Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.789738] ==================================================================
[   30.789803] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.790442] Write of size 16 at addr fff00000c919c720 by task kunit_try_catch/199
[   30.790567] 
[   30.790603] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.790751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.790812] Hardware name: linux,dummy-virt (DT)
[   30.790846] Call trace:
[   30.790878]  show_stack+0x20/0x38 (C)
[   30.790981]  dump_stack_lvl+0x8c/0xd0
[   30.791049]  print_report+0x118/0x608
[   30.791146]  kasan_report+0xdc/0x128
[   30.791202]  __asan_report_store16_noabort+0x20/0x30
[   30.791258]  kmalloc_oob_16+0x3a0/0x3f8
[   30.791336]  kunit_try_run_case+0x170/0x3f0
[   30.791393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.791446]  kthread+0x328/0x630
[   30.791496]  ret_from_fork+0x10/0x20
[   30.791657] 
[   30.791686] Allocated by task 199:
[   30.791806]  kasan_save_stack+0x3c/0x68
[   30.791974]  kasan_save_track+0x20/0x40
[   30.792250]  kasan_save_alloc_info+0x40/0x58
[   30.792352]  __kasan_kmalloc+0xd4/0xd8
[   30.792526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.792644]  kmalloc_oob_16+0xb4/0x3f8
[   30.792712]  kunit_try_run_case+0x170/0x3f0
[   30.792828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.792906]  kthread+0x328/0x630
[   30.792951]  ret_from_fork+0x10/0x20
[   30.793102] 
[   30.793266] The buggy address belongs to the object at fff00000c919c720
[   30.793266]  which belongs to the cache kmalloc-16 of size 16
[   30.793326] The buggy address is located 0 bytes inside of
[   30.793326]  allocated 13-byte region [fff00000c919c720, fff00000c919c72d)
[   30.793624] 
[   30.793710] The buggy address belongs to the physical page:
[   30.793759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c919c6c0 pfn:0x10919c
[   30.794063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.794218] page_type: f5(slab)
[   30.794304] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.794389] raw: fff00000c919c6c0 000000008080007f 00000000f5000000 0000000000000000
[   30.794575] page dumped because: kasan: bad access detected
[   30.794742] 
[   30.794834] Memory state around the buggy address:
[   30.794893]  fff00000c919c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.795258]  fff00000c919c680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   30.795328] >fff00000c919c700: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   30.795409]                                   ^
[   30.795464]  fff00000c919c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.795515]  fff00000c919c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.795775] ==================================================================

[   32.569251] ==================================================================
[   32.569462] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   32.569613] Write of size 16 at addr fff00000c5788920 by task kunit_try_catch/197
[   32.569764] 
[   32.569795] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.569879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.569905] Hardware name: linux,dummy-virt (DT)
[   32.569947] Call trace:
[   32.569969]  show_stack+0x20/0x38 (C)
[   32.570018]  dump_stack_lvl+0x8c/0xd0
[   32.570300]  print_report+0x118/0x608
[   32.570437]  kasan_report+0xdc/0x128
[   32.570483]  __asan_report_store16_noabort+0x20/0x30
[   32.570548]  kmalloc_oob_16+0x3a0/0x3f8
[   32.570593]  kunit_try_run_case+0x170/0x3f0
[   32.570642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.570896]  kthread+0x328/0x630
[   32.570944]  ret_from_fork+0x10/0x20
[   32.570992] 
[   32.571010] Allocated by task 197:
[   32.571037]  kasan_save_stack+0x3c/0x68
[   32.571077]  kasan_save_track+0x20/0x40
[   32.571114]  kasan_save_alloc_info+0x40/0x58
[   32.571170]  __kasan_kmalloc+0xd4/0xd8
[   32.571207]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.571246]  kmalloc_oob_16+0xb4/0x3f8
[   32.571280]  kunit_try_run_case+0x170/0x3f0
[   32.571544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.571758]  kthread+0x328/0x630
[   32.571794]  ret_from_fork+0x10/0x20
[   32.571855] 
[   32.571875] The buggy address belongs to the object at fff00000c5788920
[   32.571875]  which belongs to the cache kmalloc-16 of size 16
[   32.571932] The buggy address is located 0 bytes inside of
[   32.571932]  allocated 13-byte region [fff00000c5788920, fff00000c578892d)
[   32.572067] 
[   32.572090] The buggy address belongs to the physical page:
[   32.572127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105788
[   32.572238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.572383] page_type: f5(slab)
[   32.572452] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.572502] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.572541] page dumped because: kasan: bad access detected
[   32.572571] 
[   32.572588] Memory state around the buggy address:
[   32.572617]  fff00000c5788800: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.572659]  fff00000c5788880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.572756] >fff00000c5788900: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   32.572894]                                   ^
[   32.572925]  fff00000c5788980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.572972]  fff00000c5788a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.573047] ==================================================================

[   23.054954] ==================================================================
[   23.055379] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   23.055629] Write of size 16 at addr ffff8881048b6320 by task kunit_try_catch/214
[   23.056018] 
[   23.056131] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.056180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.056193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.056213] Call Trace:
[   23.056226]  <TASK>
[   23.056242]  dump_stack_lvl+0x73/0xb0
[   23.056271]  print_report+0xd1/0x650
[   23.056292]  ? __virt_addr_valid+0x1db/0x2d0
[   23.056328]  ? kmalloc_oob_16+0x452/0x4a0
[   23.056348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.056373]  ? kmalloc_oob_16+0x452/0x4a0
[   23.056394]  kasan_report+0x141/0x180
[   23.056415]  ? kmalloc_oob_16+0x452/0x4a0
[   23.056440]  __asan_report_store16_noabort+0x1b/0x30
[   23.056464]  kmalloc_oob_16+0x452/0x4a0
[   23.056484]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   23.056518]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   23.056543]  kunit_try_run_case+0x1a5/0x480
[   23.056568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.056591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.056612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.056633]  ? __kthread_parkme+0x82/0x180
[   23.056653]  ? preempt_count_sub+0x50/0x80
[   23.056686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.056711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.056734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.056758]  kthread+0x337/0x6f0
[   23.056778]  ? trace_preempt_on+0x20/0xc0
[   23.056801]  ? __pfx_kthread+0x10/0x10
[   23.056821]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.056845]  ? calculate_sigpending+0x7b/0xa0
[   23.056868]  ? __pfx_kthread+0x10/0x10
[   23.056889]  ret_from_fork+0x116/0x1d0
[   23.056908]  ? __pfx_kthread+0x10/0x10
[   23.056928]  ret_from_fork_asm+0x1a/0x30
[   23.056958]  </TASK>
[   23.056969] 
[   23.063120] Allocated by task 214:
[   23.063275]  kasan_save_stack+0x45/0x70
[   23.063468]  kasan_save_track+0x18/0x40
[   23.064088]  kasan_save_alloc_info+0x3b/0x50
[   23.064262]  __kasan_kmalloc+0xb7/0xc0
[   23.064454]  __kmalloc_cache_noprof+0x189/0x420
[   23.064688]  kmalloc_oob_16+0xa8/0x4a0
[   23.064937]  kunit_try_run_case+0x1a5/0x480
[   23.065095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.065297]  kthread+0x337/0x6f0
[   23.065444]  ret_from_fork+0x116/0x1d0
[   23.065666]  ret_from_fork_asm+0x1a/0x30
[   23.065863] 
[   23.065945] The buggy address belongs to the object at ffff8881048b6320
[   23.065945]  which belongs to the cache kmalloc-16 of size 16
[   23.066394] The buggy address is located 0 bytes inside of
[   23.066394]  allocated 13-byte region [ffff8881048b6320, ffff8881048b632d)
[   23.066813] 
[   23.066891] The buggy address belongs to the physical page:
[   23.067198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048b6
[   23.067555] flags: 0x200000000000000(node=0|zone=2)
[   23.067713] page_type: f5(slab)
[   23.067856] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.068485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.068794] page dumped because: kasan: bad access detected
[   23.069077] 
[   23.069153] Memory state around the buggy address:
[   23.069302]  ffff8881048b6200: 00 06 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   23.069838]  ffff8881048b6280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.070086] >ffff8881048b6300: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   23.070290]                                   ^
[   23.070511]  ffff8881048b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.070837]  ffff8881048b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071039] ==================================================================

[   23.310932] ==================================================================
[   23.311432] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   23.311730] Write of size 16 at addr ffff8881049ad500 by task kunit_try_catch/215
[   23.312322] 
[   23.312452] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.312506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.312519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.312542] Call Trace:
[   23.312556]  <TASK>
[   23.312577]  dump_stack_lvl+0x73/0xb0
[   23.312613]  print_report+0xd1/0x650
[   23.312637]  ? __virt_addr_valid+0x1db/0x2d0
[   23.312662]  ? kmalloc_oob_16+0x452/0x4a0
[   23.312682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.312708]  ? kmalloc_oob_16+0x452/0x4a0
[   23.312728]  kasan_report+0x141/0x180
[   23.312749]  ? kmalloc_oob_16+0x452/0x4a0
[   23.312773]  __asan_report_store16_noabort+0x1b/0x30
[   23.312797]  kmalloc_oob_16+0x452/0x4a0
[   23.312817]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   23.312839]  ? __schedule+0x10cc/0x2b60
[   23.312860]  ? __pfx_read_tsc+0x10/0x10
[   23.312883]  ? ktime_get_ts64+0x86/0x230
[   23.312910]  kunit_try_run_case+0x1a5/0x480
[   23.312960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.312982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.313005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.313027]  ? __kthread_parkme+0x82/0x180
[   23.313048]  ? preempt_count_sub+0x50/0x80
[   23.313082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.313106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.313131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.313154]  kthread+0x337/0x6f0
[   23.313235]  ? trace_preempt_on+0x20/0xc0
[   23.313264]  ? __pfx_kthread+0x10/0x10
[   23.313285]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.313309]  ? calculate_sigpending+0x7b/0xa0
[   23.313334]  ? __pfx_kthread+0x10/0x10
[   23.313356]  ret_from_fork+0x116/0x1d0
[   23.313375]  ? __pfx_kthread+0x10/0x10
[   23.313396]  ret_from_fork_asm+0x1a/0x30
[   23.313427]  </TASK>
[   23.313440] 
[   23.320402] Allocated by task 215:
[   23.320542]  kasan_save_stack+0x45/0x70
[   23.320688]  kasan_save_track+0x18/0x40
[   23.320818]  kasan_save_alloc_info+0x3b/0x50
[   23.321050]  __kasan_kmalloc+0xb7/0xc0
[   23.321316]  __kmalloc_cache_noprof+0x189/0x420
[   23.321542]  kmalloc_oob_16+0xa8/0x4a0
[   23.321726]  kunit_try_run_case+0x1a5/0x480
[   23.321938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.322357]  kthread+0x337/0x6f0
[   23.322530]  ret_from_fork+0x116/0x1d0
[   23.322702]  ret_from_fork_asm+0x1a/0x30
[   23.322882] 
[   23.323716] The buggy address belongs to the object at ffff8881049ad500
[   23.323716]  which belongs to the cache kmalloc-16 of size 16
[   23.324537] The buggy address is located 0 bytes inside of
[   23.324537]  allocated 13-byte region [ffff8881049ad500, ffff8881049ad50d)
[   23.325013] 
[   23.325118] The buggy address belongs to the physical page:
[   23.325359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   23.325690] flags: 0x200000000000000(node=0|zone=2)
[   23.325920] page_type: f5(slab)
[   23.326542] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.327144] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.327885] page dumped because: kasan: bad access detected
[   23.328358] 
[   23.328628] Memory state around the buggy address:
[   23.328914]  ffff8881049ad400: 00 06 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   23.329458]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.329744] >ffff8881049ad500: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.330403]                       ^
[   23.330709]  ffff8881049ad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.331412]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.331717] ==================================================================