Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   14.909826] ==================================================================
[   14.910136] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   14.910298] Write of size 1 at addr fff00000c6094978 by task kunit_try_catch/143
[   14.910353] 
[   14.910401] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   14.910530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.910577] Hardware name: linux,dummy-virt (DT)
[   14.910609] Call trace:
[   14.910638]  show_stack+0x20/0x38 (C)
[   14.910827]  dump_stack_lvl+0x8c/0xd0
[   14.910882]  print_report+0x118/0x5d0
[   14.910929]  kasan_report+0xdc/0x128
[   14.910982]  __asan_report_store1_noabort+0x20/0x30
[   14.911467]  kmalloc_track_caller_oob_right+0x418/0x488
[   14.911573]  kunit_try_run_case+0x170/0x3f0
[   14.911625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.911707]  kthread+0x328/0x630
[   14.911974]  ret_from_fork+0x10/0x20
[   14.912026] 
[   14.912053] Allocated by task 143:
[   14.912080]  kasan_save_stack+0x3c/0x68
[   14.912300]  kasan_save_track+0x20/0x40
[   14.912352]  kasan_save_alloc_info+0x40/0x58
[   14.912392]  __kasan_kmalloc+0xd4/0xd8
[   14.912427]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   14.912726]  kmalloc_track_caller_oob_right+0x184/0x488
[   14.912811]  kunit_try_run_case+0x170/0x3f0
[   14.912915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.913292]  kthread+0x328/0x630
[   14.913383]  ret_from_fork+0x10/0x20
[   14.913595] 
[   14.913622] The buggy address belongs to the object at fff00000c6094900
[   14.913622]  which belongs to the cache kmalloc-128 of size 128
[   14.913679] The buggy address is located 0 bytes to the right of
[   14.913679]  allocated 120-byte region [fff00000c6094900, fff00000c6094978)
[   14.913845] 
[   14.913891] The buggy address belongs to the physical page:
[   14.913955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   14.914044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.914155] page_type: f5(slab)
[   14.914219] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.914269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.914604] page dumped because: kasan: bad access detected
[   14.914747] 
[   14.914824] Memory state around the buggy address:
[   14.914857]  fff00000c6094800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.915183]  fff00000c6094880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915306] >fff00000c6094900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.915397]                                                                 ^
[   14.915484]  fff00000c6094980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915791]  fff00000c6094a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915855] ==================================================================
[   14.903203] ==================================================================
[   14.903262] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   14.903312] Write of size 1 at addr fff00000c6094878 by task kunit_try_catch/143
[   14.903380] 
[   14.903412] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   14.903498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.903525] Hardware name: linux,dummy-virt (DT)
[   14.903884] Call trace:
[   14.903919]  show_stack+0x20/0x38 (C)
[   14.904167]  dump_stack_lvl+0x8c/0xd0
[   14.904228]  print_report+0x118/0x5d0
[   14.904620]  kasan_report+0xdc/0x128
[   14.905012]  __asan_report_store1_noabort+0x20/0x30
[   14.905098]  kmalloc_track_caller_oob_right+0x40c/0x488
[   14.905150]  kunit_try_run_case+0x170/0x3f0
[   14.905207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.905259]  kthread+0x328/0x630
[   14.905300]  ret_from_fork+0x10/0x20
[   14.905347] 
[   14.905365] Allocated by task 143:
[   14.905393]  kasan_save_stack+0x3c/0x68
[   14.905433]  kasan_save_track+0x20/0x40
[   14.905470]  kasan_save_alloc_info+0x40/0x58
[   14.905639]  __kasan_kmalloc+0xd4/0xd8
[   14.906089]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   14.906157]  kmalloc_track_caller_oob_right+0xa8/0x488
[   14.906462]  kunit_try_run_case+0x170/0x3f0
[   14.906548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.906595]  kthread+0x328/0x630
[   14.906630]  ret_from_fork+0x10/0x20
[   14.906666] 
[   14.906715] The buggy address belongs to the object at fff00000c6094800
[   14.906715]  which belongs to the cache kmalloc-128 of size 128
[   14.906785] The buggy address is located 0 bytes to the right of
[   14.906785]  allocated 120-byte region [fff00000c6094800, fff00000c6094878)
[   14.906848] 
[   14.906891] The buggy address belongs to the physical page:
[   14.906930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   14.906981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.907026] page_type: f5(slab)
[   14.907078] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.907135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.907182] page dumped because: kasan: bad access detected
[   14.907225] 
[   14.907243] Memory state around the buggy address:
[   14.907288]  fff00000c6094700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.907334]  fff00000c6094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907377] >fff00000c6094800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.907413]                                                                 ^
[   14.907458]  fff00000c6094880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907504]  fff00000c6094900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907540] ==================================================================

[   12.374886] ==================================================================
[   12.375595] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.376104] Write of size 1 at addr ffff888103249478 by task kunit_try_catch/160
[   12.376772] 
[   12.376932] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.377117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.377163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.377184] Call Trace:
[   12.377196]  <TASK>
[   12.377210]  dump_stack_lvl+0x73/0xb0
[   12.377240]  print_report+0xd1/0x610
[   12.377261]  ? __virt_addr_valid+0x1db/0x2d0
[   12.377283]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.377307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.377328]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.377352]  kasan_report+0x141/0x180
[   12.377373]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.377401]  __asan_report_store1_noabort+0x1b/0x30
[   12.377425]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.377449]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.377486]  ? __schedule+0x10c6/0x2b60
[   12.377507]  ? __pfx_read_tsc+0x10/0x10
[   12.377527]  ? ktime_get_ts64+0x86/0x230
[   12.377553]  kunit_try_run_case+0x1a5/0x480
[   12.377581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.377604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.377625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.377648]  ? __kthread_parkme+0x82/0x180
[   12.377667]  ? preempt_count_sub+0x50/0x80
[   12.377691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.377714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.377736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.377759]  kthread+0x337/0x6f0
[   12.377858]  ? trace_preempt_on+0x20/0xc0
[   12.377882]  ? __pfx_kthread+0x10/0x10
[   12.377902]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.377923]  ? calculate_sigpending+0x7b/0xa0
[   12.377945]  ? __pfx_kthread+0x10/0x10
[   12.377966]  ret_from_fork+0x116/0x1d0
[   12.377984]  ? __pfx_kthread+0x10/0x10
[   12.378003]  ret_from_fork_asm+0x1a/0x30
[   12.378032]  </TASK>
[   12.378042] 
[   12.390026] Allocated by task 160:
[   12.390240]  kasan_save_stack+0x45/0x70
[   12.390730]  kasan_save_track+0x18/0x40
[   12.391081]  kasan_save_alloc_info+0x3b/0x50
[   12.391313]  __kasan_kmalloc+0xb7/0xc0
[   12.391507]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.391944]  kmalloc_track_caller_oob_right+0x19a/0x520
[   12.392301]  kunit_try_run_case+0x1a5/0x480
[   12.392650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.392909]  kthread+0x337/0x6f0
[   12.393397]  ret_from_fork+0x116/0x1d0
[   12.393749]  ret_from_fork_asm+0x1a/0x30
[   12.393987] 
[   12.394099] The buggy address belongs to the object at ffff888103249400
[   12.394099]  which belongs to the cache kmalloc-128 of size 128
[   12.394589] The buggy address is located 0 bytes to the right of
[   12.394589]  allocated 120-byte region [ffff888103249400, ffff888103249478)
[   12.395403] 
[   12.395623] The buggy address belongs to the physical page:
[   12.395909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249
[   12.396419] flags: 0x200000000000000(node=0|zone=2)
[   12.396770] page_type: f5(slab)
[   12.396949] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.397484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.397935] page dumped because: kasan: bad access detected
[   12.398291] 
[   12.398394] Memory state around the buggy address:
[   12.398794]  ffff888103249300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.399298]  ffff888103249380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.399703] >ffff888103249400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.400051]                                                                 ^
[   12.400482]  ffff888103249480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.401025]  ffff888103249500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.401403] ==================================================================
[   12.347593] ==================================================================
[   12.348388] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.348778] Write of size 1 at addr ffff888103249378 by task kunit_try_catch/160
[   12.349424] 
[   12.349740] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.349787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.349798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.349819] Call Trace:
[   12.349831]  <TASK>
[   12.349848]  dump_stack_lvl+0x73/0xb0
[   12.349879]  print_report+0xd1/0x610
[   12.349901]  ? __virt_addr_valid+0x1db/0x2d0
[   12.349925]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.349949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.349971]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.349995]  kasan_report+0x141/0x180
[   12.350016]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.350065]  __asan_report_store1_noabort+0x1b/0x30
[   12.350089]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.350120]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.350145]  ? __schedule+0x10c6/0x2b60
[   12.350168]  ? __pfx_read_tsc+0x10/0x10
[   12.350189]  ? ktime_get_ts64+0x86/0x230
[   12.350213]  kunit_try_run_case+0x1a5/0x480
[   12.350239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.350261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.350284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.350307]  ? __kthread_parkme+0x82/0x180
[   12.350327]  ? preempt_count_sub+0x50/0x80
[   12.350350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.350373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.350395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.350418]  kthread+0x337/0x6f0
[   12.350437]  ? trace_preempt_on+0x20/0xc0
[   12.350460]  ? __pfx_kthread+0x10/0x10
[   12.350490]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.350511]  ? calculate_sigpending+0x7b/0xa0
[   12.350534]  ? __pfx_kthread+0x10/0x10
[   12.350555]  ret_from_fork+0x116/0x1d0
[   12.350573]  ? __pfx_kthread+0x10/0x10
[   12.350592]  ret_from_fork_asm+0x1a/0x30
[   12.350622]  </TASK>
[   12.350631] 
[   12.361417] Allocated by task 160:
[   12.361966]  kasan_save_stack+0x45/0x70
[   12.362364]  kasan_save_track+0x18/0x40
[   12.362587]  kasan_save_alloc_info+0x3b/0x50
[   12.362971]  __kasan_kmalloc+0xb7/0xc0
[   12.363289]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.363656]  kmalloc_track_caller_oob_right+0x99/0x520
[   12.364050]  kunit_try_run_case+0x1a5/0x480
[   12.364237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.364520]  kthread+0x337/0x6f0
[   12.364696]  ret_from_fork+0x116/0x1d0
[   12.365150]  ret_from_fork_asm+0x1a/0x30
[   12.365445] 
[   12.365538] The buggy address belongs to the object at ffff888103249300
[   12.365538]  which belongs to the cache kmalloc-128 of size 128
[   12.366365] The buggy address is located 0 bytes to the right of
[   12.366365]  allocated 120-byte region [ffff888103249300, ffff888103249378)
[   12.367317] 
[   12.367431] The buggy address belongs to the physical page:
[   12.367685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249
[   12.368328] flags: 0x200000000000000(node=0|zone=2)
[   12.368765] page_type: f5(slab)
[   12.368936] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.369522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.370037] page dumped because: kasan: bad access detected
[   12.370445] 
[   12.370566] Memory state around the buggy address:
[   12.371005]  ffff888103249200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.371511]  ffff888103249280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.371998] >ffff888103249300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.372444]                                                                 ^
[   12.372964]  ffff888103249380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.373534]  ffff888103249400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.373865] ==================================================================