Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   27.474229] ==================================================================
[   27.483663] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   27.490864] Write of size 2 at addr ffff000801e2a077 by task kunit_try_catch/216
[   27.498241] 
[   27.499727] CPU: 5 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.499786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.499804] Hardware name: WinLink E850-96 board (DT)
[   27.499827] Call trace:
[   27.499842]  show_stack+0x20/0x38 (C)
[   27.499881]  dump_stack_lvl+0x8c/0xd0
[   27.499918]  print_report+0x118/0x608
[   27.499954]  kasan_report+0xdc/0x128
[   27.499986]  kasan_check_range+0x100/0x1a8
[   27.500023]  __asan_memset+0x34/0x78
[   27.500051]  kmalloc_oob_memset_2+0x150/0x2f8
[   27.500080]  kunit_try_run_case+0x170/0x3f0
[   27.500115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.500153]  kthread+0x328/0x630
[   27.500183]  ret_from_fork+0x10/0x20
[   27.500217] 
[   27.566470] Allocated by task 216:
[   27.569858]  kasan_save_stack+0x3c/0x68
[   27.573674]  kasan_save_track+0x20/0x40
[   27.577493]  kasan_save_alloc_info+0x40/0x58
[   27.581747]  __kasan_kmalloc+0xd4/0xd8
[   27.585481]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.589993]  kmalloc_oob_memset_2+0xb0/0x2f8
[   27.594246]  kunit_try_run_case+0x170/0x3f0
[   27.598413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.603882]  kthread+0x328/0x630
[   27.607093]  ret_from_fork+0x10/0x20
[   27.610652] 
[   27.612130] The buggy address belongs to the object at ffff000801e2a000
[   27.612130]  which belongs to the cache kmalloc-128 of size 128
[   27.624631] The buggy address is located 119 bytes inside of
[   27.624631]  allocated 120-byte region [ffff000801e2a000, ffff000801e2a078)
[   27.637215] 
[   27.638693] The buggy address belongs to the physical page:
[   27.644251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a
[   27.652235] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.659872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.666816] page_type: f5(slab)
[   27.669951] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.677672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.685400] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.693209] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.701023] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff
[   27.708835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.716640] page dumped because: kasan: bad access detected
[   27.722197] 
[   27.723673] Memory state around the buggy address:
[   27.728451]  ffff000801e29f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.735654]  ffff000801e29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.742860] >ffff000801e2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.750060]                                                                 ^
[   27.757182]  ffff000801e2a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.764386]  ffff000801e2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.771587] ==================================================================

[   24.789385] ==================================================================
[   24.789511] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   24.789637] Write of size 2 at addr fff00000c5eeee77 by task kunit_try_catch/173
[   24.789769] 
[   24.789849] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.790043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.790105] Hardware name: linux,dummy-virt (DT)
[   24.790173] Call trace:
[   24.790224]  show_stack+0x20/0x38 (C)
[   24.790340]  dump_stack_lvl+0x8c/0xd0
[   24.790460]  print_report+0x118/0x608
[   24.791484]  kasan_report+0xdc/0x128
[   24.791802]  kasan_check_range+0x100/0x1a8
[   24.793779]  __asan_memset+0x34/0x78
[   24.793908]  kmalloc_oob_memset_2+0x150/0x2f8
[   24.794041]  kunit_try_run_case+0x170/0x3f0
[   24.794180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.794325]  kthread+0x328/0x630
[   24.794455]  ret_from_fork+0x10/0x20
[   24.794721] 
[   24.794777] Allocated by task 173:
[   24.795310]  kasan_save_stack+0x3c/0x68
[   24.795505]  kasan_save_track+0x20/0x40
[   24.795693]  kasan_save_alloc_info+0x40/0x58
[   24.796421]  __kasan_kmalloc+0xd4/0xd8
[   24.796521]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.796620]  kmalloc_oob_memset_2+0xb0/0x2f8
[   24.797277]  kunit_try_run_case+0x170/0x3f0
[   24.797400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.797518]  kthread+0x328/0x630
[   24.797609]  ret_from_fork+0x10/0x20
[   24.798503] 
[   24.798564] The buggy address belongs to the object at fff00000c5eeee00
[   24.798564]  which belongs to the cache kmalloc-128 of size 128
[   24.798793] The buggy address is located 119 bytes inside of
[   24.798793]  allocated 120-byte region [fff00000c5eeee00, fff00000c5eeee78)
[   24.798936] 
[   24.798989] The buggy address belongs to the physical page:
[   24.799329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.800228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.800609] page_type: f5(slab)
[   24.801152] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.801293] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.801397] page dumped because: kasan: bad access detected
[   24.801472] 
[   24.801799] Memory state around the buggy address:
[   24.802624]  fff00000c5eeed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.802921]  fff00000c5eeed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.803137] >fff00000c5eeee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.803257]                                                                 ^
[   24.803516]  fff00000c5eeee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.803754]  fff00000c5eeef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.803842] ==================================================================

[   18.206665] ==================================================================
[   18.207646] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   18.208945] Write of size 2 at addr ffff8881022c3777 by task kunit_try_catch/189
[   18.209875] 
[   18.209997] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   18.210126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.210164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.210244] Call Trace:
[   18.210297]  <TASK>
[   18.210349]  dump_stack_lvl+0x73/0xb0
[   18.210434]  print_report+0xd1/0x650
[   18.210917]  ? __virt_addr_valid+0x1db/0x2d0
[   18.210957]  ? kmalloc_oob_memset_2+0x166/0x330
[   18.210989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.211045]  ? kmalloc_oob_memset_2+0x166/0x330
[   18.211083]  kasan_report+0x141/0x180
[   18.211124]  ? kmalloc_oob_memset_2+0x166/0x330
[   18.211191]  kasan_check_range+0x10c/0x1c0
[   18.211272]  __asan_memset+0x27/0x50
[   18.211359]  kmalloc_oob_memset_2+0x166/0x330
[   18.211424]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   18.211461]  ? __schedule+0x10cc/0x2b60
[   18.211515]  ? __pfx_read_tsc+0x10/0x10
[   18.211556]  ? ktime_get_ts64+0x86/0x230
[   18.211631]  kunit_try_run_case+0x1a5/0x480
[   18.211681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.211716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.211783]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.211823]  ? __kthread_parkme+0x82/0x180
[   18.211854]  ? preempt_count_sub+0x50/0x80
[   18.211886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.211915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.211950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.211984]  kthread+0x337/0x6f0
[   18.212011]  ? trace_preempt_on+0x20/0xc0
[   18.212072]  ? __pfx_kthread+0x10/0x10
[   18.212101]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.212133]  ? calculate_sigpending+0x7b/0xa0
[   18.212181]  ? __pfx_kthread+0x10/0x10
[   18.212256]  ret_from_fork+0x116/0x1d0
[   18.212303]  ? __pfx_kthread+0x10/0x10
[   18.212333]  ret_from_fork_asm+0x1a/0x30
[   18.212377]  </TASK>
[   18.212393] 
[   18.231061] Allocated by task 189:
[   18.231589]  kasan_save_stack+0x45/0x70
[   18.232127]  kasan_save_track+0x18/0x40
[   18.232621]  kasan_save_alloc_info+0x3b/0x50
[   18.233219]  __kasan_kmalloc+0xb7/0xc0
[   18.233723]  __kmalloc_cache_noprof+0x189/0x420
[   18.234360]  kmalloc_oob_memset_2+0xac/0x330
[   18.234893]  kunit_try_run_case+0x1a5/0x480
[   18.235449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.236073]  kthread+0x337/0x6f0
[   18.236706]  ret_from_fork+0x116/0x1d0
[   18.237271]  ret_from_fork_asm+0x1a/0x30
[   18.237697] 
[   18.238135] The buggy address belongs to the object at ffff8881022c3700
[   18.238135]  which belongs to the cache kmalloc-128 of size 128
[   18.239367] The buggy address is located 119 bytes inside of
[   18.239367]  allocated 120-byte region [ffff8881022c3700, ffff8881022c3778)
[   18.240661] 
[   18.241141] The buggy address belongs to the physical page:
[   18.241805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c3
[   18.242566] flags: 0x200000000000000(node=0|zone=2)
[   18.243222] page_type: f5(slab)
[   18.243718] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.244581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.245352] page dumped because: kasan: bad access detected
[   18.245891] 
[   18.246202] Memory state around the buggy address:
[   18.246666]  ffff8881022c3600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.247654]  ffff8881022c3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.248513] >ffff8881022c3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.249202]                                                                 ^
[   18.250167]  ffff8881022c3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.250922]  ffff8881022c3800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.251465] ==================================================================

[   54.082397] ==================================================================
[   54.093872] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b0/0x35c
[   54.101135] Write of size 2 at addr cc78ea77 by task kunit_try_catch/224
[   54.107879] 
[   54.109405] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   54.109436] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.109436] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.109436] Call trace: 
[   54.109436]  unwind_backtrace from show_stack+0x18/0x1c
[   54.109466]  show_stack from dump_stack_lvl+0x70/0x90
[   54.109497]  dump_stack_lvl from print_report+0x158/0x528
[   54.109527]  print_report from kasan_report+0xdc/0x118
[   54.109558]  kasan_report from kasan_check_range+0x14c/0x198
[   54.109558]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.109588]  __asan_memset from kmalloc_oob_memset_2+0x1b0/0x35c
[   54.109619]  kmalloc_oob_memset_2 from kunit_try_run_case+0x22c/0x5a8
[   54.109649]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.109680]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.109680]  kthread from ret_from_fork+0x14/0x20
[   54.109710] Exception stack(0xf2283fb0 to 0xf2283ff8)
[   54.109710] 3fa0:                                     00000000 00000000 00000000 00000000
[   54.109741] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.109741] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.109771] 
[   54.227386] Allocated by task 224:
[   54.230834]  kasan_save_track+0x30/0x5c
[   54.234680]  __kasan_kmalloc+0x8c/0x94
[   54.238464]  kmalloc_oob_memset_2+0xcc/0x35c
[   54.242767]  kunit_try_run_case+0x22c/0x5a8
[   54.246978]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.252502]  kthread+0x464/0x810
[   54.255767]  ret_from_fork+0x14/0x20
[   54.259368] 
[   54.260864] The buggy address belongs to the object at cc78ea00
[   54.260864]  which belongs to the cache kmalloc-128 of size 128
[   54.272766] The buggy address is located 119 bytes inside of
[   54.272766]  allocated 120-byte region [cc78ea00, cc78ea78)
[   54.284057] 
[   54.285552] The buggy address belongs to the physical page:
[   54.291168] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   54.298431] flags: 0x0(zone=0)
[   54.301513] page_type: f5(slab)
[   54.304687] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.312835] raw: 00000000
[   54.315460] page dumped because: kasan: bad access detected
[   54.321075] 
[   54.322570] Memory state around the buggy address:
[   54.327392]  cc78e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.333984]  cc78e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.340545] >cc78ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.347106]                                                         ^
[   54.353576]  cc78ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.360168]  cc78eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.366729] ==================================================================