Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   56.994016] ==================================================================
[   57.004148] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   57.010138] Read of size 1 at addr ffff000806058358 by task kunit_try_catch/341
[   57.017425] 
[   57.018914] CPU: 6 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   57.018975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.018993] Hardware name: WinLink E850-96 board (DT)
[   57.019017] Call trace:
[   57.019034]  show_stack+0x20/0x38 (C)
[   57.019077]  dump_stack_lvl+0x8c/0xd0
[   57.019111]  print_report+0x118/0x5d0
[   57.019144]  kasan_report+0xdc/0x128
[   57.019173]  __asan_report_load1_noabort+0x20/0x30
[   57.019209]  memcmp+0x198/0x1d8
[   57.019243]  kasan_memcmp+0x16c/0x300
[   57.019276]  kunit_try_run_case+0x170/0x3f0
[   57.019317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.019352]  kthread+0x328/0x630
[   57.019384]  ret_from_fork+0x10/0x20
[   57.019420] 
[   57.085568] Allocated by task 341:
[   57.088955]  kasan_save_stack+0x3c/0x68
[   57.092771]  kasan_save_track+0x20/0x40
[   57.096591]  kasan_save_alloc_info+0x40/0x58
[   57.100844]  __kasan_kmalloc+0xd4/0xd8
[   57.104577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.109090]  kasan_memcmp+0xbc/0x300
[   57.112650]  kunit_try_run_case+0x170/0x3f0
[   57.116816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.122286]  kthread+0x328/0x630
[   57.125497]  ret_from_fork+0x10/0x20
[   57.129055] 
[   57.130534] The buggy address belongs to the object at ffff000806058340
[   57.130534]  which belongs to the cache kmalloc-32 of size 32
[   57.142860] The buggy address is located 0 bytes to the right of
[   57.142860]  allocated 24-byte region [ffff000806058340, ffff000806058358)
[   57.155706] 
[   57.157183] The buggy address belongs to the physical page:
[   57.162740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886058
[   57.170724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.177235] page_type: f5(slab)
[   57.180369] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   57.188089] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   57.195809] page dumped because: kasan: bad access detected
[   57.201363] 
[   57.202839] Memory state around the buggy address:
[   57.207619]  ffff000806058200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.214822]  ffff000806058280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.222028] >ffff000806058300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   57.229228]                                                     ^
[   57.235307]  ffff000806058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.242514]  ffff000806058400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.249713] ==================================================================

[   32.642611] ==================================================================
[   32.642919] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   32.643048] Read of size 1 at addr fff00000c9acbe58 by task kunit_try_catch/288
[   32.643107] 
[   32.643181] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.643280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.643521] Hardware name: linux,dummy-virt (DT)
[   32.643592] Call trace:
[   32.643885]  show_stack+0x20/0x38 (C)
[   32.643969]  dump_stack_lvl+0x8c/0xd0
[   32.644105]  print_report+0x118/0x5d0
[   32.644160]  kasan_report+0xdc/0x128
[   32.644205]  __asan_report_load1_noabort+0x20/0x30
[   32.644468]  memcmp+0x198/0x1d8
[   32.644550]  kasan_memcmp+0x16c/0x300
[   32.644610]  kunit_try_run_case+0x170/0x3f0
[   32.644709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.644795]  kthread+0x328/0x630
[   32.645001]  ret_from_fork+0x10/0x20
[   32.645084] 
[   32.645125] Allocated by task 288:
[   32.645160]  kasan_save_stack+0x3c/0x68
[   32.645206]  kasan_save_track+0x20/0x40
[   32.645341]  kasan_save_alloc_info+0x40/0x58
[   32.645476]  __kasan_kmalloc+0xd4/0xd8
[   32.645601]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.645649]  kasan_memcmp+0xbc/0x300
[   32.645690]  kunit_try_run_case+0x170/0x3f0
[   32.646032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.646118]  kthread+0x328/0x630
[   32.646267]  ret_from_fork+0x10/0x20
[   32.646379] 
[   32.646471] The buggy address belongs to the object at fff00000c9acbe40
[   32.646471]  which belongs to the cache kmalloc-32 of size 32
[   32.646553] The buggy address is located 0 bytes to the right of
[   32.646553]  allocated 24-byte region [fff00000c9acbe40, fff00000c9acbe58)
[   32.646731] 
[   32.646798] The buggy address belongs to the physical page:
[   32.646835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb
[   32.646925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.647049] page_type: f5(slab)
[   32.647137] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.647282] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.647359] page dumped because: kasan: bad access detected
[   32.647606] 
[   32.647780] Memory state around the buggy address:
[   32.647860]  fff00000c9acbd00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.647944]  fff00000c9acbd80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   32.648215] >fff00000c9acbe00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.648283]                                                     ^
[   32.648421]  fff00000c9acbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.648505]  fff00000c9acbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.648590] ==================================================================

[   25.739546] ==================================================================
[   25.740820] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   25.741098] Read of size 1 at addr ffff88810613f218 by task kunit_try_catch/307
[   25.741855] 
[   25.742189] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.742250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.742263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.742357] Call Trace:
[   25.742373]  <TASK>
[   25.742392]  dump_stack_lvl+0x73/0xb0
[   25.742438]  print_report+0xd1/0x610
[   25.742464]  ? __virt_addr_valid+0x1db/0x2d0
[   25.742489]  ? memcmp+0x1b4/0x1d0
[   25.742508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.742534]  ? memcmp+0x1b4/0x1d0
[   25.742553]  kasan_report+0x141/0x180
[   25.742575]  ? memcmp+0x1b4/0x1d0
[   25.742598]  __asan_report_load1_noabort+0x18/0x20
[   25.742622]  memcmp+0x1b4/0x1d0
[   25.742643]  kasan_memcmp+0x18f/0x390
[   25.742665]  ? __pfx_kasan_memcmp+0x10/0x10
[   25.742685]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   25.742715]  ? __pfx_kasan_memcmp+0x10/0x10
[   25.742752]  kunit_try_run_case+0x1a5/0x480
[   25.742776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.742797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.742820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.742844]  ? __kthread_parkme+0x82/0x180
[   25.742866]  ? preempt_count_sub+0x50/0x80
[   25.742890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.742911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.742937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.742964]  kthread+0x337/0x6f0
[   25.742984]  ? trace_preempt_on+0x20/0xc0
[   25.743009]  ? __pfx_kthread+0x10/0x10
[   25.743031]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.743054]  ? calculate_sigpending+0x7b/0xa0
[   25.743079]  ? __pfx_kthread+0x10/0x10
[   25.743102]  ret_from_fork+0x116/0x1d0
[   25.743124]  ? __pfx_kthread+0x10/0x10
[   25.743146]  ret_from_fork_asm+0x1a/0x30
[   25.743179]  </TASK>
[   25.743191] 
[   25.752213] Allocated by task 307:
[   25.752533]  kasan_save_stack+0x45/0x70
[   25.752685]  kasan_save_track+0x18/0x40
[   25.752827]  kasan_save_alloc_info+0x3b/0x50
[   25.753029]  __kasan_kmalloc+0xb7/0xc0
[   25.753613]  __kmalloc_cache_noprof+0x189/0x420
[   25.753864]  kasan_memcmp+0xb7/0x390
[   25.754015]  kunit_try_run_case+0x1a5/0x480
[   25.754156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.754327]  kthread+0x337/0x6f0
[   25.754443]  ret_from_fork+0x116/0x1d0
[   25.754571]  ret_from_fork_asm+0x1a/0x30
[   25.754704] 
[   25.754782] The buggy address belongs to the object at ffff88810613f200
[   25.754782]  which belongs to the cache kmalloc-32 of size 32
[   25.755128] The buggy address is located 0 bytes to the right of
[   25.755128]  allocated 24-byte region [ffff88810613f200, ffff88810613f218)
[   25.755487] 
[   25.755554] The buggy address belongs to the physical page:
[   25.755720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613f
[   25.757058] flags: 0x200000000000000(node=0|zone=2)
[   25.757754] page_type: f5(slab)
[   25.757927] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   25.758213] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.758798] page dumped because: kasan: bad access detected
[   25.759202] 
[   25.759509] Memory state around the buggy address:
[   25.759747]  ffff88810613f100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.760034]  ffff88810613f180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.760578] >ffff88810613f200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.760993]                             ^
[   25.761178]  ffff88810613f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.761822]  ffff88810613f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.762209] ==================================================================