Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.286211] ================================================================== [ 30.287411] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.288164] Write of size 16 at addr fff00000c63de269 by task kunit_try_catch/167 [ 30.290169] [ 30.290550] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.291712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.292344] Hardware name: linux,dummy-virt (DT) [ 30.292933] Call trace: [ 30.293297] show_stack+0x20/0x38 (C) [ 30.293904] dump_stack_lvl+0x8c/0xd0 [ 30.294448] print_report+0x118/0x5e0 [ 30.295121] kasan_report+0xc8/0x118 [ 30.295648] kasan_check_range+0x100/0x1a8 [ 30.296300] __asan_memset+0x34/0x78 [ 30.296896] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.297497] kunit_try_run_case+0x14c/0x3d0 [ 30.298148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298998] kthread+0x24c/0x2d0 [ 30.299516] ret_from_fork+0x10/0x20 [ 30.300097] [ 30.300490] Allocated by task 167: [ 30.301021] kasan_save_stack+0x3c/0x68 [ 30.301593] kasan_save_track+0x20/0x40 [ 30.302231] kasan_save_alloc_info+0x40/0x58 [ 30.302866] __kasan_kmalloc+0xd4/0xd8 [ 30.303402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.304052] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.304642] kunit_try_run_case+0x14c/0x3d0 [ 30.305306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.306017] kthread+0x24c/0x2d0 [ 30.306619] ret_from_fork+0x10/0x20 [ 30.307080] [ 30.307487] The buggy address belongs to the object at fff00000c63de200 [ 30.307487] which belongs to the cache kmalloc-128 of size 128 [ 30.308953] The buggy address is located 105 bytes inside of [ 30.308953] allocated 120-byte region [fff00000c63de200, fff00000c63de278) [ 30.310352] [ 30.310657] The buggy address belongs to the physical page: [ 30.311363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 30.312293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.313168] page_type: f5(slab) [ 30.313710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.314680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.315638] page dumped because: kasan: bad access detected [ 30.316374] [ 30.316678] Memory state around the buggy address: [ 30.317363] fff00000c63de100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.318175] fff00000c63de180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.319048] >fff00000c63de200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.319830] ^ [ 30.320643] fff00000c63de280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.321525] fff00000c63de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.322415] ================================================================== [ 30.138478] ================================================================== [ 30.139720] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.140921] Write of size 2 at addr fff00000c63c0e77 by task kunit_try_catch/161 [ 30.141793] [ 30.142181] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.143905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.144417] Hardware name: linux,dummy-virt (DT) [ 30.145018] Call trace: [ 30.145410] show_stack+0x20/0x38 (C) [ 30.145999] dump_stack_lvl+0x8c/0xd0 [ 30.146732] print_report+0x118/0x5e0 [ 30.147446] kasan_report+0xc8/0x118 [ 30.148079] kasan_check_range+0x100/0x1a8 [ 30.148607] __asan_memset+0x34/0x78 [ 30.149290] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.149934] kunit_try_run_case+0x14c/0x3d0 [ 30.150559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.151360] kthread+0x24c/0x2d0 [ 30.152080] ret_from_fork+0x10/0x20 [ 30.152555] [ 30.152929] Allocated by task 161: [ 30.153613] kasan_save_stack+0x3c/0x68 [ 30.154153] kasan_save_track+0x20/0x40 [ 30.154818] kasan_save_alloc_info+0x40/0x58 [ 30.156246] __kasan_kmalloc+0xd4/0xd8 [ 30.156981] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.157506] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.158105] kunit_try_run_case+0x14c/0x3d0 [ 30.158623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.159443] kthread+0x24c/0x2d0 [ 30.159860] ret_from_fork+0x10/0x20 [ 30.160518] [ 30.160811] The buggy address belongs to the object at fff00000c63c0e00 [ 30.160811] which belongs to the cache kmalloc-128 of size 128 [ 30.162585] The buggy address is located 119 bytes inside of [ 30.162585] allocated 120-byte region [fff00000c63c0e00, fff00000c63c0e78) [ 30.164322] [ 30.164579] The buggy address belongs to the physical page: [ 30.165410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c0 [ 30.166508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.167378] page_type: f5(slab) [ 30.168410] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.169332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.170213] page dumped because: kasan: bad access detected [ 30.170945] [ 30.171275] Memory state around the buggy address: [ 30.171837] fff00000c63c0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.172858] fff00000c63c0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.173808] >fff00000c63c0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.174638] ^ [ 30.175796] fff00000c63c0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.176708] fff00000c63c0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177549] ================================================================== [ 30.240339] ================================================================== [ 30.241485] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.242273] Write of size 8 at addr fff00000c63de171 by task kunit_try_catch/165 [ 30.243103] [ 30.243520] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.244778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.245502] Hardware name: linux,dummy-virt (DT) [ 30.246627] Call trace: [ 30.247058] show_stack+0x20/0x38 (C) [ 30.248105] dump_stack_lvl+0x8c/0xd0 [ 30.248901] print_report+0x118/0x5e0 [ 30.249601] kasan_report+0xc8/0x118 [ 30.250188] kasan_check_range+0x100/0x1a8 [ 30.250911] __asan_memset+0x34/0x78 [ 30.251603] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.252282] kunit_try_run_case+0x14c/0x3d0 [ 30.252820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.253595] kthread+0x24c/0x2d0 [ 30.254164] ret_from_fork+0x10/0x20 [ 30.254739] [ 30.255116] Allocated by task 165: [ 30.255658] kasan_save_stack+0x3c/0x68 [ 30.256216] kasan_save_track+0x20/0x40 [ 30.256783] kasan_save_alloc_info+0x40/0x58 [ 30.257553] __kasan_kmalloc+0xd4/0xd8 [ 30.258195] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.259051] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.259618] kunit_try_run_case+0x14c/0x3d0 [ 30.260308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.261058] kthread+0x24c/0x2d0 [ 30.261629] ret_from_fork+0x10/0x20 [ 30.262152] [ 30.262580] The buggy address belongs to the object at fff00000c63de100 [ 30.262580] which belongs to the cache kmalloc-128 of size 128 [ 30.264075] The buggy address is located 113 bytes inside of [ 30.264075] allocated 120-byte region [fff00000c63de100, fff00000c63de178) [ 30.265458] [ 30.265867] The buggy address belongs to the physical page: [ 30.266549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 30.267598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.268418] page_type: f5(slab) [ 30.268854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.269895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.270792] page dumped because: kasan: bad access detected [ 30.271455] [ 30.271769] Memory state around the buggy address: [ 30.272456] fff00000c63de000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.273343] fff00000c63de080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.274170] >fff00000c63de100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.275079] ^ [ 30.275870] fff00000c63de180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.276773] fff00000c63de200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.277659] ================================================================== [ 30.189995] ================================================================== [ 30.191697] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.192901] Write of size 4 at addr fff00000c63de075 by task kunit_try_catch/163 [ 30.193823] [ 30.194420] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.195949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.196473] Hardware name: linux,dummy-virt (DT) [ 30.197203] Call trace: [ 30.197596] show_stack+0x20/0x38 (C) [ 30.198165] dump_stack_lvl+0x8c/0xd0 [ 30.198865] print_report+0x118/0x5e0 [ 30.199495] kasan_report+0xc8/0x118 [ 30.200355] kasan_check_range+0x100/0x1a8 [ 30.201011] __asan_memset+0x34/0x78 [ 30.201675] kmalloc_oob_memset_4+0x150/0x300 [ 30.202332] kunit_try_run_case+0x14c/0x3d0 [ 30.203067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.203799] kthread+0x24c/0x2d0 [ 30.204371] ret_from_fork+0x10/0x20 [ 30.205169] [ 30.205686] Allocated by task 163: [ 30.206221] kasan_save_stack+0x3c/0x68 [ 30.206964] kasan_save_track+0x20/0x40 [ 30.207626] kasan_save_alloc_info+0x40/0x58 [ 30.208209] __kasan_kmalloc+0xd4/0xd8 [ 30.208836] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.209943] kmalloc_oob_memset_4+0xb0/0x300 [ 30.210585] kunit_try_run_case+0x14c/0x3d0 [ 30.211205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.211840] kthread+0x24c/0x2d0 [ 30.212619] ret_from_fork+0x10/0x20 [ 30.213066] [ 30.213420] The buggy address belongs to the object at fff00000c63de000 [ 30.213420] which belongs to the cache kmalloc-128 of size 128 [ 30.215056] The buggy address is located 117 bytes inside of [ 30.215056] allocated 120-byte region [fff00000c63de000, fff00000c63de078) [ 30.216751] [ 30.217168] The buggy address belongs to the physical page: [ 30.217817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 30.218928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.219972] page_type: f5(slab) [ 30.220439] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.221422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.222384] page dumped because: kasan: bad access detected [ 30.223161] [ 30.223764] Memory state around the buggy address: [ 30.224382] fff00000c63ddf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.225257] fff00000c63ddf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.226153] >fff00000c63de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.227023] ^ [ 30.228595] fff00000c63de080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.229463] fff00000c63de100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.230420] ==================================================================
[ 27.894496] ================================================================== [ 27.896254] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330 [ 27.897621] Write of size 2 at addr ffff888101aaef77 by task kunit_try_catch/179 [ 27.898425] [ 27.899141] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 27.900229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.900745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.901574] Call Trace: [ 27.902348] <TASK> [ 27.902751] dump_stack_lvl+0x73/0xb0 [ 27.903241] print_report+0xd1/0x640 [ 27.903707] ? __virt_addr_valid+0x1db/0x2d0 [ 27.904542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.905345] kasan_report+0x102/0x140 [ 27.906132] ? kmalloc_oob_memset_2+0x167/0x330 [ 27.906574] ? kmalloc_oob_memset_2+0x167/0x330 [ 27.907080] kasan_check_range+0x10c/0x1c0 [ 27.907662] __asan_memset+0x27/0x50 [ 27.908388] kmalloc_oob_memset_2+0x167/0x330 [ 27.908793] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 27.909346] ? __schedule+0xc70/0x27e0 [ 27.910134] ? __pfx_read_tsc+0x10/0x10 [ 27.910508] ? ktime_get_ts64+0x86/0x230 [ 27.910888] kunit_try_run_case+0x1b3/0x490 [ 27.911246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.911810] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.912787] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.913779] ? __kthread_parkme+0x82/0x160 [ 27.914185] ? preempt_count_sub+0x50/0x80 [ 27.914612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.915529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.915968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.917152] kthread+0x257/0x310 [ 27.917486] ? __pfx_kthread+0x10/0x10 [ 27.918076] ret_from_fork+0x41/0x80 [ 27.918577] ? __pfx_kthread+0x10/0x10 [ 27.919038] ret_from_fork_asm+0x1a/0x30 [ 27.919621] </TASK> [ 27.919916] [ 27.920739] Allocated by task 179: [ 27.921610] kasan_save_stack+0x3d/0x60 [ 27.922166] kasan_save_track+0x18/0x40 [ 27.922826] kasan_save_alloc_info+0x3b/0x50 [ 27.923526] __kasan_kmalloc+0xb7/0xc0 [ 27.924383] __kmalloc_cache_noprof+0x184/0x410 [ 27.925467] kmalloc_oob_memset_2+0xad/0x330 [ 27.925898] kunit_try_run_case+0x1b3/0x490 [ 27.926488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.927497] kthread+0x257/0x310 [ 27.927754] ret_from_fork+0x41/0x80 [ 27.928512] ret_from_fork_asm+0x1a/0x30 [ 27.929450] [ 27.929631] The buggy address belongs to the object at ffff888101aaef00 [ 27.929631] which belongs to the cache kmalloc-128 of size 128 [ 27.931209] The buggy address is located 119 bytes inside of [ 27.931209] allocated 120-byte region [ffff888101aaef00, ffff888101aaef78) [ 27.932818] [ 27.933281] The buggy address belongs to the physical page: [ 27.933775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aae [ 27.935082] flags: 0x200000000000000(node=0|zone=2) [ 27.935786] page_type: f5(slab) [ 27.936456] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.937718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.938474] page dumped because: kasan: bad access detected [ 27.938917] [ 27.939370] Memory state around the buggy address: [ 27.940388] ffff888101aaee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.941464] ffff888101aaee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.942300] >ffff888101aaef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.942574] ^ [ 27.942956] ffff888101aaef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.943737] ffff888101aaf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.944528] ================================================================== [ 27.950487] ================================================================== [ 27.951578] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330 [ 27.952246] Write of size 4 at addr ffff888101ab2175 by task kunit_try_catch/181 [ 27.953215] [ 27.953404] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 27.956125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.956654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.957618] Call Trace: [ 27.958243] <TASK> [ 27.958468] dump_stack_lvl+0x73/0xb0 [ 27.959279] print_report+0xd1/0x640 [ 27.959963] ? __virt_addr_valid+0x1db/0x2d0 [ 27.960773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.961877] kasan_report+0x102/0x140 [ 27.962476] ? kmalloc_oob_memset_4+0x167/0x330 [ 27.963295] ? kmalloc_oob_memset_4+0x167/0x330 [ 27.963517] kasan_check_range+0x10c/0x1c0 [ 27.963756] __asan_memset+0x27/0x50 [ 27.964734] kmalloc_oob_memset_4+0x167/0x330 [ 27.965536] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 27.966364] ? __schedule+0xc70/0x27e0 [ 27.966899] ? __pfx_read_tsc+0x10/0x10 [ 27.967507] ? ktime_get_ts64+0x86/0x230 [ 27.968096] kunit_try_run_case+0x1b3/0x490 [ 27.968559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.969303] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.969701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.970196] ? __kthread_parkme+0x82/0x160 [ 27.970668] ? preempt_count_sub+0x50/0x80 [ 27.971494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.972215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.972914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.973512] kthread+0x257/0x310 [ 27.973889] ? __pfx_kthread+0x10/0x10 [ 27.974606] ret_from_fork+0x41/0x80 [ 27.975233] ? __pfx_kthread+0x10/0x10 [ 27.975733] ret_from_fork_asm+0x1a/0x30 [ 27.976157] </TASK> [ 27.976391] [ 27.976559] Allocated by task 181: [ 27.976940] kasan_save_stack+0x3d/0x60 [ 27.977419] kasan_save_track+0x18/0x40 [ 27.977961] kasan_save_alloc_info+0x3b/0x50 [ 27.978607] __kasan_kmalloc+0xb7/0xc0 [ 27.979150] __kmalloc_cache_noprof+0x184/0x410 [ 27.979724] kmalloc_oob_memset_4+0xad/0x330 [ 27.980357] kunit_try_run_case+0x1b3/0x490 [ 27.980832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.981936] kthread+0x257/0x310 [ 27.982746] ret_from_fork+0x41/0x80 [ 27.983562] ret_from_fork_asm+0x1a/0x30 [ 27.983926] [ 27.984184] The buggy address belongs to the object at ffff888101ab2100 [ 27.984184] which belongs to the cache kmalloc-128 of size 128 [ 27.985127] The buggy address is located 117 bytes inside of [ 27.985127] allocated 120-byte region [ffff888101ab2100, ffff888101ab2178) [ 27.986213] [ 27.986813] The buggy address belongs to the physical page: [ 27.987314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab2 [ 27.988407] flags: 0x200000000000000(node=0|zone=2) [ 27.988838] page_type: f5(slab) [ 27.989504] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.990622] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.991838] page dumped because: kasan: bad access detected [ 27.992343] [ 27.992731] Memory state around the buggy address: [ 27.993429] ffff888101ab2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 27.994820] ffff888101ab2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.995791] >ffff888101ab2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.996713] ^ [ 27.998469] ffff888101ab2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.999985] ffff888101ab2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.001266] ================================================================== [ 28.007640] ================================================================== [ 28.009151] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330 [ 28.010399] Write of size 8 at addr ffff8881029fe571 by task kunit_try_catch/183 [ 28.011744] [ 28.012268] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.013912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.014761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.016082] Call Trace: [ 28.016628] <TASK> [ 28.017091] dump_stack_lvl+0x73/0xb0 [ 28.017455] print_report+0xd1/0x640 [ 28.017834] ? __virt_addr_valid+0x1db/0x2d0 [ 28.019014] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.019677] kasan_report+0x102/0x140 [ 28.020167] ? kmalloc_oob_memset_8+0x167/0x330 [ 28.020597] ? kmalloc_oob_memset_8+0x167/0x330 [ 28.021258] kasan_check_range+0x10c/0x1c0 [ 28.021601] __asan_memset+0x27/0x50 [ 28.021895] kmalloc_oob_memset_8+0x167/0x330 [ 28.022509] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 28.023264] ? __schedule+0xc70/0x27e0 [ 28.024489] ? __pfx_read_tsc+0x10/0x10 [ 28.025147] ? ktime_get_ts64+0x86/0x230 [ 28.025799] kunit_try_run_case+0x1b3/0x490 [ 28.026626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.027143] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.027755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.028455] ? __kthread_parkme+0x82/0x160 [ 28.028929] ? preempt_count_sub+0x50/0x80 [ 28.029776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.030425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.031301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.032219] kthread+0x257/0x310 [ 28.032533] ? __pfx_kthread+0x10/0x10 [ 28.033184] ret_from_fork+0x41/0x80 [ 28.033883] ? __pfx_kthread+0x10/0x10 [ 28.034405] ret_from_fork_asm+0x1a/0x30 [ 28.035114] </TASK> [ 28.035622] [ 28.035914] Allocated by task 183: [ 28.036507] kasan_save_stack+0x3d/0x60 [ 28.037037] kasan_save_track+0x18/0x40 [ 28.037544] kasan_save_alloc_info+0x3b/0x50 [ 28.038144] __kasan_kmalloc+0xb7/0xc0 [ 28.038560] __kmalloc_cache_noprof+0x184/0x410 [ 28.039409] kmalloc_oob_memset_8+0xad/0x330 [ 28.040388] kunit_try_run_case+0x1b3/0x490 [ 28.041473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.042496] kthread+0x257/0x310 [ 28.043161] ret_from_fork+0x41/0x80 [ 28.043583] ret_from_fork_asm+0x1a/0x30 [ 28.044193] [ 28.044618] The buggy address belongs to the object at ffff8881029fe500 [ 28.044618] which belongs to the cache kmalloc-128 of size 128 [ 28.045797] The buggy address is located 113 bytes inside of [ 28.045797] allocated 120-byte region [ffff8881029fe500, ffff8881029fe578) [ 28.047253] [ 28.047619] The buggy address belongs to the physical page: [ 28.048272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fe [ 28.048988] flags: 0x200000000000000(node=0|zone=2) [ 28.049560] page_type: f5(slab) [ 28.050187] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.050907] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.051646] page dumped because: kasan: bad access detected [ 28.052329] [ 28.052640] Memory state around the buggy address: [ 28.053532] ffff8881029fe400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.054359] ffff8881029fe480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.055050] >ffff8881029fe500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.055988] ^ [ 28.056533] ffff8881029fe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.057276] ffff8881029fe600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.058138] ================================================================== [ 28.064599] ================================================================== [ 28.065979] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330 [ 28.066953] Write of size 16 at addr ffff8881029fe769 by task kunit_try_catch/185 [ 28.067759] [ 28.068190] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.068970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.069603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.070561] Call Trace: [ 28.071188] <TASK> [ 28.071886] dump_stack_lvl+0x73/0xb0 [ 28.072518] print_report+0xd1/0x640 [ 28.073101] ? __virt_addr_valid+0x1db/0x2d0 [ 28.073547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.074289] kasan_report+0x102/0x140 [ 28.074648] ? kmalloc_oob_memset_16+0x167/0x330 [ 28.075600] ? kmalloc_oob_memset_16+0x167/0x330 [ 28.076268] kasan_check_range+0x10c/0x1c0 [ 28.076755] __asan_memset+0x27/0x50 [ 28.077377] kmalloc_oob_memset_16+0x167/0x330 [ 28.077961] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 28.078591] ? __schedule+0xc70/0x27e0 [ 28.079236] ? __pfx_read_tsc+0x10/0x10 [ 28.079803] ? ktime_get_ts64+0x86/0x230 [ 28.080274] kunit_try_run_case+0x1b3/0x490 [ 28.080849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.081252] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.082159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.082640] ? __kthread_parkme+0x82/0x160 [ 28.083302] ? preempt_count_sub+0x50/0x80 [ 28.083878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.084543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.085437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.086117] kthread+0x257/0x310 [ 28.086359] ? __pfx_kthread+0x10/0x10 [ 28.087291] ret_from_fork+0x41/0x80 [ 28.087759] ? __pfx_kthread+0x10/0x10 [ 28.088415] ret_from_fork_asm+0x1a/0x30 [ 28.089205] </TASK> [ 28.089396] [ 28.089592] Allocated by task 185: [ 28.090169] kasan_save_stack+0x3d/0x60 [ 28.090606] kasan_save_track+0x18/0x40 [ 28.091379] kasan_save_alloc_info+0x3b/0x50 [ 28.091756] __kasan_kmalloc+0xb7/0xc0 [ 28.092265] __kmalloc_cache_noprof+0x184/0x410 [ 28.093361] kmalloc_oob_memset_16+0xad/0x330 [ 28.093747] kunit_try_run_case+0x1b3/0x490 [ 28.094504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.095312] kthread+0x257/0x310 [ 28.095647] ret_from_fork+0x41/0x80 [ 28.096750] ret_from_fork_asm+0x1a/0x30 [ 28.097096] [ 28.097375] The buggy address belongs to the object at ffff8881029fe700 [ 28.097375] which belongs to the cache kmalloc-128 of size 128 [ 28.099571] The buggy address is located 105 bytes inside of [ 28.099571] allocated 120-byte region [ffff8881029fe700, ffff8881029fe778) [ 28.100487] [ 28.100596] The buggy address belongs to the physical page: [ 28.100941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fe [ 28.102435] flags: 0x200000000000000(node=0|zone=2) [ 28.103526] page_type: f5(slab) [ 28.103925] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.105012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.105629] page dumped because: kasan: bad access detected [ 28.106516] [ 28.106836] Memory state around the buggy address: [ 28.108198] ffff8881029fe600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 28.108829] ffff8881029fe680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.109813] >ffff8881029fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.110627] ^ [ 28.111417] ffff8881029fe780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.111736] ffff8881029fe800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.112330] ==================================================================