Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.629316] ==================================================================
[   16.629653] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.629757] Write of size 1 at addr fff00000c65b200a by task kunit_try_catch/146
[   16.629816] 
[   16.629880] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.630001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.630028] Hardware name: linux,dummy-virt (DT)
[   16.630068] Call trace:
[   16.630092]  show_stack+0x20/0x38 (C)
[   16.630393]  dump_stack_lvl+0x8c/0xd0
[   16.630461]  print_report+0x118/0x5d0
[   16.630558]  kasan_report+0xdc/0x128
[   16.630624]  __asan_report_store1_noabort+0x20/0x30
[   16.630676]  kmalloc_large_oob_right+0x278/0x2b8
[   16.630721]  kunit_try_run_case+0x170/0x3f0
[   16.630769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.630819]  kthread+0x328/0x630
[   16.630882]  ret_from_fork+0x10/0x20
[   16.631202] 
[   16.631294] The buggy address belongs to the physical page:
[   16.631330] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0
[   16.631429] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.631496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.631620] page_type: f8(unknown)
[   16.631695] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.631743] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.631800] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.631860] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.631908] head: 0bfffe0000000002 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff
[   16.631955] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.632368] page dumped because: kasan: bad access detected
[   16.632450] 
[   16.632502] Memory state around the buggy address:
[   16.632620]  fff00000c65b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.632713]  fff00000c65b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.632755] >fff00000c65b2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.632791]                       ^
[   16.632822]  fff00000c65b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.632873]  fff00000c65b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.633046] ==================================================================

[   16.323521] ==================================================================
[   16.323693] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.323748] Write of size 1 at addr fff00000c669e00a by task kunit_try_catch/146
[   16.323797] 
[   16.324203] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.324350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.324377] Hardware name: linux,dummy-virt (DT)
[   16.324408] Call trace:
[   16.324459]  show_stack+0x20/0x38 (C)
[   16.324583]  dump_stack_lvl+0x8c/0xd0
[   16.324664]  print_report+0x118/0x5d0
[   16.324709]  kasan_report+0xdc/0x128
[   16.324833]  __asan_report_store1_noabort+0x20/0x30
[   16.324909]  kmalloc_large_oob_right+0x278/0x2b8
[   16.324956]  kunit_try_run_case+0x170/0x3f0
[   16.325238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.325298]  kthread+0x328/0x630
[   16.325404]  ret_from_fork+0x10/0x20
[   16.325464] 
[   16.325526] The buggy address belongs to the physical page:
[   16.325558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c
[   16.325666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.325723] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.325782] page_type: f8(unknown)
[   16.325821] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.325869] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.326092] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.326387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.326438] head: 0bfffe0000000002 ffffc1ffc319a701 00000000ffffffff 00000000ffffffff
[   16.326625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.326788] page dumped because: kasan: bad access detected
[   16.326915] 
[   16.326933] Memory state around the buggy address:
[   16.327022]  fff00000c669df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.327064]  fff00000c669df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.327219] >fff00000c669e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.327400]                       ^
[   16.327648]  fff00000c669e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.327744]  fff00000c669e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.327780] ==================================================================

[   16.357384] ==================================================================
[   16.357457] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.357510] Write of size 1 at addr fff00000c76d600a by task kunit_try_catch/146
[   16.357895] 
[   16.358118] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.358226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.358323] Hardware name: linux,dummy-virt (DT)
[   16.358357] Call trace:
[   16.358428]  show_stack+0x20/0x38 (C)
[   16.358526]  dump_stack_lvl+0x8c/0xd0
[   16.358736]  print_report+0x118/0x5d0
[   16.358790]  kasan_report+0xdc/0x128
[   16.358882]  __asan_report_store1_noabort+0x20/0x30
[   16.359176]  kmalloc_large_oob_right+0x278/0x2b8
[   16.359229]  kunit_try_run_case+0x170/0x3f0
[   16.359277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.359584]  kthread+0x328/0x630
[   16.359727]  ret_from_fork+0x10/0x20
[   16.360106] 
[   16.360292] The buggy address belongs to the physical page:
[   16.360738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d4
[   16.360900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.361040] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.361227] page_type: f8(unknown)
[   16.361457] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.361833] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.361918] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.362049] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.362134] head: 0bfffe0000000002 ffffc1ffc31db501 00000000ffffffff 00000000ffffffff
[   16.362248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.362295] page dumped because: kasan: bad access detected
[   16.362326] 
[   16.362351] Memory state around the buggy address:
[   16.362394]  fff00000c76d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.362435]  fff00000c76d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.362476] >fff00000c76d6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.362512]                       ^
[   16.362563]  fff00000c76d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.362603]  fff00000c76d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.362640] ==================================================================

[   11.487915] ==================================================================
[   11.488399] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   11.488736] Write of size 1 at addr ffff888102be600a by task kunit_try_catch/164
[   11.489125] 
[   11.489252] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.489295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.489305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.489326] Call Trace:
[   11.489338]  <TASK>
[   11.489352]  dump_stack_lvl+0x73/0xb0
[   11.489381]  print_report+0xd1/0x610
[   11.489404]  ? __virt_addr_valid+0x1db/0x2d0
[   11.489427]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.489460]  ? kasan_addr_to_slab+0x11/0xa0
[   11.489480]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.489503]  kasan_report+0x141/0x180
[   11.489525]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.489553]  __asan_report_store1_noabort+0x1b/0x30
[   11.489578]  kmalloc_large_oob_right+0x2e9/0x330
[   11.489647]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   11.489672]  ? __schedule+0x10cc/0x2b60
[   11.489696]  ? __pfx_read_tsc+0x10/0x10
[   11.489718]  ? ktime_get_ts64+0x86/0x230
[   11.489742]  kunit_try_run_case+0x1a5/0x480
[   11.489767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.489789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.489814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.489839]  ? __kthread_parkme+0x82/0x180
[   11.489859]  ? preempt_count_sub+0x50/0x80
[   11.489883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.489906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.489930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.489954]  kthread+0x337/0x6f0
[   11.489973]  ? trace_preempt_on+0x20/0xc0
[   11.489995]  ? __pfx_kthread+0x10/0x10
[   11.490015]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.490037]  ? calculate_sigpending+0x7b/0xa0
[   11.490061]  ? __pfx_kthread+0x10/0x10
[   11.490083]  ret_from_fork+0x116/0x1d0
[   11.490101]  ? __pfx_kthread+0x10/0x10
[   11.490121]  ret_from_fork_asm+0x1a/0x30
[   11.490153]  </TASK>
[   11.490163] 
[   11.497856] The buggy address belongs to the physical page:
[   11.498077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be4
[   11.498365] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.498615] flags: 0x200000000000040(head|node=0|zone=2)
[   11.499122] page_type: f8(unknown)
[   11.499336] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.499900] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.500250] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.500571] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.500955] head: 0200000000000002 ffffea00040af901 00000000ffffffff 00000000ffffffff
[   11.501291] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.501540] page dumped because: kasan: bad access detected
[   11.501739] 
[   11.501828] Memory state around the buggy address:
[   11.502058]  ffff888102be5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.502474]  ffff888102be5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.502905] >ffff888102be6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.503193]                       ^
[   11.503346]  ffff888102be6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.503664]  ffff888102be6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.504066] ==================================================================

[   11.593553] ==================================================================
[   11.595186] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   11.596362] Write of size 1 at addr ffff888102a0200a by task kunit_try_catch/163
[   11.596831] 
[   11.596938] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.596989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.597001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.597035] Call Trace:
[   11.597051]  <TASK>
[   11.597071]  dump_stack_lvl+0x73/0xb0
[   11.597105]  print_report+0xd1/0x610
[   11.597129]  ? __virt_addr_valid+0x1db/0x2d0
[   11.597155]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.597177]  ? kasan_addr_to_slab+0x11/0xa0
[   11.597216]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.597239]  kasan_report+0x141/0x180
[   11.597260]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.597298]  __asan_report_store1_noabort+0x1b/0x30
[   11.597322]  kmalloc_large_oob_right+0x2e9/0x330
[   11.597344]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   11.597387]  ? __schedule+0x10cc/0x2b60
[   11.597411]  ? __pfx_read_tsc+0x10/0x10
[   11.597432]  ? ktime_get_ts64+0x86/0x230
[   11.597469]  kunit_try_run_case+0x1a5/0x480
[   11.597496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.597519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.597543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.597566]  ? __kthread_parkme+0x82/0x180
[   11.597588]  ? preempt_count_sub+0x50/0x80
[   11.597612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.597635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.597669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.597693]  kthread+0x337/0x6f0
[   11.597711]  ? trace_preempt_on+0x20/0xc0
[   11.597735]  ? __pfx_kthread+0x10/0x10
[   11.597754]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.597775]  ? calculate_sigpending+0x7b/0xa0
[   11.597799]  ? __pfx_kthread+0x10/0x10
[   11.597819]  ret_from_fork+0x116/0x1d0
[   11.597837]  ? __pfx_kthread+0x10/0x10
[   11.597856]  ret_from_fork_asm+0x1a/0x30
[   11.597887]  </TASK>
[   11.597899] 
[   11.612052] The buggy address belongs to the physical page:
[   11.612745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a00
[   11.613023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.613253] flags: 0x200000000000040(head|node=0|zone=2)
[   11.613544] page_type: f8(unknown)
[   11.613973] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.614934] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.615788] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.616628] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.617641] head: 0200000000000002 ffffea00040a8001 00000000ffffffff 00000000ffffffff
[   11.617885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.618291] page dumped because: kasan: bad access detected
[   11.618849] 
[   11.619052] Memory state around the buggy address:
[   11.619584]  ffff888102a01f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.620263]  ffff888102a01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.621032] >ffff888102a02000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.621698]                       ^
[   11.621828]  ffff888102a02080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.622304]  ffff888102a02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.623018] ==================================================================

[   11.695619] ==================================================================
[   11.696254] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   11.696506] Write of size 1 at addr ffff8881039da00a by task kunit_try_catch/163
[   11.697386] 
[   11.697716] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.697765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.697775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.697835] Call Trace:
[   11.697847]  <TASK>
[   11.697863]  dump_stack_lvl+0x73/0xb0
[   11.697915]  print_report+0xd1/0x610
[   11.697938]  ? __virt_addr_valid+0x1db/0x2d0
[   11.697961]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.697983]  ? kasan_addr_to_slab+0x11/0xa0
[   11.698002]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.698024]  kasan_report+0x141/0x180
[   11.698046]  ? kmalloc_large_oob_right+0x2e9/0x330
[   11.698106]  __asan_report_store1_noabort+0x1b/0x30
[   11.698131]  kmalloc_large_oob_right+0x2e9/0x330
[   11.698153]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   11.698188]  ? __schedule+0x10cc/0x2b60
[   11.698209]  ? __pfx_read_tsc+0x10/0x10
[   11.698230]  ? ktime_get_ts64+0x86/0x230
[   11.698255]  kunit_try_run_case+0x1a5/0x480
[   11.698279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.698301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.698324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.698347]  ? __kthread_parkme+0x82/0x180
[   11.698367]  ? preempt_count_sub+0x50/0x80
[   11.698391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.698415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.698438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.698461]  kthread+0x337/0x6f0
[   11.698479]  ? trace_preempt_on+0x20/0xc0
[   11.698503]  ? __pfx_kthread+0x10/0x10
[   11.698522]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.698558]  ? calculate_sigpending+0x7b/0xa0
[   11.698582]  ? __pfx_kthread+0x10/0x10
[   11.698603]  ret_from_fork+0x116/0x1d0
[   11.698620]  ? __pfx_kthread+0x10/0x10
[   11.698640]  ret_from_fork_asm+0x1a/0x30
[   11.698672]  </TASK>
[   11.698683] 
[   11.708021] The buggy address belongs to the physical page:
[   11.708254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d8
[   11.708546] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.708776] flags: 0x200000000000040(head|node=0|zone=2)
[   11.708980] page_type: f8(unknown)
[   11.709142] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.709488] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.710003] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.710254] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.710627] head: 0200000000000002 ffffea00040e7601 00000000ffffffff 00000000ffffffff
[   11.710911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.711361] page dumped because: kasan: bad access detected
[   11.711688] 
[   11.711772] Memory state around the buggy address:
[   11.711975]  ffff8881039d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.712281]  ffff8881039d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.712517] >ffff8881039da000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.712837]                       ^
[   11.713039]  ffff8881039da080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.713331]  ffff8881039da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.713822] ==================================================================