Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   21.163014] ==================================================================
[   21.172618] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   21.180080] Write of size 1 at addr ffff0008032a600a by task kunit_try_catch/193
[   21.187458] 
[   21.188945] CPU: 5 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.189005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.189022] Hardware name: WinLink E850-96 board (DT)
[   21.189044] Call trace:
[   21.189060]  show_stack+0x20/0x38 (C)
[   21.189096]  dump_stack_lvl+0x8c/0xd0
[   21.189134]  print_report+0x118/0x608
[   21.189170]  kasan_report+0xdc/0x128
[   21.189206]  __asan_report_store1_noabort+0x20/0x30
[   21.189237]  kmalloc_large_oob_right+0x278/0x2b8
[   21.189270]  kunit_try_run_case+0x170/0x3f0
[   21.189307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.189345]  kthread+0x328/0x630
[   21.189375]  ret_from_fork+0x10/0x20
[   21.189413] 
[   21.252304] The buggy address belongs to the physical page:
[   21.257861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   21.265844] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.273484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.280425] page_type: f8(unknown)
[   21.283823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.291543] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.299272] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.307080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.314894] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   21.322705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.330511] page dumped because: kasan: bad access detected
[   21.336067] 
[   21.337542] Memory state around the buggy address:
[   21.342324]  ffff0008032a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.349526]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.356730] >ffff0008032a6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.363931]                       ^
[   21.367407]  ffff0008032a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.374612]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.381815] ==================================================================

[   24.734411] ==================================================================
[   24.734544] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   24.734651] Write of size 1 at addr fff00000c64ba00a by task kunit_try_catch/146
[   24.734763] 
[   24.734839] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.735116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.735192] Hardware name: linux,dummy-virt (DT)
[   24.735296] Call trace:
[   24.735361]  show_stack+0x20/0x38 (C)
[   24.735505]  dump_stack_lvl+0x8c/0xd0
[   24.735651]  print_report+0x118/0x608
[   24.735789]  kasan_report+0xdc/0x128
[   24.735989]  __asan_report_store1_noabort+0x20/0x30
[   24.736303]  kmalloc_large_oob_right+0x278/0x2b8
[   24.736553]  kunit_try_run_case+0x170/0x3f0
[   24.736687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.737056]  kthread+0x328/0x630
[   24.737229]  ret_from_fork+0x10/0x20
[   24.737676] 
[   24.737761] The buggy address belongs to the physical page:
[   24.737847] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   24.738010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.738238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.738395] page_type: f8(unknown)
[   24.738512] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.738695] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.738912] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.739085] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.739272] head: 0bfffe0000000002 ffffc1ffc3192e01 00000000ffffffff 00000000ffffffff
[   24.739582] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.739838] page dumped because: kasan: bad access detected
[   24.739973] 
[   24.740024] Memory state around the buggy address:
[   24.740296]  fff00000c64b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.740418]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.740535] >fff00000c64ba000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.740739]                       ^
[   24.740868]  fff00000c64ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.740994]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.741091] ==================================================================

[   24.882988] ==================================================================
[   24.883560] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   24.884174] Write of size 1 at addr fff00000c64fe00a by task kunit_try_catch/146
[   24.884393] 
[   24.884527] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.884741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.884807] Hardware name: linux,dummy-virt (DT)
[   24.884902] Call trace:
[   24.885398]  show_stack+0x20/0x38 (C)
[   24.885547]  dump_stack_lvl+0x8c/0xd0
[   24.885907]  print_report+0x118/0x608
[   24.887222]  kasan_report+0xdc/0x128
[   24.887385]  __asan_report_store1_noabort+0x20/0x30
[   24.887504]  kmalloc_large_oob_right+0x278/0x2b8
[   24.887620]  kunit_try_run_case+0x170/0x3f0
[   24.887739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.890297]  kthread+0x328/0x630
[   24.890925]  ret_from_fork+0x10/0x20
[   24.891678] 
[   24.892795] The buggy address belongs to the physical page:
[   24.892929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fc
[   24.893908] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.894576] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.895828] page_type: f8(unknown)
[   24.896357] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.897382] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.898342] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.899201] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.899992] head: 0bfffe0000000002 ffffc1ffc3193f01 00000000ffffffff 00000000ffffffff
[   24.900117] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.900210] page dumped because: kasan: bad access detected
[   24.900284] 
[   24.900330] Memory state around the buggy address:
[   24.902396]  fff00000c64fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.902525]  fff00000c64fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.903311] >fff00000c64fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.903409]                       ^
[   24.903480]  fff00000c64fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.904358]  fff00000c64fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.904535] ==================================================================

[   17.622809] ==================================================================
[   17.623594] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   17.625186] Write of size 1 at addr ffff888102a0a00a by task kunit_try_catch/164
[   17.625907] 
[   17.626203] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.626331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.626367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.626419] Call Trace:
[   17.626468]  <TASK>
[   17.626538]  dump_stack_lvl+0x73/0xb0
[   17.626641]  print_report+0xd1/0x650
[   17.626720]  ? __virt_addr_valid+0x1db/0x2d0
[   17.626793]  ? kmalloc_large_oob_right+0x2e9/0x330
[   17.626869]  ? kasan_addr_to_slab+0x11/0xa0
[   17.626939]  ? kmalloc_large_oob_right+0x2e9/0x330
[   17.627011]  kasan_report+0x141/0x180
[   17.627084]  ? kmalloc_large_oob_right+0x2e9/0x330
[   17.627167]  __asan_report_store1_noabort+0x1b/0x30
[   17.627246]  kmalloc_large_oob_right+0x2e9/0x330
[   17.627305]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   17.627346]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   17.627383]  kunit_try_run_case+0x1a5/0x480
[   17.627423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.627455]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.627488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.627569]  ? __kthread_parkme+0x82/0x180
[   17.627626]  ? preempt_count_sub+0x50/0x80
[   17.627688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.627754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.627815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.627881]  kthread+0x337/0x6f0
[   17.627941]  ? trace_preempt_on+0x20/0xc0
[   17.628007]  ? __pfx_kthread+0x10/0x10
[   17.628062]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.628156]  ? calculate_sigpending+0x7b/0xa0
[   17.628242]  ? __pfx_kthread+0x10/0x10
[   17.628305]  ret_from_fork+0x116/0x1d0
[   17.628364]  ? __pfx_kthread+0x10/0x10
[   17.628425]  ret_from_fork_asm+0x1a/0x30
[   17.628517]  </TASK>
[   17.628552] 
[   17.652146] The buggy address belongs to the physical page:
[   17.653229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   17.654087] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.654836] flags: 0x200000000000040(head|node=0|zone=2)
[   17.655314] page_type: f8(unknown)
[   17.655622] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.656162] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.657474] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.657812] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.658071] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   17.658999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.659928] page dumped because: kasan: bad access detected
[   17.660647] 
[   17.660916] Memory state around the buggy address:
[   17.661735]  ffff888102a09f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.662415]  ffff888102a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.662973] >ffff888102a0a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.663870]                       ^
[   17.664196]  ffff888102a0a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.664875]  ffff888102a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.665550] ==================================================================

[   16.810092] ==================================================================
[   16.811069] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   16.811631] Write of size 1 at addr ffff88810232600a by task kunit_try_catch/164
[   16.812727] 
[   16.813157] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   16.813280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.813353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.813419] Call Trace:
[   16.813483]  <TASK>
[   16.813671]  dump_stack_lvl+0x73/0xb0
[   16.813763]  print_report+0xd1/0x650
[   16.813839]  ? __virt_addr_valid+0x1db/0x2d0
[   16.813907]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.813943]  ? kasan_addr_to_slab+0x11/0xa0
[   16.813972]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.814004]  kasan_report+0x141/0x180
[   16.814035]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.814072]  __asan_report_store1_noabort+0x1b/0x30
[   16.814106]  kmalloc_large_oob_right+0x2e9/0x330
[   16.814138]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   16.814171]  ? __schedule+0x10cc/0x2b60
[   16.814240]  ? __pfx_read_tsc+0x10/0x10
[   16.814289]  ? ktime_get_ts64+0x86/0x230
[   16.814324]  kunit_try_run_case+0x1a5/0x480
[   16.814361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.814394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.814427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.814459]  ? __kthread_parkme+0x82/0x180
[   16.814486]  ? preempt_count_sub+0x50/0x80
[   16.814531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.814642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.814683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.814719]  kthread+0x337/0x6f0
[   16.814749]  ? trace_preempt_on+0x20/0xc0
[   16.814782]  ? __pfx_kthread+0x10/0x10
[   16.814811]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.814842]  ? calculate_sigpending+0x7b/0xa0
[   16.814895]  ? __pfx_kthread+0x10/0x10
[   16.814937]  ret_from_fork+0x116/0x1d0
[   16.814965]  ? __pfx_kthread+0x10/0x10
[   16.814993]  ret_from_fork_asm+0x1a/0x30
[   16.815034]  </TASK>
[   16.815049] 
[   16.841242] The buggy address belongs to the physical page:
[   16.841935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[   16.842733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.843388] flags: 0x200000000000040(head|node=0|zone=2)
[   16.844069] page_type: f8(unknown)
[   16.844572] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.845509] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.846302] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.847120] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.848093] head: 0200000000000002 ffffea000408c901 00000000ffffffff 00000000ffffffff
[   16.848737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.849355] page dumped because: kasan: bad access detected
[   16.849802] 
[   16.850291] Memory state around the buggy address:
[   16.850676]  ffff888102325f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.851374]  ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.852524] >ffff888102326000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.853238]                       ^
[   16.853851]  ffff888102326080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.854582]  ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.855523] ==================================================================

[   19.905718] ==================================================================
[   19.906835] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   19.907575] Write of size 1 at addr ffff00000dafa00a by task kunit_try_catch/199
[   19.908288] 
[   19.908472] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.908551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.908574] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.908600] Call trace:
[   19.908618]  show_stack+0x20/0x38 (C)
[   19.908673]  dump_stack_lvl+0x8c/0xd0
[   19.908730]  print_report+0x118/0x608
[   19.908786]  kasan_report+0xdc/0x128
[   19.908838]  __asan_report_store1_noabort+0x20/0x30
[   19.908887]  kmalloc_large_oob_right+0x278/0x2b8
[   19.908937]  kunit_try_run_case+0x170/0x3f0
[   19.908992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.909053]  kthread+0x328/0x630
[   19.909096]  ret_from_fork+0x10/0x20
[   19.909148] 
[   19.914882] The buggy address belongs to the physical page:
[   19.915416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8
[   19.916169] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.916900] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.917581] page_type: f8(unknown)
[   19.917941] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.918685] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.919430] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.920181] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.920935] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff
[   19.921687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.922426] page dumped because: kasan: bad access detected
[   19.922960] 
[   19.923127] Memory state around the buggy address:
[   19.923596]  ffff00000daf9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.924287]  ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.924980] >ffff00000dafa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.925664]                       ^
[   19.926017]  ffff00000dafa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.926708]  ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.927392] ==================================================================