Hay
Date
July 6, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.822371] ==================================================================
[   17.822417] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   17.822470] Write of size 1 at addr fff00000c1cf4978 by task kunit_try_catch/142
[   17.822519] 
[   17.822548] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.822628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.822655] Hardware name: linux,dummy-virt (DT)
[   17.822753] Call trace:
[   17.822801]  show_stack+0x20/0x38 (C)
[   17.822866]  dump_stack_lvl+0x8c/0xd0
[   17.822913]  print_report+0x118/0x608
[   17.822958]  kasan_report+0xdc/0x128
[   17.823003]  __asan_report_store1_noabort+0x20/0x30
[   17.823050]  kmalloc_track_caller_oob_right+0x418/0x488
[   17.823100]  kunit_try_run_case+0x170/0x3f0
[   17.823147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.823211]  kthread+0x328/0x630
[   17.823252]  ret_from_fork+0x10/0x20
[   17.823298] 
[   17.823460] Allocated by task 142:
[   17.823561]  kasan_save_stack+0x3c/0x68
[   17.823605]  kasan_save_track+0x20/0x40
[   17.823641]  kasan_save_alloc_info+0x40/0x58
[   17.823688]  __kasan_kmalloc+0xd4/0xd8
[   17.823739]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.823782]  kmalloc_track_caller_oob_right+0x184/0x488
[   17.823840]  kunit_try_run_case+0x170/0x3f0
[   17.823926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.823971]  kthread+0x328/0x630
[   17.824005]  ret_from_fork+0x10/0x20
[   17.824093] 
[   17.824162] The buggy address belongs to the object at fff00000c1cf4900
[   17.824162]  which belongs to the cache kmalloc-128 of size 128
[   17.824232] The buggy address is located 0 bytes to the right of
[   17.824232]  allocated 120-byte region [fff00000c1cf4900, fff00000c1cf4978)
[   17.824295] 
[   17.824464] The buggy address belongs to the physical page:
[   17.824493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   17.824711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.824772] page_type: f5(slab)
[   17.824850] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.824917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.824974] page dumped because: kasan: bad access detected
[   17.825020] 
[   17.825074] Memory state around the buggy address:
[   17.825132]  fff00000c1cf4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.825175]  fff00000c1cf4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.825360] >fff00000c1cf4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.825398]                                                                 ^
[   17.825436]  fff00000c1cf4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.825589]  fff00000c1cf4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.825738] ==================================================================
[   17.818719] ==================================================================
[   17.818786] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.818839] Write of size 1 at addr fff00000c1cf4878 by task kunit_try_catch/142
[   17.818887] 
[   17.818925] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.819005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.819031] Hardware name: linux,dummy-virt (DT)
[   17.819061] Call trace:
[   17.819082]  show_stack+0x20/0x38 (C)
[   17.819129]  dump_stack_lvl+0x8c/0xd0
[   17.819174]  print_report+0x118/0x608
[   17.819235]  kasan_report+0xdc/0x128
[   17.819280]  __asan_report_store1_noabort+0x20/0x30
[   17.819339]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.819392]  kunit_try_run_case+0x170/0x3f0
[   17.819439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.819501]  kthread+0x328/0x630
[   17.819544]  ret_from_fork+0x10/0x20
[   17.819592] 
[   17.819609] Allocated by task 142:
[   17.819637]  kasan_save_stack+0x3c/0x68
[   17.819685]  kasan_save_track+0x20/0x40
[   17.819722]  kasan_save_alloc_info+0x40/0x58
[   17.819769]  __kasan_kmalloc+0xd4/0xd8
[   17.819805]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.819848]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.819888]  kunit_try_run_case+0x170/0x3f0
[   17.819926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.819968]  kthread+0x328/0x630
[   17.819999]  ret_from_fork+0x10/0x20
[   17.820042] 
[   17.820061] The buggy address belongs to the object at fff00000c1cf4800
[   17.820061]  which belongs to the cache kmalloc-128 of size 128
[   17.820115] The buggy address is located 0 bytes to the right of
[   17.820115]  allocated 120-byte region [fff00000c1cf4800, fff00000c1cf4878)
[   17.820176] 
[   17.820205] The buggy address belongs to the physical page:
[   17.820234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   17.820284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.820328] page_type: f5(slab)
[   17.820365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.820413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.820452] page dumped because: kasan: bad access detected
[   17.820481] 
[   17.820498] Memory state around the buggy address:
[   17.820528]  fff00000c1cf4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.820649]  fff00000c1cf4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.821017] >fff00000c1cf4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.821075]                                                                 ^
[   17.821214]  fff00000c1cf4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.821307]  fff00000c1cf4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.821346] ==================================================================

[   10.990118] ==================================================================
[   10.991238] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.991758] Write of size 1 at addr ffff888102b0e678 by task kunit_try_catch/159
[   10.992459] 
[   10.992794] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.992849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.992862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.992885] Call Trace:
[   10.992899]  <TASK>
[   10.992920]  dump_stack_lvl+0x73/0xb0
[   10.992968]  print_report+0xd1/0x650
[   10.992991]  ? __virt_addr_valid+0x1db/0x2d0
[   10.993016]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.993039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.993062]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.993086]  kasan_report+0x141/0x180
[   10.993107]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.993136]  __asan_report_store1_noabort+0x1b/0x30
[   10.993155]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.993179]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.993204]  ? __schedule+0x10cc/0x2b60
[   10.993227]  ? __pfx_read_tsc+0x10/0x10
[   10.993248]  ? ktime_get_ts64+0x86/0x230
[   10.993273]  kunit_try_run_case+0x1a5/0x480
[   10.993298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.993320]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.993344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.993366]  ? __kthread_parkme+0x82/0x180
[   10.993387]  ? preempt_count_sub+0x50/0x80
[   10.993411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.993434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.993456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.993477]  kthread+0x337/0x6f0
[   10.993496]  ? trace_preempt_on+0x20/0xc0
[   10.993520]  ? __pfx_kthread+0x10/0x10
[   10.993540]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.993560]  ? calculate_sigpending+0x7b/0xa0
[   10.993584]  ? __pfx_kthread+0x10/0x10
[   10.993604]  ret_from_fork+0x116/0x1d0
[   10.993622]  ? __pfx_kthread+0x10/0x10
[   10.993641]  ret_from_fork_asm+0x1a/0x30
[   10.993672]  </TASK>
[   10.993695] 
[   11.006352] Allocated by task 159:
[   11.006721]  kasan_save_stack+0x45/0x70
[   11.007139]  kasan_save_track+0x18/0x40
[   11.007348]  kasan_save_alloc_info+0x3b/0x50
[   11.007597]  __kasan_kmalloc+0xb7/0xc0
[   11.008003]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.008673]  kmalloc_track_caller_oob_right+0x99/0x520
[   11.009206]  kunit_try_run_case+0x1a5/0x480
[   11.009572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.009748]  kthread+0x337/0x6f0
[   11.009868]  ret_from_fork+0x116/0x1d0
[   11.010009]  ret_from_fork_asm+0x1a/0x30
[   11.010188] 
[   11.010282] The buggy address belongs to the object at ffff888102b0e600
[   11.010282]  which belongs to the cache kmalloc-128 of size 128
[   11.010855] The buggy address is located 0 bytes to the right of
[   11.010855]  allocated 120-byte region [ffff888102b0e600, ffff888102b0e678)
[   11.011334] 
[   11.011412] The buggy address belongs to the physical page:
[   11.011666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0e
[   11.012009] flags: 0x200000000000000(node=0|zone=2)
[   11.012373] page_type: f5(slab)
[   11.012611] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.012856] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.013252] page dumped because: kasan: bad access detected
[   11.013534] 
[   11.013665] Memory state around the buggy address:
[   11.013819]  ffff888102b0e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.014153]  ffff888102b0e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.014435] >ffff888102b0e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.014884]                                                                 ^
[   11.015118]  ffff888102b0e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.015452]  ffff888102b0e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.015720] ==================================================================
[   11.016856] ==================================================================
[   11.017631] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.018247] Write of size 1 at addr ffff888102b0e778 by task kunit_try_catch/159
[   11.018721] 
[   11.018853] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.018896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.018907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.018938] Call Trace:
[   11.018951]  <TASK>
[   11.018965]  dump_stack_lvl+0x73/0xb0
[   11.018993]  print_report+0xd1/0x650
[   11.019015]  ? __virt_addr_valid+0x1db/0x2d0
[   11.019036]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.019060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.019082]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.019112]  kasan_report+0x141/0x180
[   11.019133]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.019173]  __asan_report_store1_noabort+0x1b/0x30
[   11.019193]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.019217]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.019253]  ? __schedule+0x10cc/0x2b60
[   11.019275]  ? __pfx_read_tsc+0x10/0x10
[   11.019296]  ? ktime_get_ts64+0x86/0x230
[   11.019319]  kunit_try_run_case+0x1a5/0x480
[   11.019344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.019366]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.019387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.019409]  ? __kthread_parkme+0x82/0x180
[   11.019428]  ? preempt_count_sub+0x50/0x80
[   11.019451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.019474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.019505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.019527]  kthread+0x337/0x6f0
[   11.019546]  ? trace_preempt_on+0x20/0xc0
[   11.019627]  ? __pfx_kthread+0x10/0x10
[   11.019647]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.019667]  ? calculate_sigpending+0x7b/0xa0
[   11.019690]  ? __pfx_kthread+0x10/0x10
[   11.019711]  ret_from_fork+0x116/0x1d0
[   11.019729]  ? __pfx_kthread+0x10/0x10
[   11.019748]  ret_from_fork_asm+0x1a/0x30
[   11.019778]  </TASK>
[   11.019789] 
[   11.028254] Allocated by task 159:
[   11.028434]  kasan_save_stack+0x45/0x70
[   11.028711]  kasan_save_track+0x18/0x40
[   11.028899]  kasan_save_alloc_info+0x3b/0x50
[   11.029163]  __kasan_kmalloc+0xb7/0xc0
[   11.029353]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.029702]  kmalloc_track_caller_oob_right+0x19a/0x520
[   11.029969]  kunit_try_run_case+0x1a5/0x480
[   11.030290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.030616]  kthread+0x337/0x6f0
[   11.030778]  ret_from_fork+0x116/0x1d0
[   11.031114]  ret_from_fork_asm+0x1a/0x30
[   11.031299] 
[   11.031400] The buggy address belongs to the object at ffff888102b0e700
[   11.031400]  which belongs to the cache kmalloc-128 of size 128
[   11.031861] The buggy address is located 0 bytes to the right of
[   11.031861]  allocated 120-byte region [ffff888102b0e700, ffff888102b0e778)
[   11.032403] 
[   11.032500] The buggy address belongs to the physical page:
[   11.032822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0e
[   11.033304] flags: 0x200000000000000(node=0|zone=2)
[   11.033627] page_type: f5(slab)
[   11.033825] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.034102] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.034396] page dumped because: kasan: bad access detected
[   11.034819] 
[   11.034912] Memory state around the buggy address:
[   11.035099]  ffff888102b0e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.035442]  ffff888102b0e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.035804] >ffff888102b0e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.036031]                                                                 ^
[   11.036385]  ffff888102b0e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.036850]  ffff888102b0e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.037298] ==================================================================