Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   22.703423] ==================================================================
[   22.703517] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   22.703718] Write of size 1 at addr fff00000c413cc78 by task kunit_try_catch/144
[   22.704321] 
[   22.704488] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.704840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.704960] Hardware name: linux,dummy-virt (DT)
[   22.705044] Call trace:
[   22.705104]  show_stack+0x20/0x38 (C)
[   22.705363]  dump_stack_lvl+0x8c/0xd0
[   22.705754]  print_report+0x118/0x608
[   22.706091]  kasan_report+0xdc/0x128
[   22.706424]  __asan_report_store1_noabort+0x20/0x30
[   22.706639]  kmalloc_track_caller_oob_right+0x418/0x488
[   22.706772]  kunit_try_run_case+0x170/0x3f0
[   22.706901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.707079]  kthread+0x328/0x630
[   22.707589]  ret_from_fork+0x10/0x20
[   22.707964] 
[   22.708024] Allocated by task 144:
[   22.708092]  kasan_save_stack+0x3c/0x68
[   22.708286]  kasan_save_track+0x20/0x40
[   22.708410]  kasan_save_alloc_info+0x40/0x58
[   22.708560]  __kasan_kmalloc+0xd4/0xd8
[   22.708653]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   22.708793]  kmalloc_track_caller_oob_right+0x184/0x488
[   22.709074]  kunit_try_run_case+0x170/0x3f0
[   22.709242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.709460]  kthread+0x328/0x630
[   22.709682]  ret_from_fork+0x10/0x20
[   22.709772] 
[   22.709867] The buggy address belongs to the object at fff00000c413cc00
[   22.709867]  which belongs to the cache kmalloc-128 of size 128
[   22.710048] The buggy address is located 0 bytes to the right of
[   22.710048]  allocated 120-byte region [fff00000c413cc00, fff00000c413cc78)
[   22.710213] 
[   22.710321] The buggy address belongs to the physical page:
[   22.710631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413c
[   22.711033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.711176] page_type: f5(slab)
[   22.711265] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.711381] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.711473] page dumped because: kasan: bad access detected
[   22.711628] 
[   22.711721] Memory state around the buggy address:
[   22.711904]  fff00000c413cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.712031]  fff00000c413cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.712137] >fff00000c413cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.712231]                                                                 ^
[   22.712424]  fff00000c413cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.712695]  fff00000c413cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.712786] ==================================================================
[   22.693287] ==================================================================
[   22.693407] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   22.693525] Write of size 1 at addr fff00000c413cb78 by task kunit_try_catch/144
[   22.693640] 
[   22.693710] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.693888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.693969] Hardware name: linux,dummy-virt (DT)
[   22.694043] Call trace:
[   22.694095]  show_stack+0x20/0x38 (C)
[   22.694244]  dump_stack_lvl+0x8c/0xd0
[   22.694376]  print_report+0x118/0x608
[   22.694507]  kasan_report+0xdc/0x128
[   22.694946]  __asan_report_store1_noabort+0x20/0x30
[   22.695416]  kmalloc_track_caller_oob_right+0x40c/0x488
[   22.695810]  kunit_try_run_case+0x170/0x3f0
[   22.696007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.696227]  kthread+0x328/0x630
[   22.696492]  ret_from_fork+0x10/0x20
[   22.696759] 
[   22.696806] Allocated by task 144:
[   22.696982]  kasan_save_stack+0x3c/0x68
[   22.697235]  kasan_save_track+0x20/0x40
[   22.697393]  kasan_save_alloc_info+0x40/0x58
[   22.697518]  __kasan_kmalloc+0xd4/0xd8
[   22.697653]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   22.697906]  kmalloc_track_caller_oob_right+0xa8/0x488
[   22.698129]  kunit_try_run_case+0x170/0x3f0
[   22.698233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.698354]  kthread+0x328/0x630
[   22.698454]  ret_from_fork+0x10/0x20
[   22.698737] 
[   22.698901] The buggy address belongs to the object at fff00000c413cb00
[   22.698901]  which belongs to the cache kmalloc-128 of size 128
[   22.699059] The buggy address is located 0 bytes to the right of
[   22.699059]  allocated 120-byte region [fff00000c413cb00, fff00000c413cb78)
[   22.699208] 
[   22.699273] The buggy address belongs to the physical page:
[   22.699435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413c
[   22.699607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.699716] page_type: f5(slab)
[   22.699830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.700074] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.700173] page dumped because: kasan: bad access detected
[   22.700518] 
[   22.700565] Memory state around the buggy address:
[   22.701010]  fff00000c413ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.701145]  fff00000c413ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.701376] >fff00000c413cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.701536]                                                                 ^
[   22.701638]  fff00000c413cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.701737]  fff00000c413cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.701823] ==================================================================

[   10.982178] ==================================================================
[   10.983356] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.984145] Write of size 1 at addr ffff888102b31878 by task kunit_try_catch/162
[   10.984471] 
[   10.984561] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   10.984604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.984615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.984635] Call Trace:
[   10.984647]  <TASK>
[   10.984662]  dump_stack_lvl+0x73/0xb0
[   10.984689]  print_report+0xd1/0x650
[   10.984711]  ? __virt_addr_valid+0x1db/0x2d0
[   10.984733]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.984757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.984778]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.984803]  kasan_report+0x141/0x180
[   10.984825]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.984855]  __asan_report_store1_noabort+0x1b/0x30
[   10.984876]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.984901]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.984926]  ? __schedule+0x10cc/0x2b30
[   10.984950]  ? __pfx_read_tsc+0x10/0x10
[   10.984968]  ? ktime_get_ts64+0x86/0x230
[   10.984993]  kunit_try_run_case+0x1a5/0x480
[   10.985016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.985037]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.985060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.985083]  ? __kthread_parkme+0x82/0x180
[   10.985104]  ? preempt_count_sub+0x50/0x80
[   10.985128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.985150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.985172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.985194]  kthread+0x337/0x6f0
[   10.985213]  ? trace_preempt_on+0x20/0xc0
[   10.985237]  ? __pfx_kthread+0x10/0x10
[   10.985258]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.985279]  ? calculate_sigpending+0x7b/0xa0
[   10.985301]  ? __pfx_kthread+0x10/0x10
[   10.985334]  ret_from_fork+0x41/0x80
[   10.985354]  ? __pfx_kthread+0x10/0x10
[   10.985375]  ret_from_fork_asm+0x1a/0x30
[   10.985406]  </TASK>
[   10.985416] 
[   10.998023] Allocated by task 162:
[   10.998173]  kasan_save_stack+0x45/0x70
[   10.998317]  kasan_save_track+0x18/0x40
[   10.998573]  kasan_save_alloc_info+0x3b/0x50
[   10.998789]  __kasan_kmalloc+0xb7/0xc0
[   10.998975]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.999346]  kmalloc_track_caller_oob_right+0x99/0x520
[   10.999634]  kunit_try_run_case+0x1a5/0x480
[   10.999788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.000028]  kthread+0x337/0x6f0
[   11.000312]  ret_from_fork+0x41/0x80
[   11.000512]  ret_from_fork_asm+0x1a/0x30
[   11.000709] 
[   11.001050] The buggy address belongs to the object at ffff888102b31800
[   11.001050]  which belongs to the cache kmalloc-128 of size 128
[   11.001479] The buggy address is located 0 bytes to the right of
[   11.001479]  allocated 120-byte region [ffff888102b31800, ffff888102b31878)
[   11.002250] 
[   11.002977] The buggy address belongs to the physical page:
[   11.003241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   11.003819] flags: 0x200000000000000(node=0|zone=2)
[   11.004344] page_type: f5(slab)
[   11.004721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.005486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.006090] page dumped because: kasan: bad access detected
[   11.006733] 
[   11.006930] Memory state around the buggy address:
[   11.007219]  ffff888102b31700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.007467]  ffff888102b31780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.008170] >ffff888102b31800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.009074]                                                                 ^
[   11.009359]  ffff888102b31880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.010066]  ffff888102b31900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.010357] ==================================================================

[   20.779804] ==================================================================
[   20.780889] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.781656] Write of size 1 at addr ffff00000ea7e578 by task kunit_try_catch/196
[   20.782344] 
[   20.782509] CPU: 3 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.782558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.782572] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.782590] Call trace:
[   20.782601]  show_stack+0x20/0x38 (C)
[   20.782634]  dump_stack_lvl+0x8c/0xd0
[   20.782665]  print_report+0x118/0x608
[   20.782695]  kasan_report+0xdc/0x128
[   20.782722]  __asan_report_store1_noabort+0x20/0x30
[   20.782755]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.782793]  kunit_try_run_case+0x170/0x3f0
[   20.782829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.782868]  kthread+0x328/0x630
[   20.782902]  ret_from_fork+0x10/0x20
[   20.782935] 
[   20.788614] Allocated by task 196:
[   20.788940]  kasan_save_stack+0x3c/0x68
[   20.789313]  kasan_save_track+0x20/0x40
[   20.789685]  kasan_save_alloc_info+0x40/0x58
[   20.790099]  __kasan_kmalloc+0xd4/0xd8
[   20.790465]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   20.790994]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.791487]  kunit_try_run_case+0x170/0x3f0
[   20.791896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.792420]  kthread+0x328/0x630
[   20.792744]  ret_from_fork+0x10/0x20
[   20.793094] 
[   20.793247] The buggy address belongs to the object at ffff00000ea7e500
[   20.793247]  which belongs to the cache kmalloc-128 of size 128
[   20.794380] The buggy address is located 0 bytes to the right of
[   20.794380]  allocated 120-byte region [ffff00000ea7e500, ffff00000ea7e578)
[   20.795554] 
[   20.795708] The buggy address belongs to the physical page:
[   20.796224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   20.796949] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.797560] page_type: f5(slab)
[   20.797875] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.798591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.799298] page dumped because: kasan: bad access detected
[   20.799813] 
[   20.799965] Memory state around the buggy address:
[   20.800413]  ffff00000ea7e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.801079]  ffff00000ea7e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.801744] >ffff00000ea7e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.802406]                                                                 ^
[   20.803062]  ffff00000ea7e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.803728]  ffff00000ea7e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.804390] ==================================================================