Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   45.303861] ==================================================================
[   45.313664] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   45.320951] Write of size 16 at addr ffff000801af8169 by task kunit_try_catch/259
[   45.328415] 
[   45.329901] CPU: 3 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   45.329958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.329976] Hardware name: WinLink E850-96 board (DT)
[   45.329997] Call trace:
[   45.330009]  show_stack+0x20/0x38 (C)
[   45.330043]  dump_stack_lvl+0x8c/0xd0
[   45.330078]  print_report+0x118/0x5d0
[   45.330107]  kasan_report+0xdc/0x128
[   45.330134]  kasan_check_range+0x100/0x1a8
[   45.330164]  __asan_memset+0x34/0x78
[   45.330193]  kmalloc_oob_memset_16+0x150/0x2f8
[   45.330225]  kunit_try_run_case+0x170/0x3f0
[   45.330255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.330289]  kthread+0x328/0x630
[   45.330317]  ret_from_fork+0x10/0x20
[   45.330354] 
[   45.397078] Allocated by task 259:
[   45.400465]  kasan_save_stack+0x3c/0x68
[   45.404281]  kasan_save_track+0x20/0x40
[   45.408100]  kasan_save_alloc_info+0x40/0x58
[   45.412354]  __kasan_kmalloc+0xd4/0xd8
[   45.416086]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.420600]  kmalloc_oob_memset_16+0xb0/0x2f8
[   45.424940]  kunit_try_run_case+0x170/0x3f0
[   45.429107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.434576]  kthread+0x328/0x630
[   45.437788]  ret_from_fork+0x10/0x20
[   45.441346] 
[   45.442825] The buggy address belongs to the object at ffff000801af8100
[   45.442825]  which belongs to the cache kmalloc-128 of size 128
[   45.455324] The buggy address is located 105 bytes inside of
[   45.455324]  allocated 120-byte region [ffff000801af8100, ffff000801af8178)
[   45.467910] 
[   45.469387] The buggy address belongs to the physical page:
[   45.474944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881af8
[   45.482928] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   45.490568] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   45.497510] page_type: f5(slab)
[   45.500648] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.508366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.516094] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.523904] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.531717] head: 0bfffe0000000001 fffffdffe006be01 00000000ffffffff 00000000ffffffff
[   45.539528] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   45.547337] page dumped because: kasan: bad access detected
[   45.552889] 
[   45.554365] Memory state around the buggy address:
[   45.559148]  ffff000801af8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.566348]  ffff000801af8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.573553] >ffff000801af8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.580754]                                                                 ^
[   45.587875]  ffff000801af8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.595082]  ffff000801af8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.602283] ==================================================================

[   30.647561] ==================================================================
[   30.647864] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.647943] Write of size 16 at addr fff00000c64f4b69 by task kunit_try_catch/210
[   30.648036] 
[   30.648089] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.648191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.648233] Hardware name: linux,dummy-virt (DT)
[   30.648265] Call trace:
[   30.648314]  show_stack+0x20/0x38 (C)
[   30.648397]  dump_stack_lvl+0x8c/0xd0
[   30.648460]  print_report+0x118/0x5d0
[   30.648581]  kasan_report+0xdc/0x128
[   30.648721]  kasan_check_range+0x100/0x1a8
[   30.648784]  __asan_memset+0x34/0x78
[   30.648827]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.649114]  kunit_try_run_case+0x170/0x3f0
[   30.649234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.649318]  kthread+0x328/0x630
[   30.649382]  ret_from_fork+0x10/0x20
[   30.649459] 
[   30.649521] Allocated by task 210:
[   30.649576]  kasan_save_stack+0x3c/0x68
[   30.649674]  kasan_save_track+0x20/0x40
[   30.650013]  kasan_save_alloc_info+0x40/0x58
[   30.650147]  __kasan_kmalloc+0xd4/0xd8
[   30.650250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.650385]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.650472]  kunit_try_run_case+0x170/0x3f0
[   30.650565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.650707]  kthread+0x328/0x630
[   30.650761]  ret_from_fork+0x10/0x20
[   30.650799] 
[   30.650820] The buggy address belongs to the object at fff00000c64f4b00
[   30.650820]  which belongs to the cache kmalloc-128 of size 128
[   30.650901] The buggy address is located 105 bytes inside of
[   30.650901]  allocated 120-byte region [fff00000c64f4b00, fff00000c64f4b78)
[   30.650962] 
[   30.650985] The buggy address belongs to the physical page:
[   30.651258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.651343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.651417] page_type: f5(slab)
[   30.651520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.651606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.651713] page dumped because: kasan: bad access detected
[   30.651781] 
[   30.651840] Memory state around the buggy address:
[   30.651951]  fff00000c64f4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.652019]  fff00000c64f4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652081] >fff00000c64f4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.652119]                                                                 ^
[   30.652158]  fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652201]  fff00000c64f4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.652238] ==================================================================

[   24.205920] ==================================================================
[   24.207216] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   24.207595] Write of size 16 at addr ffff888105654d69 by task kunit_try_catch/226
[   24.208482] 
[   24.208823] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   24.208886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.208900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.208920] Call Trace:
[   24.209026]  <TASK>
[   24.209049]  dump_stack_lvl+0x73/0xb0
[   24.209081]  print_report+0xd1/0x610
[   24.209104]  ? __virt_addr_valid+0x1db/0x2d0
[   24.209126]  ? kmalloc_oob_memset_16+0x166/0x330
[   24.209148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.209210]  ? kmalloc_oob_memset_16+0x166/0x330
[   24.209234]  kasan_report+0x141/0x180
[   24.209257]  ? kmalloc_oob_memset_16+0x166/0x330
[   24.209283]  kasan_check_range+0x10c/0x1c0
[   24.209306]  __asan_memset+0x27/0x50
[   24.209328]  kmalloc_oob_memset_16+0x166/0x330
[   24.209350]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   24.209373]  ? __schedule+0x10cc/0x2b60
[   24.209394]  ? __pfx_read_tsc+0x10/0x10
[   24.209414]  ? ktime_get_ts64+0x86/0x230
[   24.209439]  kunit_try_run_case+0x1a5/0x480
[   24.209462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.209482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.209504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.209537]  ? __kthread_parkme+0x82/0x180
[   24.209556]  ? preempt_count_sub+0x50/0x80
[   24.209579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.209604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.209631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.209673]  kthread+0x337/0x6f0
[   24.209692]  ? trace_preempt_on+0x20/0xc0
[   24.209714]  ? __pfx_kthread+0x10/0x10
[   24.209735]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.209760]  ? calculate_sigpending+0x7b/0xa0
[   24.209785]  ? __pfx_kthread+0x10/0x10
[   24.209806]  ret_from_fork+0x116/0x1d0
[   24.209825]  ? __pfx_kthread+0x10/0x10
[   24.209845]  ret_from_fork_asm+0x1a/0x30
[   24.209876]  </TASK>
[   24.209887] 
[   24.218559] Allocated by task 226:
[   24.218731]  kasan_save_stack+0x45/0x70
[   24.218944]  kasan_save_track+0x18/0x40
[   24.219269]  kasan_save_alloc_info+0x3b/0x50
[   24.219425]  __kasan_kmalloc+0xb7/0xc0
[   24.219607]  __kmalloc_cache_noprof+0x189/0x420
[   24.220047]  kmalloc_oob_memset_16+0xac/0x330
[   24.220275]  kunit_try_run_case+0x1a5/0x480
[   24.220452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.220859]  kthread+0x337/0x6f0
[   24.221008]  ret_from_fork+0x116/0x1d0
[   24.221137]  ret_from_fork_asm+0x1a/0x30
[   24.221272] 
[   24.221349] The buggy address belongs to the object at ffff888105654d00
[   24.221349]  which belongs to the cache kmalloc-128 of size 128
[   24.221897] The buggy address is located 105 bytes inside of
[   24.221897]  allocated 120-byte region [ffff888105654d00, ffff888105654d78)
[   24.222404] 
[   24.222500] The buggy address belongs to the physical page:
[   24.222941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105654
[   24.223279] flags: 0x200000000000000(node=0|zone=2)
[   24.223462] page_type: f5(slab)
[   24.223717] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.224032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.224341] page dumped because: kasan: bad access detected
[   24.224594] 
[   24.224823] Memory state around the buggy address:
[   24.225058]  ffff888105654c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.225379]  ffff888105654c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.225708] >ffff888105654d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.225966]                                                                 ^
[   24.226307]  ffff888105654d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.226732]  ffff888105654e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.226955] ==================================================================