Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.840577] ==================================================================
[   21.840767] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   21.840937] Write of size 16 at addr fff00000c794b369 by task kunit_try_catch/180
[   21.841064] 
[   21.841150] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   21.841365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.841683] Hardware name: linux,dummy-virt (DT)
[   21.841790] Call trace:
[   21.841848]  show_stack+0x20/0x38 (C)
[   21.841974]  dump_stack_lvl+0x8c/0xd0
[   21.842100]  print_report+0x118/0x608
[   21.842193]  kasan_report+0xdc/0x128
[   21.842275]  kasan_check_range+0x100/0x1a8
[   21.842793]  __asan_memset+0x34/0x78
[   21.842930]  kmalloc_oob_memset_16+0x150/0x2f8
[   21.843089]  kunit_try_run_case+0x170/0x3f0
[   21.843361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.843623]  kthread+0x328/0x630
[   21.844004]  ret_from_fork+0x10/0x20
[   21.844313] 
[   21.844440] Allocated by task 180:
[   21.844514]  kasan_save_stack+0x3c/0x68
[   21.844629]  kasan_save_track+0x20/0x40
[   21.844723]  kasan_save_alloc_info+0x40/0x58
[   21.844827]  __kasan_kmalloc+0xd4/0xd8
[   21.844916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.845017]  kmalloc_oob_memset_16+0xb0/0x2f8
[   21.845117]  kunit_try_run_case+0x170/0x3f0
[   21.845217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.845339]  kthread+0x328/0x630
[   21.845416]  ret_from_fork+0x10/0x20
[   21.845507] 
[   21.845556] The buggy address belongs to the object at fff00000c794b300
[   21.845556]  which belongs to the cache kmalloc-128 of size 128
[   21.845704] The buggy address is located 105 bytes inside of
[   21.845704]  allocated 120-byte region [fff00000c794b300, fff00000c794b378)
[   21.845873] 
[   21.845928] The buggy address belongs to the physical page:
[   21.846701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   21.847032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.847166] page_type: f5(slab)
[   21.847263] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.847391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.847495] page dumped because: kasan: bad access detected
[   21.847579] 
[   21.847630] Memory state around the buggy address:
[   21.847714]  fff00000c794b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.847829]  fff00000c794b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.848070] >fff00000c794b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.848298]                                                                 ^
[   21.848533]  fff00000c794b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.848754]  fff00000c794b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.848966] ==================================================================

[   19.446516] ==================================================================
[   19.447377] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   19.447974] Write of size 16 at addr ffff888102ed7469 by task kunit_try_catch/198
[   19.449502] 
[   19.449751] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   19.449877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.450423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.450489] Call Trace:
[   19.450520]  <TASK>
[   19.450564]  dump_stack_lvl+0x73/0xb0
[   19.450650]  print_report+0xd1/0x650
[   19.450720]  ? __virt_addr_valid+0x1db/0x2d0
[   19.450795]  ? kmalloc_oob_memset_16+0x166/0x330
[   19.450841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.450876]  ? kmalloc_oob_memset_16+0x166/0x330
[   19.450911]  kasan_report+0x141/0x180
[   19.450969]  ? kmalloc_oob_memset_16+0x166/0x330
[   19.451080]  kasan_check_range+0x10c/0x1c0
[   19.451169]  __asan_memset+0x27/0x50
[   19.451205]  kmalloc_oob_memset_16+0x166/0x330
[   19.451244]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   19.451283]  ? __schedule+0x10cc/0x2b60
[   19.451346]  ? __pfx_read_tsc+0x10/0x10
[   19.451380]  ? ktime_get_ts64+0x86/0x230
[   19.451420]  kunit_try_run_case+0x1a5/0x480
[   19.451460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.451495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.451533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.451569]  ? __kthread_parkme+0x82/0x180
[   19.451605]  ? preempt_count_sub+0x50/0x80
[   19.451645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.451682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.451717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.451753]  kthread+0x337/0x6f0
[   19.451778]  ? trace_preempt_on+0x20/0xc0
[   19.451814]  ? __pfx_kthread+0x10/0x10
[   19.451840]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.451882]  ? calculate_sigpending+0x7b/0xa0
[   19.451920]  ? __pfx_kthread+0x10/0x10
[   19.451954]  ret_from_fork+0x41/0x80
[   19.452056]  ? __pfx_kthread+0x10/0x10
[   19.452121]  ret_from_fork_asm+0x1a/0x30
[   19.452172]  </TASK>
[   19.452189] 
[   19.473963] Allocated by task 198:
[   19.474505]  kasan_save_stack+0x45/0x70
[   19.475531]  kasan_save_track+0x18/0x40
[   19.475970]  kasan_save_alloc_info+0x3b/0x50
[   19.476779]  __kasan_kmalloc+0xb7/0xc0
[   19.477654]  __kmalloc_cache_noprof+0x189/0x420
[   19.477972]  kmalloc_oob_memset_16+0xac/0x330
[   19.478634]  kunit_try_run_case+0x1a5/0x480
[   19.479015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.479954]  kthread+0x337/0x6f0
[   19.480762]  ret_from_fork+0x41/0x80
[   19.481187]  ret_from_fork_asm+0x1a/0x30
[   19.481676] 
[   19.481896] The buggy address belongs to the object at ffff888102ed7400
[   19.481896]  which belongs to the cache kmalloc-128 of size 128
[   19.482966] The buggy address is located 105 bytes inside of
[   19.482966]  allocated 120-byte region [ffff888102ed7400, ffff888102ed7478)
[   19.484063] 
[   19.484824] The buggy address belongs to the physical page:
[   19.485689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   19.486329] flags: 0x200000000000000(node=0|zone=2)
[   19.486959] page_type: f5(slab)
[   19.487594] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.488996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.489594] page dumped because: kasan: bad access detected
[   19.490001] 
[   19.490470] Memory state around the buggy address:
[   19.490920]  ffff888102ed7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.492089]  ffff888102ed7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.493221] >ffff888102ed7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.493803]                                                                 ^
[   19.494698]  ffff888102ed7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.495635]  ffff888102ed7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.496646] ==================================================================