Hay
Date
July 18, 2025, 1:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.260412] ==================================================================
[   31.260473] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   31.260526] Read of size 1 at addr fff00000c9ad9000 by task kunit_try_catch/171
[   31.260575] 
[   31.260605] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.260729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.260786] Hardware name: linux,dummy-virt (DT)
[   31.260913] Call trace:
[   31.260952]  show_stack+0x20/0x38 (C)
[   31.261000]  dump_stack_lvl+0x8c/0xd0
[   31.261102]  print_report+0x118/0x5e8
[   31.261172]  kasan_report+0xdc/0x128
[   31.261235]  __asan_report_load1_noabort+0x20/0x30
[   31.261283]  kmalloc_node_oob_right+0x2f4/0x330
[   31.261331]  kunit_try_run_case+0x170/0x3f0
[   31.261375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.261469]  kthread+0x328/0x630
[   31.261548]  ret_from_fork+0x10/0x20
[   31.261593] 
[   31.261611] Allocated by task 171:
[   31.261637]  kasan_save_stack+0x3c/0x68
[   31.261672]  kasan_save_track+0x20/0x40
[   31.261716]  kasan_save_alloc_info+0x40/0x58
[   31.261753]  __kasan_kmalloc+0xd4/0xd8
[   31.261797]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   31.261837]  kmalloc_node_oob_right+0xbc/0x330
[   31.261875]  kunit_try_run_case+0x170/0x3f0
[   31.261950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.261991]  kthread+0x328/0x630
[   31.262088]  ret_from_fork+0x10/0x20
[   31.262150] 
[   31.262168] The buggy address belongs to the object at fff00000c9ad8000
[   31.262168]  which belongs to the cache kmalloc-4k of size 4096
[   31.262290] The buggy address is located 0 bytes to the right of
[   31.262290]  allocated 4096-byte region [fff00000c9ad8000, fff00000c9ad9000)
[   31.262431] 
[   31.262483] The buggy address belongs to the physical page:
[   31.262685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad8
[   31.263014] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.263072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.263147] page_type: f5(slab)
[   31.263184] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   31.263231] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   31.263296] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   31.263355] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   31.263414] head: 0bfffe0000000003 ffffc1ffc326b601 00000000ffffffff 00000000ffffffff
[   31.263551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   31.263697] page dumped because: kasan: bad access detected
[   31.263727] 
[   31.263753] Memory state around the buggy address:
[   31.263830]  fff00000c9ad8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.263902]  fff00000c9ad8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.263955] >fff00000c9ad9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264015]                    ^
[   31.264129]  fff00000c9ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264194]  fff00000c9ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264229] ==================================================================


[   24.144384] ==================================================================
[   24.144867] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   24.145274] Read of size 1 at addr ffff888102b21000 by task kunit_try_catch/188
[   24.145520] 
[   24.145643] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.145694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.145707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.145729] Call Trace:
[   24.145741]  <TASK>
[   24.145758]  dump_stack_lvl+0x73/0xb0
[   24.145790]  print_report+0xd1/0x640
[   24.145923]  ? __virt_addr_valid+0x1db/0x2d0
[   24.145948]  ? kmalloc_node_oob_right+0x369/0x3c0
[   24.145971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.145996]  ? kmalloc_node_oob_right+0x369/0x3c0
[   24.146018]  kasan_report+0x141/0x180
[   24.146039]  ? kmalloc_node_oob_right+0x369/0x3c0
[   24.146066]  __asan_report_load1_noabort+0x18/0x20
[   24.146096]  kmalloc_node_oob_right+0x369/0x3c0
[   24.146126]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   24.146149]  ? __schedule+0x10da/0x2b60
[   24.146457]  ? __pfx_read_tsc+0x10/0x10
[   24.146482]  ? ktime_get_ts64+0x86/0x230
[   24.146508]  kunit_try_run_case+0x1a5/0x480
[   24.146533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.146554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.146577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.146600]  ? __kthread_parkme+0x82/0x180
[   24.146627]  ? preempt_count_sub+0x50/0x80
[   24.146649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.146671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.146693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.146715]  kthread+0x337/0x6f0
[   24.146733]  ? trace_preempt_on+0x20/0xc0
[   24.146756]  ? __pfx_kthread+0x10/0x10
[   24.146775]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.146812]  ? calculate_sigpending+0x7b/0xa0
[   24.146847]  ? __pfx_kthread+0x10/0x10
[   24.146868]  ret_from_fork+0x116/0x1d0
[   24.146886]  ? __pfx_kthread+0x10/0x10
[   24.146905]  ret_from_fork_asm+0x1a/0x30
[   24.146934]  </TASK>
[   24.146945] 
[   24.160635] Allocated by task 188:
[   24.160767]  kasan_save_stack+0x45/0x70
[   24.161378]  kasan_save_track+0x18/0x40
[   24.161848]  kasan_save_alloc_info+0x3b/0x50
[   24.162315]  __kasan_kmalloc+0xb7/0xc0
[   24.162721]  __kmalloc_cache_node_noprof+0x188/0x420
[   24.163308]  kmalloc_node_oob_right+0xab/0x3c0
[   24.163761]  kunit_try_run_case+0x1a5/0x480
[   24.164202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.164383]  kthread+0x337/0x6f0
[   24.164501]  ret_from_fork+0x116/0x1d0
[   24.164629]  ret_from_fork_asm+0x1a/0x30
[   24.164762] 
[   24.165200] The buggy address belongs to the object at ffff888102b20000
[   24.165200]  which belongs to the cache kmalloc-4k of size 4096
[   24.166443] The buggy address is located 0 bytes to the right of
[   24.166443]  allocated 4096-byte region [ffff888102b20000, ffff888102b21000)
[   24.167678] 
[   24.167756] The buggy address belongs to the physical page:
[   24.168001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20
[   24.168430] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.168759] flags: 0x200000000000040(head|node=0|zone=2)
[   24.169119] page_type: f5(slab)
[   24.169474] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   24.169898] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   24.170223] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   24.170630] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   24.170973] head: 0200000000000003 ffffea00040ac801 00000000ffffffff 00000000ffffffff
[   24.171427] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   24.171768] page dumped because: kasan: bad access detected
[   24.172002] 
[   24.172073] Memory state around the buggy address:
[   24.172289]  ffff888102b20f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.172588]  ffff888102b20f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.172897] >ffff888102b21000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.173429]                    ^
[   24.173553]  ffff888102b21080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.173793]  ffff888102b21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.174288] ==================================================================