Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.856162] ==================================================================
[   16.856227] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.856276] Write of size 8 at addr fff00000c78c1171 by task kunit_try_catch/176
[   16.856489] 
[   16.856527] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.856919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.857096] Hardware name: linux,dummy-virt (DT)
[   16.857224] Call trace:
[   16.857296]  show_stack+0x20/0x38 (C)
[   16.857472]  dump_stack_lvl+0x8c/0xd0
[   16.857569]  print_report+0x118/0x608
[   16.857675]  kasan_report+0xdc/0x128
[   16.857731]  kasan_check_range+0x100/0x1a8
[   16.857783]  __asan_memset+0x34/0x78
[   16.857987]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.858328]  kunit_try_run_case+0x170/0x3f0
[   16.858433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.858877]  kthread+0x328/0x630
[   16.859046]  ret_from_fork+0x10/0x20
[   16.859107] 
[   16.859125] Allocated by task 176:
[   16.859304]  kasan_save_stack+0x3c/0x68
[   16.859529]  kasan_save_track+0x20/0x40
[   16.859890]  kasan_save_alloc_info+0x40/0x58
[   16.860125]  __kasan_kmalloc+0xd4/0xd8
[   16.860262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.860573]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.860648]  kunit_try_run_case+0x170/0x3f0
[   16.860686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.860735]  kthread+0x328/0x630
[   16.860766]  ret_from_fork+0x10/0x20
[   16.860800] 
[   16.860947] The buggy address belongs to the object at fff00000c78c1100
[   16.860947]  which belongs to the cache kmalloc-128 of size 128
[   16.861041] The buggy address is located 113 bytes inside of
[   16.861041]  allocated 120-byte region [fff00000c78c1100, fff00000c78c1178)
[   16.861103] 
[   16.861123] The buggy address belongs to the physical page:
[   16.861172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1
[   16.861225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.861271] page_type: f5(slab)
[   16.861318] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.861375] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.861422] page dumped because: kasan: bad access detected
[   16.861461] 
[   16.861495] Memory state around the buggy address:
[   16.861525]  fff00000c78c1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.861568]  fff00000c78c1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861610] >fff00000c78c1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.861652]                                                                 ^
[   16.861699]  fff00000c78c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861740]  fff00000c78c1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861784] ==================================================================

[   11.599853] ==================================================================
[   11.601007] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   11.601938] Write of size 8 at addr ffff888103328771 by task kunit_try_catch/194
[   11.602208] 
[   11.602490] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.602544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.602557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.602576] Call Trace:
[   11.602588]  <TASK>
[   11.602604]  dump_stack_lvl+0x73/0xb0
[   11.602631]  print_report+0xd1/0x650
[   11.602653]  ? __virt_addr_valid+0x1db/0x2d0
[   11.602674]  ? kmalloc_oob_memset_8+0x166/0x330
[   11.602694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.602715]  ? kmalloc_oob_memset_8+0x166/0x330
[   11.602736]  kasan_report+0x141/0x180
[   11.602756]  ? kmalloc_oob_memset_8+0x166/0x330
[   11.602781]  kasan_check_range+0x10c/0x1c0
[   11.602803]  __asan_memset+0x27/0x50
[   11.602822]  kmalloc_oob_memset_8+0x166/0x330
[   11.602844]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   11.602865]  ? __schedule+0x10cc/0x2b60
[   11.602886]  ? __pfx_read_tsc+0x10/0x10
[   11.602906]  ? ktime_get_ts64+0x86/0x230
[   11.602928]  kunit_try_run_case+0x1a5/0x480
[   11.602952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.602972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.602994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.603016]  ? __kthread_parkme+0x82/0x180
[   11.603034]  ? preempt_count_sub+0x50/0x80
[   11.603057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.603079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.603102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.603137]  kthread+0x337/0x6f0
[   11.603242]  ? trace_preempt_on+0x20/0xc0
[   11.603272]  ? __pfx_kthread+0x10/0x10
[   11.603295]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.603316]  ? calculate_sigpending+0x7b/0xa0
[   11.603339]  ? __pfx_kthread+0x10/0x10
[   11.603360]  ret_from_fork+0x116/0x1d0
[   11.603379]  ? __pfx_kthread+0x10/0x10
[   11.603398]  ret_from_fork_asm+0x1a/0x30
[   11.603428]  </TASK>
[   11.603439] 
[   11.613506] Allocated by task 194:
[   11.613675]  kasan_save_stack+0x45/0x70
[   11.614064]  kasan_save_track+0x18/0x40
[   11.614401]  kasan_save_alloc_info+0x3b/0x50
[   11.614723]  __kasan_kmalloc+0xb7/0xc0
[   11.614998]  __kmalloc_cache_noprof+0x189/0x420
[   11.615364]  kmalloc_oob_memset_8+0xac/0x330
[   11.615668]  kunit_try_run_case+0x1a5/0x480
[   11.615991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.616419]  kthread+0x337/0x6f0
[   11.616601]  ret_from_fork+0x116/0x1d0
[   11.616792]  ret_from_fork_asm+0x1a/0x30
[   11.616984] 
[   11.617080] The buggy address belongs to the object at ffff888103328700
[   11.617080]  which belongs to the cache kmalloc-128 of size 128
[   11.617969] The buggy address is located 113 bytes inside of
[   11.617969]  allocated 120-byte region [ffff888103328700, ffff888103328778)
[   11.618605] 
[   11.618717] The buggy address belongs to the physical page:
[   11.618984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103328
[   11.619337] flags: 0x200000000000000(node=0|zone=2)
[   11.619825] page_type: f5(slab)
[   11.619996] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.620613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.620976] page dumped because: kasan: bad access detected
[   11.621502] 
[   11.621699] Memory state around the buggy address:
[   11.621922]  ffff888103328600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.622472]  ffff888103328680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.622864] >ffff888103328700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.623139]                                                                 ^
[   11.623732]  ffff888103328780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.624082]  ffff888103328800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.624519] ==================================================================