Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.766684] ==================================================================
[   17.766737] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   17.766785] Write of size 1 at addr fff00000c68f1178 by task kunit_try_catch/142
[   17.766831] 
[   17.766860] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.766940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.766966] Hardware name: linux,dummy-virt (DT)
[   17.766995] Call trace:
[   17.767244]  show_stack+0x20/0x38 (C)
[   17.767937]  dump_stack_lvl+0x8c/0xd0
[   17.768180]  print_report+0x118/0x608
[   17.768228]  kasan_report+0xdc/0x128
[   17.768626]  __asan_report_store1_noabort+0x20/0x30
[   17.768879]  kmalloc_track_caller_oob_right+0x418/0x488
[   17.768930]  kunit_try_run_case+0x170/0x3f0
[   17.768976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.769822]  kthread+0x328/0x630
[   17.770046]  ret_from_fork+0x10/0x20
[   17.770189] 
[   17.770208] Allocated by task 142:
[   17.770245]  kasan_save_stack+0x3c/0x68
[   17.770371]  kasan_save_track+0x20/0x40
[   17.770408]  kasan_save_alloc_info+0x40/0x58
[   17.770446]  __kasan_kmalloc+0xd4/0xd8
[   17.770480]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.770756]  kmalloc_track_caller_oob_right+0x184/0x488
[   17.770872]  kunit_try_run_case+0x170/0x3f0
[   17.770950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.770991]  kthread+0x328/0x630
[   17.771025]  ret_from_fork+0x10/0x20
[   17.771060] 
[   17.771079] The buggy address belongs to the object at fff00000c68f1100
[   17.771079]  which belongs to the cache kmalloc-128 of size 128
[   17.771134] The buggy address is located 0 bytes to the right of
[   17.771134]  allocated 120-byte region [fff00000c68f1100, fff00000c68f1178)
[   17.771215] 
[   17.771234] The buggy address belongs to the physical page:
[   17.771262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   17.771580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.771629] page_type: f5(slab)
[   17.771875] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.772225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.772272] page dumped because: kasan: bad access detected
[   17.772426] 
[   17.772469] Memory state around the buggy address:
[   17.772564]  fff00000c68f1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.772615]  fff00000c68f1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.772714] >fff00000c68f1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.772802]                                                                 ^
[   17.772876]  fff00000c68f1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.772950]  fff00000c68f1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.773041] ==================================================================
[   17.763476] ==================================================================
[   17.763544] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.763602] Write of size 1 at addr fff00000c68f1078 by task kunit_try_catch/142
[   17.763650] 
[   17.763686] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.763769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.763795] Hardware name: linux,dummy-virt (DT)
[   17.763825] Call trace:
[   17.763848]  show_stack+0x20/0x38 (C)
[   17.763896]  dump_stack_lvl+0x8c/0xd0
[   17.763942]  print_report+0x118/0x608
[   17.763987]  kasan_report+0xdc/0x128
[   17.764032]  __asan_report_store1_noabort+0x20/0x30
[   17.764082]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.764130]  kunit_try_run_case+0x170/0x3f0
[   17.764204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.764255]  kthread+0x328/0x630
[   17.764334]  ret_from_fork+0x10/0x20
[   17.764383] 
[   17.764414] Allocated by task 142:
[   17.764441]  kasan_save_stack+0x3c/0x68
[   17.764480]  kasan_save_track+0x20/0x40
[   17.764515]  kasan_save_alloc_info+0x40/0x58
[   17.764553]  __kasan_kmalloc+0xd4/0xd8
[   17.764605]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.764662]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.764715]  kunit_try_run_case+0x170/0x3f0
[   17.764749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.764790]  kthread+0x328/0x630
[   17.764824]  ret_from_fork+0x10/0x20
[   17.764858] 
[   17.764876] The buggy address belongs to the object at fff00000c68f1000
[   17.764876]  which belongs to the cache kmalloc-128 of size 128
[   17.764930] The buggy address is located 0 bytes to the right of
[   17.764930]  allocated 120-byte region [fff00000c68f1000, fff00000c68f1078)
[   17.764990] 
[   17.765009] The buggy address belongs to the physical page:
[   17.765039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   17.765090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.765139] page_type: f5(slab)
[   17.765186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.765235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.765274] page dumped because: kasan: bad access detected
[   17.765303] 
[   17.765321] Memory state around the buggy address:
[   17.765351]  fff00000c68f0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.765393]  fff00000c68f0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.765433] >fff00000c68f1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.765469]                                                                 ^
[   17.765507]  fff00000c68f1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.765548]  fff00000c68f1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.765585] ==================================================================


[   13.345213] ==================================================================
[   13.345879] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.346697] Write of size 1 at addr ffff888102b48c78 by task kunit_try_catch/160
[   13.347068] 
[   13.347296] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.347395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.347417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.347502] Call Trace:
[   13.347542]  <TASK>
[   13.347576]  dump_stack_lvl+0x73/0xb0
[   13.347632]  print_report+0xd1/0x650
[   13.347671]  ? __virt_addr_valid+0x1db/0x2d0
[   13.347869]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.347922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.348009]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.348077]  kasan_report+0x141/0x180
[   13.348134]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.348198]  __asan_report_store1_noabort+0x1b/0x30
[   13.348253]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.348298]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   13.348339]  ? __schedule+0x10cc/0x2b60
[   13.348363]  ? __pfx_read_tsc+0x10/0x10
[   13.348385]  ? ktime_get_ts64+0x86/0x230
[   13.348410]  kunit_try_run_case+0x1a5/0x480
[   13.348437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.348463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.348527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.348562]  ? __kthread_parkme+0x82/0x180
[   13.348614]  ? preempt_count_sub+0x50/0x80
[   13.348641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.348664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.348687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.348708]  kthread+0x337/0x6f0
[   13.348727]  ? trace_preempt_on+0x20/0xc0
[   13.348752]  ? __pfx_kthread+0x10/0x10
[   13.348772]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.348793]  ? calculate_sigpending+0x7b/0xa0
[   13.348818]  ? __pfx_kthread+0x10/0x10
[   13.348839]  ret_from_fork+0x116/0x1d0
[   13.348858]  ? __pfx_kthread+0x10/0x10
[   13.348879]  ret_from_fork_asm+0x1a/0x30
[   13.348913]  </TASK>
[   13.348924] 
[   13.359712] Allocated by task 160:
[   13.360264]  kasan_save_stack+0x45/0x70
[   13.360530]  kasan_save_track+0x18/0x40
[   13.360860]  kasan_save_alloc_info+0x3b/0x50
[   13.361105]  __kasan_kmalloc+0xb7/0xc0
[   13.361494]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   13.362068]  kmalloc_track_caller_oob_right+0x99/0x520
[   13.362816]  kunit_try_run_case+0x1a5/0x480
[   13.363081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.363681]  kthread+0x337/0x6f0
[   13.363929]  ret_from_fork+0x116/0x1d0
[   13.364147]  ret_from_fork_asm+0x1a/0x30
[   13.364488] 
[   13.364663] The buggy address belongs to the object at ffff888102b48c00
[   13.364663]  which belongs to the cache kmalloc-128 of size 128
[   13.365284] The buggy address is located 0 bytes to the right of
[   13.365284]  allocated 120-byte region [ffff888102b48c00, ffff888102b48c78)
[   13.365743] 
[   13.365915] The buggy address belongs to the physical page:
[   13.366686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   13.367015] flags: 0x200000000000000(node=0|zone=2)
[   13.367623] page_type: f5(slab)
[   13.367939] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.368313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.368860] page dumped because: kasan: bad access detected
[   13.369173] 
[   13.369346] Memory state around the buggy address:
[   13.369627]  ffff888102b48b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.370019]  ffff888102b48b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.370691] >ffff888102b48c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.371165]                                                                 ^
[   13.371744]  ffff888102b48c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.372540]  ffff888102b48d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.373107] ==================================================================
[   13.375183] ==================================================================
[   13.375545] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.376289] Write of size 1 at addr ffff888102b48d78 by task kunit_try_catch/160
[   13.376570] 
[   13.376900] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.376998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.377021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.377058] Call Trace:
[   13.377146]  <TASK>
[   13.377200]  dump_stack_lvl+0x73/0xb0
[   13.377264]  print_report+0xd1/0x650
[   13.377292]  ? __virt_addr_valid+0x1db/0x2d0
[   13.377316]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.377362]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377390]  kasan_report+0x141/0x180
[   13.377424]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377571]  __asan_report_store1_noabort+0x1b/0x30
[   13.377629]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377690]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   13.377736]  ? __schedule+0x10cc/0x2b60
[   13.377791]  ? __pfx_read_tsc+0x10/0x10
[   13.377840]  ? ktime_get_ts64+0x86/0x230
[   13.377890]  kunit_try_run_case+0x1a5/0x480
[   13.377940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.377983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.378019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.378041]  ? __kthread_parkme+0x82/0x180
[   13.378063]  ? preempt_count_sub+0x50/0x80
[   13.378087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.378109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.378131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.378153]  kthread+0x337/0x6f0
[   13.378172]  ? trace_preempt_on+0x20/0xc0
[   13.378195]  ? __pfx_kthread+0x10/0x10
[   13.378215]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.378259]  ? calculate_sigpending+0x7b/0xa0
[   13.378283]  ? __pfx_kthread+0x10/0x10
[   13.378305]  ret_from_fork+0x116/0x1d0
[   13.378323]  ? __pfx_kthread+0x10/0x10
[   13.378359]  ret_from_fork_asm+0x1a/0x30
[   13.378393]  </TASK>
[   13.378405] 
[   13.389956] Allocated by task 160:
[   13.390188]  kasan_save_stack+0x45/0x70
[   13.390366]  kasan_save_track+0x18/0x40
[   13.390590]  kasan_save_alloc_info+0x3b/0x50
[   13.390907]  __kasan_kmalloc+0xb7/0xc0
[   13.391405]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   13.391760]  kmalloc_track_caller_oob_right+0x19a/0x520
[   13.391977]  kunit_try_run_case+0x1a5/0x480
[   13.392180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.392555]  kthread+0x337/0x6f0
[   13.392850]  ret_from_fork+0x116/0x1d0
[   13.393100]  ret_from_fork_asm+0x1a/0x30
[   13.393361] 
[   13.393512] The buggy address belongs to the object at ffff888102b48d00
[   13.393512]  which belongs to the cache kmalloc-128 of size 128
[   13.393895] The buggy address is located 0 bytes to the right of
[   13.393895]  allocated 120-byte region [ffff888102b48d00, ffff888102b48d78)
[   13.394701] 
[   13.394870] The buggy address belongs to the physical page:
[   13.395212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   13.396027] flags: 0x200000000000000(node=0|zone=2)
[   13.396281] page_type: f5(slab)
[   13.396610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.396919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.397300] page dumped because: kasan: bad access detected
[   13.397615] 
[   13.397890] Memory state around the buggy address:
[   13.398093]  ffff888102b48c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.398688]  ffff888102b48c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.399012] >ffff888102b48d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.399260]                                                                 ^
[   13.399714]  ffff888102b48d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.400347]  ffff888102b48e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.400719] ==================================================================