Hay
Date
June 5, 2025, 7:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   24.618366] ==================================================================
[   24.618582] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   24.618710] Write of size 1 at addr fff00000c703a578 by task kunit_try_catch/142
[   24.618992] 
[   24.619079] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.619647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.620113] Hardware name: linux,dummy-virt (DT)
[   24.620423] Call trace:
[   24.620486]  show_stack+0x20/0x38 (C)
[   24.620663]  dump_stack_lvl+0x8c/0xd0
[   24.620838]  print_report+0x118/0x608
[   24.620973]  kasan_report+0xdc/0x128
[   24.621088]  __asan_report_store1_noabort+0x20/0x30
[   24.621205]  kmalloc_track_caller_oob_right+0x418/0x488
[   24.621402]  kunit_try_run_case+0x170/0x3f0
[   24.621526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.621689]  kthread+0x328/0x630
[   24.621806]  ret_from_fork+0x10/0x20
[   24.621932] 
[   24.621979] Allocated by task 142:
[   24.622065]  kasan_save_stack+0x3c/0x68
[   24.622195]  kasan_save_track+0x20/0x40
[   24.622291]  kasan_save_alloc_info+0x40/0x58
[   24.622674]  __kasan_kmalloc+0xd4/0xd8
[   24.622844]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   24.623314]  kmalloc_track_caller_oob_right+0x184/0x488
[   24.623734]  kunit_try_run_case+0x170/0x3f0
[   24.623974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.624385]  kthread+0x328/0x630
[   24.624686]  ret_from_fork+0x10/0x20
[   24.625072] 
[   24.625144] The buggy address belongs to the object at fff00000c703a500
[   24.625144]  which belongs to the cache kmalloc-128 of size 128
[   24.625292] The buggy address is located 0 bytes to the right of
[   24.625292]  allocated 120-byte region [fff00000c703a500, fff00000c703a578)
[   24.626409] 
[   24.627290] The buggy address belongs to the physical page:
[   24.627405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a
[   24.627788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.628134] page_type: f5(slab)
[   24.628508] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.628639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.629201] page dumped because: kasan: bad access detected
[   24.629365] 
[   24.629461] Memory state around the buggy address:
[   24.629539]  fff00000c703a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.629642]  fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.629744] >fff00000c703a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.629848]                                                                 ^
[   24.629981]  fff00000c703a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.630104]  fff00000c703a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.630204] ==================================================================
[   24.601930] ==================================================================
[   24.602243] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   24.602474] Write of size 1 at addr fff00000c703a478 by task kunit_try_catch/142
[   24.602696] 
[   24.602769] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.602972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.603153] Hardware name: linux,dummy-virt (DT)
[   24.603232] Call trace:
[   24.603282]  show_stack+0x20/0x38 (C)
[   24.603420]  dump_stack_lvl+0x8c/0xd0
[   24.603696]  print_report+0x118/0x608
[   24.603924]  kasan_report+0xdc/0x128
[   24.604591]  __asan_report_store1_noabort+0x20/0x30
[   24.604763]  kmalloc_track_caller_oob_right+0x40c/0x488
[   24.605022]  kunit_try_run_case+0x170/0x3f0
[   24.606039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.607257]  kthread+0x328/0x630
[   24.608168]  ret_from_fork+0x10/0x20
[   24.608504] 
[   24.608551] Allocated by task 142:
[   24.608662]  kasan_save_stack+0x3c/0x68
[   24.608767]  kasan_save_track+0x20/0x40
[   24.608862]  kasan_save_alloc_info+0x40/0x58
[   24.609147]  __kasan_kmalloc+0xd4/0xd8
[   24.609323]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   24.609453]  kmalloc_track_caller_oob_right+0xa8/0x488
[   24.609608]  kunit_try_run_case+0x170/0x3f0
[   24.609715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.609939]  kthread+0x328/0x630
[   24.610050]  ret_from_fork+0x10/0x20
[   24.610238] 
[   24.610293] The buggy address belongs to the object at fff00000c703a400
[   24.610293]  which belongs to the cache kmalloc-128 of size 128
[   24.610473] The buggy address is located 0 bytes to the right of
[   24.610473]  allocated 120-byte region [fff00000c703a400, fff00000c703a478)
[   24.610643] 
[   24.610699] The buggy address belongs to the physical page:
[   24.611268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a
[   24.611416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.611534] page_type: f5(slab)
[   24.611767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.611951] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.612163] page dumped because: kasan: bad access detected
[   24.612243] 
[   24.612292] Memory state around the buggy address:
[   24.612388]  fff00000c703a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.612507]  fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.612786] >fff00000c703a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.612885]                                                                 ^
[   24.613239]  fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.613604]  fff00000c703a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.613872] ==================================================================


[   10.768569] ==================================================================
[   10.769267] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.769788] Write of size 1 at addr ffff88810276e478 by task kunit_try_catch/159
[   10.770040] 
[   10.770371] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   10.770417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.770430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.770450] Call Trace:
[   10.770461]  <TASK>
[   10.770475]  dump_stack_lvl+0x73/0xb0
[   10.770501]  print_report+0xd1/0x650
[   10.770523]  ? __virt_addr_valid+0x1db/0x2d0
[   10.770546]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.770570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.770592]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.770617]  kasan_report+0x141/0x180
[   10.770638]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.770667]  __asan_report_store1_noabort+0x1b/0x30
[   10.770688]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.770712]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.770737]  ? __schedule+0x10cc/0x2b60
[   10.770759]  ? __pfx_read_tsc+0x10/0x10
[   10.770779]  ? ktime_get_ts64+0x86/0x230
[   10.770803]  kunit_try_run_case+0x1a5/0x480
[   10.770823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.770842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.770866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.770889]  ? __kthread_parkme+0x82/0x180
[   10.770923]  ? preempt_count_sub+0x50/0x80
[   10.770946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.770966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.770989]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.771013]  kthread+0x337/0x6f0
[   10.771032]  ? trace_preempt_on+0x20/0xc0
[   10.771054]  ? __pfx_kthread+0x10/0x10
[   10.771135]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.771158]  ? calculate_sigpending+0x7b/0xa0
[   10.771181]  ? __pfx_kthread+0x10/0x10
[   10.771202]  ret_from_fork+0x116/0x1d0
[   10.771220]  ? __pfx_kthread+0x10/0x10
[   10.771239]  ret_from_fork_asm+0x1a/0x30
[   10.771269]  </TASK>
[   10.771279] 
[   10.781578] Allocated by task 159:
[   10.782043]  kasan_save_stack+0x45/0x70
[   10.782305]  kasan_save_track+0x18/0x40
[   10.782680]  kasan_save_alloc_info+0x3b/0x50
[   10.783018]  __kasan_kmalloc+0xb7/0xc0
[   10.783259]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.783495]  kmalloc_track_caller_oob_right+0x99/0x520
[   10.783935]  kunit_try_run_case+0x1a5/0x480
[   10.784487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.784851]  kthread+0x337/0x6f0
[   10.785224]  ret_from_fork+0x116/0x1d0
[   10.785406]  ret_from_fork_asm+0x1a/0x30
[   10.785580] 
[   10.786150] The buggy address belongs to the object at ffff88810276e400
[   10.786150]  which belongs to the cache kmalloc-128 of size 128
[   10.787058] The buggy address is located 0 bytes to the right of
[   10.787058]  allocated 120-byte region [ffff88810276e400, ffff88810276e478)
[   10.787580] 
[   10.787987] The buggy address belongs to the physical page:
[   10.788451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e
[   10.789367] flags: 0x200000000000000(node=0|zone=2)
[   10.789684] page_type: f5(slab)
[   10.790004] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.790321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.790630] page dumped because: kasan: bad access detected
[   10.790855] 
[   10.790946] Memory state around the buggy address:
[   10.791153]  ffff88810276e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.791443]  ffff88810276e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.792398] >ffff88810276e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.793086]                                                                 ^
[   10.793592]  ffff88810276e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.794332]  ffff88810276e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.794622] ==================================================================
[   10.796188] ==================================================================
[   10.796702] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.797339] Write of size 1 at addr ffff88810276e578 by task kunit_try_catch/159
[   10.797887] 
[   10.798147] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   10.798193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.798205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.798224] Call Trace:
[   10.798243]  <TASK>
[   10.798256]  dump_stack_lvl+0x73/0xb0
[   10.798282]  print_report+0xd1/0x650
[   10.798303]  ? __virt_addr_valid+0x1db/0x2d0
[   10.798326]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.798350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.798372]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.798397]  kasan_report+0x141/0x180
[   10.798418]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.798447]  __asan_report_store1_noabort+0x1b/0x30
[   10.798466]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.798490]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.798515]  ? __schedule+0x10cc/0x2b60
[   10.798537]  ? __pfx_read_tsc+0x10/0x10
[   10.798557]  ? ktime_get_ts64+0x86/0x230
[   10.798580]  kunit_try_run_case+0x1a5/0x480
[   10.798600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.798619]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.798748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.798773]  ? __kthread_parkme+0x82/0x180
[   10.798792]  ? preempt_count_sub+0x50/0x80
[   10.798816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.798836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.798860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.798929]  kthread+0x337/0x6f0
[   10.798958]  ? trace_preempt_on+0x20/0xc0
[   10.798979]  ? __pfx_kthread+0x10/0x10
[   10.798999]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.799020]  ? calculate_sigpending+0x7b/0xa0
[   10.799044]  ? __pfx_kthread+0x10/0x10
[   10.799064]  ret_from_fork+0x116/0x1d0
[   10.799081]  ? __pfx_kthread+0x10/0x10
[   10.799101]  ret_from_fork_asm+0x1a/0x30
[   10.799130]  </TASK>
[   10.799139] 
[   10.809080] Allocated by task 159:
[   10.809214]  kasan_save_stack+0x45/0x70
[   10.809416]  kasan_save_track+0x18/0x40
[   10.809614]  kasan_save_alloc_info+0x3b/0x50
[   10.810102]  __kasan_kmalloc+0xb7/0xc0
[   10.810363]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.810719]  kmalloc_track_caller_oob_right+0x19a/0x520
[   10.810980]  kunit_try_run_case+0x1a5/0x480
[   10.811243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.811575]  kthread+0x337/0x6f0
[   10.811921]  ret_from_fork+0x116/0x1d0
[   10.812076]  ret_from_fork_asm+0x1a/0x30
[   10.812324] 
[   10.812422] The buggy address belongs to the object at ffff88810276e500
[   10.812422]  which belongs to the cache kmalloc-128 of size 128
[   10.813086] The buggy address is located 0 bytes to the right of
[   10.813086]  allocated 120-byte region [ffff88810276e500, ffff88810276e578)
[   10.813876] 
[   10.813989] The buggy address belongs to the physical page:
[   10.814275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e
[   10.814611] flags: 0x200000000000000(node=0|zone=2)
[   10.815084] page_type: f5(slab)
[   10.815312] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.815780] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.816186] page dumped because: kasan: bad access detected
[   10.816377] 
[   10.816469] Memory state around the buggy address:
[   10.816806]  ffff88810276e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.817336]  ffff88810276e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.817643] >ffff88810276e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.818058]                                                                 ^
[   10.818404]  ffff88810276e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.818821]  ffff88810276e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.819168] ==================================================================