Date
June 3, 2025, 7:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 17.972932] ================================================================== [ 17.973297] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.974187] Write of size 1 at addr fff00000c446ed73 by task kunit_try_catch/136 [ 17.974443] [ 17.975330] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250603 #1 PREEMPT [ 17.975779] Tainted: [N]=TEST [ 17.976216] Hardware name: linux,dummy-virt (DT) [ 17.978817] Call trace: [ 17.980101] show_stack+0x20/0x38 (C) [ 17.980263] dump_stack_lvl+0x8c/0xd0 [ 17.980609] print_report+0x118/0x608 [ 17.980741] kasan_report+0xdc/0x128 [ 17.980789] __asan_report_store1_noabort+0x20/0x30 [ 17.980844] kmalloc_oob_right+0x5a4/0x660 [ 17.981080] kunit_try_run_case+0x170/0x3f0 [ 17.981205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.981331] kthread+0x328/0x630 [ 17.981408] ret_from_fork+0x10/0x20 [ 17.982020] [ 17.982103] Allocated by task 136: [ 17.982264] kasan_save_stack+0x3c/0x68 [ 17.982604] kasan_save_track+0x20/0x40 [ 17.982679] kasan_save_alloc_info+0x40/0x58 [ 17.982770] __kasan_kmalloc+0xd4/0xd8 [ 17.982843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.982885] kmalloc_oob_right+0xb0/0x660 [ 17.983196] kunit_try_run_case+0x170/0x3f0 [ 17.983302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.983368] kthread+0x328/0x630 [ 17.983399] ret_from_fork+0x10/0x20 [ 17.983486] [ 17.983577] The buggy address belongs to the object at fff00000c446ed00 [ 17.983577] which belongs to the cache kmalloc-128 of size 128 [ 17.983869] The buggy address is located 0 bytes to the right of [ 17.983869] allocated 115-byte region [fff00000c446ed00, fff00000c446ed73) [ 17.983999] [ 17.984301] The buggy address belongs to the physical page: [ 17.984991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 17.985757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.986577] page_type: f5(slab) [ 17.986989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.987059] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.987194] page dumped because: kasan: bad access detected [ 17.987238] [ 17.987263] Memory state around the buggy address: [ 17.988172] fff00000c446ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.988421] fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.988519] >fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.988573] ^ [ 17.988903] fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.988968] fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.989102] ================================================================== [ 17.995177] ================================================================== [ 17.995223] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.995270] Read of size 1 at addr fff00000c446ed80 by task kunit_try_catch/136 [ 17.995317] [ 17.995345] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 17.995450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.995476] Hardware name: linux,dummy-virt (DT) [ 17.995531] Call trace: [ 17.995552] show_stack+0x20/0x38 (C) [ 17.995600] dump_stack_lvl+0x8c/0xd0 [ 17.995833] print_report+0x118/0x608 [ 17.996014] kasan_report+0xdc/0x128 [ 17.996113] __asan_report_load1_noabort+0x20/0x30 [ 17.996172] kmalloc_oob_right+0x5d0/0x660 [ 17.996229] kunit_try_run_case+0x170/0x3f0 [ 17.996325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.996688] kthread+0x328/0x630 [ 17.996845] ret_from_fork+0x10/0x20 [ 17.996994] [ 17.997068] Allocated by task 136: [ 17.997142] kasan_save_stack+0x3c/0x68 [ 17.997210] kasan_save_track+0x20/0x40 [ 17.997283] kasan_save_alloc_info+0x40/0x58 [ 17.997318] __kasan_kmalloc+0xd4/0xd8 [ 17.997352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.997389] kmalloc_oob_right+0xb0/0x660 [ 17.997434] kunit_try_run_case+0x170/0x3f0 [ 17.997471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.997706] kthread+0x328/0x630 [ 17.997785] ret_from_fork+0x10/0x20 [ 17.997831] [ 17.997903] The buggy address belongs to the object at fff00000c446ed00 [ 17.997903] which belongs to the cache kmalloc-128 of size 128 [ 17.997979] The buggy address is located 13 bytes to the right of [ 17.997979] allocated 115-byte region [fff00000c446ed00, fff00000c446ed73) [ 17.998092] [ 17.998151] The buggy address belongs to the physical page: [ 17.998188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 17.998274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.998451] page_type: f5(slab) [ 17.998509] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.998566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.998604] page dumped because: kasan: bad access detected [ 17.998635] [ 17.998707] Memory state around the buggy address: [ 17.998826] fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.998962] fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.999070] >fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999153] ^ [ 17.999220] fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999300] fff00000c446ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999408] ================================================================== [ 17.990239] ================================================================== [ 17.990286] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.990439] Write of size 1 at addr fff00000c446ed78 by task kunit_try_catch/136 [ 17.990552] [ 17.990587] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 17.990698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.990753] Hardware name: linux,dummy-virt (DT) [ 17.990785] Call trace: [ 17.990807] show_stack+0x20/0x38 (C) [ 17.990874] dump_stack_lvl+0x8c/0xd0 [ 17.991052] print_report+0x118/0x608 [ 17.991231] kasan_report+0xdc/0x128 [ 17.991295] __asan_report_store1_noabort+0x20/0x30 [ 17.991344] kmalloc_oob_right+0x538/0x660 [ 17.991441] kunit_try_run_case+0x170/0x3f0 [ 17.991488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.991662] kthread+0x328/0x630 [ 17.991706] ret_from_fork+0x10/0x20 [ 17.991954] [ 17.992024] Allocated by task 136: [ 17.992096] kasan_save_stack+0x3c/0x68 [ 17.992151] kasan_save_track+0x20/0x40 [ 17.992269] kasan_save_alloc_info+0x40/0x58 [ 17.992328] __kasan_kmalloc+0xd4/0xd8 [ 17.992460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.992530] kmalloc_oob_right+0xb0/0x660 [ 17.992565] kunit_try_run_case+0x170/0x3f0 [ 17.992886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.992985] kthread+0x328/0x630 [ 17.993119] ret_from_fork+0x10/0x20 [ 17.993215] [ 17.993235] The buggy address belongs to the object at fff00000c446ed00 [ 17.993235] which belongs to the cache kmalloc-128 of size 128 [ 17.993682] The buggy address is located 5 bytes to the right of [ 17.993682] allocated 115-byte region [fff00000c446ed00, fff00000c446ed73) [ 17.993836] [ 17.993889] The buggy address belongs to the physical page: [ 17.993945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 17.994010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.994057] page_type: f5(slab) [ 17.994325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.994394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.994446] page dumped because: kasan: bad access detected [ 17.994476] [ 17.994516] Memory state around the buggy address: [ 17.994546] fff00000c446ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.994587] fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994650] >fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.994695] ^ [ 17.994739] fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994787] fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994822] ==================================================================
[ 13.436590] ================================================================== [ 13.437447] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 13.437883] Write of size 1 at addr ffff888103324978 by task kunit_try_catch/153 [ 13.438379] [ 13.438507] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.438567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.438582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.438607] Call Trace: [ 13.438632] <TASK> [ 13.438657] dump_stack_lvl+0x73/0xb0 [ 13.438692] print_report+0xd1/0x650 [ 13.438717] ? __virt_addr_valid+0x1db/0x2d0 [ 13.438744] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.438768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.438792] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.438817] kasan_report+0x141/0x180 [ 13.438842] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.438870] __asan_report_store1_noabort+0x1b/0x30 [ 13.438895] kmalloc_oob_right+0x6bd/0x7f0 [ 13.438920] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.438945] ? __schedule+0x10cc/0x2b60 [ 13.438973] ? __pfx_read_tsc+0x10/0x10 [ 13.438997] ? ktime_get_ts64+0x86/0x230 [ 13.439026] kunit_try_run_case+0x1a5/0x480 [ 13.439051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.439073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.439099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.439125] ? __kthread_parkme+0x82/0x180 [ 13.439148] ? preempt_count_sub+0x50/0x80 [ 13.439174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.439197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.439230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.439268] kthread+0x337/0x6f0 [ 13.439291] ? trace_preempt_on+0x20/0xc0 [ 13.439368] ? __pfx_kthread+0x10/0x10 [ 13.439398] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.439425] ? calculate_sigpending+0x7b/0xa0 [ 13.439452] ? __pfx_kthread+0x10/0x10 [ 13.439489] ret_from_fork+0x116/0x1d0 [ 13.439511] ? __pfx_kthread+0x10/0x10 [ 13.439534] ret_from_fork_asm+0x1a/0x30 [ 13.439570] </TASK> [ 13.439584] [ 13.449697] Allocated by task 153: [ 13.450066] kasan_save_stack+0x45/0x70 [ 13.450340] kasan_save_track+0x18/0x40 [ 13.450562] kasan_save_alloc_info+0x3b/0x50 [ 13.450755] __kasan_kmalloc+0xb7/0xc0 [ 13.450969] __kmalloc_cache_noprof+0x189/0x420 [ 13.451116] kmalloc_oob_right+0xa9/0x7f0 [ 13.451269] kunit_try_run_case+0x1a5/0x480 [ 13.451536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.452189] kthread+0x337/0x6f0 [ 13.452386] ret_from_fork+0x116/0x1d0 [ 13.452570] ret_from_fork_asm+0x1a/0x30 [ 13.452882] [ 13.453004] The buggy address belongs to the object at ffff888103324900 [ 13.453004] which belongs to the cache kmalloc-128 of size 128 [ 13.453667] The buggy address is located 5 bytes to the right of [ 13.453667] allocated 115-byte region [ffff888103324900, ffff888103324973) [ 13.454357] [ 13.454428] The buggy address belongs to the physical page: [ 13.454656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 13.455100] flags: 0x200000000000000(node=0|zone=2) [ 13.455359] page_type: f5(slab) [ 13.455490] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.456272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.456652] page dumped because: kasan: bad access detected [ 13.456853] [ 13.457000] Memory state around the buggy address: [ 13.457237] ffff888103324800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.457594] ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.457878] >ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.458063] ^ [ 13.458368] ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.458948] ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.459396] ================================================================== [ 13.402228] ================================================================== [ 13.402923] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 13.403961] Write of size 1 at addr ffff888103324973 by task kunit_try_catch/153 [ 13.404257] [ 13.405598] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.406470] Tainted: [N]=TEST [ 13.406536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.406927] Call Trace: [ 13.407065] <TASK> [ 13.407291] dump_stack_lvl+0x73/0xb0 [ 13.407432] print_report+0xd1/0x650 [ 13.407484] ? __virt_addr_valid+0x1db/0x2d0 [ 13.407519] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.407543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.407567] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.407590] kasan_report+0x141/0x180 [ 13.407614] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.407641] __asan_report_store1_noabort+0x1b/0x30 [ 13.407664] kmalloc_oob_right+0x6f0/0x7f0 [ 13.407688] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.407712] ? __schedule+0x10cc/0x2b60 [ 13.407737] ? __pfx_read_tsc+0x10/0x10 [ 13.407762] ? ktime_get_ts64+0x86/0x230 [ 13.407796] kunit_try_run_case+0x1a5/0x480 [ 13.407831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.407852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.407880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.407905] ? __kthread_parkme+0x82/0x180 [ 13.407930] ? preempt_count_sub+0x50/0x80 [ 13.407956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.407979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.408004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.408030] kthread+0x337/0x6f0 [ 13.408051] ? trace_preempt_on+0x20/0xc0 [ 13.408077] ? __pfx_kthread+0x10/0x10 [ 13.408099] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.408122] ? calculate_sigpending+0x7b/0xa0 [ 13.408148] ? __pfx_kthread+0x10/0x10 [ 13.408171] ret_from_fork+0x116/0x1d0 [ 13.408192] ? __pfx_kthread+0x10/0x10 [ 13.408214] ret_from_fork_asm+0x1a/0x30 [ 13.408279] </TASK> [ 13.408365] [ 13.420946] Allocated by task 153: [ 13.421296] kasan_save_stack+0x45/0x70 [ 13.421658] kasan_save_track+0x18/0x40 [ 13.421926] kasan_save_alloc_info+0x3b/0x50 [ 13.422247] __kasan_kmalloc+0xb7/0xc0 [ 13.422551] __kmalloc_cache_noprof+0x189/0x420 [ 13.423048] kmalloc_oob_right+0xa9/0x7f0 [ 13.424021] kunit_try_run_case+0x1a5/0x480 [ 13.424390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.424777] kthread+0x337/0x6f0 [ 13.425062] ret_from_fork+0x116/0x1d0 [ 13.425303] ret_from_fork_asm+0x1a/0x30 [ 13.425637] [ 13.426685] The buggy address belongs to the object at ffff888103324900 [ 13.426685] which belongs to the cache kmalloc-128 of size 128 [ 13.427255] The buggy address is located 0 bytes to the right of [ 13.427255] allocated 115-byte region [ffff888103324900, ffff888103324973) [ 13.427807] [ 13.428033] The buggy address belongs to the physical page: [ 13.428595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 13.429323] flags: 0x200000000000000(node=0|zone=2) [ 13.430095] page_type: f5(slab) [ 13.430719] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.431166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.431612] page dumped because: kasan: bad access detected [ 13.431805] [ 13.431975] Memory state around the buggy address: [ 13.432499] ffff888103324800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.432909] ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.433671] >ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.434000] ^ [ 13.434211] ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.434359] ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.435199] ================================================================== [ 13.460302] ================================================================== [ 13.460647] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 13.461068] Read of size 1 at addr ffff888103324980 by task kunit_try_catch/153 [ 13.461420] [ 13.461572] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.461630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.461644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.461671] Call Trace: [ 13.461858] <TASK> [ 13.461889] dump_stack_lvl+0x73/0xb0 [ 13.461926] print_report+0xd1/0x650 [ 13.461953] ? __virt_addr_valid+0x1db/0x2d0 [ 13.461982] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.462005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.462028] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.462052] kasan_report+0x141/0x180 [ 13.462076] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.462105] __asan_report_load1_noabort+0x18/0x20 [ 13.462128] kmalloc_oob_right+0x68a/0x7f0 [ 13.462152] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.462178] ? __schedule+0x10cc/0x2b60 [ 13.462207] ? __pfx_read_tsc+0x10/0x10 [ 13.462234] ? ktime_get_ts64+0x86/0x230 [ 13.462262] kunit_try_run_case+0x1a5/0x480 [ 13.462286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.462307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.462354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.462382] ? __kthread_parkme+0x82/0x180 [ 13.462405] ? preempt_count_sub+0x50/0x80 [ 13.462433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.462464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.462495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.462522] kthread+0x337/0x6f0 [ 13.462543] ? trace_preempt_on+0x20/0xc0 [ 13.462570] ? __pfx_kthread+0x10/0x10 [ 13.462592] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.462616] ? calculate_sigpending+0x7b/0xa0 [ 13.462644] ? __pfx_kthread+0x10/0x10 [ 13.462667] ret_from_fork+0x116/0x1d0 [ 13.462703] ? __pfx_kthread+0x10/0x10 [ 13.462727] ret_from_fork_asm+0x1a/0x30 [ 13.462766] </TASK> [ 13.462780] [ 13.474662] Allocated by task 153: [ 13.475038] kasan_save_stack+0x45/0x70 [ 13.475435] kasan_save_track+0x18/0x40 [ 13.475783] kasan_save_alloc_info+0x3b/0x50 [ 13.475970] __kasan_kmalloc+0xb7/0xc0 [ 13.476275] __kmalloc_cache_noprof+0x189/0x420 [ 13.476450] kmalloc_oob_right+0xa9/0x7f0 [ 13.476877] kunit_try_run_case+0x1a5/0x480 [ 13.477185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.477492] kthread+0x337/0x6f0 [ 13.477627] ret_from_fork+0x116/0x1d0 [ 13.478196] ret_from_fork_asm+0x1a/0x30 [ 13.478598] [ 13.478975] The buggy address belongs to the object at ffff888103324900 [ 13.478975] which belongs to the cache kmalloc-128 of size 128 [ 13.479493] The buggy address is located 13 bytes to the right of [ 13.479493] allocated 115-byte region [ffff888103324900, ffff888103324973) [ 13.480252] [ 13.480325] The buggy address belongs to the physical page: [ 13.480449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 13.481138] flags: 0x200000000000000(node=0|zone=2) [ 13.481381] page_type: f5(slab) [ 13.481614] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.482535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.483023] page dumped because: kasan: bad access detected [ 13.483301] [ 13.483543] Memory state around the buggy address: [ 13.483791] ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.484260] ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.484469] >ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.485073] ^ [ 13.485325] ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.485688] ffff888103324a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.485972] ==================================================================
[ 16.662204] ================================================================== [ 16.669438] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 16.676414] Write of size 1 at addr ffff88810478c473 by task kunit_try_catch/176 [ 16.683806] [ 16.685309] CPU: 2 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G S N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.685318] Tainted: [S]=CPU_OUT_OF_SPEC, [N]=TEST [ 16.685320] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.685324] Call Trace: [ 16.685326] <TASK> [ 16.685328] dump_stack_lvl+0x73/0xb0 [ 16.685333] print_report+0xd1/0x650 [ 16.685338] ? __virt_addr_valid+0x1db/0x2d0 [ 16.685357] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.685361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.685366] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.685370] kasan_report+0x141/0x180 [ 16.685374] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.685391] __asan_report_store1_noabort+0x1b/0x30 [ 16.685395] kmalloc_oob_right+0x6f0/0x7f0 [ 16.685399] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.685403] ? __schedule+0x10cc/0x2b60 [ 16.685408] ? ktime_get_ts64+0x83/0x230 [ 16.685413] kunit_try_run_case+0x1a2/0x480 [ 16.685417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.685421] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.685426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.685430] ? __kthread_parkme+0x82/0x180 [ 16.685434] ? preempt_count_sub+0x50/0x80 [ 16.685439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.685442] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.685447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.685452] kthread+0x334/0x6f0 [ 16.685455] ? trace_preempt_on+0x20/0xc0 [ 16.685460] ? __pfx_kthread+0x10/0x10 [ 16.685463] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.685468] ? calculate_sigpending+0x7b/0xa0 [ 16.685472] ? __pfx_kthread+0x10/0x10 [ 16.685476] ret_from_fork+0x113/0x1d0 [ 16.685480] ? __pfx_kthread+0x10/0x10 [ 16.685484] ret_from_fork_asm+0x1a/0x30 [ 16.685490] </TASK> [ 16.685492] [ 16.850092] Allocated by task 176: [ 16.853500] kasan_save_stack+0x45/0x70 [ 16.857337] kasan_save_track+0x18/0x40 [ 16.861204] kasan_save_alloc_info+0x3b/0x50 [ 16.865476] __kasan_kmalloc+0xb7/0xc0 [ 16.869227] __kmalloc_cache_noprof+0x189/0x420 [ 16.873762] kmalloc_oob_right+0xa9/0x7f0 [ 16.877783] kunit_try_run_case+0x1a2/0x480 [ 16.881975] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.887375] kthread+0x334/0x6f0 [ 16.890635] ret_from_fork+0x113/0x1d0 [ 16.894410] ret_from_fork_asm+0x1a/0x30 [ 16.898339] [ 16.899865] The buggy address belongs to the object at ffff88810478c400 [ 16.899865] which belongs to the cache kmalloc-128 of size 128 [ 16.912393] The buggy address is located 0 bytes to the right of [ 16.912393] allocated 115-byte region [ffff88810478c400, ffff88810478c473) [ 16.925357] [ 16.926861] The buggy address belongs to the physical page: [ 16.932433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10478c [ 16.940431] flags: 0x200000000000000(node=0|zone=2) [ 16.945311] page_type: f5(slab) [ 16.948460] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 16.956206] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.963943] page dumped because: kasan: bad access detected [ 16.969518] [ 16.971015] Memory state around the buggy address: [ 16.975810] ffff88810478c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.983028] ffff88810478c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.990247] >ffff88810478c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.997466] ^ [ 17.004354] ffff88810478c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.011585] ffff88810478c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.018803] ================================================================== [ 17.396482] ================================================================== [ 17.403711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 17.410676] Read of size 1 at addr ffff88810478c480 by task kunit_try_catch/176 [ 17.417985] [ 17.419484] CPU: 2 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G S B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.419492] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 17.419495] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.419498] Call Trace: [ 17.419500] <TASK> [ 17.419501] dump_stack_lvl+0x73/0xb0 [ 17.419505] print_report+0xd1/0x650 [ 17.419509] ? __virt_addr_valid+0x1db/0x2d0 [ 17.419513] ? kmalloc_oob_right+0x68a/0x7f0 [ 17.419517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.419521] ? kmalloc_oob_right+0x68a/0x7f0 [ 17.419525] kasan_report+0x141/0x180 [ 17.419529] ? kmalloc_oob_right+0x68a/0x7f0 [ 17.419533] __asan_report_load1_noabort+0x18/0x20 [ 17.419537] kmalloc_oob_right+0x68a/0x7f0 [ 17.419541] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 17.419545] ? __schedule+0x10cc/0x2b60 [ 17.419550] ? ktime_get_ts64+0x83/0x230 [ 17.419554] kunit_try_run_case+0x1a2/0x480 [ 17.419557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.419561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.419565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.419570] ? __kthread_parkme+0x82/0x180 [ 17.419573] ? preempt_count_sub+0x50/0x80 [ 17.419577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.419581] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.419585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.419590] kthread+0x334/0x6f0 [ 17.419593] ? trace_preempt_on+0x20/0xc0 [ 17.419597] ? __pfx_kthread+0x10/0x10 [ 17.419601] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.419605] ? calculate_sigpending+0x7b/0xa0 [ 17.419609] ? __pfx_kthread+0x10/0x10 [ 17.419613] ret_from_fork+0x113/0x1d0 [ 17.419616] ? __pfx_kthread+0x10/0x10 [ 17.419620] ret_from_fork_asm+0x1a/0x30 [ 17.419625] </TASK> [ 17.419627] [ 17.585291] Allocated by task 176: [ 17.588696] kasan_save_stack+0x45/0x70 [ 17.592537] kasan_save_track+0x18/0x40 [ 17.596374] kasan_save_alloc_info+0x3b/0x50 [ 17.600672] __kasan_kmalloc+0xb7/0xc0 [ 17.604426] __kmalloc_cache_noprof+0x189/0x420 [ 17.608960] kmalloc_oob_right+0xa9/0x7f0 [ 17.612973] kunit_try_run_case+0x1a2/0x480 [ 17.617156] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.622556] kthread+0x334/0x6f0 [ 17.625789] ret_from_fork+0x113/0x1d0 [ 17.629541] ret_from_fork_asm+0x1a/0x30 [ 17.633467] [ 17.634965] The buggy address belongs to the object at ffff88810478c400 [ 17.634965] which belongs to the cache kmalloc-128 of size 128 [ 17.647472] The buggy address is located 13 bytes to the right of [ 17.647472] allocated 115-byte region [ffff88810478c400, ffff88810478c473) [ 17.660508] [ 17.662008] The buggy address belongs to the physical page: [ 17.667579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10478c [ 17.675579] flags: 0x200000000000000(node=0|zone=2) [ 17.680457] page_type: f5(slab) [ 17.683604] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 17.691357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.699125] page dumped because: kasan: bad access detected [ 17.704698] [ 17.706195] Memory state around the buggy address: [ 17.710991] ffff88810478c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.718208] ffff88810478c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.725429] >ffff88810478c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.732647] ^ [ 17.735881] ffff88810478c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.743101] ffff88810478c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.750319] ================================================================== [ 17.031443] ================================================================== [ 17.038668] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 17.045628] Write of size 1 at addr ffff88810478c478 by task kunit_try_catch/176 [ 17.053026] [ 17.054528] CPU: 2 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G S B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.054536] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 17.054539] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.054542] Call Trace: [ 17.054544] <TASK> [ 17.054545] dump_stack_lvl+0x73/0xb0 [ 17.054549] print_report+0xd1/0x650 [ 17.054553] ? __virt_addr_valid+0x1db/0x2d0 [ 17.054557] ? kmalloc_oob_right+0x6bd/0x7f0 [ 17.054561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.054565] ? kmalloc_oob_right+0x6bd/0x7f0 [ 17.054569] kasan_report+0x141/0x180 [ 17.054573] ? kmalloc_oob_right+0x6bd/0x7f0 [ 17.054578] __asan_report_store1_noabort+0x1b/0x30 [ 17.054582] kmalloc_oob_right+0x6bd/0x7f0 [ 17.054586] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 17.054590] ? __schedule+0x10cc/0x2b60 [ 17.054594] ? ktime_get_ts64+0x83/0x230 [ 17.054598] kunit_try_run_case+0x1a2/0x480 [ 17.054602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.054605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.054610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.054614] ? __kthread_parkme+0x82/0x180 [ 17.054618] ? preempt_count_sub+0x50/0x80 [ 17.054622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.054626] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.054630] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.054635] kthread+0x334/0x6f0 [ 17.054638] ? trace_preempt_on+0x20/0xc0 [ 17.054642] ? __pfx_kthread+0x10/0x10 [ 17.054646] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.054650] ? calculate_sigpending+0x7b/0xa0 [ 17.054654] ? __pfx_kthread+0x10/0x10 [ 17.054658] ret_from_fork+0x113/0x1d0 [ 17.054661] ? __pfx_kthread+0x10/0x10 [ 17.054665] ret_from_fork_asm+0x1a/0x30 [ 17.054671] </TASK> [ 17.054672] [ 17.220411] Allocated by task 176: [ 17.223817] kasan_save_stack+0x45/0x70 [ 17.227657] kasan_save_track+0x18/0x40 [ 17.231496] kasan_save_alloc_info+0x3b/0x50 [ 17.235769] __kasan_kmalloc+0xb7/0xc0 [ 17.239521] __kmalloc_cache_noprof+0x189/0x420 [ 17.244055] kmalloc_oob_right+0xa9/0x7f0 [ 17.248066] kunit_try_run_case+0x1a2/0x480 [ 17.252253] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.257651] kthread+0x334/0x6f0 [ 17.260887] ret_from_fork+0x113/0x1d0 [ 17.264639] ret_from_fork_asm+0x1a/0x30 [ 17.268563] [ 17.270063] The buggy address belongs to the object at ffff88810478c400 [ 17.270063] which belongs to the cache kmalloc-128 of size 128 [ 17.282579] The buggy address is located 5 bytes to the right of [ 17.282579] allocated 115-byte region [ffff88810478c400, ffff88810478c473) [ 17.295525] [ 17.297025] The buggy address belongs to the physical page: [ 17.302599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10478c [ 17.310606] flags: 0x200000000000000(node=0|zone=2) [ 17.315484] page_type: f5(slab) [ 17.318633] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 17.326378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.334143] page dumped because: kasan: bad access detected [ 17.339717] [ 17.341214] Memory state around the buggy address: [ 17.346008] ffff88810478c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.353227] ffff88810478c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.360447] >ffff88810478c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.367666] ^ [ 17.374797] ffff88810478c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.382018] ffff88810478c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.389236] ==================================================================