Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   37.523285] ==================================================================
[   37.533081] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   37.541150] Write of size 1 at addr ffff00080193aa78 by task kunit_try_catch/226
[   37.548527] 
[   37.550015] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   37.550073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.550089] Hardware name: WinLink E850-96 board (DT)
[   37.550111] Call trace:
[   37.550126]  show_stack+0x20/0x38 (C)
[   37.550159]  dump_stack_lvl+0x8c/0xd0
[   37.550194]  print_report+0x118/0x5d0
[   37.550223]  kasan_report+0xdc/0x128
[   37.550249]  __asan_report_store1_noabort+0x20/0x30
[   37.550289]  kmalloc_track_caller_oob_right+0x40c/0x488
[   37.550325]  kunit_try_run_case+0x170/0x3f0
[   37.550362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.550395]  kthread+0x328/0x630
[   37.550425]  ret_from_fork+0x10/0x20
[   37.550461] 
[   37.615194] Allocated by task 226:
[   37.618584]  kasan_save_stack+0x3c/0x68
[   37.622398]  kasan_save_track+0x20/0x40
[   37.626217]  kasan_save_alloc_info+0x40/0x58
[   37.630470]  __kasan_kmalloc+0xd4/0xd8
[   37.634203]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   37.639758]  kmalloc_track_caller_oob_right+0xa8/0x488
[   37.644880]  kunit_try_run_case+0x170/0x3f0
[   37.649046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.654517]  kthread+0x328/0x630
[   37.657727]  ret_from_fork+0x10/0x20
[   37.661286] 
[   37.662764] The buggy address belongs to the object at ffff00080193aa00
[   37.662764]  which belongs to the cache kmalloc-128 of size 128
[   37.675264] The buggy address is located 0 bytes to the right of
[   37.675264]  allocated 120-byte region [ffff00080193aa00, ffff00080193aa78)
[   37.688195] 
[   37.689674] The buggy address belongs to the physical page:
[   37.695232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   37.703214] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.710853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.717797] page_type: f5(slab)
[   37.720931] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.728652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.736381] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.744191] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.752004] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   37.759816] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.767621] page dumped because: kasan: bad access detected
[   37.773176] 
[   37.774652] Memory state around the buggy address:
[   37.779431]  ffff00080193a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.786635]  ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.793842] >ffff00080193aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.801041]                                                                 ^
[   37.808163]  ffff00080193aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.815367]  ffff00080193ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.822570] ==================================================================

[   30.091483] ==================================================================
[   30.091548] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.091611] Write of size 1 at addr fff00000c91b3478 by task kunit_try_catch/173
[   30.091661] 
[   30.091699] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.091781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091807] Hardware name: linux,dummy-virt (DT)
[   30.091838] Call trace:
[   30.091861]  show_stack+0x20/0x38 (C)
[   30.091910]  dump_stack_lvl+0x8c/0xd0
[   30.091956]  print_report+0x118/0x5d0
[   30.091999]  kasan_report+0xdc/0x128
[   30.092041]  __asan_report_store1_noabort+0x20/0x30
[   30.092132]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.092186]  kunit_try_run_case+0x170/0x3f0
[   30.092301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.092371]  kthread+0x328/0x630
[   30.092432]  ret_from_fork+0x10/0x20
[   30.092493] 
[   30.092512] Allocated by task 173:
[   30.092559]  kasan_save_stack+0x3c/0x68
[   30.092628]  kasan_save_track+0x20/0x40
[   30.092667]  kasan_save_alloc_info+0x40/0x58
[   30.092703]  __kasan_kmalloc+0xd4/0xd8
[   30.092739]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.092800]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.092869]  kunit_try_run_case+0x170/0x3f0
[   30.092926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.092994]  kthread+0x328/0x630
[   30.093060]  ret_from_fork+0x10/0x20
[   30.093095] 
[   30.093113] The buggy address belongs to the object at fff00000c91b3400
[   30.093113]  which belongs to the cache kmalloc-128 of size 128
[   30.093185] The buggy address is located 0 bytes to the right of
[   30.093185]  allocated 120-byte region [fff00000c91b3400, fff00000c91b3478)
[   30.093466] 
[   30.093596] The buggy address belongs to the physical page:
[   30.093706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.093822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.093892] page_type: f5(slab)
[   30.093970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.094020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.094058] page dumped because: kasan: bad access detected
[   30.094112] 
[   30.094130] Memory state around the buggy address:
[   30.094162]  fff00000c91b3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.094203]  fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094243] >fff00000c91b3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.094279]                                                                 ^
[   30.094317]  fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094367]  fff00000c91b3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094403] ==================================================================
[   30.095650] ==================================================================
[   30.095714] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.095771] Write of size 1 at addr fff00000c91b3578 by task kunit_try_catch/173
[   30.095966] 
[   30.096035] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.096117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.096205] Hardware name: linux,dummy-virt (DT)
[   30.096255] Call trace:
[   30.096293]  show_stack+0x20/0x38 (C)
[   30.096373]  dump_stack_lvl+0x8c/0xd0
[   30.096440]  print_report+0x118/0x5d0
[   30.096485]  kasan_report+0xdc/0x128
[   30.096529]  __asan_report_store1_noabort+0x20/0x30
[   30.096603]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.096670]  kunit_try_run_case+0x170/0x3f0
[   30.096737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.096786]  kthread+0x328/0x630
[   30.096842]  ret_from_fork+0x10/0x20
[   30.096909] 
[   30.096928] Allocated by task 173:
[   30.096955]  kasan_save_stack+0x3c/0x68
[   30.097011]  kasan_save_track+0x20/0x40
[   30.097073]  kasan_save_alloc_info+0x40/0x58
[   30.097110]  __kasan_kmalloc+0xd4/0xd8
[   30.097157]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.097207]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.097252]  kunit_try_run_case+0x170/0x3f0
[   30.097397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.097524]  kthread+0x328/0x630
[   30.097602]  ret_from_fork+0x10/0x20
[   30.097756] 
[   30.097857] The buggy address belongs to the object at fff00000c91b3500
[   30.097857]  which belongs to the cache kmalloc-128 of size 128
[   30.097963] The buggy address is located 0 bytes to the right of
[   30.097963]  allocated 120-byte region [fff00000c91b3500, fff00000c91b3578)
[   30.098114] 
[   30.098193] The buggy address belongs to the physical page:
[   30.098291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.098406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.098460] page_type: f5(slab)
[   30.098502] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.098557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.098603] page dumped because: kasan: bad access detected
[   30.098840] 
[   30.098952] Memory state around the buggy address:
[   30.099101]  fff00000c91b3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.099168]  fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099214] >fff00000c91b3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.099257]                                                                 ^
[   30.099303]  fff00000c91b3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099359]  fff00000c91b3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099401] ==================================================================

[   23.153157] ==================================================================
[   23.154000] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.154667] Write of size 1 at addr ffff888105a7ae78 by task kunit_try_catch/192
[   23.155130] 
[   23.155391] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.155499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.155512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.155556] Call Trace:
[   23.155569]  <TASK>
[   23.155589]  dump_stack_lvl+0x73/0xb0
[   23.155621]  print_report+0xd1/0x610
[   23.155642]  ? __virt_addr_valid+0x1db/0x2d0
[   23.155666]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.155690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.155715]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.155749]  kasan_report+0x141/0x180
[   23.155770]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.155797]  __asan_report_store1_noabort+0x1b/0x30
[   23.155821]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.155844]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.155869]  ? __schedule+0x10cc/0x2b60
[   23.155892]  ? __pfx_read_tsc+0x10/0x10
[   23.155913]  ? ktime_get_ts64+0x86/0x230
[   23.155938]  kunit_try_run_case+0x1a5/0x480
[   23.155961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.155981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.156003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.156026]  ? __kthread_parkme+0x82/0x180
[   23.156047]  ? preempt_count_sub+0x50/0x80
[   23.156070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.156091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.156115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.156139]  kthread+0x337/0x6f0
[   23.156158]  ? trace_preempt_on+0x20/0xc0
[   23.156182]  ? __pfx_kthread+0x10/0x10
[   23.156202]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.156223]  ? calculate_sigpending+0x7b/0xa0
[   23.156247]  ? __pfx_kthread+0x10/0x10
[   23.156297]  ret_from_fork+0x116/0x1d0
[   23.156321]  ? __pfx_kthread+0x10/0x10
[   23.156341]  ret_from_fork_asm+0x1a/0x30
[   23.156371]  </TASK>
[   23.156383] 
[   23.164347] Allocated by task 192:
[   23.164475]  kasan_save_stack+0x45/0x70
[   23.164674]  kasan_save_track+0x18/0x40
[   23.164888]  kasan_save_alloc_info+0x3b/0x50
[   23.165156]  __kasan_kmalloc+0xb7/0xc0
[   23.165324]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   23.165603]  kmalloc_track_caller_oob_right+0x99/0x520
[   23.165930]  kunit_try_run_case+0x1a5/0x480
[   23.166099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.166267]  kthread+0x337/0x6f0
[   23.166381]  ret_from_fork+0x116/0x1d0
[   23.166524]  ret_from_fork_asm+0x1a/0x30
[   23.166675] 
[   23.166799] The buggy address belongs to the object at ffff888105a7ae00
[   23.166799]  which belongs to the cache kmalloc-128 of size 128
[   23.167335] The buggy address is located 0 bytes to the right of
[   23.167335]  allocated 120-byte region [ffff888105a7ae00, ffff888105a7ae78)
[   23.167746] 
[   23.167812] The buggy address belongs to the physical page:
[   23.167979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a
[   23.168540] flags: 0x200000000000000(node=0|zone=2)
[   23.168898] page_type: f5(slab)
[   23.169084] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.169610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.169894] page dumped because: kasan: bad access detected
[   23.170059] 
[   23.170121] Memory state around the buggy address:
[   23.170268]  ffff888105a7ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.170608]  ffff888105a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.171043] >ffff888105a7ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.171497]                                                                 ^
[   23.171832]  ffff888105a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.172117]  ffff888105a7af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.172427] ==================================================================
[   23.173069] ==================================================================
[   23.173441] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.173685] Write of size 1 at addr ffff888105a7af78 by task kunit_try_catch/192
[   23.173909] 
[   23.173994] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.174044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.174056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.174077] Call Trace:
[   23.174091]  <TASK>
[   23.174106]  dump_stack_lvl+0x73/0xb0
[   23.174134]  print_report+0xd1/0x610
[   23.174155]  ? __virt_addr_valid+0x1db/0x2d0
[   23.174178]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.174202]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.174227]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.174251]  kasan_report+0x141/0x180
[   23.174271]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.174299]  __asan_report_store1_noabort+0x1b/0x30
[   23.174322]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.174346]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.174370]  ? __schedule+0x10cc/0x2b60
[   23.174436]  ? __pfx_read_tsc+0x10/0x10
[   23.174478]  ? ktime_get_ts64+0x86/0x230
[   23.174503]  kunit_try_run_case+0x1a5/0x480
[   23.174525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.174544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.174569]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.174591]  ? __kthread_parkme+0x82/0x180
[   23.174611]  ? preempt_count_sub+0x50/0x80
[   23.174635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.174656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.174680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.174704]  kthread+0x337/0x6f0
[   23.174723]  ? trace_preempt_on+0x20/0xc0
[   23.174755]  ? __pfx_kthread+0x10/0x10
[   23.174776]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.174797]  ? calculate_sigpending+0x7b/0xa0
[   23.174820]  ? __pfx_kthread+0x10/0x10
[   23.174841]  ret_from_fork+0x116/0x1d0
[   23.174860]  ? __pfx_kthread+0x10/0x10
[   23.174881]  ret_from_fork_asm+0x1a/0x30
[   23.174912]  </TASK>
[   23.174923] 
[   23.182071] Allocated by task 192:
[   23.182220]  kasan_save_stack+0x45/0x70
[   23.182438]  kasan_save_track+0x18/0x40
[   23.182654]  kasan_save_alloc_info+0x3b/0x50
[   23.182942]  __kasan_kmalloc+0xb7/0xc0
[   23.183109]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   23.183392]  kmalloc_track_caller_oob_right+0x19a/0x520
[   23.183687]  kunit_try_run_case+0x1a5/0x480
[   23.184002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.184250]  kthread+0x337/0x6f0
[   23.184433]  ret_from_fork+0x116/0x1d0
[   23.184684]  ret_from_fork_asm+0x1a/0x30
[   23.184891] 
[   23.184996] The buggy address belongs to the object at ffff888105a7af00
[   23.184996]  which belongs to the cache kmalloc-128 of size 128
[   23.185652] The buggy address is located 0 bytes to the right of
[   23.185652]  allocated 120-byte region [ffff888105a7af00, ffff888105a7af78)
[   23.186174] 
[   23.186272] The buggy address belongs to the physical page:
[   23.186521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a
[   23.186883] flags: 0x200000000000000(node=0|zone=2)
[   23.187106] page_type: f5(slab)
[   23.187250] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.187487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.187842] page dumped because: kasan: bad access detected
[   23.188121] 
[   23.188199] Memory state around the buggy address:
[   23.188353]  ffff888105a7ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.188874]  ffff888105a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.189192] >ffff888105a7af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.189421]                                                                 ^
[   23.189626]  ffff888105a7af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.189981]  ffff888105a7b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.190252] ==================================================================