Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.001384] ==================================================================
[   19.001437] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   19.001876] Write of size 1 at addr fff00000c1d5fc78 by task kunit_try_catch/142
[   19.001999] 
[   19.002067] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.002327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.002375] Hardware name: linux,dummy-virt (DT)
[   19.002612] Call trace:
[   19.002646]  show_stack+0x20/0x38 (C)
[   19.002773]  dump_stack_lvl+0x8c/0xd0
[   19.002850]  print_report+0x118/0x608
[   19.002895]  kasan_report+0xdc/0x128
[   19.002967]  __asan_report_store1_noabort+0x20/0x30
[   19.003399]  kmalloc_track_caller_oob_right+0x418/0x488
[   19.003478]  kunit_try_run_case+0x170/0x3f0
[   19.003668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.003937]  kthread+0x328/0x630
[   19.004047]  ret_from_fork+0x10/0x20
[   19.004095] 
[   19.004117] Allocated by task 142:
[   19.004339]  kasan_save_stack+0x3c/0x68
[   19.004827]  kasan_save_track+0x20/0x40
[   19.004914]  kasan_save_alloc_info+0x40/0x58
[   19.004954]  __kasan_kmalloc+0xd4/0xd8
[   19.004988]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.005257]  kmalloc_track_caller_oob_right+0x184/0x488
[   19.005327]  kunit_try_run_case+0x170/0x3f0
[   19.005389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.006136]  kthread+0x328/0x630
[   19.006227]  ret_from_fork+0x10/0x20
[   19.006280] 
[   19.006329] The buggy address belongs to the object at fff00000c1d5fc00
[   19.006329]  which belongs to the cache kmalloc-128 of size 128
[   19.006538] The buggy address is located 0 bytes to the right of
[   19.006538]  allocated 120-byte region [fff00000c1d5fc00, fff00000c1d5fc78)
[   19.006683] 
[   19.006701] The buggy address belongs to the physical page:
[   19.006758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f
[   19.006811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.006879] page_type: f5(slab)
[   19.006916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.006966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.007015] page dumped because: kasan: bad access detected
[   19.007049] 
[   19.007066] Memory state around the buggy address:
[   19.007097]  fff00000c1d5fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.007137]  fff00000c1d5fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.007178] >fff00000c1d5fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.007223]                                                                 ^
[   19.007270]  fff00000c1d5fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.007318]  fff00000c1d5fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.007364] ==================================================================
[   18.993752] ==================================================================
[   18.993834] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.993894] Write of size 1 at addr fff00000c1d5fb78 by task kunit_try_catch/142
[   18.994017] 
[   18.994092] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.994353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.994388] Hardware name: linux,dummy-virt (DT)
[   18.994417] Call trace:
[   18.994438]  show_stack+0x20/0x38 (C)
[   18.994487]  dump_stack_lvl+0x8c/0xd0
[   18.994549]  print_report+0x118/0x608
[   18.994595]  kasan_report+0xdc/0x128
[   18.994638]  __asan_report_store1_noabort+0x20/0x30
[   18.994686]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.994747]  kunit_try_run_case+0x170/0x3f0
[   18.994792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.994842]  kthread+0x328/0x630
[   18.994913]  ret_from_fork+0x10/0x20
[   18.994960] 
[   18.994978] Allocated by task 142:
[   18.995006]  kasan_save_stack+0x3c/0x68
[   18.995061]  kasan_save_track+0x20/0x40
[   18.995097]  kasan_save_alloc_info+0x40/0x58
[   18.995135]  __kasan_kmalloc+0xd4/0xd8
[   18.995170]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.995219]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.995258]  kunit_try_run_case+0x170/0x3f0
[   18.995306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.995350]  kthread+0x328/0x630
[   18.995390]  ret_from_fork+0x10/0x20
[   18.995424] 
[   18.995442] The buggy address belongs to the object at fff00000c1d5fb00
[   18.995442]  which belongs to the cache kmalloc-128 of size 128
[   18.996166] The buggy address is located 0 bytes to the right of
[   18.996166]  allocated 120-byte region [fff00000c1d5fb00, fff00000c1d5fb78)
[   18.996231] 
[   18.996250] The buggy address belongs to the physical page:
[   18.997030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f
[   18.997161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.997337] page_type: f5(slab)
[   18.997375] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.997443] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.997906] page dumped because: kasan: bad access detected
[   18.997962] 
[   18.998035] Memory state around the buggy address:
[   18.998102]  fff00000c1d5fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.998230]  fff00000c1d5fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.998286] >fff00000c1d5fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.998330]                                                                 ^
[   18.998510]  fff00000c1d5fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.998730]  fff00000c1d5fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.998799] ==================================================================

[   12.193847] ==================================================================
[   12.194701] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.195174] Write of size 1 at addr ffff888102602578 by task kunit_try_catch/159
[   12.195429] 
[   12.195540] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.195588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.195600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.195622] Call Trace:
[   12.195636]  <TASK>
[   12.195655]  dump_stack_lvl+0x73/0xb0
[   12.195686]  print_report+0xd1/0x650
[   12.195709]  ? __virt_addr_valid+0x1db/0x2d0
[   12.195733]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.195756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.195780]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.195804]  kasan_report+0x141/0x180
[   12.195825]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.195854]  __asan_report_store1_noabort+0x1b/0x30
[   12.195878]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.195901]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.195927]  ? __schedule+0x10cc/0x2b60
[   12.195949]  ? __pfx_read_tsc+0x10/0x10
[   12.195970]  ? ktime_get_ts64+0x86/0x230
[   12.195996]  kunit_try_run_case+0x1a5/0x480
[   12.196021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.196052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.196075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.196097]  ? __kthread_parkme+0x82/0x180
[   12.196119]  ? preempt_count_sub+0x50/0x80
[   12.196143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.196165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.196187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.196209]  kthread+0x337/0x6f0
[   12.196227]  ? trace_preempt_on+0x20/0xc0
[   12.196250]  ? __pfx_kthread+0x10/0x10
[   12.196269]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.196289]  ? calculate_sigpending+0x7b/0xa0
[   12.196313]  ? __pfx_kthread+0x10/0x10
[   12.196333]  ret_from_fork+0x116/0x1d0
[   12.196351]  ? __pfx_kthread+0x10/0x10
[   12.196370]  ret_from_fork_asm+0x1a/0x30
[   12.196403]  </TASK>
[   12.196415] 
[   12.210990] Allocated by task 159:
[   12.211420]  kasan_save_stack+0x45/0x70
[   12.211876]  kasan_save_track+0x18/0x40
[   12.212330]  kasan_save_alloc_info+0x3b/0x50
[   12.212800]  __kasan_kmalloc+0xb7/0xc0
[   12.213276]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.214160]  kmalloc_track_caller_oob_right+0x99/0x520
[   12.214364]  kunit_try_run_case+0x1a5/0x480
[   12.214510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.215323]  kthread+0x337/0x6f0
[   12.215458]  ret_from_fork+0x116/0x1d0
[   12.215600]  ret_from_fork_asm+0x1a/0x30
[   12.215741] 
[   12.215816] The buggy address belongs to the object at ffff888102602500
[   12.215816]  which belongs to the cache kmalloc-128 of size 128
[   12.216187] The buggy address is located 0 bytes to the right of
[   12.216187]  allocated 120-byte region [ffff888102602500, ffff888102602578)
[   12.216555] 
[   12.216631] The buggy address belongs to the physical page:
[   12.216807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   12.219544] flags: 0x200000000000000(node=0|zone=2)
[   12.221376] page_type: f5(slab)
[   12.222684] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.224301] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.225372] page dumped because: kasan: bad access detected
[   12.225939] 
[   12.226312] Memory state around the buggy address:
[   12.226877]  ffff888102602400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.227753]  ffff888102602480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.228522] >ffff888102602500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.229181]                                                                 ^
[   12.229900]  ffff888102602580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.230482]  ffff888102602600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.231169] ==================================================================
[   12.231988] ==================================================================
[   12.232857] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.233189] Write of size 1 at addr ffff888102602678 by task kunit_try_catch/159
[   12.233418] 
[   12.233512] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.233564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.233575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.233596] Call Trace:
[   12.233609]  <TASK>
[   12.233628]  dump_stack_lvl+0x73/0xb0
[   12.233656]  print_report+0xd1/0x650
[   12.233678]  ? __virt_addr_valid+0x1db/0x2d0
[   12.233701]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.233724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.233748]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.233772]  kasan_report+0x141/0x180
[   12.233793]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.233822]  __asan_report_store1_noabort+0x1b/0x30
[   12.233844]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.233867]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.233892]  ? __schedule+0x10cc/0x2b60
[   12.233914]  ? __pfx_read_tsc+0x10/0x10
[   12.233934]  ? ktime_get_ts64+0x86/0x230
[   12.233959]  kunit_try_run_case+0x1a5/0x480
[   12.233983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.234004]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.234027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.234067]  ? __kthread_parkme+0x82/0x180
[   12.234088]  ? preempt_count_sub+0x50/0x80
[   12.234111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.234134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.234180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.234203]  kthread+0x337/0x6f0
[   12.234221]  ? trace_preempt_on+0x20/0xc0
[   12.234243]  ? __pfx_kthread+0x10/0x10
[   12.234263]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.234283]  ? calculate_sigpending+0x7b/0xa0
[   12.234306]  ? __pfx_kthread+0x10/0x10
[   12.234327]  ret_from_fork+0x116/0x1d0
[   12.234344]  ? __pfx_kthread+0x10/0x10
[   12.234363]  ret_from_fork_asm+0x1a/0x30
[   12.234395]  </TASK>
[   12.234406] 
[   12.248089] Allocated by task 159:
[   12.248291]  kasan_save_stack+0x45/0x70
[   12.248665]  kasan_save_track+0x18/0x40
[   12.249005]  kasan_save_alloc_info+0x3b/0x50
[   12.249494]  __kasan_kmalloc+0xb7/0xc0
[   12.249836]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.250545]  kmalloc_track_caller_oob_right+0x19a/0x520
[   12.251005]  kunit_try_run_case+0x1a5/0x480
[   12.251458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.251923]  kthread+0x337/0x6f0
[   12.252057]  ret_from_fork+0x116/0x1d0
[   12.252190]  ret_from_fork_asm+0x1a/0x30
[   12.252331] 
[   12.252403] The buggy address belongs to the object at ffff888102602600
[   12.252403]  which belongs to the cache kmalloc-128 of size 128
[   12.253405] The buggy address is located 0 bytes to the right of
[   12.253405]  allocated 120-byte region [ffff888102602600, ffff888102602678)
[   12.254890] 
[   12.255138] The buggy address belongs to the physical page:
[   12.255696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   12.256145] flags: 0x200000000000000(node=0|zone=2)
[   12.256592] page_type: f5(slab)
[   12.256896] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.257230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.258035] page dumped because: kasan: bad access detected
[   12.258633] 
[   12.258751] Memory state around the buggy address:
[   12.258910]  ffff888102602500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.259405]  ffff888102602580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.260019] >ffff888102602600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.260791]                                                                 ^
[   12.261522]  ffff888102602680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.261782]  ffff888102602700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.261995] ==================================================================