Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   31.413365] ==================================================================
[   31.424924] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   31.433119] Write of size 1 at addr ffff00009462c678 by task kunit_try_catch/228
[   31.440610] 
[   31.442139] CPU: 7 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   31.442170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.442178] Hardware name: Thundercomm Dragonboard 845c (DT)
[   31.442190] Call trace:
[   31.442196]  show_stack+0x20/0x38 (C)
[   31.442214]  dump_stack_lvl+0x8c/0xd0
[   31.442233]  print_report+0x118/0x608
[   31.442251]  kasan_report+0xdc/0x128
[   31.442267]  __asan_report_store1_noabort+0x20/0x30
[   31.442284]  kmalloc_track_caller_oob_right+0x40c/0x488
[   31.442303]  kunit_try_run_case+0x170/0x3f0
[   31.442321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.442340]  kthread+0x328/0x630
[   31.442353]  ret_from_fork+0x10/0x20
[   31.442372] 
[   31.509173] Allocated by task 228:
[   31.512625]  kasan_save_stack+0x3c/0x68
[   31.516531]  kasan_save_track+0x20/0x40
[   31.520433]  kasan_save_alloc_info+0x40/0x58
[   31.524766]  __kasan_kmalloc+0xd4/0xd8
[   31.528579]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   31.534228]  kmalloc_track_caller_oob_right+0xa8/0x488
[   31.539441]  kunit_try_run_case+0x170/0x3f0
[   31.543686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.549248]  kthread+0x328/0x630
[   31.552527]  ret_from_fork+0x10/0x20
[   31.556165] 
[   31.557687] The buggy address belongs to the object at ffff00009462c600
[   31.557687]  which belongs to the cache kmalloc-128 of size 128
[   31.570336] The buggy address is located 0 bytes to the right of
[   31.570336]  allocated 120-byte region [ffff00009462c600, ffff00009462c678)
[   31.583428] 
[   31.584958] The buggy address belongs to the physical page:
[   31.590602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11462c
[   31.598699] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.606447] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.613493] page_type: f5(slab)
[   31.616687] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   31.624525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.632360] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   31.640282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.648206] head: 0bfffe0000000001 fffffdffc2518b01 00000000ffffffff 00000000ffffffff
[   31.656128] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.664047] page dumped because: kasan: bad access detected
[   31.669687] 
[   31.671208] Memory state around the buggy address:
[   31.676064]  ffff00009462c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.683368]  ffff00009462c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.690681] >ffff00009462c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.697992]                                                                 ^
[   31.705214]  ffff00009462c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.712525]  ffff00009462c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.719835] ==================================================================

[   26.572844] ==================================================================
[   26.572971] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   26.573019] Write of size 1 at addr fff00000c643f378 by task kunit_try_catch/154
[   26.573077] 
[   26.573104] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.573185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.573210] Hardware name: linux,dummy-virt (DT)
[   26.573241] Call trace:
[   26.573262]  show_stack+0x20/0x38 (C)
[   26.573309]  dump_stack_lvl+0x8c/0xd0
[   26.573354]  print_report+0x118/0x608
[   26.573422]  kasan_report+0xdc/0x128
[   26.573469]  __asan_report_store1_noabort+0x20/0x30
[   26.573516]  kmalloc_track_caller_oob_right+0x418/0x488
[   26.573645]  kunit_try_run_case+0x170/0x3f0
[   26.573713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.573796]  kthread+0x328/0x630
[   26.573838]  ret_from_fork+0x10/0x20
[   26.573925] 
[   26.573943] Allocated by task 154:
[   26.573968]  kasan_save_stack+0x3c/0x68
[   26.574125]  kasan_save_track+0x20/0x40
[   26.574166]  kasan_save_alloc_info+0x40/0x58
[   26.574298]  __kasan_kmalloc+0xd4/0xd8
[   26.574334]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   26.574375]  kmalloc_track_caller_oob_right+0x184/0x488
[   26.574415]  kunit_try_run_case+0x170/0x3f0
[   26.574451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.574493]  kthread+0x328/0x630
[   26.574537]  ret_from_fork+0x10/0x20
[   26.574571] 
[   26.574588] The buggy address belongs to the object at fff00000c643f300
[   26.574588]  which belongs to the cache kmalloc-128 of size 128
[   26.574667] The buggy address is located 0 bytes to the right of
[   26.574667]  allocated 120-byte region [fff00000c643f300, fff00000c643f378)
[   26.574964] 
[   26.574982] The buggy address belongs to the physical page:
[   26.575022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.575088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.575227] page_type: f5(slab)
[   26.575339] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.575464] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.575520] page dumped because: kasan: bad access detected
[   26.575555] 
[   26.575648] Memory state around the buggy address:
[   26.575677]  fff00000c643f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.575717]  fff00000c643f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575819] >fff00000c643f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.575855]                                                                 ^
[   26.575891]  fff00000c643f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575930]  fff00000c643f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575966] ==================================================================
[   26.569313] ==================================================================
[   26.569367] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   26.569419] Write of size 1 at addr fff00000c643f278 by task kunit_try_catch/154
[   26.569466] 
[   26.569495] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.569578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.569634] Hardware name: linux,dummy-virt (DT)
[   26.569671] Call trace:
[   26.569764]  show_stack+0x20/0x38 (C)
[   26.569812]  dump_stack_lvl+0x8c/0xd0
[   26.569859]  print_report+0x118/0x608
[   26.569905]  kasan_report+0xdc/0x128
[   26.569949]  __asan_report_store1_noabort+0x20/0x30
[   26.569996]  kmalloc_track_caller_oob_right+0x40c/0x488
[   26.570045]  kunit_try_run_case+0x170/0x3f0
[   26.570102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.570166]  kthread+0x328/0x630
[   26.570208]  ret_from_fork+0x10/0x20
[   26.570254] 
[   26.570271] Allocated by task 154:
[   26.570297]  kasan_save_stack+0x3c/0x68
[   26.570335]  kasan_save_track+0x20/0x40
[   26.570371]  kasan_save_alloc_info+0x40/0x58
[   26.570405]  __kasan_kmalloc+0xd4/0xd8
[   26.570439]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   26.570553]  kmalloc_track_caller_oob_right+0xa8/0x488
[   26.570684]  kunit_try_run_case+0x170/0x3f0
[   26.570721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.570762]  kthread+0x328/0x630
[   26.570798]  ret_from_fork+0x10/0x20
[   26.570925] 
[   26.570944] The buggy address belongs to the object at fff00000c643f200
[   26.570944]  which belongs to the cache kmalloc-128 of size 128
[   26.571005] The buggy address is located 0 bytes to the right of
[   26.571005]  allocated 120-byte region [fff00000c643f200, fff00000c643f278)
[   26.571112] 
[   26.571130] The buggy address belongs to the physical page:
[   26.571160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f
[   26.571253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.571298] page_type: f5(slab)
[   26.571334] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   26.571462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.571545] page dumped because: kasan: bad access detected
[   26.571581] 
[   26.571668] Memory state around the buggy address:
[   26.571800]  fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.571841]  fff00000c643f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.571881] >fff00000c643f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.571916]                                                                 ^
[   26.571953]  fff00000c643f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.571992]  fff00000c643f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.572050] ==================================================================

[   21.580311] ==================================================================
[   21.581603] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.582418] Write of size 1 at addr ffff8881024c9878 by task kunit_try_catch/171
[   21.582699] 
[   21.582788] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   21.582847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.582860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.582883] Call Trace:
[   21.582898]  <TASK>
[   21.582918]  dump_stack_lvl+0x73/0xb0
[   21.582949]  print_report+0xd1/0x650
[   21.582973]  ? __virt_addr_valid+0x1db/0x2d0
[   21.582997]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.583021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.583053]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.583077]  kasan_report+0x141/0x180
[   21.583098]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.583126]  __asan_report_store1_noabort+0x1b/0x30
[   21.583149]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   21.583173]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   21.583197]  ? __schedule+0x10cc/0x2b60
[   21.583232]  ? __pfx_read_tsc+0x10/0x10
[   21.583255]  ? ktime_get_ts64+0x86/0x230
[   21.583279]  kunit_try_run_case+0x1a5/0x480
[   21.583306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.583327]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.583351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.583376]  ? __kthread_parkme+0x82/0x180
[   21.583396]  ? preempt_count_sub+0x50/0x80
[   21.583419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.583442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.583465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.583488]  kthread+0x337/0x6f0
[   21.583507]  ? trace_preempt_on+0x20/0xc0
[   21.583530]  ? __pfx_kthread+0x10/0x10
[   21.583550]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.583572]  ? calculate_sigpending+0x7b/0xa0
[   21.583596]  ? __pfx_kthread+0x10/0x10
[   21.583616]  ret_from_fork+0x116/0x1d0
[   21.583635]  ? __pfx_kthread+0x10/0x10
[   21.583655]  ret_from_fork_asm+0x1a/0x30
[   21.583686]  </TASK>
[   21.583698] 
[   21.596715] Allocated by task 171:
[   21.597028]  kasan_save_stack+0x45/0x70
[   21.597411]  kasan_save_track+0x18/0x40
[   21.597784]  kasan_save_alloc_info+0x3b/0x50
[   21.598325]  __kasan_kmalloc+0xb7/0xc0
[   21.598620]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   21.598887]  kmalloc_track_caller_oob_right+0x99/0x520
[   21.599508]  kunit_try_run_case+0x1a5/0x480
[   21.599995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.600372]  kthread+0x337/0x6f0
[   21.600491]  ret_from_fork+0x116/0x1d0
[   21.600618]  ret_from_fork_asm+0x1a/0x30
[   21.600752] 
[   21.600932] The buggy address belongs to the object at ffff8881024c9800
[   21.600932]  which belongs to the cache kmalloc-128 of size 128
[   21.602158] The buggy address is located 0 bytes to the right of
[   21.602158]  allocated 120-byte region [ffff8881024c9800, ffff8881024c9878)
[   21.603418] 
[   21.603495] The buggy address belongs to the physical page:
[   21.603665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024c9
[   21.603904] flags: 0x200000000000000(node=0|zone=2)
[   21.604084] page_type: f5(slab)
[   21.604203] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.604726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.605058] page dumped because: kasan: bad access detected
[   21.605346] 
[   21.605498] Memory state around the buggy address:
[   21.605651]  ffff8881024c9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.606214]  ffff8881024c9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.606536] >ffff8881024c9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.606806]                                                                 ^
[   21.607082]  ffff8881024c9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.607670]  ffff8881024c9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.608071] ==================================================================
[   21.609372] ==================================================================
[   21.609764] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.610460] Write of size 1 at addr ffff8881024c9978 by task kunit_try_catch/171
[   21.610763] 
[   21.610950] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   21.611016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.611043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.611065] Call Trace:
[   21.611089]  <TASK>
[   21.611107]  dump_stack_lvl+0x73/0xb0
[   21.611137]  print_report+0xd1/0x650
[   21.611159]  ? __virt_addr_valid+0x1db/0x2d0
[   21.611182]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.611205]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.611241]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.611274]  kasan_report+0x141/0x180
[   21.611295]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.611333]  __asan_report_store1_noabort+0x1b/0x30
[   21.611357]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   21.611380]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   21.611404]  ? __schedule+0x10cc/0x2b60
[   21.611429]  ? __pfx_read_tsc+0x10/0x10
[   21.611451]  ? ktime_get_ts64+0x86/0x230
[   21.611475]  kunit_try_run_case+0x1a5/0x480
[   21.611508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.611530]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.611564]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.611589]  ? __kthread_parkme+0x82/0x180
[   21.611609]  ? preempt_count_sub+0x50/0x80
[   21.611632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.611663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.611686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.611709]  kthread+0x337/0x6f0
[   21.611738]  ? trace_preempt_on+0x20/0xc0
[   21.611761]  ? __pfx_kthread+0x10/0x10
[   21.611781]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.611847]  ? calculate_sigpending+0x7b/0xa0
[   21.611874]  ? __pfx_kthread+0x10/0x10
[   21.611894]  ret_from_fork+0x116/0x1d0
[   21.611913]  ? __pfx_kthread+0x10/0x10
[   21.611933]  ret_from_fork_asm+0x1a/0x30
[   21.611963]  </TASK>
[   21.611975] 
[   21.620002] Allocated by task 171:
[   21.620193]  kasan_save_stack+0x45/0x70
[   21.620381]  kasan_save_track+0x18/0x40
[   21.620512]  kasan_save_alloc_info+0x3b/0x50
[   21.620653]  __kasan_kmalloc+0xb7/0xc0
[   21.620900]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   21.621358]  kmalloc_track_caller_oob_right+0x19a/0x520
[   21.621604]  kunit_try_run_case+0x1a5/0x480
[   21.621777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.622681]  kthread+0x337/0x6f0
[   21.622880]  ret_from_fork+0x116/0x1d0
[   21.623131]  ret_from_fork_asm+0x1a/0x30
[   21.623325] 
[   21.623392] The buggy address belongs to the object at ffff8881024c9900
[   21.623392]  which belongs to the cache kmalloc-128 of size 128
[   21.623913] The buggy address is located 0 bytes to the right of
[   21.623913]  allocated 120-byte region [ffff8881024c9900, ffff8881024c9978)
[   21.625358] 
[   21.625460] The buggy address belongs to the physical page:
[   21.625905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024c9
[   21.626273] flags: 0x200000000000000(node=0|zone=2)
[   21.626484] page_type: f5(slab)
[   21.626630] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.627317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.627764] page dumped because: kasan: bad access detected
[   21.628081] 
[   21.628167] Memory state around the buggy address:
[   21.628376]  ffff8881024c9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.628659]  ffff8881024c9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.629433] >ffff8881024c9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.629780]                                                                 ^
[   21.630492]  ffff8881024c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.630979]  ffff8881024c9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.631631] ==================================================================