Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   37.480804] ==================================================================
[   37.490756] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   37.498823] Write of size 1 at addr ffff0008074f8778 by task kunit_try_catch/226
[   37.506202] 
[   37.507687] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   37.507742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.507759] Hardware name: WinLink E850-96 board (DT)
[   37.507780] Call trace:
[   37.507792]  show_stack+0x20/0x38 (C)
[   37.507828]  dump_stack_lvl+0x8c/0xd0
[   37.507859]  print_report+0x118/0x5d0
[   37.507888]  kasan_report+0xdc/0x128
[   37.507913]  __asan_report_store1_noabort+0x20/0x30
[   37.507948]  kmalloc_track_caller_oob_right+0x40c/0x488
[   37.507986]  kunit_try_run_case+0x170/0x3f0
[   37.508021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.508053]  kthread+0x328/0x630
[   37.508081]  ret_from_fork+0x10/0x20
[   37.508115] 
[   37.572870] Allocated by task 226:
[   37.576255]  kasan_save_stack+0x3c/0x68
[   37.580072]  kasan_save_track+0x20/0x40
[   37.583891]  kasan_save_alloc_info+0x40/0x58
[   37.588145]  __kasan_kmalloc+0xd4/0xd8
[   37.591877]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   37.597433]  kmalloc_track_caller_oob_right+0xa8/0x488
[   37.602554]  kunit_try_run_case+0x170/0x3f0
[   37.606721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.612191]  kthread+0x328/0x630
[   37.615401]  ret_from_fork+0x10/0x20
[   37.618960] 
[   37.620437] The buggy address belongs to the object at ffff0008074f8700
[   37.620437]  which belongs to the cache kmalloc-128 of size 128
[   37.632939] The buggy address is located 0 bytes to the right of
[   37.632939]  allocated 120-byte region [ffff0008074f8700, ffff0008074f8778)
[   37.645870] 
[   37.647348] The buggy address belongs to the physical page:
[   37.652905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   37.660887] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.668528] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.675470] page_type: f5(slab)
[   37.678608] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.686327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.694053] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.701864] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.709678] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   37.717490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.725295] page dumped because: kasan: bad access detected
[   37.730851] 
[   37.732326] Memory state around the buggy address:
[   37.737106]  ffff0008074f8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.744309]  ffff0008074f8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.751515] >ffff0008074f8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.758715]                                                                 ^
[   37.765836]  ffff0008074f8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.773043]  ffff0008074f8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.780243] ==================================================================

[   29.327939] ==================================================================
[   29.328063] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   29.328181] Write of size 1 at addr fff00000c636a878 by task kunit_try_catch/173
[   29.328343] 
[   29.328478] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.328640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.328780] Hardware name: linux,dummy-virt (DT)
[   29.328865] Call trace:
[   29.328904]  show_stack+0x20/0x38 (C)
[   29.328953]  dump_stack_lvl+0x8c/0xd0
[   29.329002]  print_report+0x118/0x5d0
[   29.329074]  kasan_report+0xdc/0x128
[   29.329119]  __asan_report_store1_noabort+0x20/0x30
[   29.329174]  kmalloc_track_caller_oob_right+0x418/0x488
[   29.329228]  kunit_try_run_case+0x170/0x3f0
[   29.329276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.329364]  kthread+0x328/0x630
[   29.329658]  ret_from_fork+0x10/0x20
[   29.329828] 
[   29.329897] Allocated by task 173:
[   29.329994]  kasan_save_stack+0x3c/0x68
[   29.330369]  kasan_save_track+0x20/0x40
[   29.330418]  kasan_save_alloc_info+0x40/0x58
[   29.330512]  __kasan_kmalloc+0xd4/0xd8
[   29.330600]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.330647]  kmalloc_track_caller_oob_right+0x184/0x488
[   29.330691]  kunit_try_run_case+0x170/0x3f0
[   29.330752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.330795]  kthread+0x328/0x630
[   29.330827]  ret_from_fork+0x10/0x20
[   29.330877] 
[   29.330914] The buggy address belongs to the object at fff00000c636a800
[   29.330914]  which belongs to the cache kmalloc-128 of size 128
[   29.330985] The buggy address is located 0 bytes to the right of
[   29.330985]  allocated 120-byte region [fff00000c636a800, fff00000c636a878)
[   29.331073] 
[   29.331110] The buggy address belongs to the physical page:
[   29.331143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.331201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.331268] page_type: f5(slab)
[   29.331306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.331361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.331404] page dumped because: kasan: bad access detected
[   29.331443] 
[   29.331460] Memory state around the buggy address:
[   29.331491]  fff00000c636a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.331538]  fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.331585] >fff00000c636a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.331630]                                                                 ^
[   29.331673]  fff00000c636a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.331718]  fff00000c636a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.331760] ==================================================================
[   29.321899] ==================================================================
[   29.321991] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   29.322122] Write of size 1 at addr fff00000c636a778 by task kunit_try_catch/173
[   29.322177] 
[   29.322212] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.322368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.322394] Hardware name: linux,dummy-virt (DT)
[   29.322453] Call trace:
[   29.322481]  show_stack+0x20/0x38 (C)
[   29.322529]  dump_stack_lvl+0x8c/0xd0
[   29.322836]  print_report+0x118/0x5d0
[   29.322896]  kasan_report+0xdc/0x128
[   29.322939]  __asan_report_store1_noabort+0x20/0x30
[   29.323077]  kmalloc_track_caller_oob_right+0x40c/0x488
[   29.323129]  kunit_try_run_case+0x170/0x3f0
[   29.323233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.323308]  kthread+0x328/0x630
[   29.323395]  ret_from_fork+0x10/0x20
[   29.323447] 
[   29.323466] Allocated by task 173:
[   29.323494]  kasan_save_stack+0x3c/0x68
[   29.323535]  kasan_save_track+0x20/0x40
[   29.323573]  kasan_save_alloc_info+0x40/0x58
[   29.323668]  __kasan_kmalloc+0xd4/0xd8
[   29.323706]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.323753]  kmalloc_track_caller_oob_right+0xa8/0x488
[   29.323797]  kunit_try_run_case+0x170/0x3f0
[   29.323836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.324057]  kthread+0x328/0x630
[   29.324306]  ret_from_fork+0x10/0x20
[   29.324406] 
[   29.324454] The buggy address belongs to the object at fff00000c636a700
[   29.324454]  which belongs to the cache kmalloc-128 of size 128
[   29.324621] The buggy address is located 0 bytes to the right of
[   29.324621]  allocated 120-byte region [fff00000c636a700, fff00000c636a778)
[   29.324694] 
[   29.324725] The buggy address belongs to the physical page:
[   29.324761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.324822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.324874] page_type: f5(slab)
[   29.324913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.324967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.325011] page dumped because: kasan: bad access detected
[   29.325044] 
[   29.325073] Memory state around the buggy address:
[   29.325106]  fff00000c636a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.325152]  fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325198] >fff00000c636a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.325262]                                                                 ^
[   29.325307]  fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325354]  fff00000c636a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325556] ==================================================================

[   23.636605] ==================================================================
[   23.637357] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.637631] Write of size 1 at addr ffff888105865d78 by task kunit_try_catch/191
[   23.638452] 
[   23.638695] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.638770] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.638784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.638807] Call Trace:
[   23.638820]  <TASK>
[   23.638840]  dump_stack_lvl+0x73/0xb0
[   23.638877]  print_report+0xd1/0x610
[   23.638899]  ? __virt_addr_valid+0x1db/0x2d0
[   23.638924]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.638947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.638971]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.638994]  kasan_report+0x141/0x180
[   23.639015]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.639042]  __asan_report_store1_noabort+0x1b/0x30
[   23.639065]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   23.639088]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.639112]  ? __schedule+0x10cc/0x2b60
[   23.639136]  ? __pfx_read_tsc+0x10/0x10
[   23.639157]  ? ktime_get_ts64+0x86/0x230
[   23.639193]  kunit_try_run_case+0x1a5/0x480
[   23.639218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.639237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.639259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.639281]  ? __kthread_parkme+0x82/0x180
[   23.639302]  ? preempt_count_sub+0x50/0x80
[   23.639325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.639346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.639369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.639393]  kthread+0x337/0x6f0
[   23.639412]  ? trace_preempt_on+0x20/0xc0
[   23.639436]  ? __pfx_kthread+0x10/0x10
[   23.639456]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.639476]  ? calculate_sigpending+0x7b/0xa0
[   23.639500]  ? __pfx_kthread+0x10/0x10
[   23.639520]  ret_from_fork+0x116/0x1d0
[   23.639538]  ? __pfx_kthread+0x10/0x10
[   23.639558]  ret_from_fork_asm+0x1a/0x30
[   23.639588]  </TASK>
[   23.639598] 
[   23.652583] Allocated by task 191:
[   23.652752]  kasan_save_stack+0x45/0x70
[   23.652915]  kasan_save_track+0x18/0x40
[   23.653057]  kasan_save_alloc_info+0x3b/0x50
[   23.653200]  __kasan_kmalloc+0xb7/0xc0
[   23.653326]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   23.653501]  kmalloc_track_caller_oob_right+0x99/0x520
[   23.653671]  kunit_try_run_case+0x1a5/0x480
[   23.653809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.653977]  kthread+0x337/0x6f0
[   23.654096]  ret_from_fork+0x116/0x1d0
[   23.654223]  ret_from_fork_asm+0x1a/0x30
[   23.654355] 
[   23.654420] The buggy address belongs to the object at ffff888105865d00
[   23.654420]  which belongs to the cache kmalloc-128 of size 128
[   23.655017] The buggy address is located 0 bytes to the right of
[   23.655017]  allocated 120-byte region [ffff888105865d00, ffff888105865d78)
[   23.656057] 
[   23.656233] The buggy address belongs to the physical page:
[   23.656834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105865
[   23.657680] flags: 0x200000000000000(node=0|zone=2)
[   23.658167] page_type: f5(slab)
[   23.658636] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.659268] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.659976] page dumped because: kasan: bad access detected
[   23.660439] 
[   23.660586] Memory state around the buggy address:
[   23.661044]  ffff888105865c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.661802]  ffff888105865c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.662485] >ffff888105865d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.663250]                                                                 ^
[   23.663932]  ffff888105865d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.664629]  ffff888105865e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.665301] ==================================================================
[   23.666600] ==================================================================
[   23.667289] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.668004] Write of size 1 at addr ffff888105865e78 by task kunit_try_catch/191
[   23.668736] 
[   23.668932] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.668985] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.668997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.669020] Call Trace:
[   23.669033]  <TASK>
[   23.669053]  dump_stack_lvl+0x73/0xb0
[   23.669084]  print_report+0xd1/0x610
[   23.669105]  ? __virt_addr_valid+0x1db/0x2d0
[   23.669128]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.669151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.669175]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.669198]  kasan_report+0x141/0x180
[   23.669218]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.669245]  __asan_report_store1_noabort+0x1b/0x30
[   23.669268]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   23.669291]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.669316]  ? __schedule+0x10cc/0x2b60
[   23.669339]  ? __pfx_read_tsc+0x10/0x10
[   23.669359]  ? ktime_get_ts64+0x86/0x230
[   23.669383]  kunit_try_run_case+0x1a5/0x480
[   23.669405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.669424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.669446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.669469]  ? __kthread_parkme+0x82/0x180
[   23.669489]  ? preempt_count_sub+0x50/0x80
[   23.669512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.669532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.669556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.669580]  kthread+0x337/0x6f0
[   23.669599]  ? trace_preempt_on+0x20/0xc0
[   23.669642]  ? __pfx_kthread+0x10/0x10
[   23.669672]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.669693]  ? calculate_sigpending+0x7b/0xa0
[   23.669716]  ? __pfx_kthread+0x10/0x10
[   23.669737]  ret_from_fork+0x116/0x1d0
[   23.669762]  ? __pfx_kthread+0x10/0x10
[   23.669782]  ret_from_fork_asm+0x1a/0x30
[   23.669812]  </TASK>
[   23.669823] 
[   23.681927] Allocated by task 191:
[   23.682144]  kasan_save_stack+0x45/0x70
[   23.682358]  kasan_save_track+0x18/0x40
[   23.682541]  kasan_save_alloc_info+0x3b/0x50
[   23.682753]  __kasan_kmalloc+0xb7/0xc0
[   23.682943]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   23.683160]  kmalloc_track_caller_oob_right+0x19a/0x520
[   23.683380]  kunit_try_run_case+0x1a5/0x480
[   23.683571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.683880]  kthread+0x337/0x6f0
[   23.683998]  ret_from_fork+0x116/0x1d0
[   23.684125]  ret_from_fork_asm+0x1a/0x30
[   23.684326] 
[   23.684419] The buggy address belongs to the object at ffff888105865e00
[   23.684419]  which belongs to the cache kmalloc-128 of size 128
[   23.685006] The buggy address is located 0 bytes to the right of
[   23.685006]  allocated 120-byte region [ffff888105865e00, ffff888105865e78)
[   23.685872] 
[   23.685944] The buggy address belongs to the physical page:
[   23.686177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105865
[   23.686411] flags: 0x200000000000000(node=0|zone=2)
[   23.686744] page_type: f5(slab)
[   23.687017] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.687310] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.687594] page dumped because: kasan: bad access detected
[   23.687867] 
[   23.687932] Memory state around the buggy address:
[   23.688122]  ffff888105865d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.688412]  ffff888105865d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.688703] >ffff888105865e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.688906]                                                                 ^
[   23.689234]  ffff888105865e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.689538]  ffff888105865f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.689951] ==================================================================