Hay
Date
July 16, 2025, 3:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.402156] ==================================================================
[   16.402285] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.402347] Write of size 1 at addr fff00000c6554878 by task kunit_try_catch/142
[   16.402416] 
[   16.402609] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.402942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.402981] Hardware name: linux,dummy-virt (DT)
[   16.403028] Call trace:
[   16.403053]  show_stack+0x20/0x38 (C)
[   16.403151]  dump_stack_lvl+0x8c/0xd0
[   16.403204]  print_report+0x118/0x5d0
[   16.403433]  kasan_report+0xdc/0x128
[   16.403482]  __asan_report_store1_noabort+0x20/0x30
[   16.403844]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.403935]  kunit_try_run_case+0x170/0x3f0
[   16.404078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.404186]  kthread+0x328/0x630
[   16.404331]  ret_from_fork+0x10/0x20
[   16.404381] 
[   16.404434] Allocated by task 142:
[   16.404636]  kasan_save_stack+0x3c/0x68
[   16.404782]  kasan_save_track+0x20/0x40
[   16.404932]  kasan_save_alloc_info+0x40/0x58
[   16.405002]  __kasan_kmalloc+0xd4/0xd8
[   16.405185]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.405351]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.405478]  kunit_try_run_case+0x170/0x3f0
[   16.405566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.405633]  kthread+0x328/0x630
[   16.405869]  ret_from_fork+0x10/0x20
[   16.405999] 
[   16.406037] The buggy address belongs to the object at fff00000c6554800
[   16.406037]  which belongs to the cache kmalloc-128 of size 128
[   16.406163] The buggy address is located 0 bytes to the right of
[   16.406163]  allocated 120-byte region [fff00000c6554800, fff00000c6554878)
[   16.406239] 
[   16.406259] The buggy address belongs to the physical page:
[   16.406396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.406486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.406639] page_type: f5(slab)
[   16.406744] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.406832] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.406873] page dumped because: kasan: bad access detected
[   16.406910] 
[   16.407119] Memory state around the buggy address:
[   16.407285]  fff00000c6554700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.407431]  fff00000c6554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.407502] >fff00000c6554800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.407547]                                                                 ^
[   16.407586]  fff00000c6554880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.408300]  fff00000c6554900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.408377] ==================================================================
[   16.409705] ==================================================================
[   16.409789] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.409962] Write of size 1 at addr fff00000c6554978 by task kunit_try_catch/142
[   16.410026] 
[   16.410113] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.410227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.410253] Hardware name: linux,dummy-virt (DT)
[   16.410289] Call trace:
[   16.410381]  show_stack+0x20/0x38 (C)
[   16.410458]  dump_stack_lvl+0x8c/0xd0
[   16.410524]  print_report+0x118/0x5d0
[   16.410618]  kasan_report+0xdc/0x128
[   16.410665]  __asan_report_store1_noabort+0x20/0x30
[   16.410731]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.410785]  kunit_try_run_case+0x170/0x3f0
[   16.411003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.411157]  kthread+0x328/0x630
[   16.411202]  ret_from_fork+0x10/0x20
[   16.411257] 
[   16.411465] Allocated by task 142:
[   16.411614]  kasan_save_stack+0x3c/0x68
[   16.411753]  kasan_save_track+0x20/0x40
[   16.411851]  kasan_save_alloc_info+0x40/0x58
[   16.411891]  __kasan_kmalloc+0xd4/0xd8
[   16.411960]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.412004]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.412044]  kunit_try_run_case+0x170/0x3f0
[   16.412081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.412123]  kthread+0x328/0x630
[   16.412154]  ret_from_fork+0x10/0x20
[   16.412189] 
[   16.412207] The buggy address belongs to the object at fff00000c6554900
[   16.412207]  which belongs to the cache kmalloc-128 of size 128
[   16.412456] The buggy address is located 0 bytes to the right of
[   16.412456]  allocated 120-byte region [fff00000c6554900, fff00000c6554978)
[   16.412623] 
[   16.412646] The buggy address belongs to the physical page:
[   16.413101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.413277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.413373] page_type: f5(slab)
[   16.413487] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.413537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.413822] page dumped because: kasan: bad access detected
[   16.413922] 
[   16.413976] Memory state around the buggy address:
[   16.414054]  fff00000c6554800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.414153]  fff00000c6554880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.414195] >fff00000c6554900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.414243]                                                                 ^
[   16.414408]  fff00000c6554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.414522]  fff00000c6554a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.414635] ==================================================================

[   12.004345] ==================================================================
[   12.004916] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.005287] Write of size 1 at addr ffff8881029cc878 by task kunit_try_catch/159
[   12.005911] 
[   12.006040] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.006082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.006093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.006114] Call Trace:
[   12.006124]  <TASK>
[   12.006138]  dump_stack_lvl+0x73/0xb0
[   12.006186]  print_report+0xd1/0x610
[   12.006208]  ? __virt_addr_valid+0x1db/0x2d0
[   12.006243]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.006269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.006293]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.006319]  kasan_report+0x141/0x180
[   12.006341]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.006372]  __asan_report_store1_noabort+0x1b/0x30
[   12.006399]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.006425]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.006453]  ? __schedule+0x10cc/0x2b60
[   12.006476]  ? __pfx_read_tsc+0x10/0x10
[   12.006496]  ? ktime_get_ts64+0x86/0x230
[   12.006521]  kunit_try_run_case+0x1a5/0x480
[   12.006545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.006577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.006610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.006634]  ? __kthread_parkme+0x82/0x180
[   12.006667]  ? preempt_count_sub+0x50/0x80
[   12.006692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.006716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.006760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.006785]  kthread+0x337/0x6f0
[   12.006804]  ? trace_preempt_on+0x20/0xc0
[   12.006828]  ? __pfx_kthread+0x10/0x10
[   12.006849]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.006871]  ? calculate_sigpending+0x7b/0xa0
[   12.006895]  ? __pfx_kthread+0x10/0x10
[   12.006917]  ret_from_fork+0x116/0x1d0
[   12.006935]  ? __pfx_kthread+0x10/0x10
[   12.006955]  ret_from_fork_asm+0x1a/0x30
[   12.006986]  </TASK>
[   12.006995] 
[   12.014112] Allocated by task 159:
[   12.014289]  kasan_save_stack+0x45/0x70
[   12.014484]  kasan_save_track+0x18/0x40
[   12.014678]  kasan_save_alloc_info+0x3b/0x50
[   12.014877]  __kasan_kmalloc+0xb7/0xc0
[   12.015012]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.015436]  kmalloc_track_caller_oob_right+0x19a/0x520
[   12.015699]  kunit_try_run_case+0x1a5/0x480
[   12.015901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.016122]  kthread+0x337/0x6f0
[   12.016304]  ret_from_fork+0x116/0x1d0
[   12.016494]  ret_from_fork_asm+0x1a/0x30
[   12.016739] 
[   12.016856] The buggy address belongs to the object at ffff8881029cc800
[   12.016856]  which belongs to the cache kmalloc-128 of size 128
[   12.017369] The buggy address is located 0 bytes to the right of
[   12.017369]  allocated 120-byte region [ffff8881029cc800, ffff8881029cc878)
[   12.017932] 
[   12.018007] The buggy address belongs to the physical page:
[   12.018180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cc
[   12.018435] flags: 0x200000000000000(node=0|zone=2)
[   12.018690] page_type: f5(slab)
[   12.018867] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.019501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.019809] page dumped because: kasan: bad access detected
[   12.019982] 
[   12.020051] Memory state around the buggy address:
[   12.020220]  ffff8881029cc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.020671]  ffff8881029cc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.020922] >ffff8881029cc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.021252]                                                                 ^
[   12.023493]  ffff8881029cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.023832]  ffff8881029cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.024050] ==================================================================
[   11.975709] ==================================================================
[   11.976332] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.976914] Write of size 1 at addr ffff8881029cc778 by task kunit_try_catch/159
[   11.977781] 
[   11.977876] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.977919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.977931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.977952] Call Trace:
[   11.977963]  <TASK>
[   11.977978]  dump_stack_lvl+0x73/0xb0
[   11.978019]  print_report+0xd1/0x610
[   11.978041]  ? __virt_addr_valid+0x1db/0x2d0
[   11.978065]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.978092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.978116]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.978144]  kasan_report+0x141/0x180
[   11.978167]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.978198]  __asan_report_store1_noabort+0x1b/0x30
[   11.978223]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.978261]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.978288]  ? __schedule+0x10cc/0x2b60
[   11.978311]  ? __pfx_read_tsc+0x10/0x10
[   11.978354]  ? ktime_get_ts64+0x86/0x230
[   11.978380]  kunit_try_run_case+0x1a5/0x480
[   11.978404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.978439]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.978464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.978488]  ? __kthread_parkme+0x82/0x180
[   11.978520]  ? preempt_count_sub+0x50/0x80
[   11.978544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.978568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.978593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.978618]  kthread+0x337/0x6f0
[   11.978637]  ? trace_preempt_on+0x20/0xc0
[   11.978660]  ? __pfx_kthread+0x10/0x10
[   11.978681]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.978702]  ? calculate_sigpending+0x7b/0xa0
[   11.978727]  ? __pfx_kthread+0x10/0x10
[   11.978748]  ret_from_fork+0x116/0x1d0
[   11.978775]  ? __pfx_kthread+0x10/0x10
[   11.978795]  ret_from_fork_asm+0x1a/0x30
[   11.978827]  </TASK>
[   11.978837] 
[   11.991698] Allocated by task 159:
[   11.992190]  kasan_save_stack+0x45/0x70
[   11.992345]  kasan_save_track+0x18/0x40
[   11.992604]  kasan_save_alloc_info+0x3b/0x50
[   11.993113]  __kasan_kmalloc+0xb7/0xc0
[   11.993492]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.994001]  kmalloc_track_caller_oob_right+0x99/0x520
[   11.994527]  kunit_try_run_case+0x1a5/0x480
[   11.994878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.995295]  kthread+0x337/0x6f0
[   11.995656]  ret_from_fork+0x116/0x1d0
[   11.996010]  ret_from_fork_asm+0x1a/0x30
[   11.996376] 
[   11.996455] The buggy address belongs to the object at ffff8881029cc700
[   11.996455]  which belongs to the cache kmalloc-128 of size 128
[   11.997431] The buggy address is located 0 bytes to the right of
[   11.997431]  allocated 120-byte region [ffff8881029cc700, ffff8881029cc778)
[   11.998255] 
[   11.998557] The buggy address belongs to the physical page:
[   11.999128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cc
[   11.999524] flags: 0x200000000000000(node=0|zone=2)
[   11.999691] page_type: f5(slab)
[   11.999824] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.000086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.000569] page dumped because: kasan: bad access detected
[   12.000771] 
[   12.000870] Memory state around the buggy address:
[   12.001163]  ffff8881029cc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.001421]  ffff8881029cc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.001862] >ffff8881029cc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.002325]                                                                 ^
[   12.002622]  ffff8881029cc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.003015]  ffff8881029cc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.003364] ==================================================================