Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 45.403157] ================================================================== [ 45.412737] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 45.420028] Write of size 16 at addr ffff00080193ae69 by task kunit_try_catch/262 [ 45.427490] [ 45.428974] CPU: 2 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 45.429027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.429045] Hardware name: WinLink E850-96 board (DT) [ 45.429071] Call trace: [ 45.429083] show_stack+0x20/0x38 (C) [ 45.429119] dump_stack_lvl+0x8c/0xd0 [ 45.429151] print_report+0x118/0x5d0 [ 45.429180] kasan_report+0xdc/0x128 [ 45.429210] kasan_check_range+0x100/0x1a8 [ 45.429239] __asan_memset+0x34/0x78 [ 45.429269] kmalloc_oob_memset_16+0x150/0x2f8 [ 45.429302] kunit_try_run_case+0x170/0x3f0 [ 45.429339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.429372] kthread+0x328/0x630 [ 45.429402] ret_from_fork+0x10/0x20 [ 45.429436] [ 45.496151] Allocated by task 262: [ 45.499540] kasan_save_stack+0x3c/0x68 [ 45.503356] kasan_save_track+0x20/0x40 [ 45.507175] kasan_save_alloc_info+0x40/0x58 [ 45.511428] __kasan_kmalloc+0xd4/0xd8 [ 45.515161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.519675] kmalloc_oob_memset_16+0xb0/0x2f8 [ 45.524016] kunit_try_run_case+0x170/0x3f0 [ 45.528181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.533651] kthread+0x328/0x630 [ 45.536862] ret_from_fork+0x10/0x20 [ 45.540421] [ 45.541898] The buggy address belongs to the object at ffff00080193ae00 [ 45.541898] which belongs to the cache kmalloc-128 of size 128 [ 45.554399] The buggy address is located 105 bytes inside of [ 45.554399] allocated 120-byte region [ffff00080193ae00, ffff00080193ae78) [ 45.566983] [ 45.568463] The buggy address belongs to the physical page: [ 45.574018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 45.582003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 45.589643] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 45.596585] page_type: f5(slab) [ 45.599721] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.607441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.615167] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.622978] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.630791] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 45.638603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.646409] page dumped because: kasan: bad access detected [ 45.651964] [ 45.653440] Memory state around the buggy address: [ 45.658220] ffff00080193ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.665423] ffff00080193ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.672632] >ffff00080193ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 45.679829] ^ [ 45.686950] ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.694155] ffff00080193af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.701356] ==================================================================
[ 30.438751] ================================================================== [ 30.438860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.438935] Write of size 16 at addr fff00000c91b3b69 by task kunit_try_catch/209 [ 30.438986] [ 30.439033] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.439300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.439398] Hardware name: linux,dummy-virt (DT) [ 30.439511] Call trace: [ 30.439537] show_stack+0x20/0x38 (C) [ 30.439589] dump_stack_lvl+0x8c/0xd0 [ 30.439942] print_report+0x118/0x5d0 [ 30.440024] kasan_report+0xdc/0x128 [ 30.440067] kasan_check_range+0x100/0x1a8 [ 30.440111] __asan_memset+0x34/0x78 [ 30.440153] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.440199] kunit_try_run_case+0x170/0x3f0 [ 30.440289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.440494] kthread+0x328/0x630 [ 30.440544] ret_from_fork+0x10/0x20 [ 30.440763] [ 30.440851] Allocated by task 209: [ 30.440903] kasan_save_stack+0x3c/0x68 [ 30.441030] kasan_save_track+0x20/0x40 [ 30.441074] kasan_save_alloc_info+0x40/0x58 [ 30.441111] __kasan_kmalloc+0xd4/0xd8 [ 30.441154] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.441226] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.441338] kunit_try_run_case+0x170/0x3f0 [ 30.441401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.441447] kthread+0x328/0x630 [ 30.441481] ret_from_fork+0x10/0x20 [ 30.441518] [ 30.441541] The buggy address belongs to the object at fff00000c91b3b00 [ 30.441541] which belongs to the cache kmalloc-128 of size 128 [ 30.441599] The buggy address is located 105 bytes inside of [ 30.441599] allocated 120-byte region [fff00000c91b3b00, fff00000c91b3b78) [ 30.442009] [ 30.442033] The buggy address belongs to the physical page: [ 30.442101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.442389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.442672] page_type: f5(slab) [ 30.442731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.442983] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.443155] page dumped because: kasan: bad access detected [ 30.443373] [ 30.443398] Memory state around the buggy address: [ 30.443436] fff00000c91b3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.443481] fff00000c91b3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.443775] >fff00000c91b3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.443884] ^ [ 30.443986] fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.444028] fff00000c91b3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.444068] ==================================================================
[ 23.914520] ================================================================== [ 23.915017] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 23.915244] Write of size 16 at addr ffff888105745169 by task kunit_try_catch/228 [ 23.916435] [ 23.916657] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 23.916855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.916872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.916894] Call Trace: [ 23.916907] <TASK> [ 23.916925] dump_stack_lvl+0x73/0xb0 [ 23.916958] print_report+0xd1/0x610 [ 23.916982] ? __virt_addr_valid+0x1db/0x2d0 [ 23.917008] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.917029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.917055] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.917076] kasan_report+0x141/0x180 [ 23.917098] ? kmalloc_oob_memset_16+0x166/0x330 [ 23.917125] kasan_check_range+0x10c/0x1c0 [ 23.917149] __asan_memset+0x27/0x50 [ 23.917172] kmalloc_oob_memset_16+0x166/0x330 [ 23.917193] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 23.917217] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 23.917242] kunit_try_run_case+0x1a5/0x480 [ 23.917263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.917283] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.917307] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.917329] ? __kthread_parkme+0x82/0x180 [ 23.917351] ? preempt_count_sub+0x50/0x80 [ 23.917394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.917425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.917450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.917474] kthread+0x337/0x6f0 [ 23.917495] ? trace_preempt_on+0x20/0xc0 [ 23.917518] ? __pfx_kthread+0x10/0x10 [ 23.917539] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.917566] ? calculate_sigpending+0x7b/0xa0 [ 23.917591] ? __pfx_kthread+0x10/0x10 [ 23.917612] ret_from_fork+0x116/0x1d0 [ 23.917632] ? __pfx_kthread+0x10/0x10 [ 23.917653] ret_from_fork_asm+0x1a/0x30 [ 23.917683] </TASK> [ 23.917695] [ 23.931062] Allocated by task 228: [ 23.931230] kasan_save_stack+0x45/0x70 [ 23.931771] kasan_save_track+0x18/0x40 [ 23.932054] kasan_save_alloc_info+0x3b/0x50 [ 23.932451] __kasan_kmalloc+0xb7/0xc0 [ 23.932647] __kmalloc_cache_noprof+0x189/0x420 [ 23.932856] kmalloc_oob_memset_16+0xac/0x330 [ 23.933055] kunit_try_run_case+0x1a5/0x480 [ 23.933239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.933940] kthread+0x337/0x6f0 [ 23.934118] ret_from_fork+0x116/0x1d0 [ 23.934581] ret_from_fork_asm+0x1a/0x30 [ 23.934871] [ 23.934946] The buggy address belongs to the object at ffff888105745100 [ 23.934946] which belongs to the cache kmalloc-128 of size 128 [ 23.935674] The buggy address is located 105 bytes inside of [ 23.935674] allocated 120-byte region [ffff888105745100, ffff888105745178) [ 23.936568] [ 23.936695] The buggy address belongs to the physical page: [ 23.937080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105745 [ 23.937825] flags: 0x200000000000000(node=0|zone=2) [ 23.938058] page_type: f5(slab) [ 23.938194] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.938859] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.939263] page dumped because: kasan: bad access detected [ 23.939726] [ 23.939836] Memory state around the buggy address: [ 23.940224] ffff888105745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.940802] ffff888105745080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.941200] >ffff888105745100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.941753] ^ [ 23.942171] ffff888105745180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.942716] ffff888105745200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.943100] ==================================================================