Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   49.116859] ==================================================================
[   49.126352] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   49.133028] Read of size 1 at addr ffff0008019be0c8 by task kunit_try_catch/291
[   49.140320] 
[   49.141807] CPU: 3 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   49.141864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.141884] Hardware name: WinLink E850-96 board (DT)
[   49.141907] Call trace:
[   49.141920]  show_stack+0x20/0x38 (C)
[   49.141957]  dump_stack_lvl+0x8c/0xd0
[   49.141990]  print_report+0x118/0x5d0
[   49.142019]  kasan_report+0xdc/0x128
[   49.142046]  __asan_report_load1_noabort+0x20/0x30
[   49.142080]  kmem_cache_oob+0x344/0x430
[   49.142114]  kunit_try_run_case+0x170/0x3f0
[   49.142150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.142184]  kthread+0x328/0x630
[   49.142218]  ret_from_fork+0x10/0x20
[   49.142253] 
[   49.205508] Allocated by task 291:
[   49.208897]  kasan_save_stack+0x3c/0x68
[   49.212713]  kasan_save_track+0x20/0x40
[   49.216534]  kasan_save_alloc_info+0x40/0x58
[   49.220786]  __kasan_slab_alloc+0xa8/0xb0
[   49.224779]  kmem_cache_alloc_noprof+0x10c/0x398
[   49.229379]  kmem_cache_oob+0x12c/0x430
[   49.233198]  kunit_try_run_case+0x170/0x3f0
[   49.237366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.242835]  kthread+0x328/0x630
[   49.246046]  ret_from_fork+0x10/0x20
[   49.249604] 
[   49.251082] The buggy address belongs to the object at ffff0008019be000
[   49.251082]  which belongs to the cache test_cache of size 200
[   49.263497] The buggy address is located 0 bytes to the right of
[   49.263497]  allocated 200-byte region [ffff0008019be000, ffff0008019be0c8)
[   49.276427] 
[   49.277907] The buggy address belongs to the physical page:
[   49.283464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819be
[   49.291446] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.299086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.306029] page_type: f5(slab)
[   49.309166] raw: 0bfffe0000000040 ffff0008019bc000 dead000000000122 0000000000000000
[   49.316885] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   49.324613] head: 0bfffe0000000040 ffff0008019bc000 dead000000000122 0000000000000000
[   49.332422] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   49.340235] head: 0bfffe0000000001 fffffdffe0066f81 00000000ffffffff 00000000ffffffff
[   49.348047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.355854] page dumped because: kasan: bad access detected
[   49.361408] 
[   49.362884] Memory state around the buggy address:
[   49.367664]  ffff0008019bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.374867]  ffff0008019be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.382073] >ffff0008019be080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   49.389273]                                               ^
[   49.394832]  ffff0008019be100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.402037]  ffff0008019be180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.409239] ==================================================================

[   30.011606] ==================================================================
[   30.011682] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   30.011933] Read of size 1 at addr fff00000c9b830c8 by task kunit_try_catch/238
[   30.012014] 
[   30.012099] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   30.012210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.012238] Hardware name: linux,dummy-virt (DT)
[   30.012318] Call trace:
[   30.012342]  show_stack+0x20/0x38 (C)
[   30.012398]  dump_stack_lvl+0x8c/0xd0
[   30.012570]  print_report+0x118/0x5d0
[   30.012618]  kasan_report+0xdc/0x128
[   30.012734]  __asan_report_load1_noabort+0x20/0x30
[   30.012861]  kmem_cache_oob+0x344/0x430
[   30.012968]  kunit_try_run_case+0x170/0x3f0
[   30.013030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.013105]  kthread+0x328/0x630
[   30.013268]  ret_from_fork+0x10/0x20
[   30.013398] 
[   30.013416] Allocated by task 238:
[   30.013455]  kasan_save_stack+0x3c/0x68
[   30.013537]  kasan_save_track+0x20/0x40
[   30.013576]  kasan_save_alloc_info+0x40/0x58
[   30.013616]  __kasan_slab_alloc+0xa8/0xb0
[   30.013828]  kmem_cache_alloc_noprof+0x10c/0x398
[   30.013940]  kmem_cache_oob+0x12c/0x430
[   30.014061]  kunit_try_run_case+0x170/0x3f0
[   30.014225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.014266]  kthread+0x328/0x630
[   30.014347]  ret_from_fork+0x10/0x20
[   30.014705] 
[   30.014852] The buggy address belongs to the object at fff00000c9b83000
[   30.014852]  which belongs to the cache test_cache of size 200
[   30.014996] The buggy address is located 0 bytes to the right of
[   30.014996]  allocated 200-byte region [fff00000c9b83000, fff00000c9b830c8)
[   30.015112] 
[   30.015371] The buggy address belongs to the physical page:
[   30.015492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b83
[   30.015628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.015714] page_type: f5(slab)
[   30.015785] raw: 0bfffe0000000000 fff00000c56873c0 dead000000000122 0000000000000000
[   30.015985] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   30.016193] page dumped because: kasan: bad access detected
[   30.016317] 
[   30.016363] Memory state around the buggy address:
[   30.016408]  fff00000c9b82f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.016506]  fff00000c9b83000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.016597] >fff00000c9b83080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   30.016636]                                               ^
[   30.016673]  fff00000c9b83100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.016714]  fff00000c9b83180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.016754] ==================================================================

[   24.934096] ==================================================================
[   24.934629] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   24.935293] Read of size 1 at addr ffff888103ead0c8 by task kunit_try_catch/256
[   24.935819] 
[   24.936093] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   24.936151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.936164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.936189] Call Trace:
[   24.936203]  <TASK>
[   24.936287]  dump_stack_lvl+0x73/0xb0
[   24.936327]  print_report+0xd1/0x610
[   24.936413]  ? __virt_addr_valid+0x1db/0x2d0
[   24.936438]  ? kmem_cache_oob+0x402/0x530
[   24.936461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.936486]  ? kmem_cache_oob+0x402/0x530
[   24.936507]  kasan_report+0x141/0x180
[   24.936528]  ? kmem_cache_oob+0x402/0x530
[   24.936553]  __asan_report_load1_noabort+0x18/0x20
[   24.936576]  kmem_cache_oob+0x402/0x530
[   24.936596]  ? trace_hardirqs_on+0x37/0xe0
[   24.936621]  ? __pfx_kmem_cache_oob+0x10/0x10
[   24.936642]  ? finish_task_switch.isra.0+0x153/0x700
[   24.936677]  ? __switch_to+0x47/0xf80
[   24.936706]  ? __pfx_read_tsc+0x10/0x10
[   24.936728]  ? ktime_get_ts64+0x86/0x230
[   24.936763]  kunit_try_run_case+0x1a5/0x480
[   24.936788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.936807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.936831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.936854]  ? __kthread_parkme+0x82/0x180
[   24.936874]  ? preempt_count_sub+0x50/0x80
[   24.936896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.936916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.936941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.936966]  kthread+0x337/0x6f0
[   24.936985]  ? trace_preempt_on+0x20/0xc0
[   24.937006]  ? __pfx_kthread+0x10/0x10
[   24.937026]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.937046]  ? calculate_sigpending+0x7b/0xa0
[   24.937070]  ? __pfx_kthread+0x10/0x10
[   24.937091]  ret_from_fork+0x116/0x1d0
[   24.937109]  ? __pfx_kthread+0x10/0x10
[   24.937129]  ret_from_fork_asm+0x1a/0x30
[   24.937159]  </TASK>
[   24.937170] 
[   24.946619] Allocated by task 256:
[   24.946805]  kasan_save_stack+0x45/0x70
[   24.947333]  kasan_save_track+0x18/0x40
[   24.947468]  kasan_save_alloc_info+0x3b/0x50
[   24.947821]  __kasan_slab_alloc+0x91/0xa0
[   24.948005]  kmem_cache_alloc_noprof+0x123/0x3f0
[   24.948360]  kmem_cache_oob+0x157/0x530
[   24.948518]  kunit_try_run_case+0x1a5/0x480
[   24.948718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.949118]  kthread+0x337/0x6f0
[   24.949278]  ret_from_fork+0x116/0x1d0
[   24.949522]  ret_from_fork_asm+0x1a/0x30
[   24.949699] 
[   24.949817] The buggy address belongs to the object at ffff888103ead000
[   24.949817]  which belongs to the cache test_cache of size 200
[   24.950715] The buggy address is located 0 bytes to the right of
[   24.950715]  allocated 200-byte region [ffff888103ead000, ffff888103ead0c8)
[   24.951349] 
[   24.951503] The buggy address belongs to the physical page:
[   24.951884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ead
[   24.952346] flags: 0x200000000000000(node=0|zone=2)
[   24.952555] page_type: f5(slab)
[   24.952890] raw: 0200000000000000 ffff888100faac80 dead000000000122 0000000000000000
[   24.953361] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   24.953781] page dumped because: kasan: bad access detected
[   24.954186] 
[   24.954281] Memory state around the buggy address:
[   24.954446]  ffff888103eacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.954917]  ffff888103ead000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.955308] >ffff888103ead080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   24.955586]                                               ^
[   24.956001]  ffff888103ead100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.956291]  ffff888103ead180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.956631] ==================================================================