Hay
Date
July 1, 2025, 11:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.139062] ==================================================================
[   18.139207] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.139281] Write of size 1 at addr fff00000c5d57f78 by task kunit_try_catch/143
[   18.139339] 
[   18.139406] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.139497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.139526] Hardware name: linux,dummy-virt (DT)
[   18.139562] Call trace:
[   18.139586]  show_stack+0x20/0x38 (C)
[   18.139640]  dump_stack_lvl+0x8c/0xd0
[   18.139693]  print_report+0x118/0x608
[   18.139743]  kasan_report+0xdc/0x128
[   18.139851]  __asan_report_store1_noabort+0x20/0x30
[   18.139959]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.140044]  kunit_try_run_case+0x170/0x3f0
[   18.140168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.140353]  kthread+0x328/0x630
[   18.140470]  ret_from_fork+0x10/0x20
[   18.140630] 
[   18.140755] Allocated by task 143:
[   18.140815]  kasan_save_stack+0x3c/0x68
[   18.140916]  kasan_save_track+0x20/0x40
[   18.140960]  kasan_save_alloc_info+0x40/0x58
[   18.141019]  __kasan_kmalloc+0xd4/0xd8
[   18.141058]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.141105]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.141159]  kunit_try_run_case+0x170/0x3f0
[   18.141262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.141556]  kthread+0x328/0x630
[   18.141722]  ret_from_fork+0x10/0x20
[   18.142304] 
[   18.142392] The buggy address belongs to the object at fff00000c5d57f00
[   18.142392]  which belongs to the cache kmalloc-128 of size 128
[   18.142520] The buggy address is located 0 bytes to the right of
[   18.142520]  allocated 120-byte region [fff00000c5d57f00, fff00000c5d57f78)
[   18.142647] 
[   18.142716] The buggy address belongs to the physical page:
[   18.142750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d57
[   18.142809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.142866] page_type: f5(slab)
[   18.142912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.142968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.143012] page dumped because: kasan: bad access detected
[   18.143045] 
[   18.143063] Memory state around the buggy address:
[   18.143109]  fff00000c5d57e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.143166]  fff00000c5d57e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.143212] >fff00000c5d57f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.143253]                                                                 ^
[   18.143296]  fff00000c5d57f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.143712]  fff00000c5d58000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.143806] ==================================================================
[   18.145449] ==================================================================
[   18.145531] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   18.145736] Write of size 1 at addr fff00000c7732078 by task kunit_try_catch/143
[   18.145805] 
[   18.145874] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.146005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.146069] Hardware name: linux,dummy-virt (DT)
[   18.146106] Call trace:
[   18.146161]  show_stack+0x20/0x38 (C)
[   18.146267]  dump_stack_lvl+0x8c/0xd0
[   18.146339]  print_report+0x118/0x608
[   18.146409]  kasan_report+0xdc/0x128
[   18.146460]  __asan_report_store1_noabort+0x20/0x30
[   18.146512]  kmalloc_track_caller_oob_right+0x418/0x488
[   18.146594]  kunit_try_run_case+0x170/0x3f0
[   18.146660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.146718]  kthread+0x328/0x630
[   18.146781]  ret_from_fork+0x10/0x20
[   18.146865] 
[   18.146885] Allocated by task 143:
[   18.146916]  kasan_save_stack+0x3c/0x68
[   18.146978]  kasan_save_track+0x20/0x40
[   18.147599]  kasan_save_alloc_info+0x40/0x58
[   18.147664]  __kasan_kmalloc+0xd4/0xd8
[   18.147704]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.147751]  kmalloc_track_caller_oob_right+0x184/0x488
[   18.147795]  kunit_try_run_case+0x170/0x3f0
[   18.147835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.147880]  kthread+0x328/0x630
[   18.147914]  ret_from_fork+0x10/0x20
[   18.147952] 
[   18.147973] The buggy address belongs to the object at fff00000c7732000
[   18.147973]  which belongs to the cache kmalloc-128 of size 128
[   18.148042] The buggy address is located 0 bytes to the right of
[   18.148042]  allocated 120-byte region [fff00000c7732000, fff00000c7732078)
[   18.148111] 
[   18.148151] The buggy address belongs to the physical page:
[   18.148248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   18.148327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.148384] page_type: f5(slab)
[   18.148430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.148484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.148527] page dumped because: kasan: bad access detected
[   18.148560] 
[   18.148580] Memory state around the buggy address:
[   18.148615]  fff00000c7731f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.148972]  fff00000c7731f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.149054] >fff00000c7732000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.149158]                                                                 ^
[   18.149281]  fff00000c7732080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.149392]  fff00000c7732100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.149434] ==================================================================

[   10.970667] ==================================================================
[   10.971781] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.972462] Write of size 1 at addr ffff888102ef5778 by task kunit_try_catch/159
[   10.972782] 
[   10.973000] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.973045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.973057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.973077] Call Trace:
[   10.973090]  <TASK>
[   10.973111]  dump_stack_lvl+0x73/0xb0
[   10.973139]  print_report+0xd1/0x650
[   10.973161]  ? __virt_addr_valid+0x1db/0x2d0
[   10.973183]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.973206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.973227]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.973251]  kasan_report+0x141/0x180
[   10.973271]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.973298]  __asan_report_store1_noabort+0x1b/0x30
[   10.973318]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.973340]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.973366]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.973407]  kunit_try_run_case+0x1a5/0x480
[   10.973430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.973451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.973473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.973494]  ? __kthread_parkme+0x82/0x180
[   10.973513]  ? preempt_count_sub+0x50/0x80
[   10.973537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.973558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.973579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.973601]  kthread+0x337/0x6f0
[   10.973620]  ? trace_preempt_on+0x20/0xc0
[   10.973645]  ? __pfx_kthread+0x10/0x10
[   10.973665]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.973685]  ? calculate_sigpending+0x7b/0xa0
[   10.973707]  ? __pfx_kthread+0x10/0x10
[   10.973730]  ret_from_fork+0x116/0x1d0
[   10.973748]  ? __pfx_kthread+0x10/0x10
[   10.973768]  ret_from_fork_asm+0x1a/0x30
[   10.973798]  </TASK>
[   10.973808] 
[   10.987048] Allocated by task 159:
[   10.987455]  kasan_save_stack+0x45/0x70
[   10.987868]  kasan_save_track+0x18/0x40
[   10.988332]  kasan_save_alloc_info+0x3b/0x50
[   10.988554]  __kasan_kmalloc+0xb7/0xc0
[   10.988689]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.988868]  kmalloc_track_caller_oob_right+0x19a/0x520
[   10.989317]  kunit_try_run_case+0x1a5/0x480
[   10.989710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.990274]  kthread+0x337/0x6f0
[   10.990597]  ret_from_fork+0x116/0x1d0
[   10.991235]  ret_from_fork_asm+0x1a/0x30
[   10.991657] 
[   10.991830] The buggy address belongs to the object at ffff888102ef5700
[   10.991830]  which belongs to the cache kmalloc-128 of size 128
[   10.992567] The buggy address is located 0 bytes to the right of
[   10.992567]  allocated 120-byte region [ffff888102ef5700, ffff888102ef5778)
[   10.992949] 
[   10.993155] The buggy address belongs to the physical page:
[   10.993646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5
[   10.994398] flags: 0x200000000000000(node=0|zone=2)
[   10.994957] page_type: f5(slab)
[   10.995307] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.996044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.996826] page dumped because: kasan: bad access detected
[   10.997208] 
[   10.997280] Memory state around the buggy address:
[   10.997450]  ffff888102ef5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.997783]  ffff888102ef5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.998408] >ffff888102ef5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.999122]                                                                 ^
[   11.000188]  ffff888102ef5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.000957]  ffff888102ef5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.001394] ==================================================================
[   10.939238] ==================================================================
[   10.939943] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.940637] Write of size 1 at addr ffff888102ef5678 by task kunit_try_catch/159
[   10.941326] 
[   10.941516] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.941564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.941576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.941597] Call Trace:
[   10.941610]  <TASK>
[   10.941627]  dump_stack_lvl+0x73/0xb0
[   10.941722]  print_report+0xd1/0x650
[   10.941747]  ? __virt_addr_valid+0x1db/0x2d0
[   10.941770]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.941793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.941813]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.941837]  kasan_report+0x141/0x180
[   10.941857]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.941885]  __asan_report_store1_noabort+0x1b/0x30
[   10.941904]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.941927]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.941953]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.942007]  kunit_try_run_case+0x1a5/0x480
[   10.942031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.942052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.942075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.942096]  ? __kthread_parkme+0x82/0x180
[   10.942116]  ? preempt_count_sub+0x50/0x80
[   10.942140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.942161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.942183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.942204]  kthread+0x337/0x6f0
[   10.942223]  ? trace_preempt_on+0x20/0xc0
[   10.942245]  ? __pfx_kthread+0x10/0x10
[   10.942264]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.942284]  ? calculate_sigpending+0x7b/0xa0
[   10.942307]  ? __pfx_kthread+0x10/0x10
[   10.942326]  ret_from_fork+0x116/0x1d0
[   10.942345]  ? __pfx_kthread+0x10/0x10
[   10.942364]  ret_from_fork_asm+0x1a/0x30
[   10.942406]  </TASK>
[   10.942417] 
[   10.955436] Allocated by task 159:
[   10.955716]  kasan_save_stack+0x45/0x70
[   10.955876]  kasan_save_track+0x18/0x40
[   10.956172]  kasan_save_alloc_info+0x3b/0x50
[   10.956562]  __kasan_kmalloc+0xb7/0xc0
[   10.957017]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.957512]  kmalloc_track_caller_oob_right+0x99/0x520
[   10.957927]  kunit_try_run_case+0x1a5/0x480
[   10.958229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.958416]  kthread+0x337/0x6f0
[   10.958538]  ret_from_fork+0x116/0x1d0
[   10.958818]  ret_from_fork_asm+0x1a/0x30
[   10.959220] 
[   10.959395] The buggy address belongs to the object at ffff888102ef5600
[   10.959395]  which belongs to the cache kmalloc-128 of size 128
[   10.960809] The buggy address is located 0 bytes to the right of
[   10.960809]  allocated 120-byte region [ffff888102ef5600, ffff888102ef5678)
[   10.962039] 
[   10.962122] The buggy address belongs to the physical page:
[   10.962296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5
[   10.962969] flags: 0x200000000000000(node=0|zone=2)
[   10.963420] page_type: f5(slab)
[   10.963732] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.964475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.965516] page dumped because: kasan: bad access detected
[   10.966108] 
[   10.966266] Memory state around the buggy address:
[   10.966627]  ffff888102ef5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.967014]  ffff888102ef5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.967714] >ffff888102ef5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.967962]                                                                 ^
[   10.968626]  ffff888102ef5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.969341]  ffff888102ef5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.969579] ==================================================================