Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   51.685462] ==================================================================
[   51.696584] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   51.702678] Read of size 1 at addr ffff0000937e3758 by task kunit_try_catch/343
[   51.710085] 
[   51.711623] CPU: 6 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   51.711657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.711665] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.711679] Call trace:
[   51.711686]  show_stack+0x20/0x38 (C)
[   51.711706]  dump_stack_lvl+0x8c/0xd0
[   51.711725]  print_report+0x118/0x608
[   51.711744]  kasan_report+0xdc/0x128
[   51.711762]  __asan_report_load1_noabort+0x20/0x30
[   51.711778]  memcmp+0x198/0x1d8
[   51.711792]  kasan_memcmp+0x16c/0x300
[   51.711808]  kunit_try_run_case+0x170/0x3f0
[   51.711826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.711847]  kthread+0x328/0x630
[   51.711860]  ret_from_fork+0x10/0x20
[   51.711879] 
[   51.780175] Allocated by task 343:
[   51.783632]  kasan_save_stack+0x3c/0x68
[   51.787538]  kasan_save_track+0x20/0x40
[   51.791442]  kasan_save_alloc_info+0x40/0x58
[   51.795776]  __kasan_kmalloc+0xd4/0xd8
[   51.799594]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.804195]  kasan_memcmp+0xbc/0x300
[   51.807826]  kunit_try_run_case+0x170/0x3f0
[   51.812075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.817640]  kthread+0x328/0x630
[   51.820923]  ret_from_fork+0x10/0x20
[   51.824555] 
[   51.826078] The buggy address belongs to the object at ffff0000937e3740
[   51.826078]  which belongs to the cache kmalloc-32 of size 32
[   51.838559] The buggy address is located 0 bytes to the right of
[   51.838559]  allocated 24-byte region [ffff0000937e3740, ffff0000937e3758)
[   51.851562] 
[   51.853086] The buggy address belongs to the physical page:
[   51.858730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1137e3
[   51.866833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.873445] page_type: f5(slab)
[   51.876645] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   51.884489] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   51.892324] page dumped because: kasan: bad access detected
[   51.897968] 
[   51.899497] Memory state around the buggy address:
[   51.904349]  ffff0000937e3600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.911664]  ffff0000937e3680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   51.918974] >ffff0000937e3700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.926279]                                                     ^
[   51.932453]  ffff0000937e3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.939760]  ffff0000937e3800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.947068] ==================================================================

[   29.066360] ==================================================================
[   29.066422] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   29.066478] Read of size 1 at addr fff00000c5770618 by task kunit_try_catch/269
[   29.066531] 
[   29.066565] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.066669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.066698] Hardware name: linux,dummy-virt (DT)
[   29.066741] Call trace:
[   29.066765]  show_stack+0x20/0x38 (C)
[   29.067159]  dump_stack_lvl+0x8c/0xd0
[   29.067339]  print_report+0x118/0x608
[   29.067393]  kasan_report+0xdc/0x128
[   29.067448]  __asan_report_load1_noabort+0x20/0x30
[   29.067573]  memcmp+0x198/0x1d8
[   29.067668]  kasan_memcmp+0x16c/0x300
[   29.067739]  kunit_try_run_case+0x170/0x3f0
[   29.067853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.067927]  kthread+0x328/0x630
[   29.067976]  ret_from_fork+0x10/0x20
[   29.068026] 
[   29.068048] Allocated by task 269:
[   29.068352]  kasan_save_stack+0x3c/0x68
[   29.068596]  kasan_save_track+0x20/0x40
[   29.068672]  kasan_save_alloc_info+0x40/0x58
[   29.068812]  __kasan_kmalloc+0xd4/0xd8
[   29.068924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.069035]  kasan_memcmp+0xbc/0x300
[   29.069131]  kunit_try_run_case+0x170/0x3f0
[   29.069297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.069343]  kthread+0x328/0x630
[   29.069716]  ret_from_fork+0x10/0x20
[   29.069878] 
[   29.069948] The buggy address belongs to the object at fff00000c5770600
[   29.069948]  which belongs to the cache kmalloc-32 of size 32
[   29.070131] The buggy address is located 0 bytes to the right of
[   29.070131]  allocated 24-byte region [fff00000c5770600, fff00000c5770618)
[   29.070260] 
[   29.070367] The buggy address belongs to the physical page:
[   29.070437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.070534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.070853] page_type: f5(slab)
[   29.071042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.071218] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.071316] page dumped because: kasan: bad access detected
[   29.071368] 
[   29.071495] Memory state around the buggy address:
[   29.071619]  fff00000c5770500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.071765]  fff00000c5770580: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.071822] >fff00000c5770600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.071863]                             ^
[   29.072047]  fff00000c5770680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.072207]  fff00000c5770700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.072373] ==================================================================

[   24.014736] ==================================================================
[   24.015440] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   24.015738] Read of size 1 at addr ffff8881024e4cd8 by task kunit_try_catch/286
[   24.016039] 
[   24.016313] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.016368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.016380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.016404] Call Trace:
[   24.016417]  <TASK>
[   24.016438]  dump_stack_lvl+0x73/0xb0
[   24.016467]  print_report+0xd1/0x650
[   24.016492]  ? __virt_addr_valid+0x1db/0x2d0
[   24.016516]  ? memcmp+0x1b4/0x1d0
[   24.016536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.016562]  ? memcmp+0x1b4/0x1d0
[   24.016582]  kasan_report+0x141/0x180
[   24.016603]  ? memcmp+0x1b4/0x1d0
[   24.016627]  __asan_report_load1_noabort+0x18/0x20
[   24.016650]  memcmp+0x1b4/0x1d0
[   24.016671]  kasan_memcmp+0x18f/0x390
[   24.016691]  ? trace_hardirqs_on+0x37/0xe0
[   24.016714]  ? __pfx_kasan_memcmp+0x10/0x10
[   24.016733]  ? finish_task_switch.isra.0+0x153/0x700
[   24.016755]  ? __switch_to+0x47/0xf50
[   24.016784]  ? __pfx_read_tsc+0x10/0x10
[   24.016806]  ? ktime_get_ts64+0x86/0x230
[   24.016830]  kunit_try_run_case+0x1a5/0x480
[   24.016854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.016876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.016901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.016925]  ? __kthread_parkme+0x82/0x180
[   24.016946]  ? preempt_count_sub+0x50/0x80
[   24.016968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.016991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.017013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.017057]  kthread+0x337/0x6f0
[   24.017077]  ? trace_preempt_on+0x20/0xc0
[   24.017099]  ? __pfx_kthread+0x10/0x10
[   24.017120]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.017148]  ? calculate_sigpending+0x7b/0xa0
[   24.017172]  ? __pfx_kthread+0x10/0x10
[   24.017193]  ret_from_fork+0x116/0x1d0
[   24.017212]  ? __pfx_kthread+0x10/0x10
[   24.017242]  ret_from_fork_asm+0x1a/0x30
[   24.017273]  </TASK>
[   24.017285] 
[   24.026458] Allocated by task 286:
[   24.026641]  kasan_save_stack+0x45/0x70
[   24.026920]  kasan_save_track+0x18/0x40
[   24.027180]  kasan_save_alloc_info+0x3b/0x50
[   24.027477]  __kasan_kmalloc+0xb7/0xc0
[   24.027636]  __kmalloc_cache_noprof+0x189/0x420
[   24.027847]  kasan_memcmp+0xb7/0x390
[   24.027995]  kunit_try_run_case+0x1a5/0x480
[   24.028438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.028750]  kthread+0x337/0x6f0
[   24.028888]  ret_from_fork+0x116/0x1d0
[   24.029076]  ret_from_fork_asm+0x1a/0x30
[   24.029481] 
[   24.029561] The buggy address belongs to the object at ffff8881024e4cc0
[   24.029561]  which belongs to the cache kmalloc-32 of size 32
[   24.030179] The buggy address is located 0 bytes to the right of
[   24.030179]  allocated 24-byte region [ffff8881024e4cc0, ffff8881024e4cd8)
[   24.030782] 
[   24.030862] The buggy address belongs to the physical page:
[   24.031118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4
[   24.031690] flags: 0x200000000000000(node=0|zone=2)
[   24.031985] page_type: f5(slab)
[   24.032130] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   24.032579] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.032964] page dumped because: kasan: bad access detected
[   24.033210] 
[   24.033414] Memory state around the buggy address:
[   24.033670]  ffff8881024e4b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.034138]  ffff8881024e4c00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.034526] >ffff8881024e4c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.034866]                                                     ^
[   24.035129]  ffff8881024e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.035556]  ffff8881024e4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.035857] ==================================================================