Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x86

[   25.297536] ==================================================================
[   25.307065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   25.314264] Write of size 2 at addr ffff000801a3d577 by task kunit_try_catch/221
[   25.321642] 
[   25.323129] CPU: 3 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   25.323182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.323199] Hardware name: WinLink E850-96 board (DT)
[   25.323220] Call trace:
[   25.323233]  show_stack+0x20/0x38 (C)
[   25.323265]  dump_stack_lvl+0x8c/0xd0
[   25.323304]  print_report+0x118/0x608
[   25.323335]  kasan_report+0xdc/0x128
[   25.323364]  kasan_check_range+0x100/0x1a8
[   25.323395]  __asan_memset+0x34/0x78
[   25.323422]  kmalloc_oob_memset_2+0x150/0x2f8
[   25.323457]  kunit_try_run_case+0x170/0x3f0
[   25.323493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.323530]  kthread+0x328/0x630
[   25.323564]  ret_from_fork+0x10/0x20
[   25.323599] 
[   25.389002] Allocated by task 221:
[   25.392390]  kasan_save_stack+0x3c/0x68
[   25.396205]  kasan_save_track+0x20/0x40
[   25.400025]  kasan_save_alloc_info+0x40/0x58
[   25.404278]  __kasan_kmalloc+0xd4/0xd8
[   25.408011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.412524]  kmalloc_oob_memset_2+0xb0/0x2f8
[   25.416779]  kunit_try_run_case+0x170/0x3f0
[   25.420945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.426413]  kthread+0x328/0x630
[   25.429625]  ret_from_fork+0x10/0x20
[   25.433184] 
[   25.434661] The buggy address belongs to the object at ffff000801a3d500
[   25.434661]  which belongs to the cache kmalloc-128 of size 128
[   25.447163] The buggy address is located 119 bytes inside of
[   25.447163]  allocated 120-byte region [ffff000801a3d500, ffff000801a3d578)
[   25.459746] 
[   25.461224] The buggy address belongs to the physical page:
[   25.466782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881a3c
[   25.474765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.482404] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.489348] page_type: f5(slab)
[   25.492485] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.500204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.507930] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.515741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.523554] head: 0bfffe0000000001 fffffdffe0068f01 00000000ffffffff 00000000ffffffff
[   25.531366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.539175] page dumped because: kasan: bad access detected
[   25.544727] 
[   25.546203] Memory state around the buggy address:
[   25.550986]  ffff000801a3d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.558186]  ffff000801a3d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.565392] >ffff000801a3d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.572592]                                                                 ^
[   25.579713]  ffff000801a3d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.586920]  ffff000801a3d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.594121] ==================================================================

[   15.585161] ==================================================================
[   15.585281] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   15.585332] Write of size 2 at addr fff00000c637a677 by task kunit_try_catch/177
[   15.585426] 
[   15.585485] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.585564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.585590] Hardware name: linux,dummy-virt (DT)
[   15.585674] Call trace:
[   15.585702]  show_stack+0x20/0x38 (C)
[   15.585785]  dump_stack_lvl+0x8c/0xd0
[   15.585863]  print_report+0x118/0x608
[   15.585907]  kasan_report+0xdc/0x128
[   15.586008]  kasan_check_range+0x100/0x1a8
[   15.586055]  __asan_memset+0x34/0x78
[   15.586114]  kmalloc_oob_memset_2+0x150/0x2f8
[   15.586161]  kunit_try_run_case+0x170/0x3f0
[   15.586212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.586355]  kthread+0x328/0x630
[   15.586424]  ret_from_fork+0x10/0x20
[   15.586493] 
[   15.586512] Allocated by task 177:
[   15.586539]  kasan_save_stack+0x3c/0x68
[   15.586592]  kasan_save_track+0x20/0x40
[   15.586638]  kasan_save_alloc_info+0x40/0x58
[   15.586713]  __kasan_kmalloc+0xd4/0xd8
[   15.586748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.586797]  kmalloc_oob_memset_2+0xb0/0x2f8
[   15.586881]  kunit_try_run_case+0x170/0x3f0
[   15.586953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.586997]  kthread+0x328/0x630
[   15.587031]  ret_from_fork+0x10/0x20
[   15.587273] 
[   15.587317] The buggy address belongs to the object at fff00000c637a600
[   15.587317]  which belongs to the cache kmalloc-128 of size 128
[   15.587371] The buggy address is located 119 bytes inside of
[   15.587371]  allocated 120-byte region [fff00000c637a600, fff00000c637a678)
[   15.587431] 
[   15.587451] The buggy address belongs to the physical page:
[   15.587514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.587684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.587768] page_type: f5(slab)
[   15.587841] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.587898] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.587936] page dumped because: kasan: bad access detected
[   15.588022] 
[   15.588261] Memory state around the buggy address:
[   15.588417]  fff00000c637a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.588570]  fff00000c637a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.588612] >fff00000c637a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.588657]                                                                 ^
[   15.588713]  fff00000c637a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.589016]  fff00000c637a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.589201] ==================================================================

[   14.340772] ==================================================================
[   14.341691] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   14.342328] Write of size 2 at addr ffff8881029e5677 by task kunit_try_catch/193
[   14.343084] 
[   14.343389] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   14.343544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.343572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.343619] Call Trace:
[   14.343651]  <TASK>
[   14.343688]  dump_stack_lvl+0x73/0xb0
[   14.343739]  print_report+0xd1/0x650
[   14.343773]  ? __virt_addr_valid+0x1db/0x2d0
[   14.343804]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.343834]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.343857]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.343881]  kasan_report+0x141/0x180
[   14.343904]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.343931]  kasan_check_range+0x10c/0x1c0
[   14.343953]  __asan_memset+0x27/0x50
[   14.343973]  kmalloc_oob_memset_2+0x166/0x330
[   14.343997]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   14.344020]  ? __schedule+0x10cc/0x2b60
[   14.344044]  ? __pfx_read_tsc+0x10/0x10
[   14.344068]  ? ktime_get_ts64+0x86/0x230
[   14.344103]  kunit_try_run_case+0x1a5/0x480
[   14.344129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.344151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.344176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.344199]  ? __kthread_parkme+0x82/0x180
[   14.344223]  ? preempt_count_sub+0x50/0x80
[   14.344249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.344273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.344296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.344319]  kthread+0x337/0x6f0
[   14.344355]  ? trace_preempt_on+0x20/0xc0
[   14.344383]  ? __pfx_kthread+0x10/0x10
[   14.344402]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.344424]  ? calculate_sigpending+0x7b/0xa0
[   14.344449]  ? __pfx_kthread+0x10/0x10
[   14.344468]  ret_from_fork+0x41/0x80
[   14.344489]  ? __pfx_kthread+0x10/0x10
[   14.344508]  ret_from_fork_asm+0x1a/0x30
[   14.344542]  </TASK>
[   14.344554] 
[   14.356553] Allocated by task 193:
[   14.356911]  kasan_save_stack+0x45/0x70
[   14.357382]  kasan_save_track+0x18/0x40
[   14.357574]  kasan_save_alloc_info+0x3b/0x50
[   14.357681]  __kasan_kmalloc+0xb7/0xc0
[   14.357773]  __kmalloc_cache_noprof+0x189/0x420
[   14.357874]  kmalloc_oob_memset_2+0xac/0x330
[   14.357972]  kunit_try_run_case+0x1a5/0x480
[   14.358093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.358597]  kthread+0x337/0x6f0
[   14.358959]  ret_from_fork+0x41/0x80
[   14.359302]  ret_from_fork_asm+0x1a/0x30
[   14.359691] 
[   14.359892] The buggy address belongs to the object at ffff8881029e5600
[   14.359892]  which belongs to the cache kmalloc-128 of size 128
[   14.361067] The buggy address is located 119 bytes inside of
[   14.361067]  allocated 120-byte region [ffff8881029e5600, ffff8881029e5678)
[   14.362219] 
[   14.362469] The buggy address belongs to the physical page:
[   14.362907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.363485] flags: 0x200000000000000(node=0|zone=2)
[   14.363842] page_type: f5(slab)
[   14.364168] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.364499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.365068] page dumped because: kasan: bad access detected
[   14.365357] 
[   14.365544] Memory state around the buggy address:
[   14.365923]  ffff8881029e5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.366567]  ffff8881029e5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.366947] >ffff8881029e5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.367539]                                                                 ^
[   14.367992]  ffff8881029e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368352]  ffff8881029e5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368849] ==================================================================

[   29.300910] ==================================================================
[   29.312352] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   29.319571] Write of size 2 at addr ffff8881049b7177 by task kunit_try_catch/215
[   29.326966] 
[   29.328464] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   29.328472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.328474] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.328477] Call Trace:
[   29.328478]  <TASK>
[   29.328480]  dump_stack_lvl+0x73/0xb0
[   29.328484]  print_report+0xd1/0x650
[   29.328488]  ? __virt_addr_valid+0x1db/0x2d0
[   29.328492]  ? kmalloc_oob_memset_2+0x166/0x330
[   29.328496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.328500]  ? kmalloc_oob_memset_2+0x166/0x330
[   29.328505]  kasan_report+0x141/0x180
[   29.328509]  ? kmalloc_oob_memset_2+0x166/0x330
[   29.328514]  kasan_check_range+0x10c/0x1c0
[   29.328518]  __asan_memset+0x27/0x50
[   29.328521]  kmalloc_oob_memset_2+0x166/0x330
[   29.328526]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   29.328530]  ? __schedule+0x10cc/0x2b60
[   29.328535]  ? ktime_get_ts64+0x83/0x230
[   29.328539]  kunit_try_run_case+0x1a2/0x480
[   29.328544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.328548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.328553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.328557]  ? __kthread_parkme+0x82/0x180
[   29.328561]  ? preempt_count_sub+0x50/0x80
[   29.328566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.328571]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.328575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.328579]  kthread+0x334/0x6f0
[   29.328582]  ? trace_preempt_on+0x20/0xc0
[   29.328586]  ? __pfx_kthread+0x10/0x10
[   29.328589]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.328594]  ? calculate_sigpending+0x7b/0xa0
[   29.328598]  ? __pfx_kthread+0x10/0x10
[   29.328601]  ret_from_fork+0x3e/0x80
[   29.328605]  ? __pfx_kthread+0x10/0x10
[   29.328608]  ret_from_fork_asm+0x1a/0x30
[   29.328613]  </TASK>
[   29.328615] 
[   29.495582] Allocated by task 215:
[   29.498988]  kasan_save_stack+0x45/0x70
[   29.502826]  kasan_save_track+0x18/0x40
[   29.506667]  kasan_save_alloc_info+0x3b/0x50
[   29.510952]  __kasan_kmalloc+0xb7/0xc0
[   29.514709]  __kmalloc_cache_noprof+0x189/0x420
[   29.519241]  kmalloc_oob_memset_2+0xac/0x330
[   29.523516]  kunit_try_run_case+0x1a2/0x480
[   29.527710]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.533108]  kthread+0x334/0x6f0
[   29.536340]  ret_from_fork+0x3e/0x80
[   29.539922]  ret_from_fork_asm+0x1a/0x30
[   29.543872] 
[   29.545363] The buggy address belongs to the object at ffff8881049b7100
[   29.545363]  which belongs to the cache kmalloc-128 of size 128
[   29.557879] The buggy address is located 119 bytes inside of
[   29.557879]  allocated 120-byte region [ffff8881049b7100, ffff8881049b7178)
[   29.570496] 
[   29.571997] The buggy address belongs to the physical page:
[   29.577570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7
[   29.585578] flags: 0x200000000000000(node=0|zone=2)
[   29.590457] page_type: f5(slab)
[   29.593605] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.601350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.609089] page dumped because: kasan: bad access detected
[   29.614663] 
[   29.616162] Memory state around the buggy address:
[   29.620955]  ffff8881049b7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.628182]  ffff8881049b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.635402] >ffff8881049b7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.642620]                                                                 ^
[   29.649752]  ffff8881049b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.656996]  ffff8881049b7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.664219] ==================================================================