Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.553154] ==================================================================
[   16.553575] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   16.553712] Write of size 16 at addr fff00000c59ab8e0 by task kunit_try_catch/166
[   16.553922] 
[   16.553958] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.554039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.554065] Hardware name: linux,dummy-virt (DT)
[   16.554096] Call trace:
[   16.554118]  show_stack+0x20/0x38 (C)
[   16.554167]  dump_stack_lvl+0x8c/0xd0
[   16.554218]  print_report+0x118/0x5d0
[   16.554264]  kasan_report+0xdc/0x128
[   16.554310]  __asan_report_store16_noabort+0x20/0x30
[   16.554385]  kmalloc_oob_16+0x3a0/0x3f8
[   16.554430]  kunit_try_run_case+0x170/0x3f0
[   16.554667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.554848]  kthread+0x328/0x630
[   16.554890]  ret_from_fork+0x10/0x20
[   16.554949] 
[   16.554967] Allocated by task 166:
[   16.555068]  kasan_save_stack+0x3c/0x68
[   16.555523]  kasan_save_track+0x20/0x40
[   16.555676]  kasan_save_alloc_info+0x40/0x58
[   16.555754]  __kasan_kmalloc+0xd4/0xd8
[   16.555850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.556237]  kmalloc_oob_16+0xb4/0x3f8
[   16.556601]  kunit_try_run_case+0x170/0x3f0
[   16.556642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.556685]  kthread+0x328/0x630
[   16.556717]  ret_from_fork+0x10/0x20
[   16.556780] 
[   16.556800] The buggy address belongs to the object at fff00000c59ab8e0
[   16.556800]  which belongs to the cache kmalloc-16 of size 16
[   16.556883] The buggy address is located 0 bytes inside of
[   16.556883]  allocated 13-byte region [fff00000c59ab8e0, fff00000c59ab8ed)
[   16.557435] 
[   16.557458] The buggy address belongs to the physical page:
[   16.557497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   16.557642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.557740] page_type: f5(slab)
[   16.557874] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.557934] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.557974] page dumped because: kasan: bad access detected
[   16.558254] 
[   16.558314] Memory state around the buggy address:
[   16.558377]  fff00000c59ab780: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   16.558421]  fff00000c59ab800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.558473] >fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   16.558718]                                                           ^
[   16.558758]  fff00000c59ab900: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.558800]  fff00000c59ab980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.558837] ==================================================================

[   16.530575] ==================================================================
[   16.530659] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   16.530713] Write of size 16 at addr fff00000c1375b00 by task kunit_try_catch/166
[   16.530775] 
[   16.530808] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.530889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.530915] Hardware name: linux,dummy-virt (DT)
[   16.530947] Call trace:
[   16.530970]  show_stack+0x20/0x38 (C)
[   16.531019]  dump_stack_lvl+0x8c/0xd0
[   16.531076]  print_report+0x118/0x5d0
[   16.531123]  kasan_report+0xdc/0x128
[   16.531170]  __asan_report_store16_noabort+0x20/0x30
[   16.531222]  kmalloc_oob_16+0x3a0/0x3f8
[   16.531267]  kunit_try_run_case+0x170/0x3f0
[   16.531316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.531376]  kthread+0x328/0x630
[   16.531434]  ret_from_fork+0x10/0x20
[   16.531491] 
[   16.531510] Allocated by task 166:
[   16.531538]  kasan_save_stack+0x3c/0x68
[   16.531585]  kasan_save_track+0x20/0x40
[   16.532420]  kasan_save_alloc_info+0x40/0x58
[   16.532478]  __kasan_kmalloc+0xd4/0xd8
[   16.532515]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.532796]  kmalloc_oob_16+0xb4/0x3f8
[   16.532875]  kunit_try_run_case+0x170/0x3f0
[   16.532917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.533335]  kthread+0x328/0x630
[   16.533476]  ret_from_fork+0x10/0x20
[   16.533651] 
[   16.533696] The buggy address belongs to the object at fff00000c1375b00
[   16.533696]  which belongs to the cache kmalloc-16 of size 16
[   16.533933] The buggy address is located 0 bytes inside of
[   16.533933]  allocated 13-byte region [fff00000c1375b00, fff00000c1375b0d)
[   16.534228] 
[   16.534365] The buggy address belongs to the physical page:
[   16.534453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   16.534540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.534813] page_type: f5(slab)
[   16.534871] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.535177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.535424] page dumped because: kasan: bad access detected
[   16.535888] 
[   16.535975] Memory state around the buggy address:
[   16.536085]  fff00000c1375a00: 00 07 fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.536190]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.536302] >fff00000c1375b00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.536403]                       ^
[   16.536452]  fff00000c1375b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.536815]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.536905] ==================================================================

[   12.661657] ==================================================================
[   12.662335] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   12.662689] Write of size 16 at addr ffff8881017e03c0 by task kunit_try_catch/184
[   12.662976] 
[   12.663175] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.663221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.663233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.663255] Call Trace:
[   12.663268]  <TASK>
[   12.663285]  dump_stack_lvl+0x73/0xb0
[   12.663316]  print_report+0xd1/0x610
[   12.663339]  ? __virt_addr_valid+0x1db/0x2d0
[   12.663362]  ? kmalloc_oob_16+0x452/0x4a0
[   12.663382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.663416]  ? kmalloc_oob_16+0x452/0x4a0
[   12.663437]  kasan_report+0x141/0x180
[   12.663459]  ? kmalloc_oob_16+0x452/0x4a0
[   12.663485]  __asan_report_store16_noabort+0x1b/0x30
[   12.663509]  kmalloc_oob_16+0x452/0x4a0
[   12.663529]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   12.663551]  ? __schedule+0x10c6/0x2b60
[   12.663574]  ? __pfx_read_tsc+0x10/0x10
[   12.663595]  ? ktime_get_ts64+0x86/0x230
[   12.663621]  kunit_try_run_case+0x1a5/0x480
[   12.663646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.663667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.663691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.663713]  ? __kthread_parkme+0x82/0x180
[   12.663733]  ? preempt_count_sub+0x50/0x80
[   12.663757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.663781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.663803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.663826]  kthread+0x337/0x6f0
[   12.663845]  ? trace_preempt_on+0x20/0xc0
[   12.663868]  ? __pfx_kthread+0x10/0x10
[   12.663888]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.663909]  ? calculate_sigpending+0x7b/0xa0
[   12.663933]  ? __pfx_kthread+0x10/0x10
[   12.663954]  ret_from_fork+0x116/0x1d0
[   12.663973]  ? __pfx_kthread+0x10/0x10
[   12.663993]  ret_from_fork_asm+0x1a/0x30
[   12.664026]  </TASK>
[   12.664036] 
[   12.671380] Allocated by task 184:
[   12.671528]  kasan_save_stack+0x45/0x70
[   12.671672]  kasan_save_track+0x18/0x40
[   12.671919]  kasan_save_alloc_info+0x3b/0x50
[   12.672428]  __kasan_kmalloc+0xb7/0xc0
[   12.672640]  __kmalloc_cache_noprof+0x189/0x420
[   12.672878]  kmalloc_oob_16+0xa8/0x4a0
[   12.673068]  kunit_try_run_case+0x1a5/0x480
[   12.673450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.673690]  kthread+0x337/0x6f0
[   12.673853]  ret_from_fork+0x116/0x1d0
[   12.673987]  ret_from_fork_asm+0x1a/0x30
[   12.674129] 
[   12.674305] The buggy address belongs to the object at ffff8881017e03c0
[   12.674305]  which belongs to the cache kmalloc-16 of size 16
[   12.674861] The buggy address is located 0 bytes inside of
[   12.674861]  allocated 13-byte region [ffff8881017e03c0, ffff8881017e03cd)
[   12.675409] 
[   12.675506] The buggy address belongs to the physical page:
[   12.675748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017e0
[   12.676068] flags: 0x200000000000000(node=0|zone=2)
[   12.676309] page_type: f5(slab)
[   12.676484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.676886] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.677390] page dumped because: kasan: bad access detected
[   12.677630] 
[   12.677706] Memory state around the buggy address:
[   12.677910]  ffff8881017e0280: 00 00 fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   12.678204]  ffff8881017e0300: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   12.678554] >ffff8881017e0380: 00 04 fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   12.678862]                                               ^
[   12.679093]  ffff8881017e0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.679309]  ffff8881017e0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.679531] ==================================================================

[   12.778647] ==================================================================
[   12.779229] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   12.779611] Write of size 16 at addr ffff88810210ebe0 by task kunit_try_catch/183
[   12.779941] 
[   12.780138] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.780197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.780209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.780230] Call Trace:
[   12.780243]  <TASK>
[   12.780260]  dump_stack_lvl+0x73/0xb0
[   12.780289]  print_report+0xd1/0x610
[   12.780311]  ? __virt_addr_valid+0x1db/0x2d0
[   12.780339]  ? kmalloc_oob_16+0x452/0x4a0
[   12.780377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.780398]  ? kmalloc_oob_16+0x452/0x4a0
[   12.780429]  kasan_report+0x141/0x180
[   12.780451]  ? kmalloc_oob_16+0x452/0x4a0
[   12.780475]  __asan_report_store16_noabort+0x1b/0x30
[   12.780499]  kmalloc_oob_16+0x452/0x4a0
[   12.780520]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   12.780541]  ? __schedule+0x10c6/0x2b60
[   12.780563]  ? __pfx_read_tsc+0x10/0x10
[   12.780593]  ? ktime_get_ts64+0x86/0x230
[   12.780618]  kunit_try_run_case+0x1a5/0x480
[   12.780642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.780676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.780699]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.780721]  ? __kthread_parkme+0x82/0x180
[   12.780741]  ? preempt_count_sub+0x50/0x80
[   12.780774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.780797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.780819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.780852]  kthread+0x337/0x6f0
[   12.780919]  ? trace_preempt_on+0x20/0xc0
[   12.780943]  ? __pfx_kthread+0x10/0x10
[   12.780963]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.780983]  ? calculate_sigpending+0x7b/0xa0
[   12.781007]  ? __pfx_kthread+0x10/0x10
[   12.781028]  ret_from_fork+0x116/0x1d0
[   12.781045]  ? __pfx_kthread+0x10/0x10
[   12.781065]  ret_from_fork_asm+0x1a/0x30
[   12.781095]  </TASK>
[   12.781105] 
[   12.789048] Allocated by task 183:
[   12.789211]  kasan_save_stack+0x45/0x70
[   12.789369]  kasan_save_track+0x18/0x40
[   12.789557]  kasan_save_alloc_info+0x3b/0x50
[   12.789796]  __kasan_kmalloc+0xb7/0xc0
[   12.789983]  __kmalloc_cache_noprof+0x189/0x420
[   12.790335]  kmalloc_oob_16+0xa8/0x4a0
[   12.790869]  kunit_try_run_case+0x1a5/0x480
[   12.791052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.791398]  kthread+0x337/0x6f0
[   12.791573]  ret_from_fork+0x116/0x1d0
[   12.791756]  ret_from_fork_asm+0x1a/0x30
[   12.792041] 
[   12.792187] The buggy address belongs to the object at ffff88810210ebe0
[   12.792187]  which belongs to the cache kmalloc-16 of size 16
[   12.792715] The buggy address is located 0 bytes inside of
[   12.792715]  allocated 13-byte region [ffff88810210ebe0, ffff88810210ebed)
[   12.793307] 
[   12.793427] The buggy address belongs to the physical page:
[   12.793671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   12.794255] flags: 0x200000000000000(node=0|zone=2)
[   12.794507] page_type: f5(slab)
[   12.794688] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.795134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.795544] page dumped because: kasan: bad access detected
[   12.795721] 
[   12.795792] Memory state around the buggy address:
[   12.795951]  ffff88810210ea80: 00 02 fc fc 00 03 fc fc fa fb fc fc 00 02 fc fc
[   12.796317]  ffff88810210eb00: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   12.796725] >ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   12.797171]                                                           ^
[   12.797549]  ffff88810210ec00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.797771]  ffff88810210ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.797986] ==================================================================