Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   36.858018] ==================================================================
[   36.867155] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   36.874006] Read of size 1 at addr ffff000804b5a03f by task kunit_try_catch/222
[   36.881298] 
[   36.882784] CPU: 2 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   36.882836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.882852] Hardware name: WinLink E850-96 board (DT)
[   36.882874] Call trace:
[   36.882887]  show_stack+0x20/0x38 (C)
[   36.882924]  dump_stack_lvl+0x8c/0xd0
[   36.882959]  print_report+0x118/0x5d0
[   36.882986]  kasan_report+0xdc/0x128
[   36.883013]  __asan_report_load1_noabort+0x20/0x30
[   36.883046]  kmalloc_oob_left+0x2ec/0x320
[   36.883077]  kunit_try_run_case+0x170/0x3f0
[   36.883113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.883144]  kthread+0x328/0x630
[   36.883175]  ret_from_fork+0x10/0x20
[   36.883211] 
[   36.946664] Allocated by task 152:
[   36.950050]  kasan_save_stack+0x3c/0x68
[   36.953867]  kasan_save_track+0x20/0x40
[   36.957687]  kasan_save_alloc_info+0x40/0x58
[   36.961939]  __kasan_kmalloc+0xd4/0xd8
[   36.965671]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   36.971227]  kvasprintf+0xe0/0x180
[   36.974612]  kasprintf+0xd0/0x110
[   36.977910]  miscdev_test_can_open+0xac/0x2c8
[   36.982251]  miscdev_test_conflict+0x1e0/0x338
[   36.986678]  kunit_try_run_case+0x170/0x3f0
[   36.990846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.996313]  kthread+0x328/0x630
[   36.999525]  ret_from_fork+0x10/0x20
[   37.003084] 
[   37.004561] Freed by task 152:
[   37.007601]  kasan_save_stack+0x3c/0x68
[   37.011417]  kasan_save_track+0x20/0x40
[   37.015238]  kasan_save_free_info+0x4c/0x78
[   37.019403]  __kasan_slab_free+0x6c/0x98
[   37.023309]  kfree+0x214/0x3c8
[   37.026347]  miscdev_test_can_open+0x138/0x2c8
[   37.030774]  miscdev_test_conflict+0x1e0/0x338
[   37.035201]  kunit_try_run_case+0x170/0x3f0
[   37.039368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.044837]  kthread+0x328/0x630
[   37.048050]  ret_from_fork+0x10/0x20
[   37.051607] 
[   37.053086] The buggy address belongs to the object at ffff000804b5a020
[   37.053086]  which belongs to the cache kmalloc-16 of size 16
[   37.065413] The buggy address is located 15 bytes to the right of
[   37.065413]  allocated 16-byte region [ffff000804b5a020, ffff000804b5a030)
[   37.078343] 
[   37.079821] The buggy address belongs to the physical page:
[   37.085378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b5a
[   37.093365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.099872] page_type: f5(slab)
[   37.103009] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   37.110728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   37.118448] page dumped because: kasan: bad access detected
[   37.124002] 
[   37.125478] Memory state around the buggy address:
[   37.130259]  ffff000804b59f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.137460]  ffff000804b59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.144667] >ffff000804b5a000: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   37.151866]                                         ^
[   37.156904]  ffff000804b5a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.164109]  ffff000804b5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.171312] ==================================================================

[   29.299790] ==================================================================
[   29.299880] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.299936] Read of size 1 at addr fff00000c64c1a5f by task kunit_try_catch/169
[   29.300012] 
[   29.300207] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.300374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.300497] Hardware name: linux,dummy-virt (DT)
[   29.300550] Call trace:
[   29.300609]  show_stack+0x20/0x38 (C)
[   29.300695]  dump_stack_lvl+0x8c/0xd0
[   29.300772]  print_report+0x118/0x5d0
[   29.300815]  kasan_report+0xdc/0x128
[   29.300894]  __asan_report_load1_noabort+0x20/0x30
[   29.300941]  kmalloc_oob_left+0x2ec/0x320
[   29.300985]  kunit_try_run_case+0x170/0x3f0
[   29.301032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.301093]  kthread+0x328/0x630
[   29.301134]  ret_from_fork+0x10/0x20
[   29.301182] 
[   29.301200] Allocated by task 110:
[   29.301229]  kasan_save_stack+0x3c/0x68
[   29.301268]  kasan_save_track+0x20/0x40
[   29.301305]  kasan_save_alloc_info+0x40/0x58
[   29.301340]  __kasan_kmalloc+0xd4/0xd8
[   29.301375]  __kmalloc_noprof+0x198/0x4c8
[   29.301412]  kunit_kmalloc_array+0x34/0x88
[   29.301448]  test_readerwriter+0x3b0/0x948
[   29.301623]  kunit_try_run_case+0x170/0x3f0
[   29.301669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.301797]  kthread+0x328/0x630
[   29.301916]  ret_from_fork+0x10/0x20
[   29.302013] 
[   29.302148] The buggy address belongs to the object at fff00000c64c1a40
[   29.302148]  which belongs to the cache kmalloc-16 of size 16
[   29.302223] The buggy address is located 15 bytes to the right of
[   29.302223]  allocated 16-byte region [fff00000c64c1a40, fff00000c64c1a50)
[   29.302512] 
[   29.302577] The buggy address belongs to the physical page:
[   29.302625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1
[   29.302758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.302896] page_type: f5(slab)
[   29.302959] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.303311] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000
[   29.303423] page dumped because: kasan: bad access detected
[   29.303571] 
[   29.303655] Memory state around the buggy address:
[   29.303688]  fff00000c64c1900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.303784]  fff00000c64c1980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.304070] >fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   29.304110]                                                     ^
[   29.304154]  fff00000c64c1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.304432]  fff00000c64c1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.304566] ==================================================================

[   23.529758] ==================================================================
[   23.530487] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   23.531085] Read of size 1 at addr ffff8881058420bf by task kunit_try_catch/187
[   23.531572] 
[   23.532049] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.532109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.532122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.532145] Call Trace:
[   23.532162]  <TASK>
[   23.532181]  dump_stack_lvl+0x73/0xb0
[   23.532217]  print_report+0xd1/0x610
[   23.532239]  ? __virt_addr_valid+0x1db/0x2d0
[   23.532263]  ? kmalloc_oob_left+0x361/0x3c0
[   23.532283]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.532307]  ? kmalloc_oob_left+0x361/0x3c0
[   23.532327]  kasan_report+0x141/0x180
[   23.532347]  ? kmalloc_oob_left+0x361/0x3c0
[   23.532371]  __asan_report_load1_noabort+0x18/0x20
[   23.532395]  kmalloc_oob_left+0x361/0x3c0
[   23.532416]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   23.532437]  ? __schedule+0x10cc/0x2b60
[   23.532460]  ? __pfx_read_tsc+0x10/0x10
[   23.532483]  ? ktime_get_ts64+0x86/0x230
[   23.532509]  kunit_try_run_case+0x1a5/0x480
[   23.532533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.532553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.532575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.532598]  ? __kthread_parkme+0x82/0x180
[   23.532620]  ? preempt_count_sub+0x50/0x80
[   23.532643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.532675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.532699]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.532723]  kthread+0x337/0x6f0
[   23.532742]  ? trace_preempt_on+0x20/0xc0
[   23.532768]  ? __pfx_kthread+0x10/0x10
[   23.532787]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.532808]  ? calculate_sigpending+0x7b/0xa0
[   23.532831]  ? __pfx_kthread+0x10/0x10
[   23.532852]  ret_from_fork+0x116/0x1d0
[   23.532870]  ? __pfx_kthread+0x10/0x10
[   23.532890]  ret_from_fork_asm+0x1a/0x30
[   23.532920]  </TASK>
[   23.532931] 
[   23.543529] Allocated by task 119:
[   23.543947]  kasan_save_stack+0x45/0x70
[   23.544266]  kasan_save_track+0x18/0x40
[   23.544549]  kasan_save_alloc_info+0x3b/0x50
[   23.544916]  __kasan_kmalloc+0xb7/0xc0
[   23.545228]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   23.545550]  kvasprintf+0xc5/0x150
[   23.545889]  kasprintf+0xb6/0xf0
[   23.546238]  miscdev_test_can_open+0x9a/0x2e0
[   23.546401]  miscdev_test_collision_reverse+0x402/0x750
[   23.546648]  kunit_try_run_case+0x1a5/0x480
[   23.547231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.547446]  kthread+0x337/0x6f0
[   23.547815]  ret_from_fork+0x116/0x1d0
[   23.548167]  ret_from_fork_asm+0x1a/0x30
[   23.548491] 
[   23.548608] Freed by task 92545664:
[   23.549340] ------------[ cut here ]------------
[   23.549572] pool index 100480 out of bounds (155) for stack id ffff8881
[   23.550806] WARNING: lib/stackdepot.c:451 at depot_fetch_stack+0x62/0x80, CPU#1: kunit_try_catch/187
[   23.551741] Modules linked in:
[   23.552078] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.552866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.553360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.554070] RIP: 0010:depot_fetch_stack+0x62/0x80
[   23.554800] Code: d2 74 05 c3 cc cc cc cc 90 0f 0b 90 31 c0 e9 d5 25 69 02 55 48 89 e5 90 89 f9 44 89 c2 48 c7 c7 90 c9 99 95 e8 9f d7 ba fe 90 <0f> 0b 90 90 31 c0 5d c3 cc cc cc cc 90 0f 0b 90 31 c0 c3 cc cc cc
[   23.555800] RSP: 0000:ffff888106127b28 EFLAGS: 00010082
[   23.556354] RAX: 0000000000000000 RBX: ffff888106127b50 RCX: 1ffffffff2ba4bc0
[   23.556788] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[   23.557468] RBP: ffff888106127b28 R08: 0000000000000000 R09: fffffbfff2ba4bc0
[   23.558099] R10: 0000000000000003 R11: 0000000000000001 R12: ffff8881058420bf
[   23.558686] R13: ffff888106168000 R14: ffffea0004161080 R15: 0000000000000001
[   23.559288] FS:  0000000000000000(0000) GS:ffff8881bd71a000(0000) knlGS:0000000000000000
[   23.559775] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   23.560238] CR2: 0000000000000000 CR3: 0000000160ebc000 CR4: 00000000000006f0
[   23.560668] DR0: ffffffff970ac504 DR1: ffffffff970ac509 DR2: ffffffff970ac50a
[   23.561222] DR3: ffffffff970ac50b DR6: 00000000ffff0ff0 DR7: 0000000000000600
[   23.561571] Call Trace:
[   23.562015]  <TASK>
[   23.562141]  stack_depot_fetch+0x2c/0x60
[   23.562453]  stack_depot_print+0x23/0x50
[   23.562651]  print_report+0x5f8/0x610
[   23.563121]  ? __virt_addr_valid+0x1db/0x2d0
[   23.563287]  ? kmalloc_oob_left+0x361/0x3c0
[   23.563670]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.564053]  ? kmalloc_oob_left+0x361/0x3c0
[   23.564456]  kasan_report+0x141/0x180
[   23.564670]  ? kmalloc_oob_left+0x361/0x3c0
[   23.565090]  __asan_report_load1_noabort+0x18/0x20
[   23.565470]  kmalloc_oob_left+0x361/0x3c0
[   23.565899]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   23.566315]  ? __schedule+0x10cc/0x2b60
[   23.566562]  ? __pfx_read_tsc+0x10/0x10
[   23.566731]  ? ktime_get_ts64+0x86/0x230
[   23.566884]  kunit_try_run_case+0x1a5/0x480
[   23.567189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.567792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.568165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.568518]  ? __kthread_parkme+0x82/0x180
[   23.568896]  ? preempt_count_sub+0x50/0x80
[   23.569157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.569539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.569900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.570428]  kthread+0x337/0x6f0
[   23.570615]  ? trace_preempt_on+0x20/0xc0
[   23.570958]  ? __pfx_kthread+0x10/0x10
[   23.571208]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.571415]  ? calculate_sigpending+0x7b/0xa0
[   23.571908]  ? __pfx_kthread+0x10/0x10
[   23.572213]  ret_from_fork+0x116/0x1d0
[   23.572551]  ? __pfx_kthread+0x10/0x10
[   23.572807]  ret_from_fork_asm+0x1a/0x30
[   23.573240]  </TASK>
[   23.573714] ---[ end trace 0000000000000000 ]---
[   23.574239] ------------[ cut here ]------------
[   23.574588] corrupt handle or use after stack_depot_put()
[   23.574703] WARNING: lib/stackdepot.c:723 at stack_depot_fetch+0x53/0x60, CPU#1: kunit_try_catch/187
[   23.575688] Modules linked in:
[   23.575948] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.576492] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.576736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.577448] RIP: 0010:stack_depot_fetch+0x53/0x60
[   23.577764] Code: ff ff ff 48 85 c0 74 14 48 8d 50 20 48 89 13 8b 40 14 48 8b 5d f8 c9 e9 4b 25 69 02 90 48 c7 c7 c8 c9 99 95 e8 1e d7 ba fe 90 <0f> 0b 90 90 31 c0 eb e0 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90
[   23.578832] RSP: 0000:ffff888106127b38 EFLAGS: 00010082
[   23.579371] RAX: 0000000000000000 RBX: ffff888106127b50 RCX: 1ffffffff2ba4bc0
[   23.579852] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[   23.580441] RBP: ffff888106127b40 R08: 0000000000000000 R09: fffffbfff2ba4bc0
[   23.580836] R10: 0000000000000003 R11: 0000000000000001 R12: ffff8881058420bf
[   23.581243] R13: ffff888106168000 R14: ffffea0004161080 R15: 0000000000000001
[   23.581538] FS:  0000000000000000(0000) GS:ffff8881bd71a000(0000) knlGS:0000000000000000
[   23.582197] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   23.582464] CR2: 0000000000000000 CR3: 0000000160ebc000 CR4: 00000000000006f0
[   23.582936] DR0: ffffffff970ac504 DR1: ffffffff970ac509 DR2: ffffffff970ac50a
[   23.583267] DR3: ffffffff970ac50b DR6: 00000000ffff0ff0 DR7: 0000000000000600
[   23.583697] Call Trace:
[   23.583907]  <TASK>
[   23.584245]  stack_depot_print+0x23/0x50
[   23.584628]  print_report+0x5f8/0x610
[   23.584832]  ? __virt_addr_valid+0x1db/0x2d0
[   23.585411]  ? kmalloc_oob_left+0x361/0x3c0
[   23.585649]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.586178]  ? kmalloc_oob_left+0x361/0x3c0
[   23.586469]  kasan_report+0x141/0x180
[   23.586713]  ? kmalloc_oob_left+0x361/0x3c0
[   23.587039]  __asan_report_load1_noabort+0x18/0x20
[   23.587371]  kmalloc_oob_left+0x361/0x3c0
[   23.587848]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   23.588060]  ? __schedule+0x10cc/0x2b60
[   23.588233]  ? __pfx_read_tsc+0x10/0x10
[   23.588655]  ? ktime_get_ts64+0x86/0x230
[   23.588913]  kunit_try_run_case+0x1a5/0x480
[   23.589051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.589585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.589905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.590362]  ? __kthread_parkme+0x82/0x180
[   23.590692]  ? preempt_count_sub+0x50/0x80
[   23.590974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.591138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.591704]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.592087]  kthread+0x337/0x6f0
[   23.592406]  ? trace_preempt_on+0x20/0xc0
[   23.592623]  ? __pfx_kthread+0x10/0x10
[   23.592888]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.593262]  ? calculate_sigpending+0x7b/0xa0
[   23.593484]  ? __pfx_kthread+0x10/0x10
[   23.593680]  ret_from_fork+0x116/0x1d0
[   23.594094]  ? __pfx_kthread+0x10/0x10
[   23.594398]  ret_from_fork_asm+0x1a/0x30
[   23.594814]  </TASK>
[   23.594967] ---[ end trace 0000000000000000 ]---
[   23.595505] 
[   23.595620] The buggy address belongs to the object at ffff8881058420a0
[   23.595620]  which belongs to the cache kmalloc-16 of size 16
[   23.596435] The buggy address is located 15 bytes to the right of
[   23.596435]  allocated 16-byte region [ffff8881058420a0, ffff8881058420b0)
[   23.597191] 
[   23.597292] The buggy address belongs to the physical page:
[   23.597537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842
[   23.597939] flags: 0x200000000000000(node=0|zone=2)
[   23.598457] page_type: f5(slab)
[   23.598636] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.599092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.599604] page dumped because: kasan: bad access detected
[   23.599967] 
[   23.600094] Memory state around the buggy address:
[   23.600426]  ffff888105841f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.601087]  ffff888105842000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.601391] >ffff888105842080: fa fb fc fc fa fb fc fc 00 07 fc fc fa fb fc fc
[   23.601999]                                         ^
[   23.602492]  ffff888105842100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.602841]  ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.603131] ==================================================================