Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.868792] ==================================================================
[   16.868839] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.869536] Write of size 1 at addr fff00000c6fb0278 by task kunit_try_catch/144
[   16.869681] 
[   16.869773] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   16.869852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.869922] Hardware name: linux,dummy-virt (DT)
[   16.869979] Call trace:
[   16.870006]  show_stack+0x20/0x38 (C)
[   16.870407]  dump_stack_lvl+0x8c/0xd0
[   16.870515]  print_report+0x118/0x5d0
[   16.870601]  kasan_report+0xdc/0x128
[   16.870646]  __asan_report_store1_noabort+0x20/0x30
[   16.870803]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.870949]  kunit_try_run_case+0x170/0x3f0
[   16.871070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.871355]  kthread+0x328/0x630
[   16.871521]  ret_from_fork+0x10/0x20
[   16.871640] 
[   16.871690] Allocated by task 144:
[   16.871834]  kasan_save_stack+0x3c/0x68
[   16.871901]  kasan_save_track+0x20/0x40
[   16.871974]  kasan_save_alloc_info+0x40/0x58
[   16.872160]  __kasan_kmalloc+0xd4/0xd8
[   16.872303]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.872497]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.872586]  kunit_try_run_case+0x170/0x3f0
[   16.872749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.872848]  kthread+0x328/0x630
[   16.872963]  ret_from_fork+0x10/0x20
[   16.872999] 
[   16.873189] The buggy address belongs to the object at fff00000c6fb0200
[   16.873189]  which belongs to the cache kmalloc-128 of size 128
[   16.873496] The buggy address is located 0 bytes to the right of
[   16.873496]  allocated 120-byte region [fff00000c6fb0200, fff00000c6fb0278)
[   16.873601] 
[   16.873659] The buggy address belongs to the physical page:
[   16.873739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0
[   16.873852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.873963] page_type: f5(slab)
[   16.874448] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.875081] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.875413] page dumped because: kasan: bad access detected
[   16.875466] 
[   16.875502] Memory state around the buggy address:
[   16.875566]  fff00000c6fb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.875650]  fff00000c6fb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.875695] >fff00000c6fb0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.875731]                                                                 ^
[   16.875770]  fff00000c6fb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.875811]  fff00000c6fb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876545] ==================================================================
[   16.860435] ==================================================================
[   16.860490] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.860542] Write of size 1 at addr fff00000c6fb0178 by task kunit_try_catch/144
[   16.861231] 
[   16.861407] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   16.861502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.861529] Hardware name: linux,dummy-virt (DT)
[   16.861624] Call trace:
[   16.861649]  show_stack+0x20/0x38 (C)
[   16.861719]  dump_stack_lvl+0x8c/0xd0
[   16.862344]  print_report+0x118/0x5d0
[   16.862397]  kasan_report+0xdc/0x128
[   16.862492]  __asan_report_store1_noabort+0x20/0x30
[   16.862546]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.862610]  kunit_try_run_case+0x170/0x3f0
[   16.862809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.862992]  kthread+0x328/0x630
[   16.863140]  ret_from_fork+0x10/0x20
[   16.863315] 
[   16.863396] Allocated by task 144:
[   16.863526]  kasan_save_stack+0x3c/0x68
[   16.863569]  kasan_save_track+0x20/0x40
[   16.864016]  kasan_save_alloc_info+0x40/0x58
[   16.864089]  __kasan_kmalloc+0xd4/0xd8
[   16.864274]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.864377]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.864454]  kunit_try_run_case+0x170/0x3f0
[   16.864496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.864553]  kthread+0x328/0x630
[   16.864598]  ret_from_fork+0x10/0x20
[   16.864649] 
[   16.864668] The buggy address belongs to the object at fff00000c6fb0100
[   16.864668]  which belongs to the cache kmalloc-128 of size 128
[   16.864724] The buggy address is located 0 bytes to the right of
[   16.864724]  allocated 120-byte region [fff00000c6fb0100, fff00000c6fb0178)
[   16.864790] 
[   16.864809] The buggy address belongs to the physical page:
[   16.864838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0
[   16.864899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.864946] page_type: f5(slab)
[   16.864990] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.865048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.865086] page dumped because: kasan: bad access detected
[   16.865125] 
[   16.865143] Memory state around the buggy address:
[   16.865172]  fff00000c6fb0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.865213]  fff00000c6fb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.865254] >fff00000c6fb0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.865308]                                                                 ^
[   16.865355]  fff00000c6fb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.865415]  fff00000c6fb0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.865467] ==================================================================

[   10.482507] ==================================================================
[   10.483024] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.483295] Write of size 1 at addr ffff88810306a778 by task kunit_try_catch/162
[   10.484524] 
[   10.484899] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.484951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.484962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.484982] Call Trace:
[   10.484994]  <TASK>
[   10.485009]  dump_stack_lvl+0x73/0xb0
[   10.485033]  print_report+0xd1/0x610
[   10.485055]  ? __virt_addr_valid+0x1db/0x2d0
[   10.485074]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.485094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.485115]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.485136]  kasan_report+0x141/0x180
[   10.485158]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.485183]  __asan_report_store1_noabort+0x1b/0x30
[   10.485203]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   10.485234]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.485255]  ? __schedule+0x10c6/0x2b60
[   10.485278]  ? __pfx_read_tsc+0x10/0x10
[   10.485296]  ? ktime_get_ts64+0x86/0x230
[   10.485320]  kunit_try_run_case+0x1a5/0x480
[   10.485340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.485408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.485428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.485451]  ? __kthread_parkme+0x82/0x180
[   10.485482]  ? preempt_count_sub+0x50/0x80
[   10.485506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.485525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.485547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.485569]  kthread+0x337/0x6f0
[   10.485586]  ? trace_preempt_on+0x20/0xc0
[   10.485608]  ? __pfx_kthread+0x10/0x10
[   10.485625]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.485674]  ? calculate_sigpending+0x7b/0xa0
[   10.485703]  ? __pfx_kthread+0x10/0x10
[   10.485721]  ret_from_fork+0x41/0x80
[   10.485740]  ? __pfx_kthread+0x10/0x10
[   10.485757]  ret_from_fork_asm+0x1a/0x30
[   10.485788]  </TASK>
[   10.485797] 
[   10.498119] Allocated by task 162:
[   10.498317]  kasan_save_stack+0x45/0x70
[   10.498613]  kasan_save_track+0x18/0x40
[   10.498983]  kasan_save_alloc_info+0x3b/0x50
[   10.499265]  __kasan_kmalloc+0xb7/0xc0
[   10.499607]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.499955]  kmalloc_track_caller_oob_right+0x19a/0x520
[   10.500546]  kunit_try_run_case+0x1a5/0x480
[   10.501016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.501338]  kthread+0x337/0x6f0
[   10.501707]  ret_from_fork+0x41/0x80
[   10.502036]  ret_from_fork_asm+0x1a/0x30
[   10.502350] 
[   10.502439] The buggy address belongs to the object at ffff88810306a700
[   10.502439]  which belongs to the cache kmalloc-128 of size 128
[   10.503546] The buggy address is located 0 bytes to the right of
[   10.503546]  allocated 120-byte region [ffff88810306a700, ffff88810306a778)
[   10.504631] 
[   10.504768] The buggy address belongs to the physical page:
[   10.505313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a
[   10.505722] flags: 0x200000000000000(node=0|zone=2)
[   10.506249] page_type: f5(slab)
[   10.506599] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.507000] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.507539] page dumped because: kasan: bad access detected
[   10.508069] 
[   10.508215] Memory state around the buggy address:
[   10.508604]  ffff88810306a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.508993]  ffff88810306a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.509763] >ffff88810306a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.510315]                                                                 ^
[   10.510976]  ffff88810306a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.511627]  ffff88810306a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.511832] ==================================================================
[   10.458052] ==================================================================
[   10.458769] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.459260] Write of size 1 at addr ffff88810306a678 by task kunit_try_catch/162
[   10.460056] 
[   10.460171] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.460216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.460239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.460259] Call Trace:
[   10.460270]  <TASK>
[   10.460286]  dump_stack_lvl+0x73/0xb0
[   10.460311]  print_report+0xd1/0x610
[   10.460333]  ? __virt_addr_valid+0x1db/0x2d0
[   10.460353]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.460408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.460431]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.460452]  kasan_report+0x141/0x180
[   10.460474]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.460500]  __asan_report_store1_noabort+0x1b/0x30
[   10.460520]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   10.460540]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   10.460562]  ? __schedule+0x10c6/0x2b60
[   10.460585]  ? __pfx_read_tsc+0x10/0x10
[   10.460604]  ? ktime_get_ts64+0x86/0x230
[   10.460629]  kunit_try_run_case+0x1a5/0x480
[   10.460649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.460667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.460686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.460709]  ? __kthread_parkme+0x82/0x180
[   10.460730]  ? preempt_count_sub+0x50/0x80
[   10.460767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.460786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.460808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.460830]  kthread+0x337/0x6f0
[   10.460846]  ? trace_preempt_on+0x20/0xc0
[   10.460869]  ? __pfx_kthread+0x10/0x10
[   10.460886]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.460907]  ? calculate_sigpending+0x7b/0xa0
[   10.460932]  ? __pfx_kthread+0x10/0x10
[   10.460950]  ret_from_fork+0x41/0x80
[   10.460969]  ? __pfx_kthread+0x10/0x10
[   10.460986]  ret_from_fork_asm+0x1a/0x30
[   10.461016]  </TASK>
[   10.461026] 
[   10.469109] Allocated by task 162:
[   10.469247]  kasan_save_stack+0x45/0x70
[   10.469394]  kasan_save_track+0x18/0x40
[   10.469530]  kasan_save_alloc_info+0x3b/0x50
[   10.469685]  __kasan_kmalloc+0xb7/0xc0
[   10.470153]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   10.470665]  kmalloc_track_caller_oob_right+0x99/0x520
[   10.471054]  kunit_try_run_case+0x1a5/0x480
[   10.471281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.471808]  kthread+0x337/0x6f0
[   10.471950]  ret_from_fork+0x41/0x80
[   10.472102]  ret_from_fork_asm+0x1a/0x30
[   10.472254] 
[   10.472391] The buggy address belongs to the object at ffff88810306a600
[   10.472391]  which belongs to the cache kmalloc-128 of size 128
[   10.473218] The buggy address is located 0 bytes to the right of
[   10.473218]  allocated 120-byte region [ffff88810306a600, ffff88810306a678)
[   10.474428] 
[   10.474531] The buggy address belongs to the physical page:
[   10.474949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a
[   10.475370] flags: 0x200000000000000(node=0|zone=2)
[   10.475764] page_type: f5(slab)
[   10.475950] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.476326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.476991] page dumped because: kasan: bad access detected
[   10.477324] 
[   10.477428] Memory state around the buggy address:
[   10.478003]  ffff88810306a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.478465]  ffff88810306a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.479020] >ffff88810306a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   10.479403]                                                                 ^
[   10.479869]  ffff88810306a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.480554]  ffff88810306a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.480983] ==================================================================