Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x86

[   25.602835] ==================================================================
[   25.612612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   25.619815] Write of size 4 at addr ffff0008018e6e75 by task kunit_try_catch/223
[   25.627192] 
[   25.628677] CPU: 2 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   25.628726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.628743] Hardware name: WinLink E850-96 board (DT)
[   25.628764] Call trace:
[   25.628779]  show_stack+0x20/0x38 (C)
[   25.628812]  dump_stack_lvl+0x8c/0xd0
[   25.628847]  print_report+0x118/0x608
[   25.628878]  kasan_report+0xdc/0x128
[   25.628906]  kasan_check_range+0x100/0x1a8
[   25.628937]  __asan_memset+0x34/0x78
[   25.628966]  kmalloc_oob_memset_4+0x150/0x300
[   25.628997]  kunit_try_run_case+0x170/0x3f0
[   25.629034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.629070]  kthread+0x328/0x630
[   25.629105]  ret_from_fork+0x10/0x20
[   25.629138] 
[   25.694552] Allocated by task 223:
[   25.697941]  kasan_save_stack+0x3c/0x68
[   25.701756]  kasan_save_track+0x20/0x40
[   25.705576]  kasan_save_alloc_info+0x40/0x58
[   25.709829]  __kasan_kmalloc+0xd4/0xd8
[   25.713562]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.718076]  kmalloc_oob_memset_4+0xb0/0x300
[   25.722329]  kunit_try_run_case+0x170/0x3f0
[   25.726496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.731964]  kthread+0x328/0x630
[   25.735176]  ret_from_fork+0x10/0x20
[   25.738735] 
[   25.740213] The buggy address belongs to the object at ffff0008018e6e00
[   25.740213]  which belongs to the cache kmalloc-128 of size 128
[   25.752714] The buggy address is located 117 bytes inside of
[   25.752714]  allocated 120-byte region [ffff0008018e6e00, ffff0008018e6e78)
[   25.765297] 
[   25.766776] The buggy address belongs to the physical page:
[   25.772333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   25.780317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.787955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.794899] page_type: f5(slab)
[   25.798034] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.805755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.813481] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.821293] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.829106] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   25.836921] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.844723] page dumped because: kasan: bad access detected
[   25.850278] 
[   25.851754] Memory state around the buggy address:
[   25.856533]  ffff0008018e6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.863737]  ffff0008018e6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.870943] >ffff0008018e6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.878143]                                                                 ^
[   25.885264]  ffff0008018e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.892469]  ffff0008018e6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.899672] ==================================================================

[   15.593737] ==================================================================
[   15.593793] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   15.593842] Write of size 4 at addr fff00000c637a775 by task kunit_try_catch/179
[   15.593889] 
[   15.593919] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.594002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.594027] Hardware name: linux,dummy-virt (DT)
[   15.594056] Call trace:
[   15.594077]  show_stack+0x20/0x38 (C)
[   15.594122]  dump_stack_lvl+0x8c/0xd0
[   15.594168]  print_report+0x118/0x608
[   15.594211]  kasan_report+0xdc/0x128
[   15.594271]  kasan_check_range+0x100/0x1a8
[   15.594317]  __asan_memset+0x34/0x78
[   15.594359]  kmalloc_oob_memset_4+0x150/0x300
[   15.594432]  kunit_try_run_case+0x170/0x3f0
[   15.594479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.594530]  kthread+0x328/0x630
[   15.594572]  ret_from_fork+0x10/0x20
[   15.594617] 
[   15.594646] Allocated by task 179:
[   15.594672]  kasan_save_stack+0x3c/0x68
[   15.594708]  kasan_save_track+0x20/0x40
[   15.594742]  kasan_save_alloc_info+0x40/0x58
[   15.594779]  __kasan_kmalloc+0xd4/0xd8
[   15.594823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.594859]  kmalloc_oob_memset_4+0xb0/0x300
[   15.594897]  kunit_try_run_case+0x170/0x3f0
[   15.595004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.595048]  kthread+0x328/0x630
[   15.595108]  ret_from_fork+0x10/0x20
[   15.595143] 
[   15.595182] The buggy address belongs to the object at fff00000c637a700
[   15.595182]  which belongs to the cache kmalloc-128 of size 128
[   15.595244] The buggy address is located 117 bytes inside of
[   15.595244]  allocated 120-byte region [fff00000c637a700, fff00000c637a778)
[   15.595303] 
[   15.595322] The buggy address belongs to the physical page:
[   15.595609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.595712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.595789] page_type: f5(slab)
[   15.595825] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.595929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.595975] page dumped because: kasan: bad access detected
[   15.596026] 
[   15.596090] Memory state around the buggy address:
[   15.596120]  fff00000c637a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.596160]  fff00000c637a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.596200] >fff00000c637a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.596235]                                                                 ^
[   15.596273]  fff00000c637a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.596312]  fff00000c637a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.596348] ==================================================================

[   14.375586] ==================================================================
[   14.376122] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   14.376862] Write of size 4 at addr ffff8881029e5775 by task kunit_try_catch/195
[   14.377541] 
[   14.377996] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   14.378175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.378209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.378274] Call Trace:
[   14.378306]  <TASK>
[   14.378360]  dump_stack_lvl+0x73/0xb0
[   14.378403]  print_report+0xd1/0x650
[   14.378431]  ? __virt_addr_valid+0x1db/0x2d0
[   14.378457]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.378481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.378506]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.378530]  kasan_report+0x141/0x180
[   14.378553]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.378581]  kasan_check_range+0x10c/0x1c0
[   14.378602]  __asan_memset+0x27/0x50
[   14.378623]  kmalloc_oob_memset_4+0x166/0x330
[   14.378647]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   14.378673]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   14.378700]  kunit_try_run_case+0x1a5/0x480
[   14.378727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.378749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.378774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.378798]  ? __kthread_parkme+0x82/0x180
[   14.378822]  ? preempt_count_sub+0x50/0x80
[   14.378849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.378873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.378897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.378920]  kthread+0x337/0x6f0
[   14.378938]  ? trace_preempt_on+0x20/0xc0
[   14.378963]  ? __pfx_kthread+0x10/0x10
[   14.378982]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.379004]  ? calculate_sigpending+0x7b/0xa0
[   14.379028]  ? __pfx_kthread+0x10/0x10
[   14.379048]  ret_from_fork+0x41/0x80
[   14.379104]  ? __pfx_kthread+0x10/0x10
[   14.379126]  ret_from_fork_asm+0x1a/0x30
[   14.379159]  </TASK>
[   14.379172] 
[   14.389268] Allocated by task 195:
[   14.389491]  kasan_save_stack+0x45/0x70
[   14.389876]  kasan_save_track+0x18/0x40
[   14.390296]  kasan_save_alloc_info+0x3b/0x50
[   14.390724]  __kasan_kmalloc+0xb7/0xc0
[   14.391083]  __kmalloc_cache_noprof+0x189/0x420
[   14.391501]  kmalloc_oob_memset_4+0xac/0x330
[   14.391909]  kunit_try_run_case+0x1a5/0x480
[   14.392364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.392602]  kthread+0x337/0x6f0
[   14.392820]  ret_from_fork+0x41/0x80
[   14.392995]  ret_from_fork_asm+0x1a/0x30
[   14.393493] 
[   14.393731] The buggy address belongs to the object at ffff8881029e5700
[   14.393731]  which belongs to the cache kmalloc-128 of size 128
[   14.394251] The buggy address is located 117 bytes inside of
[   14.394251]  allocated 120-byte region [ffff8881029e5700, ffff8881029e5778)
[   14.394762] 
[   14.394894] The buggy address belongs to the physical page:
[   14.395134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.395461] flags: 0x200000000000000(node=0|zone=2)
[   14.395706] page_type: f5(slab)
[   14.395926] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.396251] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.396630] page dumped because: kasan: bad access detected
[   14.396883] 
[   14.397022] Memory state around the buggy address:
[   14.397545]  ffff8881029e5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.397810]  ffff8881029e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.398086] >ffff8881029e5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.398428]                                                                 ^
[   14.398820]  ffff8881029e5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.399103]  ffff8881029e5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.399581] ==================================================================

[   29.671730] ==================================================================
[   29.683061] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   29.690288] Write of size 4 at addr ffff8881049b7275 by task kunit_try_catch/217
[   29.697689] 
[   29.699189] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   29.699197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.699199] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.699202] Call Trace:
[   29.699204]  <TASK>
[   29.699205]  dump_stack_lvl+0x73/0xb0
[   29.699209]  print_report+0xd1/0x650
[   29.699213]  ? __virt_addr_valid+0x1db/0x2d0
[   29.699217]  ? kmalloc_oob_memset_4+0x166/0x330
[   29.699222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.699226]  ? kmalloc_oob_memset_4+0x166/0x330
[   29.699230]  kasan_report+0x141/0x180
[   29.699235]  ? kmalloc_oob_memset_4+0x166/0x330
[   29.699240]  kasan_check_range+0x10c/0x1c0
[   29.699243]  __asan_memset+0x27/0x50
[   29.699247]  kmalloc_oob_memset_4+0x166/0x330
[   29.699252]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   29.699256]  ? __schedule+0x10cc/0x2b60
[   29.699261]  ? ktime_get_ts64+0x83/0x230
[   29.699265]  kunit_try_run_case+0x1a2/0x480
[   29.699270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.699274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.699279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.699283]  ? __kthread_parkme+0x82/0x180
[   29.699287]  ? preempt_count_sub+0x50/0x80
[   29.699292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.699297]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.699301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.699305]  kthread+0x334/0x6f0
[   29.699308]  ? trace_preempt_on+0x20/0xc0
[   29.699312]  ? __pfx_kthread+0x10/0x10
[   29.699315]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.699320]  ? calculate_sigpending+0x7b/0xa0
[   29.699323]  ? __pfx_kthread+0x10/0x10
[   29.699327]  ret_from_fork+0x3e/0x80
[   29.699331]  ? __pfx_kthread+0x10/0x10
[   29.699334]  ret_from_fork_asm+0x1a/0x30
[   29.699339]  </TASK>
[   29.699341] 
[   29.866316] Allocated by task 217:
[   29.869721]  kasan_save_stack+0x45/0x70
[   29.873559]  kasan_save_track+0x18/0x40
[   29.877400]  kasan_save_alloc_info+0x3b/0x50
[   29.881672]  __kasan_kmalloc+0xb7/0xc0
[   29.885425]  __kmalloc_cache_noprof+0x189/0x420
[   29.889956]  kmalloc_oob_memset_4+0xac/0x330
[   29.894229]  kunit_try_run_case+0x1a2/0x480
[   29.898415]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.903815]  kthread+0x334/0x6f0
[   29.907047]  ret_from_fork+0x3e/0x80
[   29.910628]  ret_from_fork_asm+0x1a/0x30
[   29.914553] 
[   29.916052] The buggy address belongs to the object at ffff8881049b7200
[   29.916052]  which belongs to the cache kmalloc-128 of size 128
[   29.928569] The buggy address is located 117 bytes inside of
[   29.928569]  allocated 120-byte region [ffff8881049b7200, ffff8881049b7278)
[   29.941169] 
[   29.942669] The buggy address belongs to the physical page:
[   29.948240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7
[   29.956241] flags: 0x200000000000000(node=0|zone=2)
[   29.961119] page_type: f5(slab)
[   29.964266] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.972007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.979751] page dumped because: kasan: bad access detected
[   29.985327] 
[   29.986824] Memory state around the buggy address:
[   29.991617]  ffff8881049b7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.998837]  ffff8881049b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.006058] >ffff8881049b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.013275]                                                                 ^
[   30.020407]  ffff8881049b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.027626]  ffff8881049b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034845] ==================================================================