Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 44.482651] ================================================================== [ 44.492439] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 44.499641] Write of size 2 at addr ffff0008019aca77 by task kunit_try_catch/256 [ 44.507017] [ 44.508505] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 44.508560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.508574] Hardware name: WinLink E850-96 board (DT) [ 44.508595] Call trace: [ 44.508607] show_stack+0x20/0x38 (C) [ 44.508642] dump_stack_lvl+0x8c/0xd0 [ 44.508676] print_report+0x118/0x5d0 [ 44.508704] kasan_report+0xdc/0x128 [ 44.508731] kasan_check_range+0x100/0x1a8 [ 44.508761] __asan_memset+0x34/0x78 [ 44.508790] kmalloc_oob_memset_2+0x150/0x2f8 [ 44.508821] kunit_try_run_case+0x170/0x3f0 [ 44.508857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.508889] kthread+0x328/0x630 [ 44.508916] ret_from_fork+0x10/0x20 [ 44.508946] [ 44.575593] Allocated by task 256: [ 44.578981] kasan_save_stack+0x3c/0x68 [ 44.582797] kasan_save_track+0x20/0x40 [ 44.586617] kasan_save_alloc_info+0x40/0x58 [ 44.590869] __kasan_kmalloc+0xd4/0xd8 [ 44.594602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.599116] kmalloc_oob_memset_2+0xb0/0x2f8 [ 44.603369] kunit_try_run_case+0x170/0x3f0 [ 44.607537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.613005] kthread+0x328/0x630 [ 44.616216] ret_from_fork+0x10/0x20 [ 44.619775] [ 44.621252] The buggy address belongs to the object at ffff0008019aca00 [ 44.621252] which belongs to the cache kmalloc-128 of size 128 [ 44.633754] The buggy address is located 119 bytes inside of [ 44.633754] allocated 120-byte region [ffff0008019aca00, ffff0008019aca78) [ 44.646337] [ 44.647817] The buggy address belongs to the physical page: [ 44.653373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 44.661356] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.668995] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.675939] page_type: f5(slab) [ 44.679076] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.686795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.694523] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.702333] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.710145] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 44.717957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.725763] page dumped because: kasan: bad access detected [ 44.731319] [ 44.732794] Memory state around the buggy address: [ 44.737574] ffff0008019ac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.744777] ffff0008019ac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.751983] >ffff0008019aca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.759183] ^ [ 44.766304] ffff0008019aca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.773509] ffff0008019acb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.780712] ==================================================================
[ 30.386771] ================================================================== [ 30.386854] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.386924] Write of size 2 at addr fff00000c91b3877 by task kunit_try_catch/203 [ 30.386974] [ 30.387013] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.387345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.387378] Hardware name: linux,dummy-virt (DT) [ 30.387409] Call trace: [ 30.387433] show_stack+0x20/0x38 (C) [ 30.387484] dump_stack_lvl+0x8c/0xd0 [ 30.388278] print_report+0x118/0x5d0 [ 30.388372] kasan_report+0xdc/0x128 [ 30.388414] kasan_check_range+0x100/0x1a8 [ 30.388457] __asan_memset+0x34/0x78 [ 30.388809] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.389034] kunit_try_run_case+0x170/0x3f0 [ 30.389274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.389701] kthread+0x328/0x630 [ 30.389764] ret_from_fork+0x10/0x20 [ 30.389813] [ 30.389955] Allocated by task 203: [ 30.389984] kasan_save_stack+0x3c/0x68 [ 30.390183] kasan_save_track+0x20/0x40 [ 30.390392] kasan_save_alloc_info+0x40/0x58 [ 30.390491] __kasan_kmalloc+0xd4/0xd8 [ 30.390536] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.390600] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.391042] kunit_try_run_case+0x170/0x3f0 [ 30.391095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.391176] kthread+0x328/0x630 [ 30.391334] ret_from_fork+0x10/0x20 [ 30.391371] [ 30.391392] The buggy address belongs to the object at fff00000c91b3800 [ 30.391392] which belongs to the cache kmalloc-128 of size 128 [ 30.391503] The buggy address is located 119 bytes inside of [ 30.391503] allocated 120-byte region [fff00000c91b3800, fff00000c91b3878) [ 30.391758] [ 30.391806] The buggy address belongs to the physical page: [ 30.392055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.392144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.392293] page_type: f5(slab) [ 30.392498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.392555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.392595] page dumped because: kasan: bad access detected [ 30.392638] [ 30.392656] Memory state around the buggy address: [ 30.392688] fff00000c91b3700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.392812] fff00000c91b3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.393039] >fff00000c91b3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.393223] ^ [ 30.393510] fff00000c91b3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.393559] fff00000c91b3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.393595] ==================================================================
[ 23.831200] ================================================================== [ 23.831910] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 23.832413] Write of size 2 at addr ffff888104cac177 by task kunit_try_catch/222 [ 23.832656] [ 23.832781] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 23.832835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.832847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.832869] Call Trace: [ 23.832883] <TASK> [ 23.832901] dump_stack_lvl+0x73/0xb0 [ 23.832935] print_report+0xd1/0x610 [ 23.832958] ? __virt_addr_valid+0x1db/0x2d0 [ 23.832982] ? kmalloc_oob_memset_2+0x166/0x330 [ 23.833003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.833029] ? kmalloc_oob_memset_2+0x166/0x330 [ 23.833050] kasan_report+0x141/0x180 [ 23.833072] ? kmalloc_oob_memset_2+0x166/0x330 [ 23.833097] kasan_check_range+0x10c/0x1c0 [ 23.833120] __asan_memset+0x27/0x50 [ 23.833142] kmalloc_oob_memset_2+0x166/0x330 [ 23.833164] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 23.833187] ? __schedule+0x10cc/0x2b60 [ 23.833211] ? __pfx_read_tsc+0x10/0x10 [ 23.833234] ? ktime_get_ts64+0x86/0x230 [ 23.833259] kunit_try_run_case+0x1a5/0x480 [ 23.833568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.833589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.833613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.833636] ? __kthread_parkme+0x82/0x180 [ 23.833659] ? preempt_count_sub+0x50/0x80 [ 23.833683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.833704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.833729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.833766] kthread+0x337/0x6f0 [ 23.833786] ? trace_preempt_on+0x20/0xc0 [ 23.833810] ? __pfx_kthread+0x10/0x10 [ 23.833830] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.833852] ? calculate_sigpending+0x7b/0xa0 [ 23.833877] ? __pfx_kthread+0x10/0x10 [ 23.833898] ret_from_fork+0x116/0x1d0 [ 23.833917] ? __pfx_kthread+0x10/0x10 [ 23.833938] ret_from_fork_asm+0x1a/0x30 [ 23.833968] </TASK> [ 23.833980] [ 23.843188] Allocated by task 222: [ 23.843432] kasan_save_stack+0x45/0x70 [ 23.843590] kasan_save_track+0x18/0x40 [ 23.844407] kasan_save_alloc_info+0x3b/0x50 [ 23.844634] __kasan_kmalloc+0xb7/0xc0 [ 23.844813] __kmalloc_cache_noprof+0x189/0x420 [ 23.845016] kmalloc_oob_memset_2+0xac/0x330 [ 23.845195] kunit_try_run_case+0x1a5/0x480 [ 23.845999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.847866] kthread+0x337/0x6f0 [ 23.848283] ret_from_fork+0x116/0x1d0 [ 23.848435] ret_from_fork_asm+0x1a/0x30 [ 23.848572] [ 23.848642] The buggy address belongs to the object at ffff888104cac100 [ 23.848642] which belongs to the cache kmalloc-128 of size 128 [ 23.849011] The buggy address is located 119 bytes inside of [ 23.849011] allocated 120-byte region [ffff888104cac100, ffff888104cac178) [ 23.849364] [ 23.849433] The buggy address belongs to the physical page: [ 23.849602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104cac [ 23.851543] flags: 0x200000000000000(node=0|zone=2) [ 23.852626] page_type: f5(slab) [ 23.853270] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.854322] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.855994] page dumped because: kasan: bad access detected [ 23.856748] [ 23.857701] Memory state around the buggy address: [ 23.858489] ffff888104cac000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.858855] ffff888104cac080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.859125] >ffff888104cac100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.859401] ^ [ 23.859697] ffff888104cac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.860083] ffff888104cac200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.860712] ==================================================================