Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.812841] ==================================================================
[   16.812906] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   16.813201] Write of size 16 at addr fff00000c1376ba0 by task kunit_try_catch/167
[   16.813265] 
[   16.813746] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.813970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.814002] Hardware name: linux,dummy-virt (DT)
[   16.814054] Call trace:
[   16.814075]  show_stack+0x20/0x38 (C)
[   16.814325]  dump_stack_lvl+0x8c/0xd0
[   16.814393]  print_report+0x118/0x608
[   16.814438]  kasan_report+0xdc/0x128
[   16.814664]  __asan_report_store16_noabort+0x20/0x30
[   16.814835]  kmalloc_oob_16+0x3a0/0x3f8
[   16.814878]  kunit_try_run_case+0x170/0x3f0
[   16.814935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.814985]  kthread+0x328/0x630
[   16.815025]  ret_from_fork+0x10/0x20
[   16.815071] 
[   16.815088] Allocated by task 167:
[   16.815115]  kasan_save_stack+0x3c/0x68
[   16.815153]  kasan_save_track+0x20/0x40
[   16.815189]  kasan_save_alloc_info+0x40/0x58
[   16.815227]  __kasan_kmalloc+0xd4/0xd8
[   16.815261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.815298]  kmalloc_oob_16+0xb4/0x3f8
[   16.815333]  kunit_try_run_case+0x170/0x3f0
[   16.815369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.815731]  kthread+0x328/0x630
[   16.815781]  ret_from_fork+0x10/0x20
[   16.815827] 
[   16.815932] The buggy address belongs to the object at fff00000c1376ba0
[   16.815932]  which belongs to the cache kmalloc-16 of size 16
[   16.816074] The buggy address is located 0 bytes inside of
[   16.816074]  allocated 13-byte region [fff00000c1376ba0, fff00000c1376bad)
[   16.816196] 
[   16.816217] The buggy address belongs to the physical page:
[   16.816245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376
[   16.816618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.816803] page_type: f5(slab)
[   16.816889] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.816949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.816987] page dumped because: kasan: bad access detected
[   16.817184] 
[   16.817210] Memory state around the buggy address:
[   16.817242]  fff00000c1376a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.817624]  fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.817692] >fff00000c1376b80: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   16.817760]                                   ^
[   16.817793]  fff00000c1376c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.817899]  fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.817946] ==================================================================

[   13.315189] ==================================================================
[   13.315670] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   13.316423] Write of size 16 at addr ffff8881024eb3e0 by task kunit_try_catch/184
[   13.316820] 
[   13.317369] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.317442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.317455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.317474] Call Trace:
[   13.317486]  <TASK>
[   13.317505]  dump_stack_lvl+0x73/0xb0
[   13.317556]  print_report+0xd1/0x650
[   13.317592]  ? __virt_addr_valid+0x1db/0x2d0
[   13.317647]  ? kmalloc_oob_16+0x452/0x4a0
[   13.317680]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.317722]  ? kmalloc_oob_16+0x452/0x4a0
[   13.317757]  kasan_report+0x141/0x180
[   13.317794]  ? kmalloc_oob_16+0x452/0x4a0
[   13.317837]  __asan_report_store16_noabort+0x1b/0x30
[   13.317865]  kmalloc_oob_16+0x452/0x4a0
[   13.317883]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   13.317903]  ? __schedule+0x10cc/0x2b60
[   13.317933]  ? __pfx_read_tsc+0x10/0x10
[   13.317953]  ? ktime_get_ts64+0x86/0x230
[   13.317977]  kunit_try_run_case+0x1a5/0x480
[   13.317999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.318018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.318038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.318058]  ? __kthread_parkme+0x82/0x180
[   13.318076]  ? preempt_count_sub+0x50/0x80
[   13.318097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.318129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.318157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.318190]  kthread+0x337/0x6f0
[   13.318223]  ? trace_preempt_on+0x20/0xc0
[   13.318263]  ? __pfx_kthread+0x10/0x10
[   13.318300]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.318336]  ? calculate_sigpending+0x7b/0xa0
[   13.318380]  ? __pfx_kthread+0x10/0x10
[   13.318420]  ret_from_fork+0x116/0x1d0
[   13.318456]  ? __pfx_kthread+0x10/0x10
[   13.318494]  ret_from_fork_asm+0x1a/0x30
[   13.318543]  </TASK>
[   13.318561] 
[   13.329712] Allocated by task 184:
[   13.331131]  kasan_save_stack+0x45/0x70
[   13.331461]  kasan_save_track+0x18/0x40
[   13.331893]  kasan_save_alloc_info+0x3b/0x50
[   13.332205]  __kasan_kmalloc+0xb7/0xc0
[   13.332603]  __kmalloc_cache_noprof+0x189/0x420
[   13.333325]  kmalloc_oob_16+0xa8/0x4a0
[   13.333778]  kunit_try_run_case+0x1a5/0x480
[   13.334203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.334974]  kthread+0x337/0x6f0
[   13.335299]  ret_from_fork+0x116/0x1d0
[   13.335865]  ret_from_fork_asm+0x1a/0x30
[   13.336241] 
[   13.336349] The buggy address belongs to the object at ffff8881024eb3e0
[   13.336349]  which belongs to the cache kmalloc-16 of size 16
[   13.337187] The buggy address is located 0 bytes inside of
[   13.337187]  allocated 13-byte region [ffff8881024eb3e0, ffff8881024eb3ed)
[   13.337762] 
[   13.337955] The buggy address belongs to the physical page:
[   13.338364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   13.338934] flags: 0x200000000000000(node=0|zone=2)
[   13.339312] page_type: f5(slab)
[   13.340057] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.340348] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.341013] page dumped because: kasan: bad access detected
[   13.341344] 
[   13.341501] Memory state around the buggy address:
[   13.342005]  ffff8881024eb280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.342436]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.342959] >ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.343424]                                                           ^
[   13.344191]  ffff8881024eb400: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.344565]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.345023] ==================================================================

[   13.490779] ==================================================================
[   13.491383] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   13.491817] Write of size 16 at addr ffff888102873080 by task kunit_try_catch/183
[   13.492180] 
[   13.492306] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.492378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.492390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.492431] Call Trace:
[   13.492444]  <TASK>
[   13.492461]  dump_stack_lvl+0x73/0xb0
[   13.492490]  print_report+0xd1/0x650
[   13.492513]  ? __virt_addr_valid+0x1db/0x2d0
[   13.492554]  ? kmalloc_oob_16+0x452/0x4a0
[   13.492575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.492601]  ? kmalloc_oob_16+0x452/0x4a0
[   13.492622]  kasan_report+0x141/0x180
[   13.492645]  ? kmalloc_oob_16+0x452/0x4a0
[   13.492671]  __asan_report_store16_noabort+0x1b/0x30
[   13.492696]  kmalloc_oob_16+0x452/0x4a0
[   13.492717]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   13.492742]  ? __schedule+0x10cc/0x2b60
[   13.492764]  ? __pfx_read_tsc+0x10/0x10
[   13.492877]  ? ktime_get_ts64+0x86/0x230
[   13.492903]  kunit_try_run_case+0x1a5/0x480
[   13.492928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.492950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.492991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.493016]  ? __kthread_parkme+0x82/0x180
[   13.493062]  ? preempt_count_sub+0x50/0x80
[   13.493087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.493111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.493134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.493157]  kthread+0x337/0x6f0
[   13.493177]  ? trace_preempt_on+0x20/0xc0
[   13.493200]  ? __pfx_kthread+0x10/0x10
[   13.493221]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.493243]  ? calculate_sigpending+0x7b/0xa0
[   13.493267]  ? __pfx_kthread+0x10/0x10
[   13.493289]  ret_from_fork+0x116/0x1d0
[   13.493308]  ? __pfx_kthread+0x10/0x10
[   13.493329]  ret_from_fork_asm+0x1a/0x30
[   13.493361]  </TASK>
[   13.493373] 
[   13.502245] Allocated by task 183:
[   13.502515]  kasan_save_stack+0x45/0x70
[   13.502826]  kasan_save_track+0x18/0x40
[   13.503014]  kasan_save_alloc_info+0x3b/0x50
[   13.503254]  __kasan_kmalloc+0xb7/0xc0
[   13.503497]  __kmalloc_cache_noprof+0x189/0x420
[   13.503823]  kmalloc_oob_16+0xa8/0x4a0
[   13.504062]  kunit_try_run_case+0x1a5/0x480
[   13.504390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.504663]  kthread+0x337/0x6f0
[   13.504915]  ret_from_fork+0x116/0x1d0
[   13.505167]  ret_from_fork_asm+0x1a/0x30
[   13.505367] 
[   13.505444] The buggy address belongs to the object at ffff888102873080
[   13.505444]  which belongs to the cache kmalloc-16 of size 16
[   13.505906] The buggy address is located 0 bytes inside of
[   13.505906]  allocated 13-byte region [ffff888102873080, ffff88810287308d)
[   13.506464] 
[   13.506586] The buggy address belongs to the physical page:
[   13.506857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   13.507316] flags: 0x200000000000000(node=0|zone=2)
[   13.507590] page_type: f5(slab)
[   13.507864] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.508204] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.508436] page dumped because: kasan: bad access detected
[   13.508688] 
[   13.508840] Memory state around the buggy address:
[   13.509177]  ffff888102872f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.509479]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   13.509844] >ffff888102873080: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.510165]                       ^
[   13.510294]  ffff888102873100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.510937]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.511377] ==================================================================

[   23.895081] ==================================================================
[   23.905706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   23.912408] Write of size 16 at addr ffff888106713140 by task kunit_try_catch/207
[   23.919894] 
[   23.921410] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   23.921419] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   23.921421] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.921424] Call Trace:
[   23.921426]  <TASK>
[   23.921428]  dump_stack_lvl+0x73/0xb0
[   23.921433]  print_report+0xd1/0x650
[   23.921437]  ? __virt_addr_valid+0x1db/0x2d0
[   23.921441]  ? kmalloc_oob_16+0x452/0x4a0
[   23.921445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.921450]  ? kmalloc_oob_16+0x452/0x4a0
[   23.921453]  kasan_report+0x141/0x180
[   23.921457]  ? kmalloc_oob_16+0x452/0x4a0
[   23.921462]  __asan_report_store16_noabort+0x1b/0x30
[   23.921467]  kmalloc_oob_16+0x452/0x4a0
[   23.921470]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   23.921474]  ? __schedule+0x10cc/0x2b60
[   23.921478]  ? ktime_get_ts64+0x83/0x230
[   23.921483]  kunit_try_run_case+0x1a2/0x480
[   23.921487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.921491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.921495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.921500]  ? __kthread_parkme+0x82/0x180
[   23.921503]  ? preempt_count_sub+0x50/0x80
[   23.921507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.921512]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.921516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.921520]  kthread+0x334/0x6f0
[   23.921523]  ? trace_preempt_on+0x20/0xc0
[   23.921527]  ? __pfx_kthread+0x10/0x10
[   23.921531]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.921535]  ? calculate_sigpending+0x7b/0xa0
[   23.921539]  ? __pfx_kthread+0x10/0x10
[   23.921543]  ret_from_fork+0x113/0x1d0
[   23.921546]  ? __pfx_kthread+0x10/0x10
[   23.921550]  ret_from_fork_asm+0x1a/0x30
[   23.921556]  </TASK>
[   23.921557] 
[   24.085243] Allocated by task 207:
[   24.088651]  kasan_save_stack+0x45/0x70
[   24.092491]  kasan_save_track+0x18/0x40
[   24.096328]  kasan_save_alloc_info+0x3b/0x50
[   24.100627]  __kasan_kmalloc+0xb7/0xc0
[   24.104417]  __kmalloc_cache_noprof+0x189/0x420
[   24.108972]  kmalloc_oob_16+0xa8/0x4a0
[   24.112726]  kunit_try_run_case+0x1a2/0x480
[   24.116911]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.122311]  kthread+0x334/0x6f0
[   24.125543]  ret_from_fork+0x113/0x1d0
[   24.129298]  ret_from_fork_asm+0x1a/0x30
[   24.133224] 
[   24.134721] The buggy address belongs to the object at ffff888106713140
[   24.134721]  which belongs to the cache kmalloc-16 of size 16
[   24.147054] The buggy address is located 0 bytes inside of
[   24.147054]  allocated 13-byte region [ffff888106713140, ffff88810671314d)
[   24.159420] 
[   24.160923] The buggy address belongs to the physical page:
[   24.166495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   24.174504] flags: 0x200000000000000(node=0|zone=2)
[   24.179415] page_type: f5(slab)
[   24.182590] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   24.190378] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.198127] page dumped because: kasan: bad access detected
[   24.203700] 
[   24.205199] Memory state around the buggy address:
[   24.209992]  ffff888106713000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.217211]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.224452] >ffff888106713100: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   24.231674]                                               ^
[   24.237248]  ffff888106713180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.244469]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.251689] ==================================================================