Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.873264] ==================================================================
[   17.873880] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   17.874767] Write of size 1 at addr fff00000c59c2578 by task kunit_try_catch/131
[   17.875611] 
[   17.876506] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.876724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.876795] Hardware name: linux,dummy-virt (DT)
[   17.876840] Call trace:
[   17.876868]  show_stack+0x20/0x38 (C)
[   17.876934]  dump_stack_lvl+0x8c/0xd0
[   17.876985]  print_report+0x118/0x608
[   17.877034]  kasan_report+0xdc/0x128
[   17.877081]  __asan_report_store1_noabort+0x20/0x30
[   17.877130]  kmalloc_track_caller_oob_right+0x414/0x490
[   17.877181]  kunit_try_run_case+0x170/0x3f0
[   17.877233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.877283]  kthread+0x318/0x620
[   17.877328]  ret_from_fork+0x10/0x20
[   17.877378] 
[   17.882366] Allocated by task 131:
[   17.883022]  kasan_save_stack+0x3c/0x68
[   17.884447]  kasan_save_track+0x20/0x40
[   17.884762]  kasan_save_alloc_info+0x40/0x58
[   17.885110]  __kasan_kmalloc+0xd4/0xd8
[   17.885553]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.885995]  kmalloc_track_caller_oob_right+0xa8/0x490
[   17.886625]  kunit_try_run_case+0x170/0x3f0
[   17.887424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.887902]  kthread+0x318/0x620
[   17.888339]  ret_from_fork+0x10/0x20
[   17.888695] 
[   17.888980] The buggy address belongs to the object at fff00000c59c2500
[   17.888980]  which belongs to the cache kmalloc-128 of size 128
[   17.889855] The buggy address is located 0 bytes to the right of
[   17.889855]  allocated 120-byte region [fff00000c59c2500, fff00000c59c2578)
[   17.891557] 
[   17.891867] The buggy address belongs to the physical page:
[   17.892321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   17.893006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.893610] page_type: f5(slab)
[   17.893957] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.894957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895484] page dumped because: kasan: bad access detected
[   17.895970] 
[   17.896261] Memory state around the buggy address:
[   17.896775]  fff00000c59c2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.897314]  fff00000c59c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.898020] >fff00000c59c2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.898777]                                                                 ^
[   17.899214]  fff00000c59c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.899542]  fff00000c59c2600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.899867] ==================================================================
[   17.902176] ==================================================================
[   17.902633] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   17.903914] Write of size 1 at addr fff00000c59c2678 by task kunit_try_catch/131
[   17.904844] 
[   17.905408] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.905604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.905669] Hardware name: linux,dummy-virt (DT)
[   17.905756] Call trace:
[   17.905797]  show_stack+0x20/0x38 (C)
[   17.905869]  dump_stack_lvl+0x8c/0xd0
[   17.905945]  print_report+0x118/0x608
[   17.906005]  kasan_report+0xdc/0x128
[   17.906064]  __asan_report_store1_noabort+0x20/0x30
[   17.906125]  kmalloc_track_caller_oob_right+0x420/0x490
[   17.906184]  kunit_try_run_case+0x170/0x3f0
[   17.906239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.906294]  kthread+0x318/0x620
[   17.906344]  ret_from_fork+0x10/0x20
[   17.906399] 
[   17.912783] Allocated by task 131:
[   17.913120]  kasan_save_stack+0x3c/0x68
[   17.913713]  kasan_save_track+0x20/0x40
[   17.914289]  kasan_save_alloc_info+0x40/0x58
[   17.914816]  __kasan_kmalloc+0xd4/0xd8
[   17.915351]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.915823]  kmalloc_track_caller_oob_right+0x184/0x490
[   17.916236]  kunit_try_run_case+0x170/0x3f0
[   17.916578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.916979]  kthread+0x318/0x620
[   17.917267]  ret_from_fork+0x10/0x20
[   17.917578] 
[   17.918450] The buggy address belongs to the object at fff00000c59c2600
[   17.918450]  which belongs to the cache kmalloc-128 of size 128
[   17.919252] The buggy address is located 0 bytes to the right of
[   17.919252]  allocated 120-byte region [fff00000c59c2600, fff00000c59c2678)
[   17.920061] 
[   17.920354] The buggy address belongs to the physical page:
[   17.920814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   17.921505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.922141] page_type: f5(slab)
[   17.922680] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.923482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.924229] page dumped because: kasan: bad access detected
[   17.924878] 
[   17.925288] Memory state around the buggy address:
[   17.925720]  fff00000c59c2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.926778]  fff00000c59c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927198] >fff00000c59c2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.927559]                                                                 ^
[   17.927938]  fff00000c59c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.928328]  fff00000c59c2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.929277] ==================================================================

[   11.775736] ==================================================================
[   11.777701] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530
[   11.778605] Write of size 1 at addr ffff888102ac8c78 by task kunit_try_catch/150
[   11.778999] 
[   11.779295] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   11.779347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.779359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.779392] Call Trace:
[   11.779406]  <TASK>
[   11.779427]  dump_stack_lvl+0x73/0xb0
[   11.779474]  print_report+0xd1/0x650
[   11.779496]  ? __virt_addr_valid+0x1db/0x2d0
[   11.779520]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   11.779544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.779568]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   11.779591]  kasan_report+0x140/0x180
[   11.779611]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   11.779639]  __asan_report_store1_noabort+0x1b/0x30
[   11.779661]  kmalloc_track_caller_oob_right+0x4ca/0x530
[   11.779684]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.779708]  ? __schedule+0xce8/0x2840
[   11.779734]  ? __pfx_read_tsc+0x10/0x10
[   11.779757]  ? ktime_get_ts64+0x86/0x230
[   11.779783]  kunit_try_run_case+0x1a6/0x480
[   11.779808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.779828]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.779860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.779884]  ? __kthread_parkme+0x82/0x160
[   11.779907]  ? preempt_count_sub+0x50/0x80
[   11.779932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.779953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.779978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.780217]  kthread+0x324/0x6e0
[   11.780252]  ? trace_preempt_on+0x20/0xc0
[   11.780278]  ? __pfx_kthread+0x10/0x10
[   11.780299]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.780323]  ? calculate_sigpending+0x7b/0xa0
[   11.780344]  ? __pfx_kthread+0x10/0x10
[   11.780366]  ret_from_fork+0x41/0x80
[   11.780385]  ? __pfx_kthread+0x10/0x10
[   11.780406]  ret_from_fork_asm+0x1a/0x30
[   11.780438]  </TASK>
[   11.780450] 
[   11.793221] Allocated by task 150:
[   11.794178]  kasan_save_stack+0x45/0x70
[   11.794689]  kasan_save_track+0x18/0x40
[   11.795241]  kasan_save_alloc_info+0x3b/0x50
[   11.795754]  __kasan_kmalloc+0xb7/0xc0
[   11.796406]  __kmalloc_node_track_caller_noprof+0x1cc/0x510
[   11.796953]  kmalloc_track_caller_oob_right+0x9a/0x530
[   11.797828]  kunit_try_run_case+0x1a6/0x480
[   11.798252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.798734]  kthread+0x324/0x6e0
[   11.798882]  ret_from_fork+0x41/0x80
[   11.799066]  ret_from_fork_asm+0x1a/0x30
[   11.799711] 
[   11.799981] The buggy address belongs to the object at ffff888102ac8c00
[   11.799981]  which belongs to the cache kmalloc-128 of size 128
[   11.801517] The buggy address is located 0 bytes to the right of
[   11.801517]  allocated 120-byte region [ffff888102ac8c00, ffff888102ac8c78)
[   11.802256] 
[   11.802545] The buggy address belongs to the physical page:
[   11.803211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac8
[   11.804169] flags: 0x200000000000000(node=0|zone=2)
[   11.804386] page_type: f5(slab)
[   11.804516] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.804747] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.804986] page dumped because: kasan: bad access detected
[   11.805503] 
[   11.805602] Memory state around the buggy address:
[   11.805770]  ffff888102ac8b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.805997]  ffff888102ac8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.806751] >ffff888102ac8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.807473]                                                                 ^
[   11.808096]  ffff888102ac8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.808574]  ffff888102ac8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.809517] ==================================================================