Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 |
[ 39.932496] ================================================================== [ 39.942666] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 39.948652] Read of size 1 at addr ffff00080691e118 by task kunit_try_catch/302 [ 39.955944] [ 39.957430] CPU: 5 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 39.957492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.957511] Hardware name: WinLink E850-96 board (DT) [ 39.957535] Call trace: [ 39.957553] show_stack+0x20/0x38 (C) [ 39.957590] dump_stack_lvl+0x8c/0xd0 [ 39.957627] print_report+0x118/0x608 [ 39.957666] kasan_report+0xdc/0x128 [ 39.957699] __asan_report_load1_noabort+0x20/0x30 [ 39.957739] memcmp+0x198/0x1d8 [ 39.957774] kasan_memcmp+0x16c/0x300 [ 39.957804] kunit_try_run_case+0x170/0x3f0 [ 39.957837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.957875] kthread+0x328/0x630 [ 39.957913] ret_from_fork+0x10/0x20 [ 39.957949] [ 40.024084] Allocated by task 302: [ 40.027472] kasan_save_stack+0x3c/0x68 [ 40.031288] kasan_save_track+0x20/0x40 [ 40.035108] kasan_save_alloc_info+0x40/0x58 [ 40.039361] __kasan_kmalloc+0xd4/0xd8 [ 40.043094] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.047607] kasan_memcmp+0xbc/0x300 [ 40.051166] kunit_try_run_case+0x170/0x3f0 [ 40.055333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.060801] kthread+0x328/0x630 [ 40.064013] ret_from_fork+0x10/0x20 [ 40.067572] [ 40.069049] The buggy address belongs to the object at ffff00080691e100 [ 40.069049] which belongs to the cache kmalloc-32 of size 32 [ 40.081377] The buggy address is located 0 bytes to the right of [ 40.081377] allocated 24-byte region [ffff00080691e100, ffff00080691e118) [ 40.094221] [ 40.095700] The buggy address belongs to the physical page: [ 40.101256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88691e [ 40.109240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.115750] page_type: f5(slab) [ 40.118888] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.126606] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.134326] page dumped because: kasan: bad access detected [ 40.139880] [ 40.141356] Memory state around the buggy address: [ 40.146140] ffff00080691e000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.153339] ffff00080691e080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.160545] >ffff00080691e100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.167744] ^ [ 40.171741] ffff00080691e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.178947] ffff00080691e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.186148] ==================================================================