Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.346145] ==================================================================
[   30.346195] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   30.346247] Write of size 1 at addr fff00000c6361878 by task kunit_try_catch/173
[   30.346297] 
[   30.346328] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.346419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.349366] Hardware name: linux,dummy-virt (DT)
[   30.349811] Call trace:
[   30.349836]  show_stack+0x20/0x38 (C)
[   30.350355]  dump_stack_lvl+0x8c/0xd0
[   30.350780]  print_report+0x118/0x5d0
[   30.350833]  kasan_report+0xdc/0x128
[   30.351543]  __asan_report_store1_noabort+0x20/0x30
[   30.352059]  kmalloc_track_caller_oob_right+0x418/0x488
[   30.352567]  kunit_try_run_case+0x170/0x3f0
[   30.352839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.352986]  kthread+0x328/0x630
[   30.353030]  ret_from_fork+0x10/0x20
[   30.353621] 
[   30.353933] Allocated by task 173:
[   30.354300]  kasan_save_stack+0x3c/0x68
[   30.354591]  kasan_save_track+0x20/0x40
[   30.355056]  kasan_save_alloc_info+0x40/0x58
[   30.355385]  __kasan_kmalloc+0xd4/0xd8
[   30.355876]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.356230]  kmalloc_track_caller_oob_right+0x184/0x488
[   30.356274]  kunit_try_run_case+0x170/0x3f0
[   30.357071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.357127]  kthread+0x328/0x630
[   30.358027]  ret_from_fork+0x10/0x20
[   30.358223] 
[   30.358242] The buggy address belongs to the object at fff00000c6361800
[   30.358242]  which belongs to the cache kmalloc-128 of size 128
[   30.358641] The buggy address is located 0 bytes to the right of
[   30.358641]  allocated 120-byte region [fff00000c6361800, fff00000c6361878)
[   30.358859] 
[   30.359328] The buggy address belongs to the physical page:
[   30.359383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.359438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.360482] page_type: f5(slab)
[   30.360568] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.360624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.360665] page dumped because: kasan: bad access detected
[   30.360697] 
[   30.360714] Memory state around the buggy address:
[   30.360746]  fff00000c6361700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.360789]  fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361359] >fff00000c6361800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.361398]                                                                 ^
[   30.361440]  fff00000c6361880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361484]  fff00000c6361900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361531] ==================================================================
[   30.331476] ==================================================================
[   30.332076] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   30.332143] Write of size 1 at addr fff00000c6361778 by task kunit_try_catch/173
[   30.332270] 
[   30.332302] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.332388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.332414] Hardware name: linux,dummy-virt (DT)
[   30.332446] Call trace:
[   30.332468]  show_stack+0x20/0x38 (C)
[   30.332528]  dump_stack_lvl+0x8c/0xd0
[   30.332574]  print_report+0x118/0x5d0
[   30.332629]  kasan_report+0xdc/0x128
[   30.332671]  __asan_report_store1_noabort+0x20/0x30
[   30.332970]  kmalloc_track_caller_oob_right+0x40c/0x488
[   30.333481]  kunit_try_run_case+0x170/0x3f0
[   30.333544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.333596]  kthread+0x328/0x630
[   30.333636]  ret_from_fork+0x10/0x20
[   30.334007] 
[   30.334046] Allocated by task 173:
[   30.334075]  kasan_save_stack+0x3c/0x68
[   30.334146]  kasan_save_track+0x20/0x40
[   30.334181]  kasan_save_alloc_info+0x40/0x58
[   30.334217]  __kasan_kmalloc+0xd4/0xd8
[   30.334296]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   30.334456]  kmalloc_track_caller_oob_right+0xa8/0x488
[   30.334596]  kunit_try_run_case+0x170/0x3f0
[   30.334632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.334674]  kthread+0x328/0x630
[   30.334706]  ret_from_fork+0x10/0x20
[   30.335065] 
[   30.335127] The buggy address belongs to the object at fff00000c6361700
[   30.335127]  which belongs to the cache kmalloc-128 of size 128
[   30.335192] The buggy address is located 0 bytes to the right of
[   30.335192]  allocated 120-byte region [fff00000c6361700, fff00000c6361778)
[   30.335256] 
[   30.335275] The buggy address belongs to the physical page:
[   30.335306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.335357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.335404] page_type: f5(slab)
[   30.336093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.336852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.337361] page dumped because: kasan: bad access detected
[   30.337774] 
[   30.337797] Memory state around the buggy address:
[   30.338607]  fff00000c6361600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.338918]  fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.339010] >fff00000c6361700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.339296]                                                                 ^
[   30.339346]  fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.339831]  fff00000c6361800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340420] ==================================================================

[   22.663405] ==================================================================
[   22.664023] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   22.664295] Write of size 1 at addr ffff888104a24678 by task kunit_try_catch/191
[   22.664514] 
[   22.664596] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   22.664643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.664655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.664675] Call Trace:
[   22.664688]  <TASK>
[   22.664705]  dump_stack_lvl+0x73/0xb0
[   22.664733]  print_report+0xd1/0x610
[   22.664754]  ? __virt_addr_valid+0x1db/0x2d0
[   22.664776]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   22.664798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.664822]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   22.664845]  kasan_report+0x141/0x180
[   22.664865]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   22.664893]  __asan_report_store1_noabort+0x1b/0x30
[   22.664915]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   22.664938]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   22.664962]  ? __schedule+0x10c6/0x2b60
[   22.664984]  ? __pfx_read_tsc+0x10/0x10
[   22.665005]  ? ktime_get_ts64+0x86/0x230
[   22.665030]  kunit_try_run_case+0x1a5/0x480
[   22.665052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.665073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.665094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.665115]  ? __kthread_parkme+0x82/0x180
[   22.665135]  ? preempt_count_sub+0x50/0x80
[   22.665157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.665179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.665204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.665229]  kthread+0x337/0x6f0
[   22.665247]  ? trace_preempt_on+0x20/0xc0
[   22.665640]  ? __pfx_kthread+0x10/0x10
[   22.665668]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.665691]  ? calculate_sigpending+0x7b/0xa0
[   22.665716]  ? __pfx_kthread+0x10/0x10
[   22.665737]  ret_from_fork+0x116/0x1d0
[   22.665976]  ? __pfx_kthread+0x10/0x10
[   22.665999]  ret_from_fork_asm+0x1a/0x30
[   22.666031]  </TASK>
[   22.666043] 
[   22.682225] Allocated by task 191:
[   22.682822]  kasan_save_stack+0x45/0x70
[   22.683466]  kasan_save_track+0x18/0x40
[   22.683898]  kasan_save_alloc_info+0x3b/0x50
[   22.684461]  __kasan_kmalloc+0xb7/0xc0
[   22.684658]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   22.684838]  kmalloc_track_caller_oob_right+0x99/0x520
[   22.685380]  kunit_try_run_case+0x1a5/0x480
[   22.685814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.686421]  kthread+0x337/0x6f0
[   22.686695]  ret_from_fork+0x116/0x1d0
[   22.686825]  ret_from_fork_asm+0x1a/0x30
[   22.687018] 
[   22.687176] The buggy address belongs to the object at ffff888104a24600
[   22.687176]  which belongs to the cache kmalloc-128 of size 128
[   22.688420] The buggy address is located 0 bytes to the right of
[   22.688420]  allocated 120-byte region [ffff888104a24600, ffff888104a24678)
[   22.689342] 
[   22.689417] The buggy address belongs to the physical page:
[   22.689726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24
[   22.690502] flags: 0x200000000000000(node=0|zone=2)
[   22.690964] page_type: f5(slab)
[   22.691412] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.692123] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.692478] page dumped because: kasan: bad access detected
[   22.692940] 
[   22.693090] Memory state around the buggy address:
[   22.693575]  ffff888104a24500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.694016]  ffff888104a24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694704] >ffff888104a24600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.695321]                                                                 ^
[   22.695716]  ffff888104a24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.696078]  ffff888104a24700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.696734] ==================================================================
[   22.697812] ==================================================================
[   22.698478] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   22.698768] Write of size 1 at addr ffff888104a24778 by task kunit_try_catch/191
[   22.699411] 
[   22.699617] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   22.699695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.699708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.699728] Call Trace:
[   22.699741]  <TASK>
[   22.699756]  dump_stack_lvl+0x73/0xb0
[   22.699784]  print_report+0xd1/0x610
[   22.699805]  ? __virt_addr_valid+0x1db/0x2d0
[   22.699828]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   22.699851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.699883]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   22.699906]  kasan_report+0x141/0x180
[   22.699927]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   22.699955]  __asan_report_store1_noabort+0x1b/0x30
[   22.699979]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   22.700002]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   22.700027]  ? __schedule+0x10c6/0x2b60
[   22.700048]  ? __pfx_read_tsc+0x10/0x10
[   22.700071]  ? ktime_get_ts64+0x86/0x230
[   22.700096]  kunit_try_run_case+0x1a5/0x480
[   22.700120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.700142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.700163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.700185]  ? __kthread_parkme+0x82/0x180
[   22.700205]  ? preempt_count_sub+0x50/0x80
[   22.700228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.700252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.700289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.700316]  kthread+0x337/0x6f0
[   22.700336]  ? trace_preempt_on+0x20/0xc0
[   22.700359]  ? __pfx_kthread+0x10/0x10
[   22.700379]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.700399]  ? calculate_sigpending+0x7b/0xa0
[   22.700422]  ? __pfx_kthread+0x10/0x10
[   22.700442]  ret_from_fork+0x116/0x1d0
[   22.700461]  ? __pfx_kthread+0x10/0x10
[   22.700481]  ret_from_fork_asm+0x1a/0x30
[   22.700511]  </TASK>
[   22.700521] 
[   22.713553] Allocated by task 191:
[   22.713928]  kasan_save_stack+0x45/0x70
[   22.714351]  kasan_save_track+0x18/0x40
[   22.714973]  kasan_save_alloc_info+0x3b/0x50
[   22.715131]  __kasan_kmalloc+0xb7/0xc0
[   22.715257]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   22.715449]  kmalloc_track_caller_oob_right+0x19a/0x520
[   22.715797]  kunit_try_run_case+0x1a5/0x480
[   22.716213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.716788]  kthread+0x337/0x6f0
[   22.717199]  ret_from_fork+0x116/0x1d0
[   22.717762]  ret_from_fork_asm+0x1a/0x30
[   22.718196] 
[   22.718374] The buggy address belongs to the object at ffff888104a24700
[   22.718374]  which belongs to the cache kmalloc-128 of size 128
[   22.719584] The buggy address is located 0 bytes to the right of
[   22.719584]  allocated 120-byte region [ffff888104a24700, ffff888104a24778)
[   22.720188] 
[   22.720273] The buggy address belongs to the physical page:
[   22.720440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24
[   22.720910] flags: 0x200000000000000(node=0|zone=2)
[   22.721669] page_type: f5(slab)
[   22.721975] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.722715] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.723437] page dumped because: kasan: bad access detected
[   22.724059] 
[   22.724282] Memory state around the buggy address:
[   22.724762]  ffff888104a24600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.725474]  ffff888104a24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.726275] >ffff888104a24700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.726495]                                                                 ^
[   22.726894]  ffff888104a24780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.727675]  ffff888104a24800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.728390] ==================================================================