Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.035227] ==================================================================
[   18.035273] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   18.036415] Write of size 1 at addr fff00000c5cbb978 by task kunit_try_catch/142
[   18.036486] 
[   18.036578] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.036658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.036704] Hardware name: linux,dummy-virt (DT)
[   18.036774] Call trace:
[   18.036802]  show_stack+0x20/0x38 (C)
[   18.036882]  dump_stack_lvl+0x8c/0xd0
[   18.036932]  print_report+0x118/0x608
[   18.037095]  kasan_report+0xdc/0x128
[   18.037170]  __asan_report_store1_noabort+0x20/0x30
[   18.037349]  kmalloc_track_caller_oob_right+0x418/0x488
[   18.037413]  kunit_try_run_case+0x170/0x3f0
[   18.037467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.037533]  kthread+0x328/0x630
[   18.037574]  ret_from_fork+0x10/0x20
[   18.037644] 
[   18.037662] Allocated by task 142:
[   18.037689]  kasan_save_stack+0x3c/0x68
[   18.037735]  kasan_save_track+0x20/0x40
[   18.037772]  kasan_save_alloc_info+0x40/0x58
[   18.037813]  __kasan_kmalloc+0xd4/0xd8
[   18.037885]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.037928]  kmalloc_track_caller_oob_right+0x184/0x488
[   18.037968]  kunit_try_run_case+0x170/0x3f0
[   18.038017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.038058]  kthread+0x328/0x630
[   18.038369]  ret_from_fork+0x10/0x20
[   18.038444] 
[   18.038464] The buggy address belongs to the object at fff00000c5cbb900
[   18.038464]  which belongs to the cache kmalloc-128 of size 128
[   18.038518] The buggy address is located 0 bytes to the right of
[   18.038518]  allocated 120-byte region [fff00000c5cbb900, fff00000c5cbb978)
[   18.038579] 
[   18.038597] The buggy address belongs to the physical page:
[   18.038625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   18.038687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.038739] page_type: f5(slab)
[   18.038776] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.038831] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.039308] page dumped because: kasan: bad access detected
[   18.039340] 
[   18.039359] Memory state around the buggy address:
[   18.039393]  fff00000c5cbb800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.039440]  fff00000c5cbb880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.039480] >fff00000c5cbb900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.039529]                                                                 ^
[   18.039581]  fff00000c5cbb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.039621]  fff00000c5cbba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.039665] ==================================================================
[   18.027742] ==================================================================
[   18.027813] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.027884] Write of size 1 at addr fff00000c5cbb878 by task kunit_try_catch/142
[   18.027944] 
[   18.027977] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.028260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.028404] Hardware name: linux,dummy-virt (DT)
[   18.028469] Call trace:
[   18.029335]  show_stack+0x20/0x38 (C)
[   18.029399]  dump_stack_lvl+0x8c/0xd0
[   18.029464]  print_report+0x118/0x608
[   18.029511]  kasan_report+0xdc/0x128
[   18.029556]  __asan_report_store1_noabort+0x20/0x30
[   18.029607]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.029657]  kunit_try_run_case+0x170/0x3f0
[   18.031177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.031923]  kthread+0x328/0x630
[   18.031988]  ret_from_fork+0x10/0x20
[   18.032080] 
[   18.032139] Allocated by task 142:
[   18.032199]  kasan_save_stack+0x3c/0x68
[   18.032265]  kasan_save_track+0x20/0x40
[   18.032320]  kasan_save_alloc_info+0x40/0x58
[   18.032399]  __kasan_kmalloc+0xd4/0xd8
[   18.032457]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.032519]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.032757]  kunit_try_run_case+0x170/0x3f0
[   18.032877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.032982]  kthread+0x328/0x630
[   18.033039]  ret_from_fork+0x10/0x20
[   18.033104] 
[   18.033184] The buggy address belongs to the object at fff00000c5cbb800
[   18.033184]  which belongs to the cache kmalloc-128 of size 128
[   18.033281] The buggy address is located 0 bytes to the right of
[   18.033281]  allocated 120-byte region [fff00000c5cbb800, fff00000c5cbb878)
[   18.033429] 
[   18.033448] The buggy address belongs to the physical page:
[   18.033477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   18.033574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.033809] page_type: f5(slab)
[   18.033873] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.034137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.034330] page dumped because: kasan: bad access detected
[   18.034369] 
[   18.034387] Memory state around the buggy address:
[   18.034419]  fff00000c5cbb700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.034464]  fff00000c5cbb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.034504] >fff00000c5cbb800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.034546]                                                                 ^
[   18.034584]  fff00000c5cbb880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.034630]  fff00000c5cbb900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.034666] ==================================================================

[   11.015375] ==================================================================
[   11.016015] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.016815] Write of size 1 at addr ffff8881031a0478 by task kunit_try_catch/160
[   11.017585] 
[   11.017759] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.017800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.017812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.017833] Call Trace:
[   11.017845]  <TASK>
[   11.017860]  dump_stack_lvl+0x73/0xb0
[   11.017886]  print_report+0xd1/0x650
[   11.017907]  ? __virt_addr_valid+0x1db/0x2d0
[   11.017928]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.017951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.017972]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.017996]  kasan_report+0x141/0x180
[   11.018017]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.018046]  __asan_report_store1_noabort+0x1b/0x30
[   11.018065]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.018089]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.018113]  ? __schedule+0x10cc/0x2b60
[   11.018134]  ? __pfx_read_tsc+0x10/0x10
[   11.018153]  ? ktime_get_ts64+0x86/0x230
[   11.018176]  kunit_try_run_case+0x1a5/0x480
[   11.018199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.018220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.018241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.018262]  ? __kthread_parkme+0x82/0x180
[   11.018281]  ? preempt_count_sub+0x50/0x80
[   11.018303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.018338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.018359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.018381]  kthread+0x337/0x6f0
[   11.018399]  ? trace_preempt_on+0x20/0xc0
[   11.018421]  ? __pfx_kthread+0x10/0x10
[   11.018441]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.018472]  ? calculate_sigpending+0x7b/0xa0
[   11.018494]  ? __pfx_kthread+0x10/0x10
[   11.018515]  ret_from_fork+0x116/0x1d0
[   11.018532]  ? __pfx_kthread+0x10/0x10
[   11.018552]  ret_from_fork_asm+0x1a/0x30
[   11.018581]  </TASK>
[   11.018591] 
[   11.029993] Allocated by task 160:
[   11.030133]  kasan_save_stack+0x45/0x70
[   11.030372]  kasan_save_track+0x18/0x40
[   11.030743]  kasan_save_alloc_info+0x3b/0x50
[   11.031128]  __kasan_kmalloc+0xb7/0xc0
[   11.031530]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.032099]  kmalloc_track_caller_oob_right+0x19a/0x520
[   11.032636]  kunit_try_run_case+0x1a5/0x480
[   11.033082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.033639]  kthread+0x337/0x6f0
[   11.034043]  ret_from_fork+0x116/0x1d0
[   11.034209]  ret_from_fork_asm+0x1a/0x30
[   11.034585] 
[   11.034749] The buggy address belongs to the object at ffff8881031a0400
[   11.034749]  which belongs to the cache kmalloc-128 of size 128
[   11.035697] The buggy address is located 0 bytes to the right of
[   11.035697]  allocated 120-byte region [ffff8881031a0400, ffff8881031a0478)
[   11.036403] 
[   11.036486] The buggy address belongs to the physical page:
[   11.037138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031a0
[   11.037450] flags: 0x200000000000000(node=0|zone=2)
[   11.038130] page_type: f5(slab)
[   11.038521] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.039484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.040290] page dumped because: kasan: bad access detected
[   11.040511] 
[   11.040583] Memory state around the buggy address:
[   11.040742]  ffff8881031a0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.041415]  ffff8881031a0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.042069] >ffff8881031a0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.042769]                                                                 ^
[   11.043277]  ffff8881031a0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.043501]  ffff8881031a0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.043768] ==================================================================
[   10.984564] ==================================================================
[   10.985685] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.987151] Write of size 1 at addr ffff8881031a0378 by task kunit_try_catch/160
[   10.987888] 
[   10.988190] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.988240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.988252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.988273] Call Trace:
[   10.988288]  <TASK>
[   10.988305]  dump_stack_lvl+0x73/0xb0
[   10.988335]  print_report+0xd1/0x650
[   10.988356]  ? __virt_addr_valid+0x1db/0x2d0
[   10.988379]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.988402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.988423]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.988447]  kasan_report+0x141/0x180
[   10.988481]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.988509]  __asan_report_store1_noabort+0x1b/0x30
[   10.988529]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.988552]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.988576]  ? __schedule+0x10cc/0x2b60
[   10.988598]  ? __pfx_read_tsc+0x10/0x10
[   10.988618]  ? ktime_get_ts64+0x86/0x230
[   10.988643]  kunit_try_run_case+0x1a5/0x480
[   10.988668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.988689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.988711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.988734]  ? __kthread_parkme+0x82/0x180
[   10.988754]  ? preempt_count_sub+0x50/0x80
[   10.988777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.988800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.988821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.988842]  kthread+0x337/0x6f0
[   10.988861]  ? trace_preempt_on+0x20/0xc0
[   10.988883]  ? __pfx_kthread+0x10/0x10
[   10.988902]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.988922]  ? calculate_sigpending+0x7b/0xa0
[   10.988945]  ? __pfx_kthread+0x10/0x10
[   10.988965]  ret_from_fork+0x116/0x1d0
[   10.988982]  ? __pfx_kthread+0x10/0x10
[   10.989001]  ret_from_fork_asm+0x1a/0x30
[   10.989031]  </TASK>
[   10.989041] 
[   11.001636] Allocated by task 160:
[   11.001903]  kasan_save_stack+0x45/0x70
[   11.002296]  kasan_save_track+0x18/0x40
[   11.002777]  kasan_save_alloc_info+0x3b/0x50
[   11.003032]  __kasan_kmalloc+0xb7/0xc0
[   11.003164]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.003741]  kmalloc_track_caller_oob_right+0x99/0x520
[   11.004232]  kunit_try_run_case+0x1a5/0x480
[   11.004617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.004913]  kthread+0x337/0x6f0
[   11.005275]  ret_from_fork+0x116/0x1d0
[   11.005634]  ret_from_fork_asm+0x1a/0x30
[   11.005835] 
[   11.005907] The buggy address belongs to the object at ffff8881031a0300
[   11.005907]  which belongs to the cache kmalloc-128 of size 128
[   11.006311] The buggy address is located 0 bytes to the right of
[   11.006311]  allocated 120-byte region [ffff8881031a0300, ffff8881031a0378)
[   11.007555] 
[   11.007719] The buggy address belongs to the physical page:
[   11.008244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031a0
[   11.009032] flags: 0x200000000000000(node=0|zone=2)
[   11.009435] page_type: f5(slab)
[   11.009571] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.009872] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.010615] page dumped because: kasan: bad access detected
[   11.011108] 
[   11.011297] Memory state around the buggy address:
[   11.011739]  ffff8881031a0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.012446]  ffff8881031a0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.012673] >ffff8881031a0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.012879]                                                                 ^
[   11.013087]  ffff8881031a0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.013567]  ffff8881031a0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.014249] ==================================================================