Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   44.740433] ==================================================================
[   44.751381] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   44.758182] Read of size 1 at addr ffff000096cb00c8 by task kunit_try_catch/293
[   44.765596] 
[   44.767131] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   44.767161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.767170] Hardware name: Thundercomm Dragonboard 845c (DT)
[   44.767184] Call trace:
[   44.767193]  show_stack+0x20/0x38 (C)
[   44.767211]  dump_stack_lvl+0x8c/0xd0
[   44.767231]  print_report+0x118/0x608
[   44.767250]  kasan_report+0xdc/0x128
[   44.767270]  __asan_report_load1_noabort+0x20/0x30
[   44.767288]  kmem_cache_oob+0x344/0x430
[   44.767305]  kunit_try_run_case+0x170/0x3f0
[   44.767325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.767347]  kthread+0x328/0x630
[   44.767362]  ret_from_fork+0x10/0x20
[   44.767383] 
[   44.832730] Allocated by task 293:
[   44.836198]  kasan_save_stack+0x3c/0x68
[   44.840104]  kasan_save_track+0x20/0x40
[   44.844009]  kasan_save_alloc_info+0x40/0x58
[   44.848352]  __kasan_slab_alloc+0xa8/0xb0
[   44.852430]  kmem_cache_alloc_noprof+0x10c/0x398
[   44.857125]  kmem_cache_oob+0x12c/0x430
[   44.861029]  kunit_try_run_case+0x170/0x3f0
[   44.865289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.870859]  kthread+0x328/0x630
[   44.874145]  ret_from_fork+0x10/0x20
[   44.877789] 
[   44.879321] The buggy address belongs to the object at ffff000096cb0000
[   44.879321]  which belongs to the cache test_cache of size 200
[   44.891896] The buggy address is located 0 bytes to the right of
[   44.891896]  allocated 200-byte region [ffff000096cb0000, ffff000096cb00c8)
[   44.905001] 
[   44.906531] The buggy address belongs to the physical page:
[   44.912175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116cb0
[   44.920280] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.928041] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.935100] page_type: f5(slab)
[   44.938300] raw: 0bfffe0000000040 ffff000096cae000 dead000000000122 0000000000000000
[   44.946149] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.953995] head: 0bfffe0000000040 ffff000096cae000 dead000000000122 0000000000000000
[   44.961928] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   44.969862] head: 0bfffe0000000001 fffffdffc25b2c01 00000000ffffffff 00000000ffffffff
[   44.977794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.985722] page dumped because: kasan: bad access detected
[   44.991366] 
[   44.992896] Memory state around the buggy address:
[   44.997756]  ffff000096caff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.005070]  ffff000096cb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.012385] >ffff000096cb0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   45.019698]                                               ^
[   45.025345]  ffff000096cb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.032659]  ffff000096cb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.039973] ==================================================================

[   27.506313] ==================================================================
[   27.506387] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   27.506452] Read of size 1 at addr fff00000c57620c8 by task kunit_try_catch/219
[   27.506502] 
[   27.506541] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   27.506808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.506845] Hardware name: linux,dummy-virt (DT)
[   27.506879] Call trace:
[   27.506930]  show_stack+0x20/0x38 (C)
[   27.507024]  dump_stack_lvl+0x8c/0xd0
[   27.507088]  print_report+0x118/0x608
[   27.507145]  kasan_report+0xdc/0x128
[   27.507192]  __asan_report_load1_noabort+0x20/0x30
[   27.507261]  kmem_cache_oob+0x344/0x430
[   27.507336]  kunit_try_run_case+0x170/0x3f0
[   27.507433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.507517]  kthread+0x328/0x630
[   27.507562]  ret_from_fork+0x10/0x20
[   27.507630] 
[   27.507649] Allocated by task 219:
[   27.507706]  kasan_save_stack+0x3c/0x68
[   27.507786]  kasan_save_track+0x20/0x40
[   27.507882]  kasan_save_alloc_info+0x40/0x58
[   27.507937]  __kasan_slab_alloc+0xa8/0xb0
[   27.507975]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.508186]  kmem_cache_oob+0x12c/0x430
[   27.508329]  kunit_try_run_case+0x170/0x3f0
[   27.508372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.508416]  kthread+0x328/0x630
[   27.508474]  ret_from_fork+0x10/0x20
[   27.508511] 
[   27.508530] The buggy address belongs to the object at fff00000c5762000
[   27.508530]  which belongs to the cache test_cache of size 200
[   27.508587] The buggy address is located 0 bytes to the right of
[   27.508587]  allocated 200-byte region [fff00000c5762000, fff00000c57620c8)
[   27.508650] 
[   27.508669] The buggy address belongs to the physical page:
[   27.508702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105762
[   27.508768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.508819] page_type: f5(slab)
[   27.508859] raw: 0bfffe0000000000 fff00000c56d4280 dead000000000122 0000000000000000
[   27.508919] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.508960] page dumped because: kasan: bad access detected
[   27.509006] 
[   27.509024] Memory state around the buggy address:
[   27.509070]  fff00000c5761f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509112]  fff00000c5762000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.509293] >fff00000c5762080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   27.509526]                                               ^
[   27.509607]  fff00000c5762100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509712]  fff00000c5762180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509830] ==================================================================

[   22.761758] ==================================================================
[   22.763119] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   22.764117] Read of size 1 at addr ffff8881024dc0c8 by task kunit_try_catch/236
[   22.764743] 
[   22.765076] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   22.765142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.765156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.765180] Call Trace:
[   22.765199]  <TASK>
[   22.765231]  dump_stack_lvl+0x73/0xb0
[   22.765269]  print_report+0xd1/0x650
[   22.765292]  ? __virt_addr_valid+0x1db/0x2d0
[   22.765318]  ? kmem_cache_oob+0x402/0x530
[   22.765340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.765364]  ? kmem_cache_oob+0x402/0x530
[   22.765386]  kasan_report+0x141/0x180
[   22.765407]  ? kmem_cache_oob+0x402/0x530
[   22.765432]  __asan_report_load1_noabort+0x18/0x20
[   22.765456]  kmem_cache_oob+0x402/0x530
[   22.765476]  ? trace_hardirqs_on+0x37/0xe0
[   22.765499]  ? __pfx_kmem_cache_oob+0x10/0x10
[   22.765520]  ? finish_task_switch.isra.0+0x153/0x700
[   22.765542]  ? __switch_to+0x47/0xf50
[   22.765572]  ? __pfx_read_tsc+0x10/0x10
[   22.765593]  ? ktime_get_ts64+0x86/0x230
[   22.765618]  kunit_try_run_case+0x1a5/0x480
[   22.765645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.765666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.765692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.765716]  ? __kthread_parkme+0x82/0x180
[   22.765736]  ? preempt_count_sub+0x50/0x80
[   22.765758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.765885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.765931]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.765954]  kthread+0x337/0x6f0
[   22.765987]  ? trace_preempt_on+0x20/0xc0
[   22.766010]  ? __pfx_kthread+0x10/0x10
[   22.766068]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.766093]  ? calculate_sigpending+0x7b/0xa0
[   22.766118]  ? __pfx_kthread+0x10/0x10
[   22.766138]  ret_from_fork+0x116/0x1d0
[   22.766157]  ? __pfx_kthread+0x10/0x10
[   22.766177]  ret_from_fork_asm+0x1a/0x30
[   22.766209]  </TASK>
[   22.766231] 
[   22.782595] Allocated by task 236:
[   22.782764]  kasan_save_stack+0x45/0x70
[   22.782937]  kasan_save_track+0x18/0x40
[   22.783188]  kasan_save_alloc_info+0x3b/0x50
[   22.783411]  __kasan_slab_alloc+0x91/0xa0
[   22.783579]  kmem_cache_alloc_noprof+0x123/0x3f0
[   22.783858]  kmem_cache_oob+0x157/0x530
[   22.784095]  kunit_try_run_case+0x1a5/0x480
[   22.784261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.784443]  kthread+0x337/0x6f0
[   22.784606]  ret_from_fork+0x116/0x1d0
[   22.784786]  ret_from_fork_asm+0x1a/0x30
[   22.785077] 
[   22.785153] The buggy address belongs to the object at ffff8881024dc000
[   22.785153]  which belongs to the cache test_cache of size 200
[   22.785750] The buggy address is located 0 bytes to the right of
[   22.785750]  allocated 200-byte region [ffff8881024dc000, ffff8881024dc0c8)
[   22.786379] 
[   22.786458] The buggy address belongs to the physical page:
[   22.786729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024dc
[   22.787486] flags: 0x200000000000000(node=0|zone=2)
[   22.787745] page_type: f5(slab)
[   22.787969] raw: 0200000000000000 ffff888101106280 dead000000000122 0000000000000000
[   22.788296] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   22.788521] page dumped because: kasan: bad access detected
[   22.788769] 
[   22.788916] Memory state around the buggy address:
[   22.789320]  ffff8881024dbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.789627]  ffff8881024dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.789943] >ffff8881024dc080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   22.790319]                                               ^
[   22.790569]  ffff8881024dc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.790944]  ffff8881024dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.791316] ==================================================================