Date
July 3, 2025, 10:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 |
[ 52.517957] ================================================================== [ 52.529102] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 52.535207] Read of size 1 at addr ffff000085584198 by task kunit_try_catch/366 [ 52.542624] [ 52.544164] CPU: 3 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 52.544197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.544207] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.544219] Call trace: [ 52.544227] show_stack+0x20/0x38 (C) [ 52.544248] dump_stack_lvl+0x8c/0xd0 [ 52.544272] print_report+0x118/0x608 [ 52.544294] kasan_report+0xdc/0x128 [ 52.544314] __asan_report_load1_noabort+0x20/0x30 [ 52.544333] memcmp+0x198/0x1d8 [ 52.544351] kasan_memcmp+0x16c/0x300 [ 52.544369] kunit_try_run_case+0x170/0x3f0 [ 52.544388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.544411] kthread+0x328/0x630 [ 52.544427] ret_from_fork+0x10/0x20 [ 52.544446] [ 52.612808] Allocated by task 366: [ 52.616271] kasan_save_stack+0x3c/0x68 [ 52.620183] kasan_save_track+0x20/0x40 [ 52.624095] kasan_save_alloc_info+0x40/0x58 [ 52.628435] __kasan_kmalloc+0xd4/0xd8 [ 52.632258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.636874] kasan_memcmp+0xbc/0x300 [ 52.640511] kunit_try_run_case+0x170/0x3f0 [ 52.644767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.650342] kthread+0x328/0x630 [ 52.653633] ret_from_fork+0x10/0x20 [ 52.657272] [ 52.658803] The buggy address belongs to the object at ffff000085584180 [ 52.658803] which belongs to the cache kmalloc-32 of size 32 [ 52.671294] The buggy address is located 0 bytes to the right of [ 52.671294] allocated 24-byte region [ffff000085584180, ffff000085584198) [ 52.684315] [ 52.685847] The buggy address belongs to the physical page: [ 52.691495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105584 [ 52.699606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.706224] page_type: f5(slab) [ 52.709430] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 52.717276] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 52.725118] page dumped because: kasan: bad access detected [ 52.730769] [ 52.732304] Memory state around the buggy address: [ 52.737169] ffff000085584080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 52.744494] ffff000085584100: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 52.751810] >ffff000085584180: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.759125] ^ [ 52.763203] ffff000085584200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.770519] ffff000085584280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.777842] ==================================================================
[ 33.277181] ================================================================== [ 33.277253] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 33.277463] Read of size 1 at addr fff00000c5a8aad8 by task kunit_try_catch/289 [ 33.277795] [ 33.278077] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.278273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.278339] Hardware name: linux,dummy-virt (DT) [ 33.278610] Call trace: [ 33.278772] show_stack+0x20/0x38 (C) [ 33.278945] dump_stack_lvl+0x8c/0xd0 [ 33.279084] print_report+0x118/0x608 [ 33.279139] kasan_report+0xdc/0x128 [ 33.279190] __asan_report_load1_noabort+0x20/0x30 [ 33.279248] memcmp+0x198/0x1d8 [ 33.279464] kasan_memcmp+0x16c/0x300 [ 33.279563] kunit_try_run_case+0x170/0x3f0 [ 33.279623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.279685] kthread+0x328/0x630 [ 33.279924] ret_from_fork+0x10/0x20 [ 33.280052] [ 33.280073] Allocated by task 289: [ 33.280106] kasan_save_stack+0x3c/0x68 [ 33.280157] kasan_save_track+0x20/0x40 [ 33.280354] kasan_save_alloc_info+0x40/0x58 [ 33.280395] __kasan_kmalloc+0xd4/0xd8 [ 33.280635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.280984] kasan_memcmp+0xbc/0x300 [ 33.281031] kunit_try_run_case+0x170/0x3f0 [ 33.281099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.281149] kthread+0x328/0x630 [ 33.281184] ret_from_fork+0x10/0x20 [ 33.281258] [ 33.281282] The buggy address belongs to the object at fff00000c5a8aac0 [ 33.281282] which belongs to the cache kmalloc-32 of size 32 [ 33.281417] The buggy address is located 0 bytes to the right of [ 33.281417] allocated 24-byte region [fff00000c5a8aac0, fff00000c5a8aad8) [ 33.281693] [ 33.281767] The buggy address belongs to the physical page: [ 33.281803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8a [ 33.281923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.282043] page_type: f5(slab) [ 33.282089] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.282333] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.282563] page dumped because: kasan: bad access detected [ 33.282599] [ 33.282620] Memory state around the buggy address: [ 33.282746] fff00000c5a8a980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.282960] fff00000c5a8aa00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.283005] >fff00000c5a8aa80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.283102] ^ [ 33.283144] fff00000c5a8ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.283190] fff00000c5a8ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.283261] ==================================================================