Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.496762] ==================================================================
[   16.496818] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.498023] Write of size 1 at addr fff00000c46ebd78 by task kunit_try_catch/142
[   16.498591] 
[   16.498729] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.499099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.499248] Hardware name: linux,dummy-virt (DT)
[   16.499466] Call trace:
[   16.499638]  show_stack+0x20/0x38 (C)
[   16.499821]  dump_stack_lvl+0x8c/0xd0
[   16.500401]  print_report+0x118/0x608
[   16.500470]  kasan_report+0xdc/0x128
[   16.500701]  __asan_report_store1_noabort+0x20/0x30
[   16.501029]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.501166]  kunit_try_run_case+0x170/0x3f0
[   16.501221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.501756]  kthread+0x328/0x630
[   16.501838]  ret_from_fork+0x10/0x20
[   16.502038] 
[   16.502347] Allocated by task 142:
[   16.502529]  kasan_save_stack+0x3c/0x68
[   16.502619]  kasan_save_track+0x20/0x40
[   16.502660]  kasan_save_alloc_info+0x40/0x58
[   16.502703]  __kasan_kmalloc+0xd4/0xd8
[   16.502741]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.503440]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.503599]  kunit_try_run_case+0x170/0x3f0
[   16.503648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.503723]  kthread+0x328/0x630
[   16.504265]  ret_from_fork+0x10/0x20
[   16.504314] 
[   16.504334] The buggy address belongs to the object at fff00000c46ebd00
[   16.504334]  which belongs to the cache kmalloc-128 of size 128
[   16.504405] The buggy address is located 0 bytes to the right of
[   16.504405]  allocated 120-byte region [fff00000c46ebd00, fff00000c46ebd78)
[   16.504466] 
[   16.504641] The buggy address belongs to the physical page:
[   16.504933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046eb
[   16.505317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.505580] page_type: f5(slab)
[   16.505767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.505919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.506140] page dumped because: kasan: bad access detected
[   16.506333] 
[   16.506372] Memory state around the buggy address:
[   16.506424]  fff00000c46ebc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.506474]  fff00000c46ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506515] >fff00000c46ebd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.506551]                                                                 ^
[   16.506654]  fff00000c46ebd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506695]  fff00000c46ebe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506732] ==================================================================
[   16.508199] ==================================================================
[   16.508244] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.508296] Write of size 1 at addr fff00000c46ebe78 by task kunit_try_catch/142
[   16.508359] 
[   16.510246] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.510435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.510464] Hardware name: linux,dummy-virt (DT)
[   16.510493] Call trace:
[   16.510653]  show_stack+0x20/0x38 (C)
[   16.510710]  dump_stack_lvl+0x8c/0xd0
[   16.510973]  print_report+0x118/0x608
[   16.511324]  kasan_report+0xdc/0x128
[   16.511645]  __asan_report_store1_noabort+0x20/0x30
[   16.512113]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.512800]  kunit_try_run_case+0x170/0x3f0
[   16.512862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.512917]  kthread+0x328/0x630
[   16.512960]  ret_from_fork+0x10/0x20
[   16.513603] 
[   16.513635] Allocated by task 142:
[   16.513666]  kasan_save_stack+0x3c/0x68
[   16.513895]  kasan_save_track+0x20/0x40
[   16.513953]  kasan_save_alloc_info+0x40/0x58
[   16.513994]  __kasan_kmalloc+0xd4/0xd8
[   16.514032]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.514531]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.514586]  kunit_try_run_case+0x170/0x3f0
[   16.514625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.514669]  kthread+0x328/0x630
[   16.514807]  ret_from_fork+0x10/0x20
[   16.514873] 
[   16.515263] The buggy address belongs to the object at fff00000c46ebe00
[   16.515263]  which belongs to the cache kmalloc-128 of size 128
[   16.515333] The buggy address is located 0 bytes to the right of
[   16.515333]  allocated 120-byte region [fff00000c46ebe00, fff00000c46ebe78)
[   16.515410] 
[   16.515430] The buggy address belongs to the physical page:
[   16.515991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046eb
[   16.516335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.516646] page_type: f5(slab)
[   16.516717] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.516890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.517162] page dumped because: kasan: bad access detected
[   16.517200] 
[   16.517444] Memory state around the buggy address:
[   16.517480]  fff00000c46ebd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.517522]  fff00000c46ebd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.517564] >fff00000c46ebe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.517601]                                                                 ^
[   16.517639]  fff00000c46ebe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.517680]  fff00000c46ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.518156] ==================================================================

[   11.962291] ==================================================================
[   11.962760] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.963455] Write of size 1 at addr ffff888102791378 by task kunit_try_catch/159
[   11.963740] 
[   11.964061] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.964108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.964119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.964137] Call Trace:
[   11.964148]  <TASK>
[   11.964162]  dump_stack_lvl+0x73/0xb0
[   11.964191]  print_report+0xd1/0x650
[   11.964216]  ? __virt_addr_valid+0x1db/0x2d0
[   11.964239]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.964265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.964288]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.964314]  kasan_report+0x141/0x180
[   11.964335]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.964365]  __asan_report_store1_noabort+0x1b/0x30
[   11.964390]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.964416]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.964443]  ? __schedule+0x10cc/0x2b60
[   11.964464]  ? __pfx_read_tsc+0x10/0x10
[   11.964484]  ? ktime_get_ts64+0x86/0x230
[   11.964508]  kunit_try_run_case+0x1a5/0x480
[   11.964532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.964554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.964578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.964601]  ? __kthread_parkme+0x82/0x180
[   11.964622]  ? preempt_count_sub+0x50/0x80
[   11.964645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.964669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.964694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.964718]  kthread+0x337/0x6f0
[   11.964737]  ? trace_preempt_on+0x20/0xc0
[   11.964759]  ? __pfx_kthread+0x10/0x10
[   11.964779]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.964801]  ? calculate_sigpending+0x7b/0xa0
[   11.964892]  ? __pfx_kthread+0x10/0x10
[   11.964913]  ret_from_fork+0x116/0x1d0
[   11.964932]  ? __pfx_kthread+0x10/0x10
[   11.964952]  ret_from_fork_asm+0x1a/0x30
[   11.964982]  </TASK>
[   11.964992] 
[   11.972889] Allocated by task 159:
[   11.973691]  kasan_save_stack+0x45/0x70
[   11.974132]  kasan_save_track+0x18/0x40
[   11.974433]  kasan_save_alloc_info+0x3b/0x50
[   11.974658]  __kasan_kmalloc+0xb7/0xc0
[   11.975369]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.975614]  kmalloc_track_caller_oob_right+0x99/0x520
[   11.975840]  kunit_try_run_case+0x1a5/0x480
[   11.976110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.976352]  kthread+0x337/0x6f0
[   11.976514]  ret_from_fork+0x116/0x1d0
[   11.976686]  ret_from_fork_asm+0x1a/0x30
[   11.977646] 
[   11.977728] The buggy address belongs to the object at ffff888102791300
[   11.977728]  which belongs to the cache kmalloc-128 of size 128
[   11.978280] The buggy address is located 0 bytes to the right of
[   11.978280]  allocated 120-byte region [ffff888102791300, ffff888102791378)
[   11.978638] 
[   11.978709] The buggy address belongs to the physical page:
[   11.978873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   11.979115] flags: 0x200000000000000(node=0|zone=2)
[   11.979269] page_type: f5(slab)
[   11.980094] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.980530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.982127] page dumped because: kasan: bad access detected
[   11.982616] 
[   11.982694] Memory state around the buggy address:
[   11.982847]  ffff888102791200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.983079]  ffff888102791280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.983288] >ffff888102791300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.983492]                                                                 ^
[   11.983698]  ffff888102791380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.983905]  ffff888102791400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.985143] ==================================================================
[   11.987550] ==================================================================
[   11.987878] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.988311] Write of size 1 at addr ffff888102791478 by task kunit_try_catch/159
[   11.988625] 
[   11.988796] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.988835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.988846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.988864] Call Trace:
[   11.988876]  <TASK>
[   11.988890]  dump_stack_lvl+0x73/0xb0
[   11.988917]  print_report+0xd1/0x650
[   11.988951]  ? __virt_addr_valid+0x1db/0x2d0
[   11.988973]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.988998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.989020]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.989063]  kasan_report+0x141/0x180
[   11.989084]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.989114]  __asan_report_store1_noabort+0x1b/0x30
[   11.989139]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.989164]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.989190]  ? __schedule+0x10cc/0x2b60
[   11.989211]  ? __pfx_read_tsc+0x10/0x10
[   11.989232]  ? ktime_get_ts64+0x86/0x230
[   11.989255]  kunit_try_run_case+0x1a5/0x480
[   11.989279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.989301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.989324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.989347]  ? __kthread_parkme+0x82/0x180
[   11.989367]  ? preempt_count_sub+0x50/0x80
[   11.989389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.989413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.989437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.989462]  kthread+0x337/0x6f0
[   11.989480]  ? trace_preempt_on+0x20/0xc0
[   11.989502]  ? __pfx_kthread+0x10/0x10
[   11.989522]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.989543]  ? calculate_sigpending+0x7b/0xa0
[   11.989566]  ? __pfx_kthread+0x10/0x10
[   11.989586]  ret_from_fork+0x116/0x1d0
[   11.989604]  ? __pfx_kthread+0x10/0x10
[   11.989624]  ret_from_fork_asm+0x1a/0x30
[   11.989654]  </TASK>
[   11.989664] 
[   11.999921] Allocated by task 159:
[   12.000332]  kasan_save_stack+0x45/0x70
[   12.000535]  kasan_save_track+0x18/0x40
[   12.000715]  kasan_save_alloc_info+0x3b/0x50
[   12.000911]  __kasan_kmalloc+0xb7/0xc0
[   12.001488]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.001714]  kmalloc_track_caller_oob_right+0x19a/0x520
[   12.002157]  kunit_try_run_case+0x1a5/0x480
[   12.002516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.002746]  kthread+0x337/0x6f0
[   12.003178]  ret_from_fork+0x116/0x1d0
[   12.003339]  ret_from_fork_asm+0x1a/0x30
[   12.003632] 
[   12.003796] The buggy address belongs to the object at ffff888102791400
[   12.003796]  which belongs to the cache kmalloc-128 of size 128
[   12.004590] The buggy address is located 0 bytes to the right of
[   12.004590]  allocated 120-byte region [ffff888102791400, ffff888102791478)
[   12.005441] 
[   12.005554] The buggy address belongs to the physical page:
[   12.005801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   12.006474] flags: 0x200000000000000(node=0|zone=2)
[   12.006712] page_type: f5(slab)
[   12.007078] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.007431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.007741] page dumped because: kasan: bad access detected
[   12.008181] 
[   12.008284] Memory state around the buggy address:
[   12.008565]  ffff888102791300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.008833]  ffff888102791380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.009412] >ffff888102791400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.009690]                                                                 ^
[   12.010435]  ffff888102791480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.010749]  ffff888102791500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.011333] ==================================================================