Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   43.749495] ==================================================================
[   43.759327] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   43.766527] Write of size 8 at addr ffff0008019adc71 by task kunit_try_catch/260
[   43.773903] 
[   43.775389] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   43.775444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.775461] Hardware name: WinLink E850-96 board (DT)
[   43.775482] Call trace:
[   43.775495]  show_stack+0x20/0x38 (C)
[   43.775531]  dump_stack_lvl+0x8c/0xd0
[   43.775564]  print_report+0x118/0x5d0
[   43.775591]  kasan_report+0xdc/0x128
[   43.775620]  kasan_check_range+0x100/0x1a8
[   43.775650]  __asan_memset+0x34/0x78
[   43.775680]  kmalloc_oob_memset_8+0x150/0x2f8
[   43.775712]  kunit_try_run_case+0x170/0x3f0
[   43.775752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.775783]  kthread+0x328/0x630
[   43.775813]  ret_from_fork+0x10/0x20
[   43.775847] 
[   43.842479] Allocated by task 260:
[   43.845865]  kasan_save_stack+0x3c/0x68
[   43.849682]  kasan_save_track+0x20/0x40
[   43.853502]  kasan_save_alloc_info+0x40/0x58
[   43.857755]  __kasan_kmalloc+0xd4/0xd8
[   43.861488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.866002]  kmalloc_oob_memset_8+0xb0/0x2f8
[   43.870255]  kunit_try_run_case+0x170/0x3f0
[   43.874421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.879890]  kthread+0x328/0x630
[   43.883102]  ret_from_fork+0x10/0x20
[   43.886661] 
[   43.888138] The buggy address belongs to the object at ffff0008019adc00
[   43.888138]  which belongs to the cache kmalloc-128 of size 128
[   43.900640] The buggy address is located 113 bytes inside of
[   43.900640]  allocated 120-byte region [ffff0008019adc00, ffff0008019adc78)
[   43.913223] 
[   43.914701] The buggy address belongs to the physical page:
[   43.920259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   43.928242] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.935882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.942825] page_type: f5(slab)
[   43.945962] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.953681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.961407] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.969218] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.977031] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   43.984843] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   43.992651] page dumped because: kasan: bad access detected
[   43.998205] 
[   43.999680] Memory state around the buggy address:
[   44.004460]  ffff0008019adb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.011663]  ffff0008019adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.018871] >ffff0008019adc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.026069]                                                                 ^
[   44.033190]  ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.040395]  ffff0008019add00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.047598] ==================================================================

[   29.673186] ==================================================================
[   29.673583] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   29.673903] Write of size 8 at addr fff00000c636ac71 by task kunit_try_catch/207
[   29.673953] 
[   29.673991] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.674088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.674273] Hardware name: linux,dummy-virt (DT)
[   29.674383] Call trace:
[   29.674520]  show_stack+0x20/0x38 (C)
[   29.674586]  dump_stack_lvl+0x8c/0xd0
[   29.674653]  print_report+0x118/0x5d0
[   29.674744]  kasan_report+0xdc/0x128
[   29.674974]  kasan_check_range+0x100/0x1a8
[   29.675020]  __asan_memset+0x34/0x78
[   29.675072]  kmalloc_oob_memset_8+0x150/0x2f8
[   29.675128]  kunit_try_run_case+0x170/0x3f0
[   29.675180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.675797]  kthread+0x328/0x630
[   29.675931]  ret_from_fork+0x10/0x20
[   29.675981] 
[   29.676000] Allocated by task 207:
[   29.676028]  kasan_save_stack+0x3c/0x68
[   29.676390]  kasan_save_track+0x20/0x40
[   29.676432]  kasan_save_alloc_info+0x40/0x58
[   29.676470]  __kasan_kmalloc+0xd4/0xd8
[   29.676508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.676550]  kmalloc_oob_memset_8+0xb0/0x2f8
[   29.676588]  kunit_try_run_case+0x170/0x3f0
[   29.676633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.676673]  kthread+0x328/0x630
[   29.676704]  ret_from_fork+0x10/0x20
[   29.676945] 
[   29.676994] The buggy address belongs to the object at fff00000c636ac00
[   29.676994]  which belongs to the cache kmalloc-128 of size 128
[   29.677261] The buggy address is located 113 bytes inside of
[   29.677261]  allocated 120-byte region [fff00000c636ac00, fff00000c636ac78)
[   29.677711] 
[   29.677805] The buggy address belongs to the physical page:
[   29.677837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.677895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.677945] page_type: f5(slab)
[   29.677986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.678449] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.678501] page dumped because: kasan: bad access detected
[   29.678531] 
[   29.678550] Memory state around the buggy address:
[   29.678583]  fff00000c636ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.678624]  fff00000c636ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679200] >fff00000c636ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.679467]                                                                 ^
[   29.679593]  fff00000c636ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679637]  fff00000c636ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.679673] ==================================================================

[   24.403837] ==================================================================
[   24.404610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   24.405505] Write of size 8 at addr ffff888103e99271 by task kunit_try_catch/225
[   24.406520] 
[   24.406974] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   24.407290] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.407310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.407336] Call Trace:
[   24.407351]  <TASK>
[   24.407377]  dump_stack_lvl+0x73/0xb0
[   24.407425]  print_report+0xd1/0x610
[   24.407449]  ? __virt_addr_valid+0x1db/0x2d0
[   24.407476]  ? kmalloc_oob_memset_8+0x166/0x330
[   24.407499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.407524]  ? kmalloc_oob_memset_8+0x166/0x330
[   24.407546]  kasan_report+0x141/0x180
[   24.407567]  ? kmalloc_oob_memset_8+0x166/0x330
[   24.407592]  kasan_check_range+0x10c/0x1c0
[   24.407615]  __asan_memset+0x27/0x50
[   24.407638]  kmalloc_oob_memset_8+0x166/0x330
[   24.407673]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   24.407695]  ? __schedule+0x10cc/0x2b60
[   24.407720]  ? __pfx_read_tsc+0x10/0x10
[   24.407766]  ? ktime_get_ts64+0x86/0x230
[   24.407792]  kunit_try_run_case+0x1a5/0x480
[   24.407819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.407842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.407870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.407895]  ? __kthread_parkme+0x82/0x180
[   24.407918]  ? preempt_count_sub+0x50/0x80
[   24.407971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.407993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.408019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.408044]  kthread+0x337/0x6f0
[   24.408064]  ? trace_preempt_on+0x20/0xc0
[   24.408090]  ? __pfx_kthread+0x10/0x10
[   24.408111]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.408132]  ? calculate_sigpending+0x7b/0xa0
[   24.408156]  ? __pfx_kthread+0x10/0x10
[   24.408177]  ret_from_fork+0x116/0x1d0
[   24.408196]  ? __pfx_kthread+0x10/0x10
[   24.408216]  ret_from_fork_asm+0x1a/0x30
[   24.408247]  </TASK>
[   24.408259] 
[   24.419924] Allocated by task 225:
[   24.420146]  kasan_save_stack+0x45/0x70
[   24.420456]  kasan_save_track+0x18/0x40
[   24.420797]  kasan_save_alloc_info+0x3b/0x50
[   24.421042]  __kasan_kmalloc+0xb7/0xc0
[   24.421219]  __kmalloc_cache_noprof+0x189/0x420
[   24.421440]  kmalloc_oob_memset_8+0xac/0x330
[   24.421646]  kunit_try_run_case+0x1a5/0x480
[   24.422154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.422420]  kthread+0x337/0x6f0
[   24.422607]  ret_from_fork+0x116/0x1d0
[   24.423067]  ret_from_fork_asm+0x1a/0x30
[   24.423283] 
[   24.423386] The buggy address belongs to the object at ffff888103e99200
[   24.423386]  which belongs to the cache kmalloc-128 of size 128
[   24.424095] The buggy address is located 113 bytes inside of
[   24.424095]  allocated 120-byte region [ffff888103e99200, ffff888103e99278)
[   24.424702] 
[   24.424805] The buggy address belongs to the physical page:
[   24.425368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e99
[   24.425935] flags: 0x200000000000000(node=0|zone=2)
[   24.426179] page_type: f5(slab)
[   24.426352] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.426609] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.426994] page dumped because: kasan: bad access detected
[   24.427321] 
[   24.427384] Memory state around the buggy address:
[   24.427592]  ffff888103e99100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.427984]  ffff888103e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.428242] >ffff888103e99200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.428630]                                                                 ^
[   24.428866]  ffff888103e99280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.429163]  ffff888103e99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.429484] ==================================================================