Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.185866] ==================================================================
[   31.186374] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   31.186559] Write of size 1 at addr fff00000c44df478 by task kunit_try_catch/153
[   31.186820] 
[   31.186918] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.187119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.187580] Hardware name: linux,dummy-virt (DT)
[   31.187730] Call trace:
[   31.187836]  show_stack+0x20/0x38 (C)
[   31.187980]  dump_stack_lvl+0x8c/0xd0
[   31.188094]  print_report+0x118/0x608
[   31.188207]  kasan_report+0xdc/0x128
[   31.188319]  __asan_report_store1_noabort+0x20/0x30
[   31.188444]  kmalloc_track_caller_oob_right+0x40c/0x488
[   31.188569]  kunit_try_run_case+0x170/0x3f0
[   31.188701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.188830]  kthread+0x328/0x630
[   31.188936]  ret_from_fork+0x10/0x20
[   31.189088] 
[   31.189130] Allocated by task 153:
[   31.189195]  kasan_save_stack+0x3c/0x68
[   31.189292]  kasan_save_track+0x20/0x40
[   31.189382]  kasan_save_alloc_info+0x40/0x58
[   31.189480]  __kasan_kmalloc+0xd4/0xd8
[   31.189558]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   31.189680]  kmalloc_track_caller_oob_right+0xa8/0x488
[   31.189770]  kunit_try_run_case+0x170/0x3f0
[   31.189862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.189944]  kthread+0x328/0x630
[   31.190000]  ret_from_fork+0x10/0x20
[   31.190071] 
[   31.190110] The buggy address belongs to the object at fff00000c44df400
[   31.190110]  which belongs to the cache kmalloc-128 of size 128
[   31.190216] The buggy address is located 0 bytes to the right of
[   31.190216]  allocated 120-byte region [fff00000c44df400, fff00000c44df478)
[   31.190896] 
[   31.190951] The buggy address belongs to the physical page:
[   31.191256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   31.191406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.191619] page_type: f5(slab)
[   31.191721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.191929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.192053] page dumped because: kasan: bad access detected
[   31.192191] 
[   31.192240] Memory state around the buggy address:
[   31.192362]  fff00000c44df300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.192470]  fff00000c44df380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.193088] >fff00000c44df400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.193203]                                                                 ^
[   31.193376]  fff00000c44df480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.193990]  fff00000c44df500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.194124] ==================================================================

[   24.735766] ==================================================================
[   24.736310] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   24.737688] Write of size 1 at addr ffff88810231cd78 by task kunit_try_catch/171
[   24.738087] 
[   24.738308] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   24.738483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.738514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.738559] Call Trace:
[   24.738589]  <TASK>
[   24.738627]  dump_stack_lvl+0x73/0xb0
[   24.738751]  print_report+0xd1/0x650
[   24.738815]  ? __virt_addr_valid+0x1db/0x2d0
[   24.738863]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   24.738907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.738938]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   24.738964]  kasan_report+0x141/0x180
[   24.738987]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   24.739018]  __asan_report_store1_noabort+0x1b/0x30
[   24.739044]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   24.739070]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   24.739098]  ? __schedule+0x10cc/0x2b60
[   24.739123]  ? __pfx_read_tsc+0x10/0x10
[   24.739153]  ? ktime_get_ts64+0x86/0x230
[   24.739197]  kunit_try_run_case+0x1a5/0x480
[   24.739226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.739250]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.739274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.739298]  ? __kthread_parkme+0x82/0x180
[   24.739322]  ? preempt_count_sub+0x50/0x80
[   24.739347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.739372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.739397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.739421]  kthread+0x337/0x6f0
[   24.739464]  ? trace_preempt_on+0x20/0xc0
[   24.739494]  ? __pfx_kthread+0x10/0x10
[   24.739517]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.739539]  ? calculate_sigpending+0x7b/0xa0
[   24.739566]  ? __pfx_kthread+0x10/0x10
[   24.739589]  ret_from_fork+0x116/0x1d0
[   24.739611]  ? __pfx_kthread+0x10/0x10
[   24.739633]  ret_from_fork_asm+0x1a/0x30
[   24.739668]  </TASK>
[   24.739682] 
[   24.747518] Allocated by task 171:
[   24.747801]  kasan_save_stack+0x45/0x70
[   24.748109]  kasan_save_track+0x18/0x40
[   24.748453]  kasan_save_alloc_info+0x3b/0x50
[   24.748675]  __kasan_kmalloc+0xb7/0xc0
[   24.748842]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   24.749061]  kmalloc_track_caller_oob_right+0x99/0x520
[   24.749269]  kunit_try_run_case+0x1a5/0x480
[   24.749642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.750079]  kthread+0x337/0x6f0
[   24.750354]  ret_from_fork+0x116/0x1d0
[   24.750691]  ret_from_fork_asm+0x1a/0x30
[   24.751035] 
[   24.751207] The buggy address belongs to the object at ffff88810231cd00
[   24.751207]  which belongs to the cache kmalloc-128 of size 128
[   24.751894] The buggy address is located 0 bytes to the right of
[   24.751894]  allocated 120-byte region [ffff88810231cd00, ffff88810231cd78)
[   24.752606] 
[   24.754544] The buggy address belongs to the physical page:
[   24.754947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231c
[   24.755653] flags: 0x200000000000000(node=0|zone=2)
[   24.756008] page_type: f5(slab)
[   24.756279] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.756938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.757360] page dumped because: kasan: bad access detected
[   24.757889] 
[   24.758081] Memory state around the buggy address:
[   24.758385]  ffff88810231cc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.759014]  ffff88810231cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.759358] >ffff88810231cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.759913]                                                                 ^
[   24.760555]  ffff88810231cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.761069]  ffff88810231ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.761427] ==================================================================
[   24.763456] ==================================================================
[   24.764053] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   24.764620] Write of size 1 at addr ffff88810231ce78 by task kunit_try_catch/171
[   24.765066] 
[   24.765350] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   24.765476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.765663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.765856] Call Trace:
[   24.765906]  <TASK>
[   24.765991]  dump_stack_lvl+0x73/0xb0
[   24.766061]  print_report+0xd1/0x650
[   24.766090]  ? __virt_addr_valid+0x1db/0x2d0
[   24.766117]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   24.766162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.766205]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   24.766232]  kasan_report+0x141/0x180
[   24.766255]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   24.766285]  __asan_report_store1_noabort+0x1b/0x30
[   24.766312]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   24.766339]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   24.766366]  ? __schedule+0x10cc/0x2b60
[   24.766390]  ? __pfx_read_tsc+0x10/0x10
[   24.766415]  ? ktime_get_ts64+0x86/0x230
[   24.766462]  kunit_try_run_case+0x1a5/0x480
[   24.766494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.766518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.766543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.766567]  ? __kthread_parkme+0x82/0x180
[   24.766590]  ? preempt_count_sub+0x50/0x80
[   24.766615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.766640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.766664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.766689]  kthread+0x337/0x6f0
[   24.766710]  ? trace_preempt_on+0x20/0xc0
[   24.766736]  ? __pfx_kthread+0x10/0x10
[   24.766758]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.766780]  ? calculate_sigpending+0x7b/0xa0
[   24.766806]  ? __pfx_kthread+0x10/0x10
[   24.766829]  ret_from_fork+0x116/0x1d0
[   24.766850]  ? __pfx_kthread+0x10/0x10
[   24.766872]  ret_from_fork_asm+0x1a/0x30
[   24.766905]  </TASK>
[   24.766918] 
[   24.778155] Allocated by task 171:
[   24.778548]  kasan_save_stack+0x45/0x70
[   24.778940]  kasan_save_track+0x18/0x40
[   24.779315]  kasan_save_alloc_info+0x3b/0x50
[   24.779706]  __kasan_kmalloc+0xb7/0xc0
[   24.779889]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   24.780096]  kmalloc_track_caller_oob_right+0x19a/0x520
[   24.780337]  kunit_try_run_case+0x1a5/0x480
[   24.780531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.780730]  kthread+0x337/0x6f0
[   24.780888]  ret_from_fork+0x116/0x1d0
[   24.781107]  ret_from_fork_asm+0x1a/0x30
[   24.781293] 
[   24.781399] The buggy address belongs to the object at ffff88810231ce00
[   24.781399]  which belongs to the cache kmalloc-128 of size 128
[   24.782150] The buggy address is located 0 bytes to the right of
[   24.782150]  allocated 120-byte region [ffff88810231ce00, ffff88810231ce78)
[   24.782841] 
[   24.783009] The buggy address belongs to the physical page:
[   24.783450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231c
[   24.783866] flags: 0x200000000000000(node=0|zone=2)
[   24.784211] page_type: f5(slab)
[   24.784504] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.784896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.785405] page dumped because: kasan: bad access detected
[   24.785762] 
[   24.785910] Memory state around the buggy address:
[   24.786188]  ffff88810231cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.786693]  ffff88810231cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.787124] >ffff88810231ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.787396]                                                                 ^
[   24.787885]  ffff88810231ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.788262]  ffff88810231cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.788625] ==================================================================