Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  104.856922] ==================================================================
[  104.858586] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[  104.860049] Read of size 1 at addr ffff0000c67a3000 by task kunit_try_catch/206
[  104.861624] 
[  104.862264] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  104.863466] Hardware name: linux,dummy-virt (DT)
[  104.864299] Call trace:
[  104.864943]  dump_backtrace+0xe0/0x134
[  104.865855]  show_stack+0x20/0x2c
[  104.866575]  dump_stack_lvl+0x88/0xb4
[  104.867298]  print_report+0x158/0x44c
[  104.868138]  kasan_report+0xc8/0x180
[  104.868923]  __asan_load1+0x68/0x74
[  104.869640]  kmalloc_node_oob_right+0xd0/0x1f0
[  104.870366]  kunit_try_run_case+0x8c/0x124
[  104.871243]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  104.872224]  kthread+0x15c/0x170
[  104.872887]  ret_from_fork+0x10/0x20
[  104.873271] 
[  104.873454] Allocated by task 206:
[  104.873732]  kasan_save_stack+0x3c/0x70
[  104.874246]  kasan_set_track+0x2c/0x40
[  104.874808]  kasan_save_alloc_info+0x24/0x34
[  104.875354]  __kasan_kmalloc+0xd4/0xe0
[  104.875878]  kmalloc_node_trace+0x90/0x150
[  104.876385]  kmalloc_node_oob_right+0xa4/0x1f0
[  104.876854]  kunit_try_run_case+0x8c/0x124
[  104.877322]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  104.877885]  kthread+0x15c/0x170
[  104.878311]  ret_from_fork+0x10/0x20
[  104.879619] 
[  104.879868] The buggy address belongs to the object at ffff0000c67a2000
[  104.879868]  which belongs to the cache kmalloc-4k of size 4096
[  104.881118] The buggy address is located 0 bytes to the right of
[  104.881118]  4096-byte region [ffff0000c67a2000, ffff0000c67a3000)
[  104.882166] 
[  104.882407] The buggy address belongs to the physical page:
[  104.883003] page:00000000a5b8441f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067a0
[  104.883833] head:00000000a5b8441f order:3 compound_mapcount:0 compound_pincount:0
[  104.884472] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  104.885203] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[  104.886082] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[  104.886740] page dumped because: kasan: bad access detected
[  104.887261] 
[  104.887477] Memory state around the buggy address:
[  104.887955]  ffff0000c67a2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  104.888805]  ffff0000c67a2f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  104.889425] >ffff0000c67a3000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  104.890046]                    ^
[  104.890421]  ffff0000c67a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  104.891057]  ffff0000c67a3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  104.891657] ==================================================================

[   74.658047] ==================================================================
[   74.658874] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c
[   74.659648] Read of size 1 at addr ffff0000c58cf000 by task kunit_try_catch/122
[   74.660289] 
[   74.660547] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.661258] Hardware name: linux,dummy-virt (DT)
[   74.661676] Call trace:
[   74.661986]  dump_backtrace+0xf8/0x118
[   74.662459]  show_stack+0x18/0x24
[   74.662884]  __dump_stack+0x28/0x38
[   74.663338]  dump_stack_lvl+0x54/0x6c
[   74.663945]  print_address_description+0x7c/0x1ec
[   74.664498]  print_report+0x50/0x68
[   74.665134]  kasan_report+0xac/0x100
[   74.665571]  __asan_load1+0x6c/0x70
[   74.666021]  kmalloc_node_oob_right+0xa4/0x15c
[   74.666496]  kunit_try_run_case+0x80/0x184
[   74.666961]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.667520]  kthread+0x16c/0x21c
[   74.667947]  ret_from_fork+0x10/0x20
[   74.668365] 
[   74.668564] Allocated by task 122:
[   74.669089]  kasan_set_track+0x4c/0x80
[   74.669596]  kasan_save_alloc_info+0x28/0x34
[   74.670090]  __kasan_kmalloc+0x88/0xa0
[   74.670536]  kmalloc_node_trace+0x4c/0x60
[   74.671028]  kmalloc_node_oob_right+0x4c/0x15c
[   74.671500]  kunit_try_run_case+0x80/0x184
[   74.672002]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.672560]  kthread+0x16c/0x21c
[   74.673171]  ret_from_fork+0x10/0x20
[   74.673626] 
[   74.673843] The buggy address belongs to the object at ffff0000c58ce000
[   74.673843]  which belongs to the cache kmalloc-4k of size 4096
[   74.674789] The buggy address is located 0 bytes to the right of
[   74.674789]  4096-byte region [ffff0000c58ce000, ffff0000c58cf000)
[   74.675722] 
[   74.675937] The buggy address belongs to the physical page:
[   74.676443] page:00000000de932318 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.677839] head:00000000de932318 order:3 compound_mapcount:0 compound_pincount:0
[   74.678442] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.679205] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   74.679901] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   74.680528] page dumped because: kasan: bad access detected
[   74.681154] 
[   74.681354] Memory state around the buggy address:
[   74.681792]  ffff0000c58cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.682432]  ffff0000c58cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.683046] >ffff0000c58cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.683632]                    ^
[   74.684035]  ffff0000c58cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.684866]  ffff0000c58cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.685453] ==================================================================

[   73.638861] ==================================================================
[   73.641959] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c
[   73.642854] Read of size 1 at addr ffff0000c593f000 by task kunit_try_catch/122
[   73.643526] 
[   73.643776] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.644598] Hardware name: linux,dummy-virt (DT)
[   73.645269] Call trace:
[   73.645588]  dump_backtrace+0xf4/0x114
[   73.646148]  show_stack+0x18/0x24
[   73.646945]  __dump_stack+0x28/0x38
[   73.647400]  dump_stack_lvl+0x50/0x68
[   73.647885]  print_address_description+0x7c/0x1ec
[   73.648727]  print_report+0x50/0x68
[   73.649214]  kasan_report+0xac/0xfc
[   73.649722]  __asan_load1+0x6c/0x70
[   73.650199]  kmalloc_node_oob_right+0xa4/0x15c
[   73.650720]  kunit_try_run_case+0x80/0x184
[   73.651220]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.651876]  kthread+0x16c/0x21c
[   73.652833]  ret_from_fork+0x10/0x20
[   73.653284] 
[   73.653504] Allocated by task 122:
[   73.653897]  kasan_set_track+0x4c/0x80
[   73.654379]  kasan_save_alloc_info+0x28/0x34
[   73.654873]  __kasan_kmalloc+0x88/0xa0
[   73.655353]  kmalloc_node_trace+0x4c/0x60
[   73.655884]  kmalloc_node_oob_right+0x4c/0x15c
[   73.656673]  kunit_try_run_case+0x80/0x184
[   73.657205]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.657801]  kthread+0x16c/0x21c
[   73.658234]  ret_from_fork+0x10/0x20
[   73.658706] 
[   73.658930] The buggy address belongs to the object at ffff0000c593e000
[   73.658930]  which belongs to the cache kmalloc-4k of size 4096
[   73.660389] The buggy address is located 0 bytes to the right of
[   73.660389]  4096-byte region [ffff0000c593e000, ffff0000c593f000)
[   73.661397] 
[   73.661658] The buggy address belongs to the physical page:
[   73.662259] page:00000000949663e6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   73.663108] head:00000000949663e6 order:3 compound_mapcount:0 compound_pincount:0
[   73.664073] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.664875] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   73.665608] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   73.666257] page dumped because: kasan: bad access detected
[   73.666757] 
[   73.666979] Memory state around the buggy address:
[   73.667460]  ffff0000c593ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.668583]  ffff0000c593ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.669307] >ffff0000c593f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.669941]                    ^
[   73.670283]  ffff0000c593f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.670922]  ffff0000c593f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.671545] ==================================================================

[   72.273728] ==================================================================
[   72.274613] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xc8/0x1e4
[   72.275343] Read of size 1 at addr ffff0000c599b000 by task kunit_try_catch/122
[   72.276433] 
[   72.276670] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.277369] Hardware name: linux,dummy-virt (DT)
[   72.277794] Call trace:
[   72.278448]  dump_backtrace.part.0+0xdc/0xf0
[   72.278966]  show_stack+0x18/0x30
[   72.279358]  dump_stack_lvl+0x64/0x80
[   72.279775]  print_report+0x158/0x438
[   72.280218]  kasan_report+0xb4/0xf4
[   72.280621]  __asan_load1+0x68/0x74
[   72.281012]  kmalloc_node_oob_right+0xc8/0x1e4
[   72.281487]  kunit_try_run_case+0x84/0x120
[   72.282122]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.282675]  kthread+0x180/0x190
[   72.283050]  ret_from_fork+0x10/0x20
[   72.283471] 
[   72.283651] Allocated by task 122:
[   72.283980]  kasan_save_stack+0x3c/0x70
[   72.284784]  kasan_set_track+0x2c/0x40
[   72.285184]  kasan_save_alloc_info+0x24/0x34
[   72.285661]  __kasan_kmalloc+0xb8/0xc0
[   72.286326]  kmalloc_node_trace+0x54/0x70
[   72.286816]  kmalloc_node_oob_right+0x9c/0x1e4
[   72.287267]  kunit_try_run_case+0x84/0x120
[   72.287723]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.288289]  kthread+0x180/0x190
[   72.288665]  ret_from_fork+0x10/0x20
[   72.289072] 
[   72.289269] The buggy address belongs to the object at ffff0000c599a000
[   72.289269]  which belongs to the cache kmalloc-4k of size 4096
[   72.290708] The buggy address is located 0 bytes to the right of
[   72.290708]  4096-byte region [ffff0000c599a000, ffff0000c599b000)
[   72.291622] 
[   72.291800] The buggy address belongs to the physical page:
[   72.292322] page:000000006c8790c3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[   72.293095] head:000000006c8790c3 order:3 compound_mapcount:0 compound_pincount:0
[   72.293703] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.294409] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   72.295047] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   72.295655] page dumped because: kasan: bad access detected
[   72.296100] 
[   72.296282] Memory state around the buggy address:
[   72.297081]  ffff0000c599af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.297717]  ffff0000c599af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.298813] >ffff0000c599b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.299402]                    ^
[   72.299710]  ffff0000c599b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.300317]  ffff0000c599b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.300902] ==================================================================

[   63.971548] ==================================================================
[   63.972204] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xdc/0x1f0
[   63.973026] Read of size 1 at addr ffff0000c5907000 by task kunit_try_catch/120
[   63.974344] 
[   63.974781] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   63.975649] Hardware name: linux,dummy-virt (DT)
[   63.975956] Call trace:
[   63.976156]  dump_backtrace+0x110/0x120
[   63.976529]  show_stack+0x18/0x28
[   63.976855]  dump_stack_lvl+0x68/0x84
[   63.977187]  print_report+0x158/0x484
[   63.978281]  kasan_report+0x98/0xe0
[   63.978861]  __asan_load1+0x68/0x78
[   63.979435]  kmalloc_node_oob_right+0xdc/0x1f0
[   63.980127]  kunit_try_run_case+0x7c/0x120
[   63.980773]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   63.981591]  kthread+0x1a4/0x1b8
[   63.982193]  ret_from_fork+0x10/0x20
[   63.982787] 
[   63.983089] Allocated by task 120:
[   63.983591]  kasan_save_stack+0x2c/0x58
[   63.984187]  kasan_set_track+0x2c/0x40
[   63.984761]  kasan_save_alloc_info+0x24/0x38
[   63.985435]  __kasan_kmalloc+0xa0/0xb8
[   63.986075]  kmalloc_node_trace+0x48/0x60
[   63.986694]  kmalloc_node_oob_right+0xac/0x1f0
[   63.987363]  kunit_try_run_case+0x7c/0x120
[   63.987994]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   63.988736]  kthread+0x1a4/0x1b8
[   63.989225]  ret_from_fork+0x10/0x20
[   63.989775] 
[   63.990082] The buggy address belongs to the object at ffff0000c5906000
[   63.990082]  which belongs to the cache kmalloc-4k of size 4096
[   63.991475] The buggy address is located 0 bytes to the right of
[   63.991475]  4096-byte region [ffff0000c5906000, ffff0000c5907000)
[   63.992817] 
[   63.993090] The buggy address belongs to the physical page:
[   63.993808] page:000000002773b70c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105900
[   63.994875] head:000000002773b70c order:3 compound_mapcount:0 compound_pincount:0
[   63.995473] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   63.996418] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   63.997306] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   63.998430] page dumped because: kasan: bad access detected
[   63.999040] 
[   63.999329] Memory state around the buggy address:
[   63.999875]  ffff0000c5906f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.000312]  ffff0000c5906f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.000736] >ffff0000c5907000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.001134]                    ^
[   64.001655]  ffff0000c5907080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.002654]  ffff0000c5907100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.003495] ==================================================================

[   30.307067] ==================================================================
[   30.308395] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[   30.308709] Read of size 1 at addr ffff888103619000 by task kunit_try_catch/226
[   30.308981] 
[   30.309099] CPU: 1 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.310350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.311405] Call Trace:
[   30.311824]  <TASK>
[   30.312074]  dump_stack_lvl+0x49/0x62
[   30.312549]  print_report+0x189/0x492
[   30.312746]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.313560]  ? kmalloc_node_oob_right+0xd0/0x1f0
[   30.314022]  kasan_report+0x10c/0x190
[   30.314456]  ? kmalloc_node_oob_right+0xd0/0x1f0
[   30.314945]  __asan_load1+0x62/0x70
[   30.315367]  kmalloc_node_oob_right+0xd0/0x1f0
[   30.315815]  ? pagealloc_uaf+0x1e0/0x1e0
[   30.316153]  ? __kunit_add_resource+0xd1/0x100
[   30.316710]  kunit_try_run_case+0x8f/0xd0
[   30.317207]  ? kunit_catch_run_case+0x80/0x80
[   30.317563]  ? kunit_try_catch_throw+0x40/0x40
[   30.317869]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.318470]  kthread+0x17b/0x1b0
[   30.318822]  ? kthread_complete_and_exit+0x30/0x30
[   30.319319]  ret_from_fork+0x22/0x30
[   30.319811]  </TASK>
[   30.320040] 
[   30.320170] Allocated by task 226:
[   30.320533]  kasan_save_stack+0x41/0x70
[   30.320949]  kasan_set_track+0x25/0x40
[   30.321240]  kasan_save_alloc_info+0x1e/0x30
[   30.321761]  __kasan_kmalloc+0xb6/0xc0
[   30.322077]  kmalloc_node_trace+0x45/0xb0
[   30.322390]  kmalloc_node_oob_right+0x9d/0x1f0
[   30.322900]  kunit_try_run_case+0x8f/0xd0
[   30.323434]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.324031]  kthread+0x17b/0x1b0
[   30.324403]  ret_from_fork+0x22/0x30
[   30.324575] 
[   30.324662] The buggy address belongs to the object at ffff888103618000
[   30.324662]  which belongs to the cache kmalloc-4k of size 4096
[   30.325104] The buggy address is located 0 bytes to the right of
[   30.325104]  4096-byte region [ffff888103618000, ffff888103619000)
[   30.326323] 
[   30.326528] The buggy address belongs to the physical page:
[   30.327184] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103618
[   30.328210] head:(____ptrval____) order:3 compound_mapcount:0 compound_pincount:0
[   30.329094] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.329914] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100042140
[   30.330764] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   30.331662] page dumped because: kasan: bad access detected
[   30.331928] 
[   30.332015] Memory state around the buggy address:
[   30.332213]  ffff888103618f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.332920]  ffff888103618f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.333706] >ffff888103619000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.334397]                    ^
[   30.334754]  ffff888103619080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.335460]  ffff888103619100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.335903] ==================================================================