Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 43.442916] ================================================================== [ 43.452558] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 43.459760] Write of size 4 at addr ffff0008074f8f75 by task kunit_try_catch/258 [ 43.467136] [ 43.468623] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 43.468678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.468694] Hardware name: WinLink E850-96 board (DT) [ 43.468715] Call trace: [ 43.468730] show_stack+0x20/0x38 (C) [ 43.468767] dump_stack_lvl+0x8c/0xd0 [ 43.468800] print_report+0x118/0x5d0 [ 43.468828] kasan_report+0xdc/0x128 [ 43.468853] kasan_check_range+0x100/0x1a8 [ 43.468882] __asan_memset+0x34/0x78 [ 43.468910] kmalloc_oob_memset_4+0x150/0x300 [ 43.468941] kunit_try_run_case+0x170/0x3f0 [ 43.468981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.469013] kthread+0x328/0x630 [ 43.469041] ret_from_fork+0x10/0x20 [ 43.469074] [ 43.535713] Allocated by task 258: [ 43.539099] kasan_save_stack+0x3c/0x68 [ 43.542918] kasan_save_track+0x20/0x40 [ 43.546735] kasan_save_alloc_info+0x40/0x58 [ 43.550989] __kasan_kmalloc+0xd4/0xd8 [ 43.554722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.559235] kmalloc_oob_memset_4+0xb0/0x300 [ 43.563490] kunit_try_run_case+0x170/0x3f0 [ 43.567656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.573124] kthread+0x328/0x630 [ 43.576336] ret_from_fork+0x10/0x20 [ 43.579895] [ 43.581372] The buggy address belongs to the object at ffff0008074f8f00 [ 43.581372] which belongs to the cache kmalloc-128 of size 128 [ 43.593874] The buggy address is located 117 bytes inside of [ 43.593874] allocated 120-byte region [ffff0008074f8f00, ffff0008074f8f78) [ 43.606457] [ 43.607935] The buggy address belongs to the physical page: [ 43.613493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 43.621476] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.629116] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.636059] page_type: f5(slab) [ 43.639196] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.646915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.654641] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.662453] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.670265] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 43.678077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.685884] page dumped because: kasan: bad access detected [ 43.691438] [ 43.692913] Memory state around the buggy address: [ 43.697695] ffff0008074f8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.704896] ffff0008074f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.712102] >ffff0008074f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.719302] ^ [ 43.726424] ffff0008074f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.733630] ffff0008074f9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.740831] ==================================================================
[ 29.650814] ================================================================== [ 29.652346] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 29.652686] Write of size 4 at addr fff00000c636ab75 by task kunit_try_catch/205 [ 29.652740] [ 29.652780] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.653829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.654080] Hardware name: linux,dummy-virt (DT) [ 29.654295] Call trace: [ 29.654703] show_stack+0x20/0x38 (C) [ 29.655204] dump_stack_lvl+0x8c/0xd0 [ 29.655255] print_report+0x118/0x5d0 [ 29.655298] kasan_report+0xdc/0x128 [ 29.655340] kasan_check_range+0x100/0x1a8 [ 29.655384] __asan_memset+0x34/0x78 [ 29.655426] kmalloc_oob_memset_4+0x150/0x300 [ 29.655473] kunit_try_run_case+0x170/0x3f0 [ 29.655522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.656311] kthread+0x328/0x630 [ 29.657308] ret_from_fork+0x10/0x20 [ 29.657371] [ 29.657390] Allocated by task 205: [ 29.657419] kasan_save_stack+0x3c/0x68 [ 29.657601] kasan_save_track+0x20/0x40 [ 29.657641] kasan_save_alloc_info+0x40/0x58 [ 29.657730] __kasan_kmalloc+0xd4/0xd8 [ 29.657894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.657933] kmalloc_oob_memset_4+0xb0/0x300 [ 29.658112] kunit_try_run_case+0x170/0x3f0 [ 29.658269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.658555] kthread+0x328/0x630 [ 29.658653] ret_from_fork+0x10/0x20 [ 29.658981] [ 29.659004] The buggy address belongs to the object at fff00000c636ab00 [ 29.659004] which belongs to the cache kmalloc-128 of size 128 [ 29.659087] The buggy address is located 117 bytes inside of [ 29.659087] allocated 120-byte region [fff00000c636ab00, fff00000c636ab78) [ 29.659148] [ 29.659170] The buggy address belongs to the physical page: [ 29.659203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.659258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.659309] page_type: f5(slab) [ 29.659856] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.660165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.660314] page dumped because: kasan: bad access detected [ 29.660371] [ 29.660389] Memory state around the buggy address: [ 29.660422] fff00000c636aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.660462] fff00000c636aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660614] >fff00000c636ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.660656] ^ [ 29.660740] fff00000c636ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660782] fff00000c636ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660866] ==================================================================
[ 24.369147] ================================================================== [ 24.369536] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 24.369790] Write of size 4 at addr ffff888105919075 by task kunit_try_catch/223 [ 24.370007] [ 24.370098] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.370150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.370162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.370185] Call Trace: [ 24.370196] <TASK> [ 24.370214] dump_stack_lvl+0x73/0xb0 [ 24.370245] print_report+0xd1/0x610 [ 24.370267] ? __virt_addr_valid+0x1db/0x2d0 [ 24.370290] ? kmalloc_oob_memset_4+0x166/0x330 [ 24.370309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.370333] ? kmalloc_oob_memset_4+0x166/0x330 [ 24.370353] kasan_report+0x141/0x180 [ 24.370373] ? kmalloc_oob_memset_4+0x166/0x330 [ 24.370398] kasan_check_range+0x10c/0x1c0 [ 24.370419] __asan_memset+0x27/0x50 [ 24.370441] kmalloc_oob_memset_4+0x166/0x330 [ 24.370462] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 24.370482] ? __schedule+0x10cc/0x2b60 [ 24.370505] ? __pfx_read_tsc+0x10/0x10 [ 24.370525] ? ktime_get_ts64+0x86/0x230 [ 24.370548] kunit_try_run_case+0x1a5/0x480 [ 24.370570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.370589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.370611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.370633] ? __kthread_parkme+0x82/0x180 [ 24.370653] ? preempt_count_sub+0x50/0x80 [ 24.370746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.370767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.370792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.370816] kthread+0x337/0x6f0 [ 24.370835] ? trace_preempt_on+0x20/0xc0 [ 24.370858] ? __pfx_kthread+0x10/0x10 [ 24.370877] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.370898] ? calculate_sigpending+0x7b/0xa0 [ 24.371012] ? __pfx_kthread+0x10/0x10 [ 24.371053] ret_from_fork+0x116/0x1d0 [ 24.371072] ? __pfx_kthread+0x10/0x10 [ 24.371091] ret_from_fork_asm+0x1a/0x30 [ 24.371146] </TASK> [ 24.371157] [ 24.383989] Allocated by task 223: [ 24.384393] kasan_save_stack+0x45/0x70 [ 24.384831] kasan_save_track+0x18/0x40 [ 24.385233] kasan_save_alloc_info+0x3b/0x50 [ 24.385626] __kasan_kmalloc+0xb7/0xc0 [ 24.386049] __kmalloc_cache_noprof+0x189/0x420 [ 24.386463] kmalloc_oob_memset_4+0xac/0x330 [ 24.386987] kunit_try_run_case+0x1a5/0x480 [ 24.387362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.387890] kthread+0x337/0x6f0 [ 24.388234] ret_from_fork+0x116/0x1d0 [ 24.388626] ret_from_fork_asm+0x1a/0x30 [ 24.389094] [ 24.389257] The buggy address belongs to the object at ffff888105919000 [ 24.389257] which belongs to the cache kmalloc-128 of size 128 [ 24.390759] The buggy address is located 117 bytes inside of [ 24.390759] allocated 120-byte region [ffff888105919000, ffff888105919078) [ 24.392132] [ 24.392329] The buggy address belongs to the physical page: [ 24.392974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 24.393817] flags: 0x200000000000000(node=0|zone=2) [ 24.394309] page_type: f5(slab) [ 24.394646] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.395468] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.396115] page dumped because: kasan: bad access detected [ 24.396435] [ 24.396498] Memory state around the buggy address: [ 24.396648] ffff888105918f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.396908] ffff888105918f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.397517] >ffff888105919000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.398333] ^ [ 24.398845] ffff888105919080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.399359] ffff888105919100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.399837] ==================================================================