Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.684351] ==================================================================
[   16.684417] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.684480] Write of size 1 at addr fff00000c653200a by task kunit_try_catch/147
[   16.684537] 
[   16.684605] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.684722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.684747] Hardware name: linux,dummy-virt (DT)
[   16.684776] Call trace:
[   16.684814]  show_stack+0x20/0x38 (C)
[   16.684943]  dump_stack_lvl+0x8c/0xd0
[   16.685030]  print_report+0x118/0x608
[   16.685090]  kasan_report+0xdc/0x128
[   16.685134]  __asan_report_store1_noabort+0x20/0x30
[   16.685193]  kmalloc_large_oob_right+0x278/0x2b8
[   16.685249]  kunit_try_run_case+0x170/0x3f0
[   16.685294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.685353]  kthread+0x328/0x630
[   16.685392]  ret_from_fork+0x10/0x20
[   16.685445] 
[   16.685488] The buggy address belongs to the physical page:
[   16.685520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   16.685570] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.685621] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.685677] page_type: f8(unknown)
[   16.685713] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.685809] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.685911] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.686067] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.686211] head: 0bfffe0000000002 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff
[   16.686304] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.686418] page dumped because: kasan: bad access detected
[   16.686477] 
[   16.686528] Memory state around the buggy address:
[   16.686961]  fff00000c6531f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.687021]  fff00000c6531f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.687062] >fff00000c6532000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.687098]                       ^
[   16.687126]  fff00000c6532080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.687166]  fff00000c6532100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.687202] ==================================================================

[   16.618531] ==================================================================
[   16.618628] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.618977] Write of size 1 at addr fff00000c770a00a by task kunit_try_catch/147
[   16.619029] 
[   16.619060] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.619140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.619164] Hardware name: linux,dummy-virt (DT)
[   16.619193] Call trace:
[   16.619224]  show_stack+0x20/0x38 (C)
[   16.619388]  dump_stack_lvl+0x8c/0xd0
[   16.619452]  print_report+0x118/0x608
[   16.619498]  kasan_report+0xdc/0x128
[   16.619596]  __asan_report_store1_noabort+0x20/0x30
[   16.619645]  kmalloc_large_oob_right+0x278/0x2b8
[   16.619690]  kunit_try_run_case+0x170/0x3f0
[   16.620100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.620265]  kthread+0x328/0x630
[   16.620332]  ret_from_fork+0x10/0x20
[   16.620379] 
[   16.620416] The buggy address belongs to the physical page:
[   16.620447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107708
[   16.620509] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.620556] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.621080] page_type: f8(unknown)
[   16.621126] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.621174] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.621222] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.621268] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.621315] head: 0bfffe0000000002 ffffc1ffc31dc201 00000000ffffffff 00000000ffffffff
[   16.621513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.621712] page dumped because: kasan: bad access detected
[   16.621743] 
[   16.621760] Memory state around the buggy address:
[   16.621792]  fff00000c7709f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.621838]  fff00000c7709f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.622040] >fff00000c770a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.622078]                       ^
[   16.622105]  fff00000c770a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.622145]  fff00000c770a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.622181] ==================================================================

[   12.695959] ==================================================================
[   12.696416] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   12.697028] Write of size 1 at addr ffff88810263e00a by task kunit_try_catch/164
[   12.697558] 
[   12.697800] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.697877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.697899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.697939] Call Trace:
[   12.697966]  <TASK>
[   12.697996]  dump_stack_lvl+0x73/0xb0
[   12.698058]  print_report+0xd1/0x650
[   12.698097]  ? __virt_addr_valid+0x1db/0x2d0
[   12.698131]  ? kmalloc_large_oob_right+0x2e9/0x330
[   12.698151]  ? kasan_addr_to_slab+0x11/0xa0
[   12.698169]  ? kmalloc_large_oob_right+0x2e9/0x330
[   12.698189]  kasan_report+0x141/0x180
[   12.698208]  ? kmalloc_large_oob_right+0x2e9/0x330
[   12.698233]  __asan_report_store1_noabort+0x1b/0x30
[   12.698268]  kmalloc_large_oob_right+0x2e9/0x330
[   12.698290]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   12.698312]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   12.698336]  kunit_try_run_case+0x1a5/0x480
[   12.698359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.698379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.698401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.698421]  ? __kthread_parkme+0x82/0x180
[   12.698441]  ? preempt_count_sub+0x50/0x80
[   12.698464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.698486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.698550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.698584]  kthread+0x337/0x6f0
[   12.698638]  ? trace_preempt_on+0x20/0xc0
[   12.698676]  ? __pfx_kthread+0x10/0x10
[   12.698711]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.698747]  ? calculate_sigpending+0x7b/0xa0
[   12.698790]  ? __pfx_kthread+0x10/0x10
[   12.698830]  ret_from_fork+0x116/0x1d0
[   12.698866]  ? __pfx_kthread+0x10/0x10
[   12.698905]  ret_from_fork_asm+0x1a/0x30
[   12.698967]  </TASK>
[   12.698991] 
[   12.710992] The buggy address belongs to the physical page:
[   12.711786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10263c
[   12.712648] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.712981] flags: 0x200000000000040(head|node=0|zone=2)
[   12.713338] page_type: f8(unknown)
[   12.713824] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.714066] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.714823] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.715462] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.715892] head: 0200000000000002 ffffea0004098f01 00000000ffffffff 00000000ffffffff
[   12.716678] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.717002] page dumped because: kasan: bad access detected
[   12.717456] 
[   12.717964] Memory state around the buggy address:
[   12.718311]  ffff88810263df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.718532]  ffff88810263df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.718863] >ffff88810263e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.719668]                       ^
[   12.719937]  ffff88810263e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.720148]  ffff88810263e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.721041] ==================================================================

[   12.952398] ==================================================================
[   12.953416] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   12.953686] Write of size 1 at addr ffff8881029ea00a by task kunit_try_catch/163
[   12.955396] 
[   12.955799] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.955847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.955858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.955879] Call Trace:
[   12.955892]  <TASK>
[   12.955906]  dump_stack_lvl+0x73/0xb0
[   12.955934]  print_report+0xd1/0x650
[   12.955956]  ? __virt_addr_valid+0x1db/0x2d0
[   12.955978]  ? kmalloc_large_oob_right+0x2e9/0x330
[   12.955998]  ? kasan_addr_to_slab+0x11/0xa0
[   12.956018]  ? kmalloc_large_oob_right+0x2e9/0x330
[   12.956039]  kasan_report+0x141/0x180
[   12.956073]  ? kmalloc_large_oob_right+0x2e9/0x330
[   12.956100]  __asan_report_store1_noabort+0x1b/0x30
[   12.956123]  kmalloc_large_oob_right+0x2e9/0x330
[   12.956144]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   12.956166]  ? __schedule+0x10cc/0x2b60
[   12.956187]  ? __pfx_read_tsc+0x10/0x10
[   12.956208]  ? ktime_get_ts64+0x86/0x230
[   12.956233]  kunit_try_run_case+0x1a5/0x480
[   12.956256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.956277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.956299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.956321]  ? __kthread_parkme+0x82/0x180
[   12.956340]  ? preempt_count_sub+0x50/0x80
[   12.956363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.956385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.956407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.956428]  kthread+0x337/0x6f0
[   12.956447]  ? trace_preempt_on+0x20/0xc0
[   12.956470]  ? __pfx_kthread+0x10/0x10
[   12.956490]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.956510]  ? calculate_sigpending+0x7b/0xa0
[   12.956533]  ? __pfx_kthread+0x10/0x10
[   12.956553]  ret_from_fork+0x116/0x1d0
[   12.956571]  ? __pfx_kthread+0x10/0x10
[   12.956591]  ret_from_fork_asm+0x1a/0x30
[   12.956621]  </TASK>
[   12.956632] 
[   12.976060] The buggy address belongs to the physical page:
[   12.976333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8
[   12.976680] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.977034] flags: 0x200000000000040(head|node=0|zone=2)
[   12.977423] page_type: f8(unknown)
[   12.977573] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.978047] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.978448] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.978980] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.979349] head: 0200000000000002 ffffea00040a7a01 00000000ffffffff 00000000ffffffff
[   12.979691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.980159] page dumped because: kasan: bad access detected
[   12.980380] 
[   12.980484] Memory state around the buggy address:
[   12.980807]  ffff8881029e9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.981128]  ffff8881029e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.981470] >ffff8881029ea000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.981892]                       ^
[   12.982111]  ffff8881029ea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.982446]  ffff8881029ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.982883] ==================================================================

[   16.393939] ==================================================================
[   16.405271] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   16.412758] Write of size 1 at addr ffff888104ffa00a by task kunit_try_catch/187
[   16.420159] 
[   16.421659] CPU: 3 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.421668] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   16.421670] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   16.421674] Call Trace:
[   16.421676]  <TASK>
[   16.421678]  dump_stack_lvl+0x73/0xb0
[   16.421682]  print_report+0xd1/0x650
[   16.421686]  ? __virt_addr_valid+0x1db/0x2d0
[   16.421690]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.421694]  ? kasan_addr_to_slab+0x11/0xa0
[   16.421698]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.421702]  kasan_report+0x141/0x180
[   16.421706]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.421710]  __asan_report_store1_noabort+0x1b/0x30
[   16.421715]  kmalloc_large_oob_right+0x2e9/0x330
[   16.421719]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   16.421723]  ? __schedule+0x10cc/0x2b60
[   16.421727]  ? ktime_get_ts64+0x83/0x230
[   16.421731]  kunit_try_run_case+0x1a2/0x480
[   16.421736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.421740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.421744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.421748]  ? __kthread_parkme+0x82/0x180
[   16.421752]  ? preempt_count_sub+0x50/0x80
[   16.421756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.421760]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.421764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.421768]  kthread+0x334/0x6f0
[   16.421772]  ? trace_preempt_on+0x20/0xc0
[   16.421776]  ? __pfx_kthread+0x10/0x10
[   16.421780]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.421783]  ? calculate_sigpending+0x7b/0xa0
[   16.421788]  ? __pfx_kthread+0x10/0x10
[   16.421792]  ret_from_fork+0x113/0x1d0
[   16.421795]  ? __pfx_kthread+0x10/0x10
[   16.421799]  ret_from_fork_asm+0x1a/0x30
[   16.421804]  </TASK>
[   16.421806] 
[   16.588102] The buggy address belongs to the physical page:
[   16.593674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8
[   16.601683] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.609361] flags: 0x200000000000040(head|node=0|zone=2)
[   16.614723] page_type: f8(unknown)
[   16.618133] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.625878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.633618] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.641446] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.649280] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff
[   16.657114] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.664937] page dumped because: kasan: bad access detected
[   16.670510] 
[   16.672004] Memory state around the buggy address:
[   16.676794]  ffff888104ff9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.684013]  ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.691235] >ffff888104ffa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.698453]                       ^
[   16.701945]  ffff888104ffa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.709164]  ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.716412] ==================================================================