Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   39.961634] ==================================================================
[   39.971845] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.977832] Read of size 1 at addr ffff0008050026d8 by task kunit_try_catch/301
[   39.985120] 
[   39.986605] CPU: 5 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   39.986670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.986690] Hardware name: WinLink E850-96 board (DT)
[   39.986714] Call trace:
[   39.986728]  show_stack+0x20/0x38 (C)
[   39.986766]  dump_stack_lvl+0x8c/0xd0
[   39.986804]  print_report+0x118/0x608
[   39.986844]  kasan_report+0xdc/0x128
[   39.986878]  __asan_report_load1_noabort+0x20/0x30
[   39.986913]  memcmp+0x198/0x1d8
[   39.986944]  kasan_memcmp+0x16c/0x300
[   39.986977]  kunit_try_run_case+0x170/0x3f0
[   39.987017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.987056]  kthread+0x328/0x630
[   39.987088]  ret_from_fork+0x10/0x20
[   39.987125] 
[   40.052914] Allocated by task 301:
[   40.056301]  kasan_save_stack+0x3c/0x68
[   40.060118]  kasan_save_track+0x20/0x40
[   40.063936]  kasan_save_alloc_info+0x40/0x58
[   40.068190]  __kasan_kmalloc+0xd4/0xd8
[   40.071923]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.076436]  kasan_memcmp+0xbc/0x300
[   40.079997]  kunit_try_run_case+0x170/0x3f0
[   40.084162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.089631]  kthread+0x328/0x630
[   40.092842]  ret_from_fork+0x10/0x20
[   40.096403] 
[   40.097879] The buggy address belongs to the object at ffff0008050026c0
[   40.097879]  which belongs to the cache kmalloc-32 of size 32
[   40.110208] The buggy address is located 0 bytes to the right of
[   40.110208]  allocated 24-byte region [ffff0008050026c0, ffff0008050026d8)
[   40.123050] 
[   40.124530] The buggy address belongs to the physical page:
[   40.130086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885002
[   40.138071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.144579] page_type: f5(slab)
[   40.147716] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.155435] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.163155] page dumped because: kasan: bad access detected
[   40.168711] 
[   40.170185] Memory state around the buggy address:
[   40.174968]  ffff000805002580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.182168]  ffff000805002600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.189374] >ffff000805002680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.196573]                                                     ^
[   40.202653]  ffff000805002700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.209858]  ffff000805002780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.217061] ==================================================================

[   28.452138] ==================================================================
[   28.452310] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   28.452879] Read of size 1 at addr fff00000c7895a98 by task kunit_try_catch/258
[   28.453072] 
[   28.453281] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.453492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.453565] Hardware name: linux,dummy-virt (DT)
[   28.453650] Call trace:
[   28.453748]  show_stack+0x20/0x38 (C)
[   28.454512]  dump_stack_lvl+0x8c/0xd0
[   28.454779]  print_report+0x118/0x608
[   28.455060]  kasan_report+0xdc/0x128
[   28.455539]  __asan_report_load1_noabort+0x20/0x30
[   28.455766]  memcmp+0x198/0x1d8
[   28.455946]  kasan_memcmp+0x16c/0x300
[   28.456104]  kunit_try_run_case+0x170/0x3f0
[   28.456265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.456407]  kthread+0x328/0x630
[   28.456570]  ret_from_fork+0x10/0x20
[   28.456746] 
[   28.457074] Allocated by task 258:
[   28.457414]  kasan_save_stack+0x3c/0x68
[   28.457552]  kasan_save_track+0x20/0x40
[   28.457754]  kasan_save_alloc_info+0x40/0x58
[   28.457870]  __kasan_kmalloc+0xd4/0xd8
[   28.457976]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.458469]  kasan_memcmp+0xbc/0x300
[   28.458566]  kunit_try_run_case+0x170/0x3f0
[   28.458930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.459071]  kthread+0x328/0x630
[   28.459376]  ret_from_fork+0x10/0x20
[   28.459491] 
[   28.459551] The buggy address belongs to the object at fff00000c7895a80
[   28.459551]  which belongs to the cache kmalloc-32 of size 32
[   28.460261] The buggy address is located 0 bytes to the right of
[   28.460261]  allocated 24-byte region [fff00000c7895a80, fff00000c7895a98)
[   28.460528] 
[   28.460595] The buggy address belongs to the physical page:
[   28.460774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   28.460996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.461161] page_type: f5(slab)
[   28.461369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.461645] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.461772] page dumped because: kasan: bad access detected
[   28.461869] 
[   28.462317] Memory state around the buggy address:
[   28.462409]  fff00000c7895980: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   28.462535]  fff00000c7895a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.462782] >fff00000c7895a80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.462887]                             ^
[   28.462977]  fff00000c7895b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.463136]  fff00000c7895b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.463458] ==================================================================

[   21.224823] ==================================================================
[   21.226128] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   21.227172] Read of size 1 at addr ffff888102b71d98 by task kunit_try_catch/274
[   21.227988] 
[   21.228655] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   21.228908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.228953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.229012] Call Trace:
[   21.229034]  <TASK>
[   21.229058]  dump_stack_lvl+0x73/0xb0
[   21.229098]  print_report+0xd1/0x650
[   21.229134]  ? __virt_addr_valid+0x1db/0x2d0
[   21.229167]  ? memcmp+0x1b4/0x1d0
[   21.229195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.229245]  ? memcmp+0x1b4/0x1d0
[   21.229361]  kasan_report+0x141/0x180
[   21.229398]  ? memcmp+0x1b4/0x1d0
[   21.229434]  __asan_report_load1_noabort+0x18/0x20
[   21.229464]  memcmp+0x1b4/0x1d0
[   21.229494]  kasan_memcmp+0x18f/0x390
[   21.229523]  ? trace_hardirqs_on+0x37/0xe0
[   21.229556]  ? __pfx_kasan_memcmp+0x10/0x10
[   21.229586]  ? finish_task_switch.isra.0+0x153/0x700
[   21.229618]  ? __switch_to+0x47/0xf50
[   21.229661]  ? __pfx_read_tsc+0x10/0x10
[   21.229716]  ? ktime_get_ts64+0x86/0x230
[   21.229755]  kunit_try_run_case+0x1a5/0x480
[   21.229787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.229816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.229852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.229887]  ? __kthread_parkme+0x82/0x180
[   21.229916]  ? preempt_count_sub+0x50/0x80
[   21.229973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.230005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.230043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.230079]  kthread+0x337/0x6f0
[   21.230106]  ? trace_preempt_on+0x20/0xc0
[   21.230138]  ? __pfx_kthread+0x10/0x10
[   21.230178]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.230326]  ? calculate_sigpending+0x7b/0xa0
[   21.230364]  ? __pfx_kthread+0x10/0x10
[   21.230395]  ret_from_fork+0x116/0x1d0
[   21.230423]  ? __pfx_kthread+0x10/0x10
[   21.230453]  ret_from_fork_asm+0x1a/0x30
[   21.230495]  </TASK>
[   21.230510] 
[   21.252034] Allocated by task 274:
[   21.253098]  kasan_save_stack+0x45/0x70
[   21.253834]  kasan_save_track+0x18/0x40
[   21.254141]  kasan_save_alloc_info+0x3b/0x50
[   21.255168]  __kasan_kmalloc+0xb7/0xc0
[   21.256029]  __kmalloc_cache_noprof+0x189/0x420
[   21.256508]  kasan_memcmp+0xb7/0x390
[   21.257029]  kunit_try_run_case+0x1a5/0x480
[   21.258188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.259064]  kthread+0x337/0x6f0
[   21.260071]  ret_from_fork+0x116/0x1d0
[   21.260514]  ret_from_fork_asm+0x1a/0x30
[   21.260976] 
[   21.261652] The buggy address belongs to the object at ffff888102b71d80
[   21.261652]  which belongs to the cache kmalloc-32 of size 32
[   21.263010] The buggy address is located 0 bytes to the right of
[   21.263010]  allocated 24-byte region [ffff888102b71d80, ffff888102b71d98)
[   21.265017] 
[   21.265220] The buggy address belongs to the physical page:
[   21.265993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b71
[   21.266415] flags: 0x200000000000000(node=0|zone=2)
[   21.266604] page_type: f5(slab)
[   21.267051] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   21.268295] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.269011] page dumped because: kasan: bad access detected
[   21.269816] 
[   21.270002] Memory state around the buggy address:
[   21.270647]  ffff888102b71c80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.271533]  ffff888102b71d00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   21.272239] >ffff888102b71d80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.273076]                             ^
[   21.273401]  ffff888102b71e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.274763]  ffff888102b71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.275693] ==================================================================

[   66.977935] ==================================================================
[   66.988983] BUG: KASAN: slab-out-of-bounds in memcmp+0x19c/0x1b0
[   66.995056] Read of size 1 at addr cc90a298 by task kunit_try_catch/309
[   67.001708] 
[   67.003204] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   67.003234] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.003234] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.003265] Call trace: 
[   67.003265]  unwind_backtrace from show_stack+0x18/0x1c
[   67.003295]  show_stack from dump_stack_lvl+0x70/0x90
[   67.003326]  dump_stack_lvl from print_report+0x158/0x528
[   67.003356]  print_report from kasan_report+0xdc/0x118
[   67.003356]  kasan_report from memcmp+0x19c/0x1b0
[   67.003387]  memcmp from kasan_memcmp+0x1d0/0x388
[   67.003417]  kasan_memcmp from kunit_try_run_case+0x22c/0x5a8
[   67.003448]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.003479]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.003509]  kthread from ret_from_fork+0x14/0x20
[   67.003509] Exception stack(0xf24b3fb0 to 0xf24b3ff8)
[   67.003540] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.003540] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.003570] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.003570] 
[   67.112640] Allocated by task 309:
[   67.116058]  kasan_save_track+0x30/0x5c
[   67.119934]  __kasan_kmalloc+0x8c/0x94
[   67.123718]  kasan_memcmp+0xe0/0x388
[   67.127319]  kunit_try_run_case+0x22c/0x5a8
[   67.131561]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.137084]  kthread+0x464/0x810
[   67.140319]  ret_from_fork+0x14/0x20
[   67.143951] 
[   67.145446] The buggy address belongs to the object at cc90a280
[   67.145446]  which belongs to the cache kmalloc-64 of size 64
[   67.157165] The buggy address is located 0 bytes to the right of
[   67.157165]  allocated 24-byte region [cc90a280, cc90a298)
[   67.168731] 
[   67.170227] The buggy address belongs to the physical page:
[   67.175842] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   67.183105] flags: 0x0(zone=0)
[   67.186187] page_type: f5(slab)
[   67.189361] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   67.197479] raw: 00000000
[   67.200134] page dumped because: kasan: bad access detected
[   67.205749] 
[   67.207244] Memory state around the buggy address:
[   67.212066]  cc90a180: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.218627]  cc90a200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.225219] >cc90a280: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.231781]                     ^
[   67.235107]  cc90a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.241699]  cc90a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.248260] ==================================================================