+0x257/0x310 [ 20.534321] ? __pfx_kthread+0x10/0x10 [ 20.535234] ret_from_fork+0x41/0x80 [ 20.535724] ? __pfx_kthread+0x10/0x10 [ 20.536294] ret_from_fork_asm+0x1a/0x30 [ 20.536754] </TASK> [ 20.537292] [ 20.537545] Allocated by task 181: [ 20.538040] kasan_save_stack+0x3d/0x60 [ 20.538506] kasan_save_track+0x18/0x40 [ 20.538792] kasan_save_alloc_info+0x3b/0x50 [ 20.539244] __kasan_kmalloc+0xb7/0xc0 [ 20.540500] __kmalloc_cache_noprof+0x184/0x410 [ 20.541066] kmalloc_oob_memset_4+0xad/0x330 [ 20.541756] kunit_try_run_case+0x1b3/0x490 [ 20.542471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.543172] kthread+0x257/0x310 [ 20.543567] ret_from_fork+0x41/0x80 [ 20.543990] ret_from_fork_asm+0x1a/0x30 [ 20.544587] [ 20.545144] The buggy address belongs to the object at ffff88810295eb00 [ 20.545144] which belongs to the cache kmalloc-128 of size 128 [ 20.546142] The buggy address is located 117 bytes inside of [ 20.546142] allocated 120-byte region [ffff88810295eb00, ffff88810295eb78) [ 20.548160] [ 20.548586] The buggy address belongs to the physical page: [ 20.549117] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10295e [ 20.549514] flags: 0x200000000000000(node=0|zone=2) [ 20.550186] page_type: f5(slab) [ 20.551106] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.552312] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.553341] page dumped because: kasan: bad access detected [ 20.553968] [ 20.554204] Memory state around the buggy address: [ 20.554538] ffff88810295ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.555878] ffff88810295ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.556615] >ffff88810295eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.557005] ^ [ 20.557604] ffff88810295eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.558659] ffff88810295ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.559420] ================================================================== [ 20.566738] ================================================================== [ 20.567629] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330 [ 20.568544] Write of size 8 at addr ffff8881028b7c71 by task kunit_try_catch/183 [ 20.569440] [ 20.569737] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 20.570602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.570947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.571908] Call Trace: [ 20.572332] <TASK> [ 20.572661] dump_stack_lvl+0x73/0xb0 [ 20.573235] print_report+0xd1/0x640 [ 20.573806] ? __virt_addr_valid+0x1db/0x2d0 [ 20.575384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.575915] kasan_report+0x102/0x140 [ 20.576406] ? kmalloc_oob_memset_8+0x167/0x330 [ 20.576976] ? kmalloc_oob_memset_8+0x167/0x330 [ 20.578152] kasan_check_range+0x10c/0x1c0 [ 20.578503] __asan_memset+0x27/0x50 [ 20.579311] kmalloc_oob_memset_8+0x167/0x330 [ 20.579833] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 20.580393] ? __schedule+0xc3e/0x2790 [ 20.581446] ? __pfx_read_tsc+0x10/0x10 [ 20.582388] ? ktime_get_ts64+0x84/0x230 [ 20.582754] kunit_try_run_case+0x1b3/0x490 [ 20.583161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.584044] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.584468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.585436] ? __kthread_parkme+0x82/0x160 [ 20.586127] ? preempt_count_sub+0x50/0x80 [ 20.586747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.587420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.588199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.588815] kthread+0x257/0x310 [ 20.589354] ? __pfx_kthread+0x10/0x10 [ 20.589915] ret_from_fork+0x41/0x80 [ 20.590534] ? __pfx_kthread+0x10/0x10 [ 20.591022] ret_from_fork_asm+0x1a/0x30 [ 20.591620] </TASK> [ 20.591885] [ 20.592156] Allocated by task 183: [ 20.592614] kasan_save_stack+0x3d/0x60 [ 20.593217] kasan_save_track+0x18/0x40 [ 20.593732] kasan_save_alloc_info+0x3b/0x50 [ 20.594360] __kasan_kmalloc+0xb7/0xc0 [ 20.594899] __kmalloc_cache_noprof+0x184/0x410 [ 20.595480] kmalloc_oob_memset_8+0xad/0x330 [ 20.595963] kunit_try_run_case+0x1b3/0x490 [ 20.596538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.597376] kthread+0x257/0x310 [ 20.598143] ret_from_fork+0x41/0x80 [ 20.598672] ret_from_fork_asm+0x1a/0x30 [ 20.599263] [ 20.599523] The buggy address belongs to the object at ffff8881028b7c00 [ 20.599523] which belongs to the cache kmalloc-128 of size 128 [ 20.600632] The buggy address is located 113 bytes inside of [ 20.600632] allocated 120-byte region [ffff8881028b7c00, ffff8881028b7c78) [ 20.602766] [ 20.603033] The buggy address belongs to the physical page: [ 20.603794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 [ 20.604393] flags: 0x200000000000000(node=0|zone=2) [ 20.604823] page_type: f5(slab) [ 20.605234] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.605667] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.606379] page dumped because: kasan: bad access detected [ 20.607465] [ 20.607665] Memory state around the buggy address: [ 20.608197] ffff8881028b7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.608834] ffff8881028b7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.609383] >ffff8881028b7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.610153] ^ [ 20.611319] ffff8881028b7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.611893] ffff8881028b7d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.612455] ================================================================== [ 20.620738] ================================================================== [ 20.621592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330 [ 20.622160] Write of size 16 at addr ffff8881028b7e69 by task kunit_try_catch/185 [ 20.622992] [ 20.623186] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 20.624050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.624457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.625780] Call Trace: [ 20.626310] <TASK> [ 20.626663] dump_stack_lvl+0x73/0xb0 [ 20.627195] print_report+0xd1/0x640 [ 20.627659] ? __virt_addr_valid+0x1db/0x2d0 [ 20.628502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.629238] kasan_report+0x102/0x140 [ 20.629677] ? kmalloc_oob_memset_16+0x167/0x330 [ 20.630333] ? kmalloc_oob_memset_16+0x167/0x330 [ 20.630898] kasan_check_range+0x10c/0x1c0 [ 20.631382] __asan_memset+0x27/0x50 [ 20.631861] kmalloc_oob_memset_16+0x167/0x330 [ 20.632592] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 20.633161] ? __schedule+0xc3e/0x2790 [ 20.633734] ? __pfx_read_tsc+0x10/0x10 [ 20.634080] ? ktime_get_ts64+0x84/0x230 [ 20.634442] kunit_try_run_case+0x1b3/0x490 [ 20.634921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.635445] ? irqentry_exit+0x2a/0x60 [ 20.636476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.637162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.637517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.638244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.638676] kthread+0x257/0x310 [ 20.639341] ? __pfx_kthread+0x10/0x10 [ 20.639821] ret_from_fork+0x41/0x80 [ 20.640671] ? __pfx_kthread+0x10/0x10 [ 20.641256] ret_from_fork_asm+0x1a/0x30 [ 20.641722] </TASK> [ 20.641994] [ 20.642527] Allocated by task 185: [ 20.643362] kasan_save_stack+0x3d/0x60 [ 20.643773] kasan_save_track+0x18/0x40 [ 20.644177] kasan_save_alloc_info+0x3b/0x50 [ 20.644570] __kasan_kmalloc+0xb7/0xc0 [ 20.644974] __kmalloc_cache_noprof+0x184/0x410 [ 20.645450] kmalloc_oob_memset_16+0xad/0x330 [ 20.645888] kunit_try_run_case+0x1b3/0x490 [ 20.646744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.647526] kthread+0x257/0x310 [ 20.647935] ret_from_fork+0x41/0x80 [ 20.648505] ret_from_fork_asm+0x1a/0x30 [ 20.649116] [ 20.649349] The buggy address belongs to the object at ffff8881028b7e00 [ 20.649349] which belongs to the cache kmalloc-128 of size 128 [ 20.650578] The buggy address is located 105 bytes inside of [ 20.650578] allocated 120-byte region [ffff8881028b7e00, ffff8881028b7e78) [ 20.651834] [ 20.652179] The buggy address belongs to the physical page: [ 20.652768] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b7 [ 20.653708] flags: 0x200000000000000(node=0|zone=2) [ 20.654747] page_type: f5(slab) [ 20.655420] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.656161] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.656909] page dumped because: kasan: bad access detected [ 20.657661] [ 20.657873] Memory state around the buggy address: [ 20.658712] ffff8881028b7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.659547] ffff8881028b7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.660399] >ffff8881028b7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.661177] ^ [ 20.661824] ffff8881028b7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.662743] ffff8881028b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.663116] ================================================================== [ 20.459210] ================================================================== [ 20.460171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330 [ 20.461217] Write of size 2 at addr ffff88810295ea77 by task kunit_try_catch/179 [ 20.462620] [ 20.462859] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 20.464220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.464966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.465840] Call Trace: [ 20.466077] <TASK> [ 20.466376] dump_stack_lvl+0x73/0xb0 [ 20.466951] print_report+0xd1/0x640 [ 20.467573] ? __virt_addr_valid+0x1db/0x2d0 [ 20.468181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.470210] kasan_report+0x102/0x140 [ 20.471307] ? kmalloc_oob_memset_2+0x167/0x330 [ 20.471841] ? kmalloc_oob_memset_2+0x167/0x330 [ 20.472151] kasan_check_range+0x10c/0x1c0 [ 20.472445] __asan_memset+0x27/0x50 [ 20.474680] kmalloc_oob_memset_2+0x167/0x330 [ 20.475842] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 20.476812] ? __schedule+0xc3e/0x2790 [ 20.477318] ? __pfx_read_tsc+0x10/0x10 [ 20.478352] ? ktime_get_ts64+0x84/0x230 [ 20.478853] kunit_try_run_case+0x1b3/0x490 [ 20.479738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.480087] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.480575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.480947] ? __kthread_parkme+0x82/0x160 [ 20.481398] ? preempt_count_sub+0x50/0x80 [ 20.482076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.482395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.482771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.483319] kthread+0x257/0x310 [ 20.483662] ? __pfx_kthread+0x10/0x10 [ 20.483942] ret_from_fork+0x41/0x80 [ 20.484367] ? __pfx_kthread+0x10/0x10 [ 20.484722] ret_from_fork_asm+0x1a/0x30 [ 20.485249] </TASK> [ 20.486377] [ 20.486612] Allocated by task 179: [ 20.486927] kasan_save_stack+0x3d/0x60 [ 20.487353] kasan_save_track+0x18/0x40 [ 20.488297] kasan_save_alloc_info+0x3b/0x50 [ 20.488996] __kasan_kmalloc+0xb7/0xc0 [ 20.489185] __kmalloc_cache_noprof+0x184/0x410 [ 20.489347] kmalloc_oob_memset_2+0xad/0x330 [ 20.489531] kunit_try_run_case+0x1b3/0x490 [ 20.489800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.490132] kthread+0x257/0x310 [ 20.490558] ret_from_fork+0x41/0x80 [ 20.490891] ret_from_fork_asm+0x1a/0x30 [ 20.491469] [ 20.491763] The buggy address belongs to the object at ffff88810295ea00 [ 20.491763] which belongs to the cache kmalloc-128 of size 128 [ 20.492694] The buggy address is located 119 bytes inside of [ 20.492694] allocated 120-byte region [ffff88810295ea00, ffff88810295ea78) [ 20.494525] [ 20.494816] The buggy address belongs to the physical page: [ 20.495532] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10295e [ 20.496213] flags: 0x200000000000000(node=0|zone=2) [ 20.496792] page_type: f5(slab) [ 20.497330] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.498059] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.498561] page dumped because: kasan: bad access detected [ 20.499069] [ 20.499257] Memory state around the buggy address: [ 20.499734] ffff88810295e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.501100] ffff88810295e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.501679] >ffff88810295ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.502513] ^ [ 20.503190] ffff88810295ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.503874] ffff88810295eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.504550] ==================================================================