Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 |
[ 31.299098] ================================================================== [ 31.306202] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.313577] Read of size 1 at addr ffff000801ede97f by task kunit_try_catch/239 [ 31.320868] [ 31.322350] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 31.322402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.322418] Hardware name: WinLink E850-96 board (DT) [ 31.322439] Call trace: [ 31.322454] show_stack+0x20/0x38 (C) [ 31.322489] dump_stack_lvl+0x8c/0xd0 [ 31.322519] print_report+0x118/0x608 [ 31.322550] kasan_report+0xdc/0x128 [ 31.322579] __asan_report_load1_noabort+0x20/0x30 [ 31.322612] ksize_unpoisons_memory+0x690/0x740 [ 31.322642] kunit_try_run_case+0x170/0x3f0 [ 31.322677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.322711] kthread+0x328/0x630 [ 31.322745] ret_from_fork+0x10/0x20 [ 31.322778] [ 31.386751] Allocated by task 239: [ 31.390139] kasan_save_stack+0x3c/0x68 [ 31.393956] kasan_save_track+0x20/0x40 [ 31.397777] kasan_save_alloc_info+0x40/0x58 [ 31.402029] __kasan_kmalloc+0xd4/0xd8 [ 31.405763] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.410275] ksize_unpoisons_memory+0xc0/0x740 [ 31.414702] kunit_try_run_case+0x170/0x3f0 [ 31.418869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.424337] kthread+0x328/0x630 [ 31.427549] ret_from_fork+0x10/0x20 [ 31.431108] [ 31.432586] The buggy address belongs to the object at ffff000801ede900 [ 31.432586] which belongs to the cache kmalloc-128 of size 128 [ 31.445086] The buggy address is located 12 bytes to the right of [ 31.445086] allocated 115-byte region [ffff000801ede900, ffff000801ede973) [ 31.458104] [ 31.459582] The buggy address belongs to the physical page: [ 31.465140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 31.473123] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.480760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.487706] page_type: f5(slab) [ 31.490842] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.498562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.506288] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.514100] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.521913] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 31.529725] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.537532] page dumped because: kasan: bad access detected [ 31.543085] [ 31.544561] Memory state around the buggy address: [ 31.549342] ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.556544] ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.563749] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.570950] ^ [ 31.578072] ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.585278] ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.592478] ================================================================== [ 30.998495] ================================================================== [ 31.005599] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.012973] Read of size 1 at addr ffff000801ede978 by task kunit_try_catch/239 [ 31.020264] [ 31.021748] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 31.021799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.021817] Hardware name: WinLink E850-96 board (DT) [ 31.021835] Call trace: [ 31.021849] show_stack+0x20/0x38 (C) [ 31.021887] dump_stack_lvl+0x8c/0xd0 [ 31.021919] print_report+0x118/0x608 [ 31.021950] kasan_report+0xdc/0x128 [ 31.021982] __asan_report_load1_noabort+0x20/0x30 [ 31.022018] ksize_unpoisons_memory+0x618/0x740 [ 31.022050] kunit_try_run_case+0x170/0x3f0 [ 31.022084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.022116] kthread+0x328/0x630 [ 31.022149] ret_from_fork+0x10/0x20 [ 31.022179] [ 31.086148] Allocated by task 239: [ 31.089537] kasan_save_stack+0x3c/0x68 [ 31.093353] kasan_save_track+0x20/0x40 [ 31.097172] kasan_save_alloc_info+0x40/0x58 [ 31.101426] __kasan_kmalloc+0xd4/0xd8 [ 31.105158] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.109672] ksize_unpoisons_memory+0xc0/0x740 [ 31.114099] kunit_try_run_case+0x170/0x3f0 [ 31.118266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.123734] kthread+0x328/0x630 [ 31.126946] ret_from_fork+0x10/0x20 [ 31.130505] [ 31.131982] The buggy address belongs to the object at ffff000801ede900 [ 31.131982] which belongs to the cache kmalloc-128 of size 128 [ 31.144481] The buggy address is located 5 bytes to the right of [ 31.144481] allocated 115-byte region [ffff000801ede900, ffff000801ede973) [ 31.157414] [ 31.158892] The buggy address belongs to the physical page: [ 31.164450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 31.172432] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.180072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.187017] page_type: f5(slab) [ 31.190151] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.197872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.205598] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.213410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.221224] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 31.229034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.236842] page dumped because: kasan: bad access detected [ 31.242396] [ 31.243871] Memory state around the buggy address: [ 31.248650] ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.255855] ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263061] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.270260] ^ [ 31.277382] ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.284588] ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.291787] ================================================================== [ 30.695512] ================================================================== [ 30.705256] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.712631] Read of size 1 at addr ffff000801ede973 by task kunit_try_catch/239 [ 30.719921] [ 30.721406] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 30.721465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.721483] Hardware name: WinLink E850-96 board (DT) [ 30.721504] Call trace: [ 30.721520] show_stack+0x20/0x38 (C) [ 30.721559] dump_stack_lvl+0x8c/0xd0 [ 30.721594] print_report+0x118/0x608 [ 30.721627] kasan_report+0xdc/0x128 [ 30.721656] __asan_report_load1_noabort+0x20/0x30 [ 30.721693] ksize_unpoisons_memory+0x628/0x740 [ 30.721726] kunit_try_run_case+0x170/0x3f0 [ 30.721760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.721794] kthread+0x328/0x630 [ 30.721828] ret_from_fork+0x10/0x20 [ 30.721865] [ 30.785805] Allocated by task 239: [ 30.789194] kasan_save_stack+0x3c/0x68 [ 30.793010] kasan_save_track+0x20/0x40 [ 30.796829] kasan_save_alloc_info+0x40/0x58 [ 30.801083] __kasan_kmalloc+0xd4/0xd8 [ 30.804817] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.809330] ksize_unpoisons_memory+0xc0/0x740 [ 30.813756] kunit_try_run_case+0x170/0x3f0 [ 30.817923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.823392] kthread+0x328/0x630 [ 30.826603] ret_from_fork+0x10/0x20 [ 30.830162] [ 30.831641] The buggy address belongs to the object at ffff000801ede900 [ 30.831641] which belongs to the cache kmalloc-128 of size 128 [ 30.844141] The buggy address is located 0 bytes to the right of [ 30.844141] allocated 115-byte region [ffff000801ede900, ffff000801ede973) [ 30.857072] [ 30.858551] The buggy address belongs to the physical page: [ 30.864106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 30.872091] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.879731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.886675] page_type: f5(slab) [ 30.889810] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.897529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.905256] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.913067] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.920880] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 30.928692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.936497] page dumped because: kasan: bad access detected [ 30.942053] [ 30.943528] Memory state around the buggy address: [ 30.948309] ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.955512] ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.962716] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.969917] ^ [ 30.976778] ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983985] ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.991186] ==================================================================