Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  104.895961] ==================================================================
[  104.897245] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xac/0x1e0
[  104.898056] Write of size 1 at addr ffff0000c67c200a by task kunit_try_catch/207
[  104.898669] 
[  104.898930] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  104.899736] Hardware name: linux,dummy-virt (DT)
[  104.900211] Call trace:
[  104.900641]  dump_backtrace+0xe0/0x134
[  104.901083]  show_stack+0x20/0x2c
[  104.901503]  dump_stack_lvl+0x88/0xb4
[  104.901953]  print_report+0x158/0x44c
[  104.902329]  kasan_report+0xc8/0x180
[  104.902870]  __asan_store1+0x68/0x7c
[  104.903336]  kmalloc_pagealloc_oob_right+0xac/0x1e0
[  104.903906]  kunit_try_run_case+0x8c/0x124
[  104.904611]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  104.905208]  kthread+0x15c/0x170
[  104.905660]  ret_from_fork+0x10/0x20
[  104.906105] 
[  104.906329] The buggy address belongs to the physical page:
[  104.906935] page:00000000c0b1eb2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067c0
[  104.907685] head:00000000c0b1eb2b order:2 compound_mapcount:0 compound_pincount:0
[  104.908338] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  104.909212] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  104.909929] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  104.910567] page dumped because: kasan: bad access detected
[  104.911074] 
[  104.911289] Memory state around the buggy address:
[  104.911734]  ffff0000c67c1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  104.912385]  ffff0000c67c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  104.913050] >ffff0000c67c2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  104.914228]                       ^
[  104.914626]  ffff0000c67c2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  104.915275]  ffff0000c67c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  104.916100] ==================================================================

[   74.689959] ==================================================================
[   74.690710] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130
[   74.691885] Write of size 1 at addr ffff0000c5a2600a by task kunit_try_catch/123
[   74.693071] 
[   74.693436] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.694594] Hardware name: linux,dummy-virt (DT)
[   74.695330] Call trace:
[   74.695752]  dump_backtrace+0xf8/0x118
[   74.696398]  show_stack+0x18/0x24
[   74.697064]  __dump_stack+0x28/0x38
[   74.697689]  dump_stack_lvl+0x54/0x6c
[   74.698338]  print_address_description+0x7c/0x1ec
[   74.699113]  print_report+0x50/0x68
[   74.699717]  kasan_report+0xac/0x100
[   74.700286]  __asan_store1+0x6c/0x70
[   74.700736]  kmalloc_pagealloc_oob_right+0x84/0x130
[   74.701674]  kunit_try_run_case+0x80/0x184
[   74.702130]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.702632]  kthread+0x16c/0x21c
[   74.703211]  ret_from_fork+0x10/0x20
[   74.703799] 
[   74.704071] The buggy address belongs to the physical page:
[   74.704895] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   74.706034] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   74.706953] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.707894] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.708919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.709955] page dumped because: kasan: bad access detected
[   74.710578] 
[   74.710770] Memory state around the buggy address:
[   74.711125]  ffff0000c5a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.711613]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.712155] >ffff0000c5a26000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.712781]                       ^
[   74.713215]  ffff0000c5a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.713997]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.714688] ==================================================================

[   73.677896] ==================================================================
[   73.678825] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130
[   73.679561] Write of size 1 at addr ffff0000c59d600a by task kunit_try_catch/123
[   73.680450] 
[   73.680732] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.681551] Hardware name: linux,dummy-virt (DT)
[   73.682016] Call trace:
[   73.682322]  dump_backtrace+0xf4/0x114
[   73.682827]  show_stack+0x18/0x24
[   73.683272]  __dump_stack+0x28/0x38
[   73.683756]  dump_stack_lvl+0x50/0x68
[   73.684383]  print_address_description+0x7c/0x1ec
[   73.684972]  print_report+0x50/0x68
[   73.685445]  kasan_report+0xac/0xfc
[   73.685913]  __asan_store1+0x6c/0x70
[   73.686380]  kmalloc_pagealloc_oob_right+0x84/0x130
[   73.686921]  kunit_try_run_case+0x80/0x184
[   73.687402]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.688194]  kthread+0x16c/0x21c
[   73.688638]  ret_from_fork+0x10/0x20
[   73.689121] 
[   73.689344] The buggy address belongs to the physical page:
[   73.689931] page:000000008cac2150 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d4
[   73.690703] head:000000008cac2150 order:2 compound_mapcount:0 compound_pincount:0
[   73.691368] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   73.692296] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   73.692986] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   73.693651] page dumped because: kasan: bad access detected
[   73.694170] 
[   73.694386] Memory state around the buggy address:
[   73.694866]  ffff0000c59d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.695564]  ffff0000c59d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.696370] >ffff0000c59d6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   73.697011]                       ^
[   73.697415]  ffff0000c59d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   73.698078]  ffff0000c59d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   73.698692] ==================================================================

[   72.310417] ==================================================================
[   72.311291] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xa4/0x1e0
[   72.312080] Write of size 1 at addr ffff0000c5a3200a by task kunit_try_catch/123
[   72.312622] 
[   72.312837] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.313508] Hardware name: linux,dummy-virt (DT)
[   72.313893] Call trace:
[   72.314962]  dump_backtrace.part.0+0xdc/0xf0
[   72.315494]  show_stack+0x18/0x30
[   72.315919]  dump_stack_lvl+0x64/0x80
[   72.316332]  print_report+0x158/0x438
[   72.316800]  kasan_report+0xb4/0xf4
[   72.317185]  __asan_store1+0x68/0x7c
[   72.317599]  kmalloc_pagealloc_oob_right+0xa4/0x1e0
[   72.318114]  kunit_try_run_case+0x84/0x120
[   72.318592]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.319307]  kthread+0x180/0x190
[   72.319769]  ret_from_fork+0x10/0x20
[   72.320219] 
[   72.320457] The buggy address belongs to the physical page:
[   72.320978] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30
[   72.321740] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0
[   72.322372] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.322996] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.323821] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.324434] page dumped because: kasan: bad access detected
[   72.324930] 
[   72.325119] Memory state around the buggy address:
[   72.325583]  ffff0000c5a31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.326326]  ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.326968] >ffff0000c5a32000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.327564]                       ^
[   72.327935]  ffff0000c5a32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.328573]  ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.329165] ==================================================================

[   64.007779] ==================================================================
[   64.009095] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xc4/0x1d8
[   64.009818] Write of size 1 at addr ffff0000c595e00a by task kunit_try_catch/121
[   64.010276] 
[   64.010451] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.010936] Hardware name: linux,dummy-virt (DT)
[   64.011253] Call trace:
[   64.011609]  dump_backtrace+0x110/0x120
[   64.012249]  show_stack+0x18/0x28
[   64.012939]  dump_stack_lvl+0x68/0x84
[   64.013575]  print_report+0x158/0x484
[   64.014145]  kasan_report+0x98/0xe0
[   64.014806]  __asan_store1+0x68/0x78
[   64.015374]  kmalloc_pagealloc_oob_right+0xc4/0x1d8
[   64.016069]  kunit_try_run_case+0x7c/0x120
[   64.016704]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.017477]  kthread+0x1a4/0x1b8
[   64.018186]  ret_from_fork+0x10/0x20
[   64.018849] 
[   64.019112] The buggy address belongs to the physical page:
[   64.019945] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.021014] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.022014] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.023093] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.024025] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.024687] page dumped because: kasan: bad access detected
[   64.025018] 
[   64.025172] Memory state around the buggy address:
[   64.025775]  ffff0000c595df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.026249]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.026786] >ffff0000c595e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.027243]                       ^
[   64.027643]  ffff0000c595e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.028218]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.028775] ==================================================================

[   30.339752] ==================================================================
[   30.340376] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xad/0x1c0
[   30.340804] Write of size 1 at addr ffff8881036be00a by task kunit_try_catch/227
[   30.341154] 
[   30.341655] CPU: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.342325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.342969] Call Trace:
[   30.343132]  <TASK>
[   30.343613]  dump_stack_lvl+0x49/0x62
[   30.343862]  print_report+0x189/0x492
[   30.344224]  ? kasan_addr_to_slab+0xd/0xb0
[   30.344665]  ? kmalloc_pagealloc_oob_right+0xad/0x1c0
[   30.345082]  kasan_report+0x10c/0x190
[   30.345508]  ? kasan_poison+0x55/0x70
[   30.345881]  ? kmalloc_pagealloc_oob_right+0xad/0x1c0
[   30.346362]  __asan_store1+0x65/0x70
[   30.346761]  kmalloc_pagealloc_oob_right+0xad/0x1c0
[   30.347025]  ? kmalloc_pagealloc_uaf+0x1a0/0x1a0
[   30.347290]  ? kmalloc_pagealloc_uaf+0x1a0/0x1a0
[   30.347795]  ? kunit_try_run_case+0x84/0xd0
[   30.348206]  ? __kunit_add_resource+0xd1/0x100
[   30.348633]  kunit_try_run_case+0x8f/0xd0
[   30.349054]  ? kunit_catch_run_case+0x80/0x80
[   30.349521]  ? kunit_try_catch_throw+0x40/0x40
[   30.349935]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.350549]  kthread+0x17b/0x1b0
[   30.350957]  ? kthread_complete_and_exit+0x30/0x30
[   30.351419]  ret_from_fork+0x22/0x30
[   30.351922]  </TASK>
[   30.352068] 
[   30.352173] The buggy address belongs to the physical page:
[   30.352761] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036bc
[   30.353294] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.353785] flags: 0x200000000010000(head|node=0|zone=2)
[   30.354116] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.354643] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.355028] page dumped because: kasan: bad access detected
[   30.355303] 
[   30.355575] Memory state around the buggy address:
[   30.355820]  ffff8881036bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.356185]  ffff8881036bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.356675] >ffff8881036be000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.357045]                       ^
[   30.357264]  ffff8881036be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.357643]  ffff8881036be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.358091] ==================================================================