Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.245869] ==================================================================
[   32.246699] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   32.246882] Write of size 1 at addr fff00000c56e8e78 by task kunit_try_catch/154
[   32.246958] 
[   32.247002] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.247175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.247209] Hardware name: linux,dummy-virt (DT)
[   32.247248] Call trace:
[   32.247275]  show_stack+0x20/0x38 (C)
[   32.247340]  dump_stack_lvl+0x8c/0xd0
[   32.247398]  print_report+0x118/0x608
[   32.247456]  kasan_report+0xdc/0x128
[   32.247510]  __asan_report_store1_noabort+0x20/0x30
[   32.247566]  kmalloc_track_caller_oob_right+0x40c/0x488
[   32.247625]  kunit_try_run_case+0x170/0x3f0
[   32.247683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.247744]  kthread+0x328/0x630
[   32.247794]  ret_from_fork+0x10/0x20
[   32.247851] 
[   32.247874] Allocated by task 154:
[   32.247908]  kasan_save_stack+0x3c/0x68
[   32.247959]  kasan_save_track+0x20/0x40
[   32.248005]  kasan_save_alloc_info+0x40/0x58
[   32.248077]  __kasan_kmalloc+0xd4/0xd8
[   32.248126]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.248181]  kmalloc_track_caller_oob_right+0xa8/0x488
[   32.248231]  kunit_try_run_case+0x170/0x3f0
[   32.248275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.248326]  kthread+0x328/0x630
[   32.248363]  ret_from_fork+0x10/0x20
[   32.248404] 
[   32.248427] The buggy address belongs to the object at fff00000c56e8e00
[   32.248427]  which belongs to the cache kmalloc-128 of size 128
[   32.248494] The buggy address is located 0 bytes to the right of
[   32.248494]  allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78)
[   32.248566] 
[   32.248589] The buggy address belongs to the physical page:
[   32.248625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.248686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.248747] page_type: f5(slab)
[   32.248793] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.248849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.248895] page dumped because: kasan: bad access detected
[   32.248929] 
[   32.248949] Memory state around the buggy address:
[   32.248985]  fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.249190]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.249341] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.249435]                                                                 ^
[   32.250483]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.250655]  fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.250785] ==================================================================
[   32.252433] ==================================================================
[   32.252522] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   32.252647] Write of size 1 at addr fff00000c56e8f78 by task kunit_try_catch/154
[   32.252780] 
[   32.253335] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.253962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.254090] Hardware name: linux,dummy-virt (DT)
[   32.254306] Call trace:
[   32.254362]  show_stack+0x20/0x38 (C)
[   32.254476]  dump_stack_lvl+0x8c/0xd0
[   32.254644]  print_report+0x118/0x608
[   32.254799]  kasan_report+0xdc/0x128
[   32.255182]  __asan_report_store1_noabort+0x20/0x30
[   32.255319]  kmalloc_track_caller_oob_right+0x418/0x488
[   32.255465]  kunit_try_run_case+0x170/0x3f0
[   32.256455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.256597]  kthread+0x328/0x630
[   32.257003]  ret_from_fork+0x10/0x20
[   32.257672] 
[   32.257731] Allocated by task 154:
[   32.257828]  kasan_save_stack+0x3c/0x68
[   32.257998]  kasan_save_track+0x20/0x40
[   32.258246]  kasan_save_alloc_info+0x40/0x58
[   32.258362]  __kasan_kmalloc+0xd4/0xd8
[   32.258677]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.258831]  kmalloc_track_caller_oob_right+0x184/0x488
[   32.258998]  kunit_try_run_case+0x170/0x3f0
[   32.259224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.259451]  kthread+0x328/0x630
[   32.259753]  ret_from_fork+0x10/0x20
[   32.259857] 
[   32.260014] The buggy address belongs to the object at fff00000c56e8f00
[   32.260014]  which belongs to the cache kmalloc-128 of size 128
[   32.260207] The buggy address is located 0 bytes to the right of
[   32.260207]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   32.260443] 
[   32.260496] The buggy address belongs to the physical page:
[   32.260760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.261061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.261351] page_type: f5(slab)
[   32.261718] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.261891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.262061] page dumped because: kasan: bad access detected
[   32.262243] 
[   32.262340] Memory state around the buggy address:
[   32.262705]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.262872]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.262979] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.263084]                                                                 ^
[   32.263183]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.263285]  fff00000c56e9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.263422] ==================================================================

[   21.111456] ==================================================================
[   21.112490] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.113189] Write of size 1 at addr ffff8881023ac278 by task kunit_try_catch/171
[   21.113843] 
[   21.114206] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.114306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.114328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.114359] Call Trace:
[   21.114398]  <TASK>
[   21.114433]  dump_stack_lvl+0x73/0xb0
[   21.114503]  print_report+0xd1/0x650
[   21.114545]  ? __virt_addr_valid+0x1db/0x2d0
[   21.114572]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.114595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.114619]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.114642]  kasan_report+0x141/0x180
[   21.114663]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.114690]  __asan_report_store1_noabort+0x1b/0x30
[   21.114712]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.114735]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   21.114759]  ? __schedule+0x10cc/0x2b60
[   21.114779]  ? __pfx_read_tsc+0x10/0x10
[   21.114798]  ? ktime_get_ts64+0x86/0x230
[   21.114821]  kunit_try_run_case+0x1a5/0x480
[   21.114864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.114885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.114906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.114926]  ? __kthread_parkme+0x82/0x180
[   21.114945]  ? preempt_count_sub+0x50/0x80
[   21.114967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.114987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.115007]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.115026]  kthread+0x337/0x6f0
[   21.115043]  ? trace_preempt_on+0x20/0xc0
[   21.115063]  ? __pfx_kthread+0x10/0x10
[   21.115088]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.115115]  ? calculate_sigpending+0x7b/0xa0
[   21.115144]  ? __pfx_kthread+0x10/0x10
[   21.115172]  ret_from_fork+0x116/0x1d0
[   21.115198]  ? __pfx_kthread+0x10/0x10
[   21.115221]  ret_from_fork_asm+0x1a/0x30
[   21.115248]  </TASK>
[   21.115259] 
[   21.125773] Allocated by task 171:
[   21.126214]  kasan_save_stack+0x45/0x70
[   21.126591]  kasan_save_track+0x18/0x40
[   21.126963]  kasan_save_alloc_info+0x3b/0x50
[   21.127414]  __kasan_kmalloc+0xb7/0xc0
[   21.127793]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   21.128259]  kmalloc_track_caller_oob_right+0x19a/0x520
[   21.128730]  kunit_try_run_case+0x1a5/0x480
[   21.129421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.129787]  kthread+0x337/0x6f0
[   21.130223]  ret_from_fork+0x116/0x1d0
[   21.130643]  ret_from_fork_asm+0x1a/0x30
[   21.130864] 
[   21.131105] The buggy address belongs to the object at ffff8881023ac200
[   21.131105]  which belongs to the cache kmalloc-128 of size 128
[   21.131653] The buggy address is located 0 bytes to the right of
[   21.131653]  allocated 120-byte region [ffff8881023ac200, ffff8881023ac278)
[   21.132200] 
[   21.132298] The buggy address belongs to the physical page:
[   21.132661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023ac
[   21.133084] flags: 0x200000000000000(node=0|zone=2)
[   21.133339] page_type: f5(slab)
[   21.133993] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.134742] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.135055] page dumped because: kasan: bad access detected
[   21.135587] 
[   21.135736] Memory state around the buggy address:
[   21.135992]  ffff8881023ac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.136533]  ffff8881023ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.136887] >ffff8881023ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.137563]                                                                 ^
[   21.138144]  ffff8881023ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.138777]  ffff8881023ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.139373] ==================================================================
[   21.083735] ==================================================================
[   21.084141] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.084651] Write of size 1 at addr ffff8881023ac178 by task kunit_try_catch/171
[   21.085558] 
[   21.085790] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.085873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.085896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.085931] Call Trace:
[   21.085950]  <TASK>
[   21.085967]  dump_stack_lvl+0x73/0xb0
[   21.085998]  print_report+0xd1/0x650
[   21.086031]  ? __virt_addr_valid+0x1db/0x2d0
[   21.086055]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.086230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.086284]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.086322]  kasan_report+0x141/0x180
[   21.086358]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.086469]  __asan_report_store1_noabort+0x1b/0x30
[   21.086513]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.086558]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   21.086584]  ? __schedule+0x10cc/0x2b60
[   21.086605]  ? __pfx_read_tsc+0x10/0x10
[   21.086626]  ? ktime_get_ts64+0x86/0x230
[   21.086649]  kunit_try_run_case+0x1a5/0x480
[   21.086672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.086693]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.086714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.086735]  ? __kthread_parkme+0x82/0x180
[   21.086754]  ? preempt_count_sub+0x50/0x80
[   21.086776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.086799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.086820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.086859]  kthread+0x337/0x6f0
[   21.086880]  ? trace_preempt_on+0x20/0xc0
[   21.086902]  ? __pfx_kthread+0x10/0x10
[   21.086921]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.086941]  ? calculate_sigpending+0x7b/0xa0
[   21.086964]  ? __pfx_kthread+0x10/0x10
[   21.086984]  ret_from_fork+0x116/0x1d0
[   21.086999]  ? __pfx_kthread+0x10/0x10
[   21.087017]  ret_from_fork_asm+0x1a/0x30
[   21.087044]  </TASK>
[   21.087056] 
[   21.097417] Allocated by task 171:
[   21.097570]  kasan_save_stack+0x45/0x70
[   21.097720]  kasan_save_track+0x18/0x40
[   21.098188]  kasan_save_alloc_info+0x3b/0x50
[   21.098578]  __kasan_kmalloc+0xb7/0xc0
[   21.098968]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   21.099536]  kmalloc_track_caller_oob_right+0x99/0x520
[   21.099977]  kunit_try_run_case+0x1a5/0x480
[   21.100583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.100962]  kthread+0x337/0x6f0
[   21.101193]  ret_from_fork+0x116/0x1d0
[   21.101476]  ret_from_fork_asm+0x1a/0x30
[   21.101645] 
[   21.101731] The buggy address belongs to the object at ffff8881023ac100
[   21.101731]  which belongs to the cache kmalloc-128 of size 128
[   21.102882] The buggy address is located 0 bytes to the right of
[   21.102882]  allocated 120-byte region [ffff8881023ac100, ffff8881023ac178)
[   21.103675] 
[   21.103825] The buggy address belongs to the physical page:
[   21.104320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023ac
[   21.104861] flags: 0x200000000000000(node=0|zone=2)
[   21.105372] page_type: f5(slab)
[   21.105643] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.106293] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.106696] page dumped because: kasan: bad access detected
[   21.106981] 
[   21.107336] Memory state around the buggy address:
[   21.107544]  ffff8881023ac000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.108009]  ffff8881023ac080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.108630] >ffff8881023ac100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.109012]                                                                 ^
[   21.109506]  ffff8881023ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.109916]  ffff8881023ac200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.110461] ==================================================================