Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   44.077211] ==================================================================
[   44.086249] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   44.093537] Write of size 128 at addr ffff00080244da00 by task kunit_try_catch/251
[   44.101088] 
[   44.102575] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   44.102630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.102645] Hardware name: WinLink E850-96 board (DT)
[   44.102668] Call trace:
[   44.102683]  show_stack+0x20/0x38 (C)
[   44.102715]  dump_stack_lvl+0x8c/0xd0
[   44.102750]  print_report+0x118/0x5d0
[   44.102779]  kasan_report+0xdc/0x128
[   44.102804]  kasan_check_range+0x100/0x1a8
[   44.102832]  __asan_memset+0x34/0x78
[   44.102860]  kmalloc_oob_in_memset+0x144/0x2d0
[   44.102891]  kunit_try_run_case+0x170/0x3f0
[   44.102922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.102955]  kthread+0x328/0x630
[   44.102981]  ret_from_fork+0x10/0x20
[   44.103012] 
[   44.169750] Allocated by task 251:
[   44.173139]  kasan_save_stack+0x3c/0x68
[   44.176955]  kasan_save_track+0x20/0x40
[   44.180775]  kasan_save_alloc_info+0x40/0x58
[   44.185028]  __kasan_kmalloc+0xd4/0xd8
[   44.188761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.193275]  kmalloc_oob_in_memset+0xb0/0x2d0
[   44.197616]  kunit_try_run_case+0x170/0x3f0
[   44.201781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.207250]  kthread+0x328/0x630
[   44.210462]  ret_from_fork+0x10/0x20
[   44.214021] 
[   44.215498] The buggy address belongs to the object at ffff00080244da00
[   44.215498]  which belongs to the cache kmalloc-128 of size 128
[   44.227998] The buggy address is located 0 bytes inside of
[   44.227998]  allocated 120-byte region [ffff00080244da00, ffff00080244da78)
[   44.240409] 
[   44.241890] The buggy address belongs to the physical page:
[   44.247446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   44.255429] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.263068] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.270011] page_type: f5(slab)
[   44.273148] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.280867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.288595] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.296405] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.304218] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   44.312030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.319835] page dumped because: kasan: bad access detected
[   44.325391] 
[   44.326866] Memory state around the buggy address:
[   44.331648]  ffff00080244d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.338849]  ffff00080244d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.346054] >ffff00080244da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.353255]                                                                 ^
[   44.360376]  ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.367581]  ffff00080244db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.374784] ==================================================================

[   30.600403] ==================================================================
[   30.600484] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.600607] Write of size 128 at addr fff00000c64f4700 by task kunit_try_catch/202
[   30.600793] 
[   30.600933] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.601295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.601354] Hardware name: linux,dummy-virt (DT)
[   30.601385] Call trace:
[   30.601406]  show_stack+0x20/0x38 (C)
[   30.601709]  dump_stack_lvl+0x8c/0xd0
[   30.602341]  print_report+0x118/0x5d0
[   30.602536]  kasan_report+0xdc/0x128
[   30.602586]  kasan_check_range+0x100/0x1a8
[   30.602644]  __asan_memset+0x34/0x78
[   30.602798]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.602846]  kunit_try_run_case+0x170/0x3f0
[   30.602912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.603234]  kthread+0x328/0x630
[   30.603301]  ret_from_fork+0x10/0x20
[   30.603350] 
[   30.603368] Allocated by task 202:
[   30.603395]  kasan_save_stack+0x3c/0x68
[   30.603446]  kasan_save_track+0x20/0x40
[   30.603495]  kasan_save_alloc_info+0x40/0x58
[   30.603533]  __kasan_kmalloc+0xd4/0xd8
[   30.603766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.604037]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.604077]  kunit_try_run_case+0x170/0x3f0
[   30.604113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.604154]  kthread+0x328/0x630
[   30.604499]  ret_from_fork+0x10/0x20
[   30.604564] 
[   30.604859] The buggy address belongs to the object at fff00000c64f4700
[   30.604859]  which belongs to the cache kmalloc-128 of size 128
[   30.605018] The buggy address is located 0 bytes inside of
[   30.605018]  allocated 120-byte region [fff00000c64f4700, fff00000c64f4778)
[   30.605092] 
[   30.605111] The buggy address belongs to the physical page:
[   30.605268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.605644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.605902] page_type: f5(slab)
[   30.606001] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.606049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.606087] page dumped because: kasan: bad access detected
[   30.606142] 
[   30.606160] Memory state around the buggy address:
[   30.606220]  fff00000c64f4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.606336]  fff00000c64f4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.606502] >fff00000c64f4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.606719]                                                                 ^
[   30.606824]  fff00000c64f4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.606865]  fff00000c64f4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.606901] ==================================================================

[   24.090268] ==================================================================
[   24.091240] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   24.091489] Write of size 128 at addr ffff8881041b9700 by task kunit_try_catch/218
[   24.092082] 
[   24.092369] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   24.092424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.092459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.092482] Call Trace:
[   24.092507]  <TASK>
[   24.092543]  dump_stack_lvl+0x73/0xb0
[   24.092579]  print_report+0xd1/0x610
[   24.092616]  ? __virt_addr_valid+0x1db/0x2d0
[   24.092647]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.092673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.092737]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.092764]  kasan_report+0x141/0x180
[   24.092804]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.092839]  kasan_check_range+0x10c/0x1c0
[   24.092867]  __asan_memset+0x27/0x50
[   24.092896]  kmalloc_oob_in_memset+0x15f/0x320
[   24.092923]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   24.092954]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   24.092987]  kunit_try_run_case+0x1a5/0x480
[   24.093015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.093041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.093068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.093095]  ? __kthread_parkme+0x82/0x180
[   24.093120]  ? preempt_count_sub+0x50/0x80
[   24.093150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.093177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.093208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.093239]  kthread+0x337/0x6f0
[   24.093263]  ? trace_preempt_on+0x20/0xc0
[   24.093292]  ? __pfx_kthread+0x10/0x10
[   24.093318]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.093347]  ? calculate_sigpending+0x7b/0xa0
[   24.093375]  ? __pfx_kthread+0x10/0x10
[   24.093402]  ret_from_fork+0x116/0x1d0
[   24.093425]  ? __pfx_kthread+0x10/0x10
[   24.093450]  ret_from_fork_asm+0x1a/0x30
[   24.093490]  </TASK>
[   24.093502] 
[   24.106412] Allocated by task 218:
[   24.106554]  kasan_save_stack+0x45/0x70
[   24.107082]  kasan_save_track+0x18/0x40
[   24.107483]  kasan_save_alloc_info+0x3b/0x50
[   24.108148]  __kasan_kmalloc+0xb7/0xc0
[   24.108539]  __kmalloc_cache_noprof+0x189/0x420
[   24.109089]  kmalloc_oob_in_memset+0xac/0x320
[   24.109427]  kunit_try_run_case+0x1a5/0x480
[   24.109597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.110237]  kthread+0x337/0x6f0
[   24.110592]  ret_from_fork+0x116/0x1d0
[   24.111048]  ret_from_fork_asm+0x1a/0x30
[   24.111367] 
[   24.111556] The buggy address belongs to the object at ffff8881041b9700
[   24.111556]  which belongs to the cache kmalloc-128 of size 128
[   24.112260] The buggy address is located 0 bytes inside of
[   24.112260]  allocated 120-byte region [ffff8881041b9700, ffff8881041b9778)
[   24.112873] 
[   24.113196] The buggy address belongs to the physical page:
[   24.113747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9
[   24.114464] flags: 0x200000000000000(node=0|zone=2)
[   24.114951] page_type: f5(slab)
[   24.115333] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.115720] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.116409] page dumped because: kasan: bad access detected
[   24.116954] 
[   24.117026] Memory state around the buggy address:
[   24.117182]  ffff8881041b9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.117398]  ffff8881041b9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.117629] >ffff8881041b9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.118031]                                                                 ^
[   24.118565]  ffff8881041b9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.118872]  ffff8881041b9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.119239] ==================================================================