Re: [linux-next:master] [kasan] 0e8b630f30: BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Nov 23, 2023 at 7:19 AM kernel test robot <oliver.sang@xxxxxxxxx> wrote:
>
> kernel test robot noticed "BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten" on:
>
> commit: 0e8b630f3053f0ff84b7c3ab8ff98a7393863824 ("kasan: use stack_depot_put for Generic mode")
> https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
>
> [test failed on linux-next/master 07b677953b9dca02928be323e2db853511305fa9]
>
> in testcase: boot
>
> compiler: clang-16
> test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
>
> (please refer to attached dmesg/kmsg for entire log/backtrace)
>
>
> +--------------------------------------------------------------+------------+------------+
> |                                                              | 882f84db75 | 0e8b630f30 |
> +--------------------------------------------------------------+------------+------------+
> | BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten          | 0          | 55         |
> | BUG_kmem_cache_node(Tainted:G_B_T):Poison_overwritten        | 0          | 55         |
> +--------------------------------------------------------------+------------+------------+

This should be fixed by "slub, kasan: improve interaction of KASAN and
slub_debug poisoning" and the most recent version of "kasan: Improve
free meta storage in Generic KASAN".





[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux