Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   26.838075] ==================================================================
[   26.838209] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   26.838358] Write of size 1 at addr fff00000c5a34978 by task kunit_try_catch/144
[   26.838518] 
[   26.838611] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   26.838846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.838924] Hardware name: linux,dummy-virt (DT)
[   26.839015] Call trace:
[   26.839082]  show_stack+0x20/0x38 (C)
[   26.839222]  dump_stack_lvl+0x8c/0xd0
[   26.839358]  print_report+0x118/0x608
[   26.839513]  kasan_report+0xdc/0x128
[   26.839634]  __asan_report_store1_noabort+0x20/0x30
[   26.839779]  kmalloc_track_caller_oob_right+0x418/0x488
[   26.839926]  kunit_try_run_case+0x170/0x3f0
[   26.840057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.840207]  kthread+0x328/0x630
[   26.840344]  ret_from_fork+0x10/0x20
[   26.840609] 
[   26.840818] Allocated by task 144:
[   26.840906]  kasan_save_stack+0x3c/0x68
[   26.841929]  kasan_save_track+0x20/0x40
[   26.843386]  kasan_save_alloc_info+0x40/0x58
[   26.844136]  __kasan_kmalloc+0xd4/0xd8
[   26.844251]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   26.844440]  kmalloc_track_caller_oob_right+0x184/0x488
[   26.844620]  kunit_try_run_case+0x170/0x3f0
[   26.844719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.844844]  kthread+0x328/0x630
[   26.844939]  ret_from_fork+0x10/0x20
[   26.845264] 
[   26.845361] The buggy address belongs to the object at fff00000c5a34900
[   26.845361]  which belongs to the cache kmalloc-128 of size 128
[   26.845563] The buggy address is located 0 bytes to the right of
[   26.845563]  allocated 120-byte region [fff00000c5a34900, fff00000c5a34978)
[   26.845752] 
[   26.845826] The buggy address belongs to the physical page:
[   26.845946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   26.846157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.846404] page_type: f5(slab)
[   26.846531] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.846679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.846800] page dumped because: kasan: bad access detected
[   26.846889] 
[   26.846940] Memory state around the buggy address:
[   26.847078]  fff00000c5a34800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.847208]  fff00000c5a34880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.847325] >fff00000c5a34900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.847464]                                                                 ^
[   26.847575]  fff00000c5a34980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.848290]  fff00000c5a34a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.848637] ==================================================================
[   26.823435] ==================================================================
[   26.824011] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   26.824290] Write of size 1 at addr fff00000c5a34878 by task kunit_try_catch/144
[   26.824562] 
[   26.824892] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   26.825145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.825220] Hardware name: linux,dummy-virt (DT)
[   26.825299] Call trace:
[   26.825352]  show_stack+0x20/0x38 (C)
[   26.825505]  dump_stack_lvl+0x8c/0xd0
[   26.825771]  print_report+0x118/0x608
[   26.825921]  kasan_report+0xdc/0x128
[   26.826057]  __asan_report_store1_noabort+0x20/0x30
[   26.826270]  kmalloc_track_caller_oob_right+0x40c/0x488
[   26.826433]  kunit_try_run_case+0x170/0x3f0
[   26.826600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.826747]  kthread+0x328/0x630
[   26.827230]  ret_from_fork+0x10/0x20
[   26.827478] 
[   26.827536] Allocated by task 144:
[   26.827700]  kasan_save_stack+0x3c/0x68
[   26.828046]  kasan_save_track+0x20/0x40
[   26.828530]  kasan_save_alloc_info+0x40/0x58
[   26.828673]  __kasan_kmalloc+0xd4/0xd8
[   26.828776]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   26.828884]  kmalloc_track_caller_oob_right+0xa8/0x488
[   26.829035]  kunit_try_run_case+0x170/0x3f0
[   26.829152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.829283]  kthread+0x328/0x630
[   26.829387]  ret_from_fork+0x10/0x20
[   26.830047] 
[   26.830676] The buggy address belongs to the object at fff00000c5a34800
[   26.830676]  which belongs to the cache kmalloc-128 of size 128
[   26.832234] The buggy address is located 0 bytes to the right of
[   26.832234]  allocated 120-byte region [fff00000c5a34800, fff00000c5a34878)
[   26.833653] 
[   26.833972] The buggy address belongs to the physical page:
[   26.834285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   26.834467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.834616] page_type: f5(slab)
[   26.834728] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.834873] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.834994] page dumped because: kasan: bad access detected
[   26.835085] 
[   26.835137] Memory state around the buggy address:
[   26.835246]  fff00000c5a34700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.835370]  fff00000c5a34780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.835519] >fff00000c5a34800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.835631]                                                                 ^
[   26.835745]  fff00000c5a34880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.835860]  fff00000c5a34900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.835984] ==================================================================

[   12.079760] ==================================================================
[   12.080351] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.081010] Write of size 1 at addr ffff888102a2d278 by task kunit_try_catch/161
[   12.081805] 
[   12.081985] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   12.082033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.082045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.082066] Call Trace:
[   12.082078]  <TASK>
[   12.082096]  dump_stack_lvl+0x73/0xb0
[   12.082126]  print_report+0xd1/0x650
[   12.082148]  ? __virt_addr_valid+0x1db/0x2d0
[   12.082171]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.082191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.082213]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.082235]  kasan_report+0x141/0x180
[   12.082256]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.082282]  __asan_report_store1_noabort+0x1b/0x30
[   12.082314]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.082335]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.082356]  ? __schedule+0x10cc/0x2b30
[   12.082378]  ? __pfx_read_tsc+0x10/0x10
[   12.082398]  ? ktime_get_ts64+0x86/0x230
[   12.082424]  kunit_try_run_case+0x1a5/0x480
[   12.082449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.082471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.082493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.082515]  ? __kthread_parkme+0x82/0x180
[   12.082537]  ? preempt_count_sub+0x50/0x80
[   12.082563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.082585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.082606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.082628]  kthread+0x337/0x6f0
[   12.082644]  ? trace_preempt_on+0x20/0xc0
[   12.082675]  ? __pfx_kthread+0x10/0x10
[   12.082693]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.082713]  ? calculate_sigpending+0x7b/0xa0
[   12.082735]  ? __pfx_kthread+0x10/0x10
[   12.082753]  ret_from_fork+0x41/0x80
[   12.082773]  ? __pfx_kthread+0x10/0x10
[   12.082791]  ret_from_fork_asm+0x1a/0x30
[   12.082821]  </TASK>
[   12.082833] 
[   12.096668] Allocated by task 161:
[   12.096817]  kasan_save_stack+0x45/0x70
[   12.097203]  kasan_save_track+0x18/0x40
[   12.097616]  kasan_save_alloc_info+0x3b/0x50
[   12.098033]  __kasan_kmalloc+0xb7/0xc0
[   12.098428]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.098788]  kmalloc_track_caller_oob_right+0x99/0x520
[   12.099073]  kunit_try_run_case+0x1a5/0x480
[   12.099486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.100056]  kthread+0x337/0x6f0
[   12.100359]  ret_from_fork+0x41/0x80
[   12.100518]  ret_from_fork_asm+0x1a/0x30
[   12.100657] 
[   12.100731] The buggy address belongs to the object at ffff888102a2d200
[   12.100731]  which belongs to the cache kmalloc-128 of size 128
[   12.101710] The buggy address is located 0 bytes to the right of
[   12.101710]  allocated 120-byte region [ffff888102a2d200, ffff888102a2d278)
[   12.102954] 
[   12.103121] The buggy address belongs to the physical page:
[   12.103390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   12.104139] flags: 0x200000000000000(node=0|zone=2)
[   12.104533] page_type: f5(slab)
[   12.104743] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.105159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.106194] page dumped because: kasan: bad access detected
[   12.106420] 
[   12.106494] Memory state around the buggy address:
[   12.106652]  ffff888102a2d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.106872]  ffff888102a2d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.107565] >ffff888102a2d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.108357]                                                                 ^
[   12.109051]  ffff888102a2d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.109795]  ffff888102a2d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.110519] ==================================================================