Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.049487] ==================================================================
[   19.049546] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   19.049599] Write of size 1 at addr fff00000c6343778 by task kunit_try_catch/142
[   19.049646] 
[   19.049676] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.049763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.049795] Hardware name: linux,dummy-virt (DT)
[   19.049825] Call trace:
[   19.049846]  show_stack+0x20/0x38 (C)
[   19.049893]  dump_stack_lvl+0x8c/0xd0
[   19.049941]  print_report+0x118/0x608
[   19.049995]  kasan_report+0xdc/0x128
[   19.050041]  __asan_report_store1_noabort+0x20/0x30
[   19.050092]  kmalloc_track_caller_oob_right+0x40c/0x488
[   19.050150]  kunit_try_run_case+0x170/0x3f0
[   19.050674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.051112]  kthread+0x328/0x630
[   19.051503]  ret_from_fork+0x10/0x20
[   19.051579] 
[   19.051599] Allocated by task 142:
[   19.051657]  kasan_save_stack+0x3c/0x68
[   19.051701]  kasan_save_track+0x20/0x40
[   19.051756]  kasan_save_alloc_info+0x40/0x58
[   19.052206]  __kasan_kmalloc+0xd4/0xd8
[   19.052368]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.052633]  kmalloc_track_caller_oob_right+0xa8/0x488
[   19.052763]  kunit_try_run_case+0x170/0x3f0
[   19.053026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.053098]  kthread+0x328/0x630
[   19.053165]  ret_from_fork+0x10/0x20
[   19.053495] 
[   19.053556] The buggy address belongs to the object at fff00000c6343700
[   19.053556]  which belongs to the cache kmalloc-128 of size 128
[   19.053670] The buggy address is located 0 bytes to the right of
[   19.053670]  allocated 120-byte region [fff00000c6343700, fff00000c6343778)
[   19.053791] 
[   19.053870] The buggy address belongs to the physical page:
[   19.053983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   19.054086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.054242] page_type: f5(slab)
[   19.054325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.054693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.054768] page dumped because: kasan: bad access detected
[   19.054873] 
[   19.054900] Memory state around the buggy address:
[   19.054932]  fff00000c6343600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.055012]  fff00000c6343680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.055233] >fff00000c6343700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.055312]                                                                 ^
[   19.055538]  fff00000c6343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.055891]  fff00000c6343800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.055963] ==================================================================
[   19.057572] ==================================================================
[   19.058012] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   19.058077] Write of size 1 at addr fff00000c6343878 by task kunit_try_catch/142
[   19.058342] 
[   19.058510] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.058598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.058624] Hardware name: linux,dummy-virt (DT)
[   19.058847] Call trace:
[   19.058884]  show_stack+0x20/0x38 (C)
[   19.058940]  dump_stack_lvl+0x8c/0xd0
[   19.058995]  print_report+0x118/0x608
[   19.059196]  kasan_report+0xdc/0x128
[   19.059526]  __asan_report_store1_noabort+0x20/0x30
[   19.059618]  kmalloc_track_caller_oob_right+0x418/0x488
[   19.059780]  kunit_try_run_case+0x170/0x3f0
[   19.059831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.059882]  kthread+0x328/0x630
[   19.060096]  ret_from_fork+0x10/0x20
[   19.060425] 
[   19.060499] Allocated by task 142:
[   19.060601]  kasan_save_stack+0x3c/0x68
[   19.060681]  kasan_save_track+0x20/0x40
[   19.060886]  kasan_save_alloc_info+0x40/0x58
[   19.061051]  __kasan_kmalloc+0xd4/0xd8
[   19.061454]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.061790]  kmalloc_track_caller_oob_right+0x184/0x488
[   19.061847]  kunit_try_run_case+0x170/0x3f0
[   19.061988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.062622]  kthread+0x328/0x630
[   19.062772]  ret_from_fork+0x10/0x20
[   19.062965] 
[   19.063143] The buggy address belongs to the object at fff00000c6343800
[   19.063143]  which belongs to the cache kmalloc-128 of size 128
[   19.063349] The buggy address is located 0 bytes to the right of
[   19.063349]  allocated 120-byte region [fff00000c6343800, fff00000c6343878)
[   19.063418] 
[   19.063647] The buggy address belongs to the physical page:
[   19.063841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   19.063990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.064040] page_type: f5(slab)
[   19.064097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.064363] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.064514] page dumped because: kasan: bad access detected
[   19.064598] 
[   19.064618] Memory state around the buggy address:
[   19.064649]  fff00000c6343700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.064867]  fff00000c6343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.065035] >fff00000c6343800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.065099]                                                                 ^
[   19.065202]  fff00000c6343880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.065269]  fff00000c6343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.065306] ==================================================================

[   11.888372] ==================================================================
[   11.889036] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.889294] Write of size 1 at addr ffff888102662b78 by task kunit_try_catch/160
[   11.889514] 
[   11.889610] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.889650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.889661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.889680] Call Trace:
[   11.889691]  <TASK>
[   11.889711]  dump_stack_lvl+0x73/0xb0
[   11.889739]  print_report+0xd1/0x650
[   11.889760]  ? __virt_addr_valid+0x1db/0x2d0
[   11.889781]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.889805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.889826]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.889849]  kasan_report+0x141/0x180
[   11.889870]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.889899]  __asan_report_store1_noabort+0x1b/0x30
[   11.889922]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.889946]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.889971]  ? __schedule+0x10cc/0x2b60
[   11.889991]  ? __pfx_read_tsc+0x10/0x10
[   11.890010]  ? ktime_get_ts64+0x86/0x230
[   11.890033]  kunit_try_run_case+0x1a5/0x480
[   11.890056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.890076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.890098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.890120]  ? __kthread_parkme+0x82/0x180
[   11.890139]  ? preempt_count_sub+0x50/0x80
[   11.890162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.890184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.890206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.890229]  kthread+0x337/0x6f0
[   11.890246]  ? trace_preempt_on+0x20/0xc0
[   11.890268]  ? __pfx_kthread+0x10/0x10
[   11.890287]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.890307]  ? calculate_sigpending+0x7b/0xa0
[   11.890330]  ? __pfx_kthread+0x10/0x10
[   11.890350]  ret_from_fork+0x116/0x1d0
[   11.890367]  ? __pfx_kthread+0x10/0x10
[   11.890386]  ret_from_fork_asm+0x1a/0x30
[   11.890416]  </TASK>
[   11.890425] 
[   11.906204] Allocated by task 160:
[   11.906382]  kasan_save_stack+0x45/0x70
[   11.906725]  kasan_save_track+0x18/0x40
[   11.907217]  kasan_save_alloc_info+0x3b/0x50
[   11.907428]  __kasan_kmalloc+0xb7/0xc0
[   11.907789]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.908408]  kmalloc_track_caller_oob_right+0x99/0x520
[   11.908827]  kunit_try_run_case+0x1a5/0x480
[   11.909327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.909765]  kthread+0x337/0x6f0
[   11.910054]  ret_from_fork+0x116/0x1d0
[   11.910237]  ret_from_fork_asm+0x1a/0x30
[   11.910425] 
[   11.910707] The buggy address belongs to the object at ffff888102662b00
[   11.910707]  which belongs to the cache kmalloc-128 of size 128
[   11.911332] The buggy address is located 0 bytes to the right of
[   11.911332]  allocated 120-byte region [ffff888102662b00, ffff888102662b78)
[   11.912236] 
[   11.912352] The buggy address belongs to the physical page:
[   11.912849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   11.913565] flags: 0x200000000000000(node=0|zone=2)
[   11.913810] page_type: f5(slab)
[   11.914149] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.914835] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.915325] page dumped because: kasan: bad access detected
[   11.915797] 
[   11.915900] Memory state around the buggy address:
[   11.916256]  ffff888102662a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.916693]  ffff888102662a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.917127] >ffff888102662b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.917640]                                                                 ^
[   11.918092]  ffff888102662b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.918633]  ffff888102662c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.919063] ==================================================================
[   11.919775] ==================================================================
[   11.920024] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.920429] Write of size 1 at addr ffff888102662c78 by task kunit_try_catch/160
[   11.920803] 
[   11.920914] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.920954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.920965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.920983] Call Trace:
[   11.920994]  <TASK>
[   11.921007]  dump_stack_lvl+0x73/0xb0
[   11.921034]  print_report+0xd1/0x650
[   11.921055]  ? __virt_addr_valid+0x1db/0x2d0
[   11.921077]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.921117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.921140]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.921167]  kasan_report+0x141/0x180
[   11.921188]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.921218]  __asan_report_store1_noabort+0x1b/0x30
[   11.921245]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.921270]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.921297]  ? __schedule+0x10cc/0x2b60
[   11.921319]  ? __pfx_read_tsc+0x10/0x10
[   11.921338]  ? ktime_get_ts64+0x86/0x230
[   11.921363]  kunit_try_run_case+0x1a5/0x480
[   11.921387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.921409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.921432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.921455]  ? __kthread_parkme+0x82/0x180
[   11.921475]  ? preempt_count_sub+0x50/0x80
[   11.921499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.921523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.921546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.921570]  kthread+0x337/0x6f0
[   11.921589]  ? trace_preempt_on+0x20/0xc0
[   11.921621]  ? __pfx_kthread+0x10/0x10
[   11.921641]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.921662]  ? calculate_sigpending+0x7b/0xa0
[   11.921685]  ? __pfx_kthread+0x10/0x10
[   11.921712]  ret_from_fork+0x116/0x1d0
[   11.921730]  ? __pfx_kthread+0x10/0x10
[   11.921750]  ret_from_fork_asm+0x1a/0x30
[   11.921780]  </TASK>
[   11.921790] 
[   11.929539] Allocated by task 160:
[   11.929744]  kasan_save_stack+0x45/0x70
[   11.929969]  kasan_save_track+0x18/0x40
[   11.930317]  kasan_save_alloc_info+0x3b/0x50
[   11.930517]  __kasan_kmalloc+0xb7/0xc0
[   11.930693]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.930937]  kmalloc_track_caller_oob_right+0x19a/0x520
[   11.931162]  kunit_try_run_case+0x1a5/0x480
[   11.931415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.931590]  kthread+0x337/0x6f0
[   11.931717]  ret_from_fork+0x116/0x1d0
[   11.931847]  ret_from_fork_asm+0x1a/0x30
[   11.932033] 
[   11.932126] The buggy address belongs to the object at ffff888102662c00
[   11.932126]  which belongs to the cache kmalloc-128 of size 128
[   11.932736] The buggy address is located 0 bytes to the right of
[   11.932736]  allocated 120-byte region [ffff888102662c00, ffff888102662c78)
[   11.933127] 
[   11.933221] The buggy address belongs to the physical page:
[   11.933470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   11.934014] flags: 0x200000000000000(node=0|zone=2)
[   11.934249] page_type: f5(slab)
[   11.934396] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.934707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.935044] page dumped because: kasan: bad access detected
[   11.935273] 
[   11.935341] Memory state around the buggy address:
[   11.935575]  ffff888102662b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.935858]  ffff888102662b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.936209] >ffff888102662c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.936428]                                                                 ^
[   11.936720]  ffff888102662c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.937144]  ffff888102662d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.937353] ==================================================================