Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   25.558510] ==================================================================
[   25.568065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   25.575266] Write of size 4 at addr ffff000802408375 by task kunit_try_catch/221
[   25.582639] 
[   25.584127] CPU: 5 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   25.584183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.584199] Hardware name: WinLink E850-96 board (DT)
[   25.584221] Call trace:
[   25.584234]  show_stack+0x20/0x38 (C)
[   25.584268]  dump_stack_lvl+0x8c/0xd0
[   25.584302]  print_report+0x118/0x608
[   25.584331]  kasan_report+0xdc/0x128
[   25.584356]  kasan_check_range+0x100/0x1a8
[   25.584386]  __asan_memset+0x34/0x78
[   25.584415]  kmalloc_oob_memset_4+0x150/0x300
[   25.584451]  kunit_try_run_case+0x170/0x3f0
[   25.584486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.584523]  kthread+0x328/0x630
[   25.584556]  ret_from_fork+0x10/0x20
[   25.584590] 
[   25.650001] Allocated by task 221:
[   25.653388]  kasan_save_stack+0x3c/0x68
[   25.657205]  kasan_save_track+0x20/0x40
[   25.661026]  kasan_save_alloc_info+0x40/0x58
[   25.665278]  __kasan_kmalloc+0xd4/0xd8
[   25.669010]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.673524]  kmalloc_oob_memset_4+0xb0/0x300
[   25.677778]  kunit_try_run_case+0x170/0x3f0
[   25.681944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.687413]  kthread+0x328/0x630
[   25.690625]  ret_from_fork+0x10/0x20
[   25.694183] 
[   25.695661] The buggy address belongs to the object at ffff000802408300
[   25.695661]  which belongs to the cache kmalloc-128 of size 128
[   25.708161] The buggy address is located 117 bytes inside of
[   25.708161]  allocated 120-byte region [ffff000802408300, ffff000802408378)
[   25.720745] 
[   25.722224] The buggy address belongs to the physical page:
[   25.727782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   25.735766] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.743405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.750348] page_type: f5(slab)
[   25.753483] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.761203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.768929] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.776741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.784555] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   25.792366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.800171] page dumped because: kasan: bad access detected
[   25.805728] 
[   25.807202] Memory state around the buggy address:
[   25.811984]  ffff000802408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.819185]  ffff000802408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.826390] >ffff000802408300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.833591]                                                                 ^
[   25.840713]  ffff000802408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.847919]  ffff000802408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855120] ==================================================================

[   18.038720] ==================================================================
[   18.040270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   18.040381] Write of size 4 at addr fff00000c3f75575 by task kunit_try_catch/177
[   18.040432] 
[   18.040471] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.040556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.040584] Hardware name: linux,dummy-virt (DT)
[   18.040616] Call trace:
[   18.040640]  show_stack+0x20/0x38 (C)
[   18.040691]  dump_stack_lvl+0x8c/0xd0
[   18.040740]  print_report+0x118/0x608
[   18.040785]  kasan_report+0xdc/0x128
[   18.040828]  kasan_check_range+0x100/0x1a8
[   18.040875]  __asan_memset+0x34/0x78
[   18.040919]  kmalloc_oob_memset_4+0x150/0x300
[   18.040968]  kunit_try_run_case+0x170/0x3f0
[   18.041017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.041071]  kthread+0x328/0x630
[   18.041116]  ret_from_fork+0x10/0x20
[   18.041166] 
[   18.041185] Allocated by task 177:
[   18.041212]  kasan_save_stack+0x3c/0x68
[   18.041252]  kasan_save_track+0x20/0x40
[   18.041288]  kasan_save_alloc_info+0x40/0x58
[   18.041327]  __kasan_kmalloc+0xd4/0xd8
[   18.044885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.045740]  kmalloc_oob_memset_4+0xb0/0x300
[   18.045829]  kunit_try_run_case+0x170/0x3f0
[   18.045872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.046089]  kthread+0x328/0x630
[   18.046134]  ret_from_fork+0x10/0x20
[   18.046275] 
[   18.046297] The buggy address belongs to the object at fff00000c3f75500
[   18.046297]  which belongs to the cache kmalloc-128 of size 128
[   18.046376] The buggy address is located 117 bytes inside of
[   18.046376]  allocated 120-byte region [fff00000c3f75500, fff00000c3f75578)
[   18.046441] 
[   18.046462] The buggy address belongs to the physical page:
[   18.046495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   18.046550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.046601] page_type: f5(slab)
[   18.046644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.046693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.046731] page dumped because: kasan: bad access detected
[   18.046761] 
[   18.046779] Memory state around the buggy address:
[   18.046812]  fff00000c3f75400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.046854]  fff00000c3f75480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.046896] >fff00000c3f75500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.046932]                                                                 ^
[   18.046972]  fff00000c3f75580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047021]  fff00000c3f75600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047057] ==================================================================

[   16.638073] ==================================================================
[   16.639180] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   16.639816] Write of size 4 at addr ffff888101de5575 by task kunit_try_catch/195
[   16.640604] 
[   16.640847] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   16.640954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.640977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.641019] Call Trace:
[   16.641044]  <TASK>
[   16.641084]  dump_stack_lvl+0x73/0xb0
[   16.641194]  print_report+0xd1/0x650
[   16.641246]  ? __virt_addr_valid+0x1db/0x2d0
[   16.641300]  ? kmalloc_oob_memset_4+0x166/0x330
[   16.641344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.641387]  ? kmalloc_oob_memset_4+0x166/0x330
[   16.641436]  kasan_report+0x141/0x180
[   16.641486]  ? kmalloc_oob_memset_4+0x166/0x330
[   16.641548]  kasan_check_range+0x10c/0x1c0
[   16.641587]  __asan_memset+0x27/0x50
[   16.641882]  kmalloc_oob_memset_4+0x166/0x330
[   16.641940]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   16.641993]  ? __schedule+0x10cc/0x2b30
[   16.642046]  ? __pfx_read_tsc+0x10/0x10
[   16.642094]  ? ktime_get_ts64+0x86/0x230
[   16.642166]  kunit_try_run_case+0x1a5/0x480
[   16.642226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.642272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.642313]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.642349]  ? __kthread_parkme+0x82/0x180
[   16.642381]  ? preempt_count_sub+0x50/0x80
[   16.642421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.642457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.642491]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.642523]  kthread+0x337/0x6f0
[   16.642550]  ? trace_preempt_on+0x20/0xc0
[   16.642586]  ? __pfx_kthread+0x10/0x10
[   16.642614]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.642647]  ? calculate_sigpending+0x7b/0xa0
[   16.642681]  ? __pfx_kthread+0x10/0x10
[   16.642709]  ret_from_fork+0x41/0x80
[   16.642742]  ? __pfx_kthread+0x10/0x10
[   16.642791]  ret_from_fork_asm+0x1a/0x30
[   16.642838]  </TASK>
[   16.642854] 
[   16.656896] Allocated by task 195:
[   16.657730]  kasan_save_stack+0x45/0x70
[   16.658235]  kasan_save_track+0x18/0x40
[   16.658625]  kasan_save_alloc_info+0x3b/0x50
[   16.658996]  __kasan_kmalloc+0xb7/0xc0
[   16.659255]  __kmalloc_cache_noprof+0x189/0x420
[   16.659569]  kmalloc_oob_memset_4+0xac/0x330
[   16.660012]  kunit_try_run_case+0x1a5/0x480
[   16.661064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.661524]  kthread+0x337/0x6f0
[   16.661928]  ret_from_fork+0x41/0x80
[   16.662303]  ret_from_fork_asm+0x1a/0x30
[   16.662800] 
[   16.662992] The buggy address belongs to the object at ffff888101de5500
[   16.662992]  which belongs to the cache kmalloc-128 of size 128
[   16.664024] The buggy address is located 117 bytes inside of
[   16.664024]  allocated 120-byte region [ffff888101de5500, ffff888101de5578)
[   16.665203] 
[   16.665968] The buggy address belongs to the physical page:
[   16.666493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de5
[   16.667092] flags: 0x200000000000000(node=0|zone=2)
[   16.667800] page_type: f5(slab)
[   16.668275] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.668712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.669096] page dumped because: kasan: bad access detected
[   16.670166] 
[   16.670651] Memory state around the buggy address:
[   16.671099]  ffff888101de5400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.671740]  ffff888101de5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.672134] >ffff888101de5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.672635]                                                                 ^
[   16.673098]  ffff888101de5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.673578]  ffff888101de5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.674408] ==================================================================