Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 20.862235] ================================================================== [ 20.873065] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.880348] Write of size 1 at addr ffff000805d69f00 by task kunit_try_catch/191 [ 20.887723] [ 20.889211] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.889268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.889285] Hardware name: WinLink E850-96 board (DT) [ 20.889306] Call trace: [ 20.889321] show_stack+0x20/0x38 (C) [ 20.889360] dump_stack_lvl+0x8c/0xd0 [ 20.889398] print_report+0x118/0x608 [ 20.889433] kasan_report+0xdc/0x128 [ 20.889466] __asan_report_store1_noabort+0x20/0x30 [ 20.889497] kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.889528] kunit_try_run_case+0x170/0x3f0 [ 20.889564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.889601] kthread+0x328/0x630 [ 20.889632] ret_from_fork+0x10/0x20 [ 20.889667] [ 20.952393] Allocated by task 191: [ 20.955781] kasan_save_stack+0x3c/0x68 [ 20.959598] kasan_save_track+0x20/0x40 [ 20.963416] kasan_save_alloc_info+0x40/0x58 [ 20.967669] __kasan_kmalloc+0xd4/0xd8 [ 20.971403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.975916] kmalloc_big_oob_right+0xb8/0x2f0 [ 20.980257] kunit_try_run_case+0x170/0x3f0 [ 20.984423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.989891] kthread+0x328/0x630 [ 20.993103] ret_from_fork+0x10/0x20 [ 20.996662] [ 20.998139] The buggy address belongs to the object at ffff000805d68000 [ 20.998139] which belongs to the cache kmalloc-8k of size 8192 [ 21.010640] The buggy address is located 0 bytes to the right of [ 21.010640] allocated 7936-byte region [ffff000805d68000, ffff000805d69f00) [ 21.023658] [ 21.025138] The buggy address belongs to the physical page: [ 21.030693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d68 [ 21.038677] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.046317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.053261] page_type: f5(slab) [ 21.056397] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.064116] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.071845] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.079653] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.087466] head: 0bfffe0000000003 fffffdffe0175a01 00000000ffffffff 00000000ffffffff [ 21.095278] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.103084] page dumped because: kasan: bad access detected [ 21.108641] [ 21.110115] Memory state around the buggy address: [ 21.114896] ffff000805d69e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.122098] ffff000805d69e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.129302] >ffff000805d69f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.136504] ^ [ 21.139720] ffff000805d69f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.146925] ffff000805d6a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.154128] ==================================================================
[ 24.712999] ================================================================== [ 24.713247] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.713367] Write of size 1 at addr fff00000c7791f00 by task kunit_try_catch/144 [ 24.713599] [ 24.713728] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.713948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.714013] Hardware name: linux,dummy-virt (DT) [ 24.714084] Call trace: [ 24.714140] show_stack+0x20/0x38 (C) [ 24.714257] dump_stack_lvl+0x8c/0xd0 [ 24.714383] print_report+0x118/0x608 [ 24.714725] kasan_report+0xdc/0x128 [ 24.715075] __asan_report_store1_noabort+0x20/0x30 [ 24.715271] kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.715547] kunit_try_run_case+0x170/0x3f0 [ 24.715685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.715838] kthread+0x328/0x630 [ 24.715981] ret_from_fork+0x10/0x20 [ 24.716207] [ 24.716277] Allocated by task 144: [ 24.716350] kasan_save_stack+0x3c/0x68 [ 24.716480] kasan_save_track+0x20/0x40 [ 24.716799] kasan_save_alloc_info+0x40/0x58 [ 24.716999] __kasan_kmalloc+0xd4/0xd8 [ 24.717111] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.717361] kmalloc_big_oob_right+0xb8/0x2f0 [ 24.717456] kunit_try_run_case+0x170/0x3f0 [ 24.717550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.717690] kthread+0x328/0x630 [ 24.717879] ret_from_fork+0x10/0x20 [ 24.717988] [ 24.718045] The buggy address belongs to the object at fff00000c7790000 [ 24.718045] which belongs to the cache kmalloc-8k of size 8192 [ 24.718431] The buggy address is located 0 bytes to the right of [ 24.718431] allocated 7936-byte region [fff00000c7790000, fff00000c7791f00) [ 24.718955] [ 24.719011] The buggy address belongs to the physical page: [ 24.719304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107790 [ 24.719530] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.719682] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.719808] page_type: f5(slab) [ 24.719912] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.720057] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.720727] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.721232] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.721525] head: 0bfffe0000000003 ffffc1ffc31de401 00000000ffffffff 00000000ffffffff [ 24.721664] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 24.722170] page dumped because: kasan: bad access detected [ 24.722273] [ 24.722327] Memory state around the buggy address: [ 24.722413] fff00000c7791e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.722658] fff00000c7791e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.722812] >fff00000c7791f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.723081] ^ [ 24.723154] fff00000c7791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.723258] fff00000c7792000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.723380] ==================================================================
[ 24.852463] ================================================================== [ 24.852607] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.852892] Write of size 1 at addr fff00000c64cdf00 by task kunit_try_catch/144 [ 24.853021] [ 24.853539] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.853774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.853908] Hardware name: linux,dummy-virt (DT) [ 24.853998] Call trace: [ 24.854063] show_stack+0x20/0x38 (C) [ 24.854188] dump_stack_lvl+0x8c/0xd0 [ 24.854499] print_report+0x118/0x608 [ 24.854629] kasan_report+0xdc/0x128 [ 24.854859] __asan_report_store1_noabort+0x20/0x30 [ 24.855097] kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.855226] kunit_try_run_case+0x170/0x3f0 [ 24.855574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.855710] kthread+0x328/0x630 [ 24.855850] ret_from_fork+0x10/0x20 [ 24.855977] [ 24.856029] Allocated by task 144: [ 24.856106] kasan_save_stack+0x3c/0x68 [ 24.856216] kasan_save_track+0x20/0x40 [ 24.856327] kasan_save_alloc_info+0x40/0x58 [ 24.856438] __kasan_kmalloc+0xd4/0xd8 [ 24.856546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.856662] kmalloc_big_oob_right+0xb8/0x2f0 [ 24.856775] kunit_try_run_case+0x170/0x3f0 [ 24.856919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.857041] kthread+0x328/0x630 [ 24.857154] ret_from_fork+0x10/0x20 [ 24.857251] [ 24.857306] The buggy address belongs to the object at fff00000c64cc000 [ 24.857306] which belongs to the cache kmalloc-8k of size 8192 [ 24.857451] The buggy address is located 0 bytes to the right of [ 24.857451] allocated 7936-byte region [fff00000c64cc000, fff00000c64cdf00) [ 24.857711] [ 24.857772] The buggy address belongs to the physical page: [ 24.857875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c8 [ 24.858015] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.858162] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.859214] page_type: f5(slab) [ 24.859339] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.859461] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.859584] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.859700] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.859827] head: 0bfffe0000000003 ffffc1ffc3193201 00000000ffffffff 00000000ffffffff [ 24.859980] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 24.860084] page dumped because: kasan: bad access detected [ 24.860250] [ 24.860326] Memory state around the buggy address: [ 24.860416] fff00000c64cde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.860519] fff00000c64cde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.860783] >fff00000c64cdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.860917] ^ [ 24.860997] fff00000c64cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.861158] fff00000c64ce000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.861263] ==================================================================
[ 17.560192] ================================================================== [ 17.561961] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 17.563137] Write of size 1 at addr ffff888103999f00 by task kunit_try_catch/162 [ 17.564017] [ 17.564582] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.564716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.564754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.564819] Call Trace: [ 17.564867] <TASK> [ 17.565102] dump_stack_lvl+0x73/0xb0 [ 17.565268] print_report+0xd1/0x650 [ 17.565373] ? __virt_addr_valid+0x1db/0x2d0 [ 17.565416] ? kmalloc_big_oob_right+0x316/0x370 [ 17.565451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.565481] ? kmalloc_big_oob_right+0x316/0x370 [ 17.565551] kasan_report+0x141/0x180 [ 17.565668] ? kmalloc_big_oob_right+0x316/0x370 [ 17.565742] __asan_report_store1_noabort+0x1b/0x30 [ 17.565806] kmalloc_big_oob_right+0x316/0x370 [ 17.565871] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 17.565911] ? __schedule+0x10cc/0x2b60 [ 17.565946] ? __pfx_read_tsc+0x10/0x10 [ 17.565976] ? ktime_get_ts64+0x86/0x230 [ 17.566010] kunit_try_run_case+0x1a5/0x480 [ 17.566048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.566081] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.566115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.566147] ? __kthread_parkme+0x82/0x180 [ 17.566175] ? preempt_count_sub+0x50/0x80 [ 17.566209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.566285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.566322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.566357] kthread+0x337/0x6f0 [ 17.566386] ? trace_preempt_on+0x20/0xc0 [ 17.566421] ? __pfx_kthread+0x10/0x10 [ 17.566450] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.566480] ? calculate_sigpending+0x7b/0xa0 [ 17.566551] ? __pfx_kthread+0x10/0x10 [ 17.566626] ret_from_fork+0x116/0x1d0 [ 17.566680] ? __pfx_kthread+0x10/0x10 [ 17.566711] ret_from_fork_asm+0x1a/0x30 [ 17.566755] </TASK> [ 17.566771] [ 17.589937] Allocated by task 162: [ 17.590631] kasan_save_stack+0x45/0x70 [ 17.591275] kasan_save_track+0x18/0x40 [ 17.591706] kasan_save_alloc_info+0x3b/0x50 [ 17.592163] __kasan_kmalloc+0xb7/0xc0 [ 17.592563] __kmalloc_cache_noprof+0x189/0x420 [ 17.593032] kmalloc_big_oob_right+0xa9/0x370 [ 17.593591] kunit_try_run_case+0x1a5/0x480 [ 17.593976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.594935] kthread+0x337/0x6f0 [ 17.595388] ret_from_fork+0x116/0x1d0 [ 17.596185] ret_from_fork_asm+0x1a/0x30 [ 17.596821] [ 17.597053] The buggy address belongs to the object at ffff888103998000 [ 17.597053] which belongs to the cache kmalloc-8k of size 8192 [ 17.598283] The buggy address is located 0 bytes to the right of [ 17.598283] allocated 7936-byte region [ffff888103998000, ffff888103999f00) [ 17.599858] [ 17.600288] The buggy address belongs to the physical page: [ 17.601050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103998 [ 17.602010] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.602674] flags: 0x200000000000040(head|node=0|zone=2) [ 17.603375] page_type: f5(slab) [ 17.603917] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 17.604756] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.605435] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 17.606708] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.607325] head: 0200000000000003 ffffea00040e6601 00000000ffffffff 00000000ffffffff [ 17.608116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.608955] page dumped because: kasan: bad access detected [ 17.609492] [ 17.609936] Memory state around the buggy address: [ 17.610406] ffff888103999e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.611435] ffff888103999e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.612210] >ffff888103999f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.613000] ^ [ 17.613396] ffff888103999f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.614202] ffff88810399a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.615008] ==================================================================
[ 16.751319] ================================================================== [ 16.752678] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 16.753692] Write of size 1 at addr ffff888102a0df00 by task kunit_try_catch/162 [ 16.754349] [ 16.754695] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 16.754856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.754913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.754970] Call Trace: [ 16.755004] <TASK> [ 16.755096] dump_stack_lvl+0x73/0xb0 [ 16.755213] print_report+0xd1/0x650 [ 16.755331] ? __virt_addr_valid+0x1db/0x2d0 [ 16.755379] ? kmalloc_big_oob_right+0x316/0x370 [ 16.755413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.755445] ? kmalloc_big_oob_right+0x316/0x370 [ 16.755477] kasan_report+0x141/0x180 [ 16.755510] ? kmalloc_big_oob_right+0x316/0x370 [ 16.755591] __asan_report_store1_noabort+0x1b/0x30 [ 16.755657] kmalloc_big_oob_right+0x316/0x370 [ 16.755692] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 16.755726] ? __schedule+0x10cc/0x2b60 [ 16.755759] ? __pfx_read_tsc+0x10/0x10 [ 16.755788] ? ktime_get_ts64+0x86/0x230 [ 16.755819] kunit_try_run_case+0x1a5/0x480 [ 16.755854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.755913] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.755952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.755986] ? __kthread_parkme+0x82/0x180 [ 16.756014] ? preempt_count_sub+0x50/0x80 [ 16.756044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.756078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.756129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.756175] kthread+0x337/0x6f0 [ 16.756205] ? trace_preempt_on+0x20/0xc0 [ 16.756237] ? __pfx_kthread+0x10/0x10 [ 16.756265] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.756296] ? calculate_sigpending+0x7b/0xa0 [ 16.756331] ? __pfx_kthread+0x10/0x10 [ 16.756360] ret_from_fork+0x116/0x1d0 [ 16.756384] ? __pfx_kthread+0x10/0x10 [ 16.756411] ret_from_fork_asm+0x1a/0x30 [ 16.756451] </TASK> [ 16.756465] [ 16.776306] Allocated by task 162: [ 16.777104] kasan_save_stack+0x45/0x70 [ 16.778007] kasan_save_track+0x18/0x40 [ 16.778293] kasan_save_alloc_info+0x3b/0x50 [ 16.779327] __kasan_kmalloc+0xb7/0xc0 [ 16.779761] __kmalloc_cache_noprof+0x189/0x420 [ 16.780835] kmalloc_big_oob_right+0xa9/0x370 [ 16.781583] kunit_try_run_case+0x1a5/0x480 [ 16.782307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.783190] kthread+0x337/0x6f0 [ 16.783614] ret_from_fork+0x116/0x1d0 [ 16.784421] ret_from_fork_asm+0x1a/0x30 [ 16.785021] [ 16.785212] The buggy address belongs to the object at ffff888102a0c000 [ 16.785212] which belongs to the cache kmalloc-8k of size 8192 [ 16.786979] The buggy address is located 0 bytes to the right of [ 16.786979] allocated 7936-byte region [ffff888102a0c000, ffff888102a0df00) [ 16.788597] [ 16.789057] The buggy address belongs to the physical page: [ 16.789692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08 [ 16.790800] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.791971] flags: 0x200000000000040(head|node=0|zone=2) [ 16.792394] page_type: f5(slab) [ 16.793245] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 16.794140] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.794698] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 16.795397] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.796692] head: 0200000000000003 ffffea00040a8201 00000000ffffffff 00000000ffffffff [ 16.797238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.798059] page dumped because: kasan: bad access detected [ 16.798933] [ 16.799092] Memory state around the buggy address: [ 16.799477] ffff888102a0de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.800694] ffff888102a0de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.801400] >ffff888102a0df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.802221] ^ [ 16.802500] ffff888102a0df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.803439] ffff888102a0e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.804304] ==================================================================
[ 19.874335] ================================================================== [ 19.875486] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 19.876178] Write of size 1 at addr ffff00000e5e1f00 by task kunit_try_catch/197 [ 19.876861] [ 19.877026] CPU: 2 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 19.877076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.877090] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.877107] Call trace: [ 19.877117] show_stack+0x20/0x38 (C) [ 19.877152] dump_stack_lvl+0x8c/0xd0 [ 19.877187] print_report+0x118/0x608 [ 19.877220] kasan_report+0xdc/0x128 [ 19.877252] __asan_report_store1_noabort+0x20/0x30 [ 19.877281] kmalloc_big_oob_right+0x2a4/0x2f0 [ 19.877311] kunit_try_run_case+0x170/0x3f0 [ 19.877344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.877381] kthread+0x328/0x630 [ 19.877408] ret_from_fork+0x10/0x20 [ 19.877439] [ 19.883049] Allocated by task 197: [ 19.883373] kasan_save_stack+0x3c/0x68 [ 19.883750] kasan_save_track+0x20/0x40 [ 19.884124] kasan_save_alloc_info+0x40/0x58 [ 19.884540] __kasan_kmalloc+0xd4/0xd8 [ 19.884906] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.885343] kmalloc_big_oob_right+0xb8/0x2f0 [ 19.885761] kunit_try_run_case+0x170/0x3f0 [ 19.886167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.886690] kthread+0x328/0x630 [ 19.887005] ret_from_fork+0x10/0x20 [ 19.887355] [ 19.887507] The buggy address belongs to the object at ffff00000e5e0000 [ 19.887507] which belongs to the cache kmalloc-8k of size 8192 [ 19.888638] The buggy address is located 0 bytes to the right of [ 19.888638] allocated 7936-byte region [ffff00000e5e0000, ffff00000e5e1f00) [ 19.889819] [ 19.889973] The buggy address belongs to the physical page: [ 19.890487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe5e0 [ 19.891210] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.891914] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.892564] page_type: f5(slab) [ 19.892879] raw: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000 [ 19.893594] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.894308] head: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000 [ 19.895030] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.895752] head: 03fffe0000000003 fffffdffc0397801 00000000ffffffff 00000000ffffffff [ 19.896474] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.897189] page dumped because: kasan: bad access detected [ 19.897703] [ 19.897854] Memory state around the buggy address: [ 19.898302] ffff00000e5e1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.898966] ffff00000e5e1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.899631] >ffff00000e5e1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.900291] ^ [ 19.900601] ffff00000e5e1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.901265] ffff00000e5e2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.901925] ==================================================================