Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   20.444211] ==================================================================
[   20.453842] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.461911] Write of size 1 at addr ffff000801ed6278 by task kunit_try_catch/191
[   20.469289] 
[   20.470775] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.470829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.470846] Hardware name: WinLink E850-96 board (DT)
[   20.470866] Call trace:
[   20.470879]  show_stack+0x20/0x38 (C)
[   20.470915]  dump_stack_lvl+0x8c/0xd0
[   20.470953]  print_report+0x118/0x608
[   20.470985]  kasan_report+0xdc/0x128
[   20.471016]  __asan_report_store1_noabort+0x20/0x30
[   20.471053]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.471085]  kunit_try_run_case+0x170/0x3f0
[   20.471123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.471160]  kthread+0x328/0x630
[   20.471196]  ret_from_fork+0x10/0x20
[   20.471231] 
[   20.534741] Allocated by task 191:
[   20.538127]  kasan_save_stack+0x3c/0x68
[   20.541944]  kasan_save_track+0x20/0x40
[   20.545764]  kasan_save_alloc_info+0x40/0x58
[   20.550017]  __kasan_kmalloc+0xd4/0xd8
[   20.553750]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   20.559305]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.564426]  kunit_try_run_case+0x170/0x3f0
[   20.568593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574062]  kthread+0x328/0x630
[   20.577273]  ret_from_fork+0x10/0x20
[   20.580833] 
[   20.582309] The buggy address belongs to the object at ffff000801ed6200
[   20.582309]  which belongs to the cache kmalloc-128 of size 128
[   20.594811] The buggy address is located 0 bytes to the right of
[   20.594811]  allocated 120-byte region [ffff000801ed6200, ffff000801ed6278)
[   20.607742] 
[   20.609222] The buggy address belongs to the physical page:
[   20.614777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   20.622762] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.630400] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.637343] page_type: f5(slab)
[   20.640482] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.648199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.655927] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.663737] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.671550] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   20.679362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.687167] page dumped because: kasan: bad access detected
[   20.692723] 
[   20.694198] Memory state around the buggy address:
[   20.698979]  ffff000801ed6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.706182]  ffff000801ed6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.713387] >ffff000801ed6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.720587]                                                                 ^
[   20.727709]  ffff000801ed6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.734914]  ffff000801ed6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.742116] ==================================================================

[   17.648813] ==================================================================
[   17.648885] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.648938] Write of size 1 at addr fff00000c5bdc678 by task kunit_try_catch/144
[   17.649039] 
[   17.649069] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.649164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.649213] Hardware name: linux,dummy-virt (DT)
[   17.649245] Call trace:
[   17.649266]  show_stack+0x20/0x38 (C)
[   17.649316]  dump_stack_lvl+0x8c/0xd0
[   17.649362]  print_report+0x118/0x608
[   17.649416]  kasan_report+0xdc/0x128
[   17.649460]  __asan_report_store1_noabort+0x20/0x30
[   17.649517]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.649567]  kunit_try_run_case+0x170/0x3f0
[   17.649615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.649668]  kthread+0x328/0x630
[   17.649713]  ret_from_fork+0x10/0x20
[   17.649764] 
[   17.649781] Allocated by task 144:
[   17.649808]  kasan_save_stack+0x3c/0x68
[   17.649846]  kasan_save_track+0x20/0x40
[   17.650107]  kasan_save_alloc_info+0x40/0x58
[   17.650353]  __kasan_kmalloc+0xd4/0xd8
[   17.650430]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.650483]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.650568]  kunit_try_run_case+0x170/0x3f0
[   17.650645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.650690]  kthread+0x328/0x630
[   17.650941]  ret_from_fork+0x10/0x20
[   17.651002] 
[   17.651034] The buggy address belongs to the object at fff00000c5bdc600
[   17.651034]  which belongs to the cache kmalloc-128 of size 128
[   17.651129] The buggy address is located 0 bytes to the right of
[   17.651129]  allocated 120-byte region [fff00000c5bdc600, fff00000c5bdc678)
[   17.651200] 
[   17.651219] The buggy address belongs to the physical page:
[   17.651373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.651461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.651582] page_type: f5(slab)
[   17.651653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.651707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.651793] page dumped because: kasan: bad access detected
[   17.651879] 
[   17.652004] Memory state around the buggy address:
[   17.652039]  fff00000c5bdc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.652085]  fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.652136] >fff00000c5bdc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.652175]                                                                 ^
[   17.652214]  fff00000c5bdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.652257]  fff00000c5bdc700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.652422] ==================================================================

[   10.299077] ==================================================================
[   10.299585] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.300233] Write of size 1 at addr ffff888102f60478 by task kunit_try_catch/161
[   10.300604] 
[   10.300702] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.300775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.300787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.300820] Call Trace:
[   10.300834]  <TASK>
[   10.300853]  dump_stack_lvl+0x73/0xb0
[   10.300996]  print_report+0xd1/0x650
[   10.301025]  ? __virt_addr_valid+0x1db/0x2d0
[   10.301049]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.301070]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.301092]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.301112]  kasan_report+0x141/0x180
[   10.301134]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.301159]  __asan_report_store1_noabort+0x1b/0x30
[   10.301180]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.301201]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.301249]  ? __schedule+0x10cc/0x2b60
[   10.301275]  ? __pfx_read_tsc+0x10/0x10
[   10.301309]  ? ktime_get_ts64+0x86/0x230
[   10.301336]  kunit_try_run_case+0x1a5/0x480
[   10.301362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.301384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.301408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.301431]  ? __kthread_parkme+0x82/0x180
[   10.301453]  ? preempt_count_sub+0x50/0x80
[   10.301480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.301503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.301525]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.301547]  kthread+0x337/0x6f0
[   10.301564]  ? trace_preempt_on+0x20/0xc0
[   10.301588]  ? __pfx_kthread+0x10/0x10
[   10.301606]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.301626]  ? calculate_sigpending+0x7b/0xa0
[   10.301648]  ? __pfx_kthread+0x10/0x10
[   10.301665]  ret_from_fork+0x41/0x80
[   10.301685]  ? __pfx_kthread+0x10/0x10
[   10.301702]  ret_from_fork_asm+0x1a/0x30
[   10.301775]  </TASK>
[   10.301788] 
[   10.310267] Allocated by task 161:
[   10.310441]  kasan_save_stack+0x45/0x70
[   10.310669]  kasan_save_track+0x18/0x40
[   10.310871]  kasan_save_alloc_info+0x3b/0x50
[   10.311124]  __kasan_kmalloc+0xb7/0xc0
[   10.311442]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.311947]  kmalloc_track_caller_oob_right+0x99/0x520
[   10.312185]  kunit_try_run_case+0x1a5/0x480
[   10.312393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.312677]  kthread+0x337/0x6f0
[   10.312963]  ret_from_fork+0x41/0x80
[   10.313138]  ret_from_fork_asm+0x1a/0x30
[   10.313339] 
[   10.313423] The buggy address belongs to the object at ffff888102f60400
[   10.313423]  which belongs to the cache kmalloc-128 of size 128
[   10.314123] The buggy address is located 0 bytes to the right of
[   10.314123]  allocated 120-byte region [ffff888102f60400, ffff888102f60478)
[   10.314518] 
[   10.314629] The buggy address belongs to the physical page:
[   10.314943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   10.315253] flags: 0x200000000000000(node=0|zone=2)
[   10.315420] page_type: f5(slab)
[   10.315581] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.315930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.316266] page dumped because: kasan: bad access detected
[   10.316495] 
[   10.316813] Memory state around the buggy address:
[   10.317016]  ffff888102f60300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.317324]  ffff888102f60380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.317656] >ffff888102f60400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.318102]                                                                 ^
[   10.318415]  ffff888102f60480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.318773]  ffff888102f60500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.319102] ==================================================================
[   10.319825] ==================================================================
[   10.320175] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.320545] Write of size 1 at addr ffff888102f60578 by task kunit_try_catch/161
[   10.320902] 
[   10.321222] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.321287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.321344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.321366] Call Trace:
[   10.321379]  <TASK>
[   10.321395]  dump_stack_lvl+0x73/0xb0
[   10.321431]  print_report+0xd1/0x650
[   10.321455]  ? __virt_addr_valid+0x1db/0x2d0
[   10.321476]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.321509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.321531]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.321552]  kasan_report+0x141/0x180
[   10.321584]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.321610]  __asan_report_store1_noabort+0x1b/0x30
[   10.321630]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.321651]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.321673]  ? __schedule+0x10cc/0x2b60
[   10.321695]  ? __pfx_read_tsc+0x10/0x10
[   10.321773]  ? ktime_get_ts64+0x86/0x230
[   10.321801]  kunit_try_run_case+0x1a5/0x480
[   10.321827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.321860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.321883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.321906]  ? __kthread_parkme+0x82/0x180
[   10.321945]  ? preempt_count_sub+0x50/0x80
[   10.321970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.321992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.322014]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.322045]  kthread+0x337/0x6f0
[   10.322061]  ? trace_preempt_on+0x20/0xc0
[   10.322085]  ? __pfx_kthread+0x10/0x10
[   10.322112]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.322133]  ? calculate_sigpending+0x7b/0xa0
[   10.322155]  ? __pfx_kthread+0x10/0x10
[   10.322172]  ret_from_fork+0x41/0x80
[   10.322192]  ? __pfx_kthread+0x10/0x10
[   10.322209]  ret_from_fork_asm+0x1a/0x30
[   10.322239]  </TASK>
[   10.322249] 
[   10.330581] Allocated by task 161:
[   10.330771]  kasan_save_stack+0x45/0x70
[   10.330975]  kasan_save_track+0x18/0x40
[   10.331113]  kasan_save_alloc_info+0x3b/0x50
[   10.331256]  __kasan_kmalloc+0xb7/0xc0
[   10.331388]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.331717]  kmalloc_track_caller_oob_right+0x19a/0x520
[   10.331976]  kunit_try_run_case+0x1a5/0x480
[   10.332344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.332518]  kthread+0x337/0x6f0
[   10.332652]  ret_from_fork+0x41/0x80
[   10.333215]  ret_from_fork_asm+0x1a/0x30
[   10.333453] 
[   10.333562] The buggy address belongs to the object at ffff888102f60500
[   10.333562]  which belongs to the cache kmalloc-128 of size 128
[   10.334912] The buggy address is located 0 bytes to the right of
[   10.334912]  allocated 120-byte region [ffff888102f60500, ffff888102f60578)
[   10.336042] 
[   10.336151] The buggy address belongs to the physical page:
[   10.336525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   10.337290] flags: 0x200000000000000(node=0|zone=2)
[   10.337688] page_type: f5(slab)
[   10.337959] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.338379] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.338880] page dumped because: kasan: bad access detected
[   10.339222] 
[   10.339325] Memory state around the buggy address:
[   10.339697]  ffff888102f60400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.340037]  ffff888102f60480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.340472] >ffff888102f60500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.341235]                                                                 ^
[   10.341535]  ffff888102f60580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.342036]  ffff888102f60600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.342364] ==================================================================