Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.595885] ==================================================================
[   15.595947] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   15.595997] Write of size 1 at addr fff00000c78e1f00 by task kunit_try_catch/145
[   15.596045] 
[   15.596075] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.598096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.598824] Hardware name: linux,dummy-virt (DT)
[   15.598862] Call trace:
[   15.599217]  show_stack+0x20/0x38 (C)
[   15.600760]  dump_stack_lvl+0x8c/0xd0
[   15.600856]  print_report+0x118/0x5d0
[   15.600900]  kasan_report+0xdc/0x128
[   15.601229]  __asan_report_store1_noabort+0x20/0x30
[   15.601281]  kmalloc_big_oob_right+0x2a4/0x2f0
[   15.601326]  kunit_try_run_case+0x170/0x3f0
[   15.603508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.603567]  kthread+0x328/0x630
[   15.603608]  ret_from_fork+0x10/0x20
[   15.603654] 
[   15.603672] Allocated by task 145:
[   15.603699]  kasan_save_stack+0x3c/0x68
[   15.603739]  kasan_save_track+0x20/0x40
[   15.603775]  kasan_save_alloc_info+0x40/0x58
[   15.603814]  __kasan_kmalloc+0xd4/0xd8
[   15.603849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.603887]  kmalloc_big_oob_right+0xb8/0x2f0
[   15.603923]  kunit_try_run_case+0x170/0x3f0
[   15.603959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.604000]  kthread+0x328/0x630
[   15.604031]  ret_from_fork+0x10/0x20
[   15.604772] 
[   15.604864] The buggy address belongs to the object at fff00000c78e0000
[   15.604864]  which belongs to the cache kmalloc-8k of size 8192
[   15.604976] The buggy address is located 0 bytes to the right of
[   15.604976]  allocated 7936-byte region [fff00000c78e0000, fff00000c78e1f00)
[   15.605058] 
[   15.605133] The buggy address belongs to the physical page:
[   15.605166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   15.607253] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.607304] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.607358] page_type: f5(slab)
[   15.607397] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   15.607594] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   15.609288] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   15.609528] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   15.611607] head: 0bfffe0000000003 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   15.612317] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   15.612626] page dumped because: kasan: bad access detected
[   15.612657] 
[   15.612675] Memory state around the buggy address:
[   15.612706]  fff00000c78e1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.612748]  fff00000c78e1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.614685] >fff00000c78e1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.614724]                    ^
[   15.614862]  fff00000c78e1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.616532]  fff00000c78e2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.616576] ==================================================================

[   16.474309] ==================================================================
[   16.474372] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   16.474423] Write of size 1 at addr fff00000c457df00 by task kunit_try_catch/145
[   16.475742] 
[   16.475898] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.476109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.476138] Hardware name: linux,dummy-virt (DT)
[   16.476370] Call trace:
[   16.476710]  show_stack+0x20/0x38 (C)
[   16.476824]  dump_stack_lvl+0x8c/0xd0
[   16.477060]  print_report+0x118/0x5d0
[   16.477113]  kasan_report+0xdc/0x128
[   16.477158]  __asan_report_store1_noabort+0x20/0x30
[   16.477220]  kmalloc_big_oob_right+0x2a4/0x2f0
[   16.477266]  kunit_try_run_case+0x170/0x3f0
[   16.477311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.478170]  kthread+0x328/0x630
[   16.478522]  ret_from_fork+0x10/0x20
[   16.478827] 
[   16.478967] Allocated by task 145:
[   16.479002]  kasan_save_stack+0x3c/0x68
[   16.479052]  kasan_save_track+0x20/0x40
[   16.479090]  kasan_save_alloc_info+0x40/0x58
[   16.479466]  __kasan_kmalloc+0xd4/0xd8
[   16.479850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.480150]  kmalloc_big_oob_right+0xb8/0x2f0
[   16.480202]  kunit_try_run_case+0x170/0x3f0
[   16.480599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.480653]  kthread+0x328/0x630
[   16.480685]  ret_from_fork+0x10/0x20
[   16.480720] 
[   16.480740] The buggy address belongs to the object at fff00000c457c000
[   16.480740]  which belongs to the cache kmalloc-8k of size 8192
[   16.481417] The buggy address is located 0 bytes to the right of
[   16.481417]  allocated 7936-byte region [fff00000c457c000, fff00000c457df00)
[   16.481501] 
[   16.481532] The buggy address belongs to the physical page:
[   16.481957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104578
[   16.482775] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.483150] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.483346] page_type: f5(slab)
[   16.483428] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.483621] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.483758] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.483920] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.484139] head: 0bfffe0000000003 ffffc1ffc3115e01 00000000ffffffff 00000000ffffffff
[   16.484252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.484668] page dumped because: kasan: bad access detected
[   16.484907] 
[   16.484930] Memory state around the buggy address:
[   16.485142]  fff00000c457de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.485414]  fff00000c457de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.485476] >fff00000c457df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485521]                    ^
[   16.485549]  fff00000c457df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.486394]  fff00000c457e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.486453] ==================================================================

[   11.990335] ==================================================================
[   11.991152] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   11.992026] Write of size 1 at addr ffff888102965f00 by task kunit_try_catch/161
[   11.992419] 
[   11.992651] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.992701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.992712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.992733] Call Trace:
[   11.992745]  <TASK>
[   11.992761]  dump_stack_lvl+0x73/0xb0
[   11.992792]  print_report+0xd1/0x610
[   11.992813]  ? __virt_addr_valid+0x1db/0x2d0
[   11.992836]  ? kmalloc_big_oob_right+0x316/0x370
[   11.992859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.992882]  ? kmalloc_big_oob_right+0x316/0x370
[   11.992905]  kasan_report+0x141/0x180
[   11.992927]  ? kmalloc_big_oob_right+0x316/0x370
[   11.992954]  __asan_report_store1_noabort+0x1b/0x30
[   11.992980]  kmalloc_big_oob_right+0x316/0x370
[   11.993003]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   11.993027]  ? __schedule+0x10cc/0x2b60
[   11.993049]  ? __pfx_read_tsc+0x10/0x10
[   11.993070]  ? ktime_get_ts64+0x86/0x230
[   11.993093]  kunit_try_run_case+0x1a5/0x480
[   11.993117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.993140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.993163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.993187]  ? __kthread_parkme+0x82/0x180
[   11.993207]  ? preempt_count_sub+0x50/0x80
[   11.993231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.993255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.993279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.993304]  kthread+0x337/0x6f0
[   11.993323]  ? trace_preempt_on+0x20/0xc0
[   11.993347]  ? __pfx_kthread+0x10/0x10
[   11.993367]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.993388]  ? calculate_sigpending+0x7b/0xa0
[   11.993530]  ? __pfx_kthread+0x10/0x10
[   11.993556]  ret_from_fork+0x116/0x1d0
[   11.993584]  ? __pfx_kthread+0x10/0x10
[   11.993605]  ret_from_fork_asm+0x1a/0x30
[   11.993635]  </TASK>
[   11.993678] 
[   12.004352] Allocated by task 161:
[   12.004756]  kasan_save_stack+0x45/0x70
[   12.005082]  kasan_save_track+0x18/0x40
[   12.005271]  kasan_save_alloc_info+0x3b/0x50
[   12.005671]  __kasan_kmalloc+0xb7/0xc0
[   12.005964]  __kmalloc_cache_noprof+0x189/0x420
[   12.006307]  kmalloc_big_oob_right+0xa9/0x370
[   12.006756]  kunit_try_run_case+0x1a5/0x480
[   12.007012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.007458]  kthread+0x337/0x6f0
[   12.007691]  ret_from_fork+0x116/0x1d0
[   12.007871]  ret_from_fork_asm+0x1a/0x30
[   12.008045] 
[   12.008135] The buggy address belongs to the object at ffff888102964000
[   12.008135]  which belongs to the cache kmalloc-8k of size 8192
[   12.009216] The buggy address is located 0 bytes to the right of
[   12.009216]  allocated 7936-byte region [ffff888102964000, ffff888102965f00)
[   12.010199] 
[   12.010442] The buggy address belongs to the physical page:
[   12.011148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102960
[   12.011837] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.012357] flags: 0x200000000000040(head|node=0|zone=2)
[   12.012742] page_type: f5(slab)
[   12.012901] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   12.013204] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   12.013863] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   12.014311] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   12.014870] head: 0200000000000003 ffffea00040a5801 00000000ffffffff 00000000ffffffff
[   12.015493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   12.015956] page dumped because: kasan: bad access detected
[   12.016197] 
[   12.016291] Memory state around the buggy address:
[   12.016963]  ffff888102965e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.017418]  ffff888102965e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.018132] >ffff888102965f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.018709]                    ^
[   12.018953]  ffff888102965f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.019254]  ffff888102966000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.019945] ==================================================================

[   12.229772] ==================================================================
[   12.230913] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   12.231577] Write of size 1 at addr ffff888102d51f00 by task kunit_try_catch/162
[   12.232554] 
[   12.233125] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.233176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.233189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.233210] Call Trace:
[   12.233223]  <TASK>
[   12.233240]  dump_stack_lvl+0x73/0xb0
[   12.233274]  print_report+0xd1/0x610
[   12.233297]  ? __virt_addr_valid+0x1db/0x2d0
[   12.233321]  ? kmalloc_big_oob_right+0x316/0x370
[   12.233344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.233368]  ? kmalloc_big_oob_right+0x316/0x370
[   12.233390]  kasan_report+0x141/0x180
[   12.233412]  ? kmalloc_big_oob_right+0x316/0x370
[   12.233439]  __asan_report_store1_noabort+0x1b/0x30
[   12.233465]  kmalloc_big_oob_right+0x316/0x370
[   12.233488]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   12.233511]  ? __schedule+0x10cc/0x2b60
[   12.233534]  ? __pfx_read_tsc+0x10/0x10
[   12.233556]  ? ktime_get_ts64+0x86/0x230
[   12.233582]  kunit_try_run_case+0x1a5/0x480
[   12.233608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.233631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.233656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.233681]  ? __kthread_parkme+0x82/0x180
[   12.233703]  ? preempt_count_sub+0x50/0x80
[   12.233729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.233754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.233780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.233805]  kthread+0x337/0x6f0
[   12.233824]  ? trace_preempt_on+0x20/0xc0
[   12.233849]  ? __pfx_kthread+0x10/0x10
[   12.233869]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.233891]  ? calculate_sigpending+0x7b/0xa0
[   12.233916]  ? __pfx_kthread+0x10/0x10
[   12.233938]  ret_from_fork+0x116/0x1d0
[   12.233958]  ? __pfx_kthread+0x10/0x10
[   12.233978]  ret_from_fork_asm+0x1a/0x30
[   12.234009]  </TASK>
[   12.234019] 
[   12.246471] Allocated by task 162:
[   12.246856]  kasan_save_stack+0x45/0x70
[   12.247252]  kasan_save_track+0x18/0x40
[   12.247606]  kasan_save_alloc_info+0x3b/0x50
[   12.248061]  __kasan_kmalloc+0xb7/0xc0
[   12.248418]  __kmalloc_cache_noprof+0x189/0x420
[   12.248888]  kmalloc_big_oob_right+0xa9/0x370
[   12.249327]  kunit_try_run_case+0x1a5/0x480
[   12.249889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.250093]  kthread+0x337/0x6f0
[   12.250409]  ret_from_fork+0x116/0x1d0
[   12.250815]  ret_from_fork_asm+0x1a/0x30
[   12.251211] 
[   12.251369] The buggy address belongs to the object at ffff888102d50000
[   12.251369]  which belongs to the cache kmalloc-8k of size 8192
[   12.252166] The buggy address is located 0 bytes to the right of
[   12.252166]  allocated 7936-byte region [ffff888102d50000, ffff888102d51f00)
[   12.253073] 
[   12.253188] The buggy address belongs to the physical page:
[   12.253732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d50
[   12.254044] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.254589] flags: 0x200000000000040(head|node=0|zone=2)
[   12.255267] page_type: f5(slab)
[   12.255571] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   12.255923] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   12.256217] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   12.256927] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   12.257609] head: 0200000000000003 ffffea00040b5401 00000000ffffffff 00000000ffffffff
[   12.258244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   12.258594] page dumped because: kasan: bad access detected
[   12.259159] 
[   12.259323] Memory state around the buggy address:
[   12.259603]  ffff888102d51e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.260333]  ffff888102d51e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.260557] >ffff888102d51f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.261167]                    ^
[   12.261485]  ffff888102d51f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.262189]  ffff888102d52000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.262471] ==================================================================