Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.931011] ==================================================================
[   31.931129] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   31.931190] Read of size 1 at addr fff00000c85ecd7f by task kunit_try_catch/170
[   31.931701] 
[   31.931737] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   31.931991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.932090] Hardware name: linux,dummy-virt (DT)
[   31.932123] Call trace:
[   31.932145]  show_stack+0x20/0x38 (C)
[   31.932199]  dump_stack_lvl+0x8c/0xd0
[   31.932244]  print_report+0x118/0x5e8
[   31.932288]  kasan_report+0xdc/0x128
[   31.932378]  __asan_report_load1_noabort+0x20/0x30
[   31.932428]  kmalloc_oob_left+0x2ec/0x320
[   31.932474]  kunit_try_run_case+0x170/0x3f0
[   31.932817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.932928]  kthread+0x328/0x630
[   31.933331]  ret_from_fork+0x10/0x20
[   31.933466] 
[   31.933579] Allocated by task 104:
[   31.933611]  kasan_save_stack+0x3c/0x68
[   31.934009]  kasan_save_track+0x20/0x40
[   31.934198]  kasan_save_alloc_info+0x40/0x58
[   31.934245]  __kasan_kmalloc+0xd4/0xd8
[   31.934585]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   31.934873]  kvasprintf+0xe0/0x180
[   31.935031]  kasprintf+0xd0/0x110
[   31.935064]  miscdev_test_can_open+0xac/0x2c8
[   31.935493]  miscdev_test_collision_reverse+0x3b8/0x650
[   31.935548]  kunit_try_run_case+0x170/0x3f0
[   31.935587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.935800]  kthread+0x328/0x630
[   31.936273]  ret_from_fork+0x10/0x20
[   31.936359] 
[   31.936595] Freed by task 3361656128:
[   31.937449] ------------[ cut here ]------------
[   31.938139] pool index -1 out of bounds (219) for stack id fff00000
[   31.942816] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#1: kunit_try_catch/170
[   32.010018] Modules linked in:
[   32.011514] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.012929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.013611] Hardware name: linux,dummy-virt (DT)
[   32.014432] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   32.015580] pc : depot_fetch_stack+0x68/0x88
[   32.016338] lr : depot_fetch_stack+0x68/0x88
[   32.016573] sp : ffff800080b57a50
[   32.016776] x29: ffff800080b57a50 x28: ffff800080087b08 x27: 1ffff00010010f61
[   32.017325] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff9501e9f78254
[   32.018026] x23: ffffc1ffc3217b00 x22: ffff9501eeab1208 x21: ffff9501eeab4568
[   32.019282] x20: fff00000c85ecd7f x19: ffff800080b57b60 x18: 00000000511e29a0
[   32.020368] x17: 000000005ff4b93d x16: 00000000f1f1f1f1 x15: 0000000000000007
[   32.021323] x14: 0000000000000000 x13: 0000000000000007 x12: ffff70001016aea7
[   32.022346] x11: 1ffff0001016aea6 x10: ffff70001016aea6 x9 : ffff9501e98f123c
[   32.023493] x8 : ffff800080b57537 x7 : 0000000000000001 x6 : ffff70001016aea6
[   32.024483] x5 : ffff800080b57530 x4 : 1ffe000019357a21 x3 : dfff800000000000
[   32.025493] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9abd100
[   32.026522] Call trace:
[   32.027024]  depot_fetch_stack+0x68/0x88 (P)
[   32.027742]  stack_depot_print+0x24/0x60
[   32.028302]  print_report+0x5e4/0x5e8
[   32.028510]  kasan_report+0xdc/0x128
[   32.028716]  __asan_report_load1_noabort+0x20/0x30
[   32.028940]  kmalloc_oob_left+0x2ec/0x320
[   32.029136]  kunit_try_run_case+0x170/0x3f0
[   32.029336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.029577]  kthread+0x328/0x630
[   32.029940]  ret_from_fork+0x10/0x20
[   32.030395] ---[ end trace 0000000000000000 ]---
[   32.031574] ------------[ cut here ]------------
[   32.031627] corrupt handle or use after stack_depot_put()
[   32.031739] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#1: kunit_try_catch/170
[   32.033520] Modules linked in:
[   32.033889] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.034911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.035604] Hardware name: linux,dummy-virt (DT)
[   32.036104] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   32.036783] pc : stack_depot_print+0x54/0x60
[   32.037227] lr : stack_depot_print+0x54/0x60
[   32.037430] sp : ffff800080b57a60
[   32.037589] x29: ffff800080b57a60 x28: ffff800080087b08 x27: 1ffff00010010f61
[   32.037948] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff9501e9f78254
[   32.038290] x23: ffffc1ffc3217b00 x22: ffff9501eeab1208 x21: ffff9501eeab4568
[   32.038628] x20: fff00000c85ecd7f x19: ffff800080b57b60 x18: 00000000511e29a0
[   32.039518] x17: 000000005ff4b93d x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   32.040063] x14: ffff70001016af2c x13: 1ffe000019357a21 x12: ffff72a03e117255
[   32.040406] x11: 1ffff2a03e117254 x10: ffff72a03e117254 x9 : ffff9501e98f123c
[   32.040764] x8 : ffff9501f08b92a3 x7 : 0000000000000001 x6 : ffff72a03e117254
[   32.041203] x5 : ffff9501f08b92a0 x4 : 1ffe000019357a21 x3 : dfff800000000000
[   32.041603] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9abd100
[   32.042011] Call trace:
[   32.042180]  stack_depot_print+0x54/0x60 (P)
[   32.042420]  print_report+0x5e4/0x5e8
[   32.042666]  kasan_report+0xdc/0x128
[   32.042903]  __asan_report_load1_noabort+0x20/0x30
[   32.043157]  kmalloc_oob_left+0x2ec/0x320
[   32.043411]  kunit_try_run_case+0x170/0x3f0
[   32.043678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.043968]  kthread+0x328/0x630
[   32.044186]  ret_from_fork+0x10/0x20
[   32.044423] ---[ end trace 0000000000000000 ]---
[   32.044693] 
[   32.044723] The buggy address belongs to the object at fff00000c85ecd60
[   32.044723]  which belongs to the cache kmalloc-16 of size 16
[   32.044780] The buggy address is located 15 bytes to the right of
[   32.044780]  allocated 16-byte region [fff00000c85ecd60, fff00000c85ecd70)
[   32.044841] 
[   32.044864] The buggy address belongs to the physical page:
[   32.044903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec
[   32.044956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.045005] page_type: f5(slab)
[   32.045045] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.045093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.045131] page dumped because: kasan: bad access detected
[   32.045161] 
[   32.045178] Memory state around the buggy address:
[   32.045212]  fff00000c85ecc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045255]  fff00000c85ecc80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045296] >fff00000c85ecd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045332]                                                                 ^
[   32.045372]  fff00000c85ecd80: 00 07 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.045411]  fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   32.045449] ==================================================================

[   25.022494] ==================================================================
[   25.022926] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   25.024059] Read of size 1 at addr ffff888105f9f15f by task kunit_try_catch/187
[   25.025254] 
[   25.025654] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   25.025711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.025724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.025746] Call Trace:
[   25.025760]  <TASK>
[   25.025778]  dump_stack_lvl+0x73/0xb0
[   25.025823]  print_report+0xd1/0x640
[   25.025847]  ? __virt_addr_valid+0x1db/0x2d0
[   25.025871]  ? kmalloc_oob_left+0x361/0x3c0
[   25.025892]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.025918]  ? kmalloc_oob_left+0x361/0x3c0
[   25.025940]  kasan_report+0x141/0x180
[   25.025975]  ? kmalloc_oob_left+0x361/0x3c0
[   25.026001]  __asan_report_load1_noabort+0x18/0x20
[   25.026026]  kmalloc_oob_left+0x361/0x3c0
[   25.026048]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   25.026083]  ? __schedule+0x10da/0x2b60
[   25.026104]  ? __pfx_read_tsc+0x10/0x10
[   25.026126]  ? ktime_get_ts64+0x86/0x230
[   25.026152]  kunit_try_run_case+0x1a5/0x480
[   25.026178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.026203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.026225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.026251]  ? __kthread_parkme+0x82/0x180
[   25.026273]  ? preempt_count_sub+0x50/0x80
[   25.026297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.026322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.026346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.026370]  kthread+0x337/0x6f0
[   25.026390]  ? trace_preempt_on+0x20/0xc0
[   25.026414]  ? __pfx_kthread+0x10/0x10
[   25.026435]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.026459]  ? calculate_sigpending+0x7b/0xa0
[   25.026482]  ? __pfx_kthread+0x10/0x10
[   25.026504]  ret_from_fork+0x116/0x1d0
[   25.026523]  ? __pfx_kthread+0x10/0x10
[   25.026544]  ret_from_fork_asm+0x1a/0x30
[   25.026575]  </TASK>
[   25.026587] 
[   25.040180] Allocated by task 21:
[   25.040599]  kasan_save_stack+0x45/0x70
[   25.041102]  kasan_save_track+0x18/0x40
[   25.041552]  kasan_save_alloc_info+0x3b/0x50
[   25.042041]  __kasan_kmalloc+0xb7/0xc0
[   25.042466]  __kmalloc_cache_node_noprof+0x188/0x420
[   25.042956]  build_sched_domains+0x38c/0x5d80
[   25.043352]  partition_sched_domains+0x471/0x9c0
[   25.043723]  rebuild_sched_domains_locked+0x97d/0xd50
[   25.044386]  cpuset_update_active_cpus+0x80f/0x1a90
[   25.044967]  sched_cpu_activate+0x2bf/0x330
[   25.045309]  cpuhp_invoke_callback+0x2a1/0xf00
[   25.045734]  cpuhp_thread_fun+0x2ce/0x5c0
[   25.046167]  smpboot_thread_fn+0x2bc/0x730
[   25.046429]  kthread+0x337/0x6f0
[   25.046766]  ret_from_fork+0x116/0x1d0
[   25.047210]  ret_from_fork_asm+0x1a/0x30
[   25.047352] 
[   25.047441] Freed by task 21:
[   25.047564]  kasan_save_stack+0x45/0x70
[   25.047698]  kasan_save_track+0x18/0x40
[   25.047827]  kasan_save_free_info+0x3f/0x60
[   25.047986]  __kasan_slab_free+0x5e/0x80
[   25.048475]  kfree+0x222/0x3f0
[   25.048741]  build_sched_domains+0x2072/0x5d80
[   25.049375]  partition_sched_domains+0x471/0x9c0
[   25.049919]  rebuild_sched_domains_locked+0x97d/0xd50
[   25.050458]  cpuset_update_active_cpus+0x80f/0x1a90
[   25.050642]  sched_cpu_activate+0x2bf/0x330
[   25.051046]  cpuhp_invoke_callback+0x2a1/0xf00
[   25.051765]  cpuhp_thread_fun+0x2ce/0x5c0
[   25.052373]  smpboot_thread_fn+0x2bc/0x730
[   25.052934]  kthread+0x337/0x6f0
[   25.053503]  ret_from_fork+0x116/0x1d0
[   25.054061]  ret_from_fork_asm+0x1a/0x30
[   25.054523] 
[   25.054886] The buggy address belongs to the object at ffff888105f9f140
[   25.054886]  which belongs to the cache kmalloc-16 of size 16
[   25.055745] The buggy address is located 15 bytes to the right of
[   25.055745]  allocated 16-byte region [ffff888105f9f140, ffff888105f9f150)
[   25.057500] 
[   25.057812] The buggy address belongs to the physical page:
[   25.058476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9f
[   25.058738] flags: 0x200000000000000(node=0|zone=2)
[   25.059542] page_type: f5(slab)
[   25.060058] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   25.061088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.061619] page dumped because: kasan: bad access detected
[   25.061977] 
[   25.062340] Memory state around the buggy address:
[   25.063018]  ffff888105f9f000: 00 06 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   25.063874]  ffff888105f9f080: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   25.064579] >ffff888105f9f100: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   25.065103]                                                     ^
[   25.065818]  ffff888105f9f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.066771]  ffff888105f9f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.067303] ==================================================================