Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.013232] ==================================================================
[   17.013344] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   17.013416] Write of size 4 at addr fff00000c7892175 by task kunit_try_catch/174
[   17.013632] 
[   17.013931] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.014029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.014055] Hardware name: linux,dummy-virt (DT)
[   17.014202] Call trace:
[   17.014236]  show_stack+0x20/0x38 (C)
[   17.014295]  dump_stack_lvl+0x8c/0xd0
[   17.014717]  print_report+0x118/0x5d0
[   17.014818]  kasan_report+0xdc/0x128
[   17.015117]  kasan_check_range+0x100/0x1a8
[   17.015189]  __asan_memset+0x34/0x78
[   17.015234]  kmalloc_oob_memset_4+0x150/0x300
[   17.015280]  kunit_try_run_case+0x170/0x3f0
[   17.015477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.015586]  kthread+0x328/0x630
[   17.016046]  ret_from_fork+0x10/0x20
[   17.016207] 
[   17.016268] Allocated by task 174:
[   17.016338]  kasan_save_stack+0x3c/0x68
[   17.016670]  kasan_save_track+0x20/0x40
[   17.016922]  kasan_save_alloc_info+0x40/0x58
[   17.017118]  __kasan_kmalloc+0xd4/0xd8
[   17.017341]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.017455]  kmalloc_oob_memset_4+0xb0/0x300
[   17.017560]  kunit_try_run_case+0x170/0x3f0
[   17.017641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.018044]  kthread+0x328/0x630
[   17.018131]  ret_from_fork+0x10/0x20
[   17.018172] 
[   17.018238] The buggy address belongs to the object at fff00000c7892100
[   17.018238]  which belongs to the cache kmalloc-128 of size 128
[   17.018723] The buggy address is located 117 bytes inside of
[   17.018723]  allocated 120-byte region [fff00000c7892100, fff00000c7892178)
[   17.018980] 
[   17.019025] The buggy address belongs to the physical page:
[   17.019065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.019268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.019402] page_type: f5(slab)
[   17.019588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.019981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.020027] page dumped because: kasan: bad access detected
[   17.020060] 
[   17.020078] Memory state around the buggy address:
[   17.020112]  fff00000c7892000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.020153]  fff00000c7892080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.020194] >fff00000c7892100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.020554]                                                                 ^
[   17.020605]  fff00000c7892180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.020647]  fff00000c7892200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.020684] ==================================================================

[   16.674336] ==================================================================
[   16.674400] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   16.674450] Write of size 4 at addr fff00000c5b7da75 by task kunit_try_catch/174
[   16.674497] 
[   16.674531] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.674610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.674636] Hardware name: linux,dummy-virt (DT)
[   16.674665] Call trace:
[   16.674688]  show_stack+0x20/0x38 (C)
[   16.674734]  dump_stack_lvl+0x8c/0xd0
[   16.674779]  print_report+0x118/0x5d0
[   16.674823]  kasan_report+0xdc/0x128
[   16.674876]  kasan_check_range+0x100/0x1a8
[   16.674923]  __asan_memset+0x34/0x78
[   16.674963]  kmalloc_oob_memset_4+0x150/0x300
[   16.675008]  kunit_try_run_case+0x170/0x3f0
[   16.675053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.675108]  kthread+0x328/0x630
[   16.675159]  ret_from_fork+0x10/0x20
[   16.675208] 
[   16.675226] Allocated by task 174:
[   16.675254]  kasan_save_stack+0x3c/0x68
[   16.675293]  kasan_save_track+0x20/0x40
[   16.675728]  kasan_save_alloc_info+0x40/0x58
[   16.676115]  __kasan_kmalloc+0xd4/0xd8
[   16.676196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.676244]  kmalloc_oob_memset_4+0xb0/0x300
[   16.676289]  kunit_try_run_case+0x170/0x3f0
[   16.676586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.676748]  kthread+0x328/0x630
[   16.676802]  ret_from_fork+0x10/0x20
[   16.676990] 
[   16.677031] The buggy address belongs to the object at fff00000c5b7da00
[   16.677031]  which belongs to the cache kmalloc-128 of size 128
[   16.677234] The buggy address is located 117 bytes inside of
[   16.677234]  allocated 120-byte region [fff00000c5b7da00, fff00000c5b7da78)
[   16.677650] 
[   16.677701] The buggy address belongs to the physical page:
[   16.677740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.677819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.677944] page_type: f5(slab)
[   16.678042] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.678220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.678298] page dumped because: kasan: bad access detected
[   16.678422] 
[   16.678468] Memory state around the buggy address:
[   16.678501]  fff00000c5b7d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.678559]  fff00000c5b7d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678799] >fff00000c5b7da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.678984]                                                                 ^
[   16.679031]  fff00000c5b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.679075]  fff00000c5b7db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.679581] ==================================================================

[   16.703626] ==================================================================
[   16.703842] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   16.704349] Write of size 4 at addr fff00000c771d175 by task kunit_try_catch/174
[   16.704407] 
[   16.704619] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.704916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.705069] Hardware name: linux,dummy-virt (DT)
[   16.705166] Call trace:
[   16.705346]  show_stack+0x20/0x38 (C)
[   16.705792]  dump_stack_lvl+0x8c/0xd0
[   16.706208]  print_report+0x118/0x5d0
[   16.706301]  kasan_report+0xdc/0x128
[   16.706733]  kasan_check_range+0x100/0x1a8
[   16.706959]  __asan_memset+0x34/0x78
[   16.707194]  kmalloc_oob_memset_4+0x150/0x300
[   16.707468]  kunit_try_run_case+0x170/0x3f0
[   16.707548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.707735]  kthread+0x328/0x630
[   16.707780]  ret_from_fork+0x10/0x20
[   16.708057] 
[   16.708257] Allocated by task 174:
[   16.708301]  kasan_save_stack+0x3c/0x68
[   16.708509]  kasan_save_track+0x20/0x40
[   16.708640]  kasan_save_alloc_info+0x40/0x58
[   16.708865]  __kasan_kmalloc+0xd4/0xd8
[   16.709007]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.709164]  kmalloc_oob_memset_4+0xb0/0x300
[   16.709407]  kunit_try_run_case+0x170/0x3f0
[   16.709706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.709794]  kthread+0x328/0x630
[   16.710105]  ret_from_fork+0x10/0x20
[   16.710327] 
[   16.710460] The buggy address belongs to the object at fff00000c771d100
[   16.710460]  which belongs to the cache kmalloc-128 of size 128
[   16.710699] The buggy address is located 117 bytes inside of
[   16.710699]  allocated 120-byte region [fff00000c771d100, fff00000c771d178)
[   16.711000] 
[   16.711112] The buggy address belongs to the physical page:
[   16.711214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.711375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.711595] page_type: f5(slab)
[   16.711965] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.712098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.712316] page dumped because: kasan: bad access detected
[   16.712401] 
[   16.712503] Memory state around the buggy address:
[   16.712578]  fff00000c771d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.712979]  fff00000c771d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.713266] >fff00000c771d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.713483]                                                                 ^
[   16.713558]  fff00000c771d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714002]  fff00000c771d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714097] ==================================================================

[   12.355098] ==================================================================
[   12.355858] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   12.356562] Write of size 4 at addr ffff888102988675 by task kunit_try_catch/191
[   12.356913] 
[   12.357035] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.357080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.357208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.357237] Call Trace:
[   12.357248]  <TASK>
[   12.357264]  dump_stack_lvl+0x73/0xb0
[   12.357296]  print_report+0xd1/0x610
[   12.357318]  ? __virt_addr_valid+0x1db/0x2d0
[   12.357341]  ? kmalloc_oob_memset_4+0x166/0x330
[   12.357362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.357404]  ? kmalloc_oob_memset_4+0x166/0x330
[   12.357440]  kasan_report+0x141/0x180
[   12.357462]  ? kmalloc_oob_memset_4+0x166/0x330
[   12.357489]  kasan_check_range+0x10c/0x1c0
[   12.357512]  __asan_memset+0x27/0x50
[   12.357574]  kmalloc_oob_memset_4+0x166/0x330
[   12.357600]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   12.357623]  ? __schedule+0x10cc/0x2b60
[   12.357645]  ? __pfx_read_tsc+0x10/0x10
[   12.357666]  ? ktime_get_ts64+0x86/0x230
[   12.357691]  kunit_try_run_case+0x1a5/0x480
[   12.357716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.357738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.357762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.357785]  ? __kthread_parkme+0x82/0x180
[   12.357805]  ? preempt_count_sub+0x50/0x80
[   12.357830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.357853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.357876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.357913]  kthread+0x337/0x6f0
[   12.357931]  ? trace_preempt_on+0x20/0xc0
[   12.357955]  ? __pfx_kthread+0x10/0x10
[   12.357975]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.358004]  ? calculate_sigpending+0x7b/0xa0
[   12.358028]  ? __pfx_kthread+0x10/0x10
[   12.358049]  ret_from_fork+0x116/0x1d0
[   12.358067]  ? __pfx_kthread+0x10/0x10
[   12.358087]  ret_from_fork_asm+0x1a/0x30
[   12.358119]  </TASK>
[   12.358129] 
[   12.367113] Allocated by task 191:
[   12.367326]  kasan_save_stack+0x45/0x70
[   12.367525]  kasan_save_track+0x18/0x40
[   12.367764]  kasan_save_alloc_info+0x3b/0x50
[   12.368028]  __kasan_kmalloc+0xb7/0xc0
[   12.368204]  __kmalloc_cache_noprof+0x189/0x420
[   12.368437]  kmalloc_oob_memset_4+0xac/0x330
[   12.368857]  kunit_try_run_case+0x1a5/0x480
[   12.369089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.369316]  kthread+0x337/0x6f0
[   12.369438]  ret_from_fork+0x116/0x1d0
[   12.369596]  ret_from_fork_asm+0x1a/0x30
[   12.369792] 
[   12.369937] The buggy address belongs to the object at ffff888102988600
[   12.369937]  which belongs to the cache kmalloc-128 of size 128
[   12.370864] The buggy address is located 117 bytes inside of
[   12.370864]  allocated 120-byte region [ffff888102988600, ffff888102988678)
[   12.371272] 
[   12.371346] The buggy address belongs to the physical page:
[   12.371523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   12.371765] flags: 0x200000000000000(node=0|zone=2)
[   12.371944] page_type: f5(slab)
[   12.372066] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.372382] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.372613] page dumped because: kasan: bad access detected
[   12.372786] 
[   12.372857] Memory state around the buggy address:
[   12.373034]  ffff888102988500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.373341]  ffff888102988580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.373662] >ffff888102988600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.374138]                                                                 ^
[   12.374429]  ffff888102988680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.374645]  ffff888102988700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.374867] ==================================================================

[   12.287392] ==================================================================
[   12.287806] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   12.288180] Write of size 4 at addr ffff888102b7d375 by task kunit_try_catch/191
[   12.288480] 
[   12.288949] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.289003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.289027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.289050] Call Trace:
[   12.289063]  <TASK>
[   12.289082]  dump_stack_lvl+0x73/0xb0
[   12.289116]  print_report+0xd1/0x610
[   12.289140]  ? __virt_addr_valid+0x1db/0x2d0
[   12.289165]  ? kmalloc_oob_memset_4+0x166/0x330
[   12.289186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.289208]  ? kmalloc_oob_memset_4+0x166/0x330
[   12.289229]  kasan_report+0x141/0x180
[   12.289251]  ? kmalloc_oob_memset_4+0x166/0x330
[   12.289276]  kasan_check_range+0x10c/0x1c0
[   12.289299]  __asan_memset+0x27/0x50
[   12.289318]  kmalloc_oob_memset_4+0x166/0x330
[   12.289340]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   12.289362]  ? __schedule+0x10cc/0x2b60
[   12.289384]  ? __pfx_read_tsc+0x10/0x10
[   12.289406]  ? ktime_get_ts64+0x86/0x230
[   12.289442]  kunit_try_run_case+0x1a5/0x480
[   12.289503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.289525]  ? irqentry_exit+0x2a/0x60
[   12.289560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.289587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.289610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.289632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.289656]  kthread+0x337/0x6f0
[   12.289676]  ? trace_preempt_on+0x20/0xc0
[   12.289700]  ? __pfx_kthread+0x10/0x10
[   12.289719]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.289741]  ? calculate_sigpending+0x7b/0xa0
[   12.289766]  ? __pfx_kthread+0x10/0x10
[   12.289786]  ret_from_fork+0x116/0x1d0
[   12.289804]  ? __pfx_kthread+0x10/0x10
[   12.289824]  ret_from_fork_asm+0x1a/0x30
[   12.289856]  </TASK>
[   12.289868] 
[   12.301646] Allocated by task 191:
[   12.301859]  kasan_save_stack+0x45/0x70
[   12.302395]  kasan_save_track+0x18/0x40
[   12.302695]  kasan_save_alloc_info+0x3b/0x50
[   12.302851]  __kasan_kmalloc+0xb7/0xc0
[   12.303127]  __kmalloc_cache_noprof+0x189/0x420
[   12.303494]  kmalloc_oob_memset_4+0xac/0x330
[   12.303652]  kunit_try_run_case+0x1a5/0x480
[   12.303849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.304110]  kthread+0x337/0x6f0
[   12.304255]  ret_from_fork+0x116/0x1d0
[   12.304502]  ret_from_fork_asm+0x1a/0x30
[   12.304710] 
[   12.304797] The buggy address belongs to the object at ffff888102b7d300
[   12.304797]  which belongs to the cache kmalloc-128 of size 128
[   12.305420] The buggy address is located 117 bytes inside of
[   12.305420]  allocated 120-byte region [ffff888102b7d300, ffff888102b7d378)
[   12.305957] 
[   12.306105] The buggy address belongs to the physical page:
[   12.306401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   12.306801] flags: 0x200000000000000(node=0|zone=2)
[   12.307033] page_type: f5(slab)
[   12.307160] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.307392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.307720] page dumped because: kasan: bad access detected
[   12.308145] 
[   12.308217] Memory state around the buggy address:
[   12.308377]  ffff888102b7d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.309359]  ffff888102b7d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.309788] >ffff888102b7d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.310253]                                                                 ^
[   12.310569]  ffff888102b7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.310790]  ffff888102b7d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.311287] ==================================================================