Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.505392] ==================================================================
[   16.505446] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.505494] Write of size 1 at addr fff00000c652dd78 by task kunit_try_catch/142
[   16.505798] 
[   16.505951] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.506078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.506147] Hardware name: linux,dummy-virt (DT)
[   16.506195] Call trace:
[   16.506280]  show_stack+0x20/0x38 (C)
[   16.506333]  dump_stack_lvl+0x8c/0xd0
[   16.506388]  print_report+0x118/0x608
[   16.506575]  kasan_report+0xdc/0x128
[   16.506774]  __asan_report_store1_noabort+0x20/0x30
[   16.506836]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.506886]  kunit_try_run_case+0x170/0x3f0
[   16.506931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.507232]  kthread+0x328/0x630
[   16.507458]  ret_from_fork+0x10/0x20
[   16.507533] 
[   16.507583] Allocated by task 142:
[   16.507630]  kasan_save_stack+0x3c/0x68
[   16.507741]  kasan_save_track+0x20/0x40
[   16.507792]  kasan_save_alloc_info+0x40/0x58
[   16.507831]  __kasan_kmalloc+0xd4/0xd8
[   16.507884]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.507944]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.508138]  kunit_try_run_case+0x170/0x3f0
[   16.508192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.508372]  kthread+0x328/0x630
[   16.508415]  ret_from_fork+0x10/0x20
[   16.508507] 
[   16.508579] The buggy address belongs to the object at fff00000c652dd00
[   16.508579]  which belongs to the cache kmalloc-128 of size 128
[   16.508713] The buggy address is located 0 bytes to the right of
[   16.508713]  allocated 120-byte region [fff00000c652dd00, fff00000c652dd78)
[   16.508778] 
[   16.508797] The buggy address belongs to the physical page:
[   16.508824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d
[   16.508879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.509072] page_type: f5(slab)
[   16.509148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.509322] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.509537] page dumped because: kasan: bad access detected
[   16.509604] 
[   16.509622] Memory state around the buggy address:
[   16.509899]  fff00000c652dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.510201]  fff00000c652dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.510379] >fff00000c652dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.510456]                                                                 ^
[   16.510511]  fff00000c652dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.510800]  fff00000c652de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.510895] ==================================================================
[   16.498438] ==================================================================
[   16.498736] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.498800] Write of size 1 at addr fff00000c652dc78 by task kunit_try_catch/142
[   16.499117] 
[   16.499246] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.499335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.499521] Hardware name: linux,dummy-virt (DT)
[   16.499717] Call trace:
[   16.499770]  show_stack+0x20/0x38 (C)
[   16.499823]  dump_stack_lvl+0x8c/0xd0
[   16.499956]  print_report+0x118/0x608
[   16.500076]  kasan_report+0xdc/0x128
[   16.500262]  __asan_report_store1_noabort+0x20/0x30
[   16.500310]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.500623]  kunit_try_run_case+0x170/0x3f0
[   16.500847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.500907]  kthread+0x328/0x630
[   16.500948]  ret_from_fork+0x10/0x20
[   16.500996] 
[   16.501015] Allocated by task 142:
[   16.501297]  kasan_save_stack+0x3c/0x68
[   16.501544]  kasan_save_track+0x20/0x40
[   16.501656]  kasan_save_alloc_info+0x40/0x58
[   16.501838]  __kasan_kmalloc+0xd4/0xd8
[   16.501955]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.502129]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.502469]  kunit_try_run_case+0x170/0x3f0
[   16.502597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.502646]  kthread+0x328/0x630
[   16.502677]  ret_from_fork+0x10/0x20
[   16.502711] 
[   16.502730] The buggy address belongs to the object at fff00000c652dc00
[   16.502730]  which belongs to the cache kmalloc-128 of size 128
[   16.502786] The buggy address is located 0 bytes to the right of
[   16.502786]  allocated 120-byte region [fff00000c652dc00, fff00000c652dc78)
[   16.502918] 
[   16.502945] The buggy address belongs to the physical page:
[   16.502990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d
[   16.503071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.503119] page_type: f5(slab)
[   16.503156] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.503209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.503273] page dumped because: kasan: bad access detected
[   16.503313] 
[   16.503330] Memory state around the buggy address:
[   16.503359]  fff00000c652db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.503400]  fff00000c652db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503440] >fff00000c652dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.503476]                                                                 ^
[   16.503514]  fff00000c652dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503555]  fff00000c652dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503591] ==================================================================

[   10.887224] ==================================================================
[   10.887755] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.888021] Write of size 1 at addr ffff8881029db278 by task kunit_try_catch/160
[   10.888436] 
[   10.888531] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.888574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.888585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.888606] Call Trace:
[   10.888618]  <TASK>
[   10.888634]  dump_stack_lvl+0x73/0xb0
[   10.888663]  print_report+0xd1/0x650
[   10.888684]  ? __virt_addr_valid+0x1db/0x2d0
[   10.888707]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.888731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.888751]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.888775]  kasan_report+0x141/0x180
[   10.888796]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.888824]  __asan_report_store1_noabort+0x1b/0x30
[   10.888844]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.888867]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.888891]  ? __schedule+0x10cc/0x2b60
[   10.888913]  ? __pfx_read_tsc+0x10/0x10
[   10.888934]  ? ktime_get_ts64+0x86/0x230
[   10.888959]  kunit_try_run_case+0x1a5/0x480
[   10.888983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.889003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.889025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.889046]  ? __kthread_parkme+0x82/0x180
[   10.889066]  ? preempt_count_sub+0x50/0x80
[   10.889089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.889132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.889155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.889177]  kthread+0x337/0x6f0
[   10.889195]  ? trace_preempt_on+0x20/0xc0
[   10.889218]  ? __pfx_kthread+0x10/0x10
[   10.889238]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.889257]  ? calculate_sigpending+0x7b/0xa0
[   10.889281]  ? __pfx_kthread+0x10/0x10
[   10.889301]  ret_from_fork+0x116/0x1d0
[   10.889337]  ? __pfx_kthread+0x10/0x10
[   10.889357]  ret_from_fork_asm+0x1a/0x30
[   10.889387]  </TASK>
[   10.889398] 
[   10.903166] Allocated by task 160:
[   10.903538]  kasan_save_stack+0x45/0x70
[   10.904217]  kasan_save_track+0x18/0x40
[   10.904373]  kasan_save_alloc_info+0x3b/0x50
[   10.904780]  __kasan_kmalloc+0xb7/0xc0
[   10.905090]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.905366]  kmalloc_track_caller_oob_right+0x99/0x520
[   10.905838]  kunit_try_run_case+0x1a5/0x480
[   10.906249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.906656]  kthread+0x337/0x6f0
[   10.906785]  ret_from_fork+0x116/0x1d0
[   10.906918]  ret_from_fork_asm+0x1a/0x30
[   10.907059] 
[   10.907150] The buggy address belongs to the object at ffff8881029db200
[   10.907150]  which belongs to the cache kmalloc-128 of size 128
[   10.907802] The buggy address is located 0 bytes to the right of
[   10.907802]  allocated 120-byte region [ffff8881029db200, ffff8881029db278)
[   10.908397] 
[   10.908502] The buggy address belongs to the physical page:
[   10.908730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   10.909045] flags: 0x200000000000000(node=0|zone=2)
[   10.909398] page_type: f5(slab)
[   10.909531] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.909864] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.910241] page dumped because: kasan: bad access detected
[   10.910493] 
[   10.910587] Memory state around the buggy address:
[   10.910784]  ffff8881029db100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.911038]  ffff8881029db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.911297] >ffff8881029db200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.911606]                                                                 ^
[   10.912043]  ffff8881029db280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.912404]  ffff8881029db300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.912644] ==================================================================