Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 20.987427] ================================================================== [ 20.998263] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 21.005547] Write of size 1 at addr ffff000805f79f00 by task kunit_try_catch/188 [ 21.012922] [ 21.014410] CPU: 5 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 21.014466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.014482] Hardware name: WinLink E850-96 board (DT) [ 21.014505] Call trace: [ 21.014521] show_stack+0x20/0x38 (C) [ 21.014558] dump_stack_lvl+0x8c/0xd0 [ 21.014594] print_report+0x118/0x608 [ 21.014631] kasan_report+0xdc/0x128 [ 21.014662] __asan_report_store1_noabort+0x20/0x30 [ 21.014693] kmalloc_big_oob_right+0x2a4/0x2f0 [ 21.014724] kunit_try_run_case+0x170/0x3f0 [ 21.014761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.014799] kthread+0x328/0x630 [ 21.014826] ret_from_fork+0x10/0x20 [ 21.014861] [ 21.078459] Allocated by task 188: [ 21.081848] kasan_save_stack+0x3c/0x68 [ 21.085664] kasan_save_track+0x20/0x40 [ 21.089483] kasan_save_alloc_info+0x40/0x58 [ 21.093736] __kasan_kmalloc+0xd4/0xd8 [ 21.097469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.101983] kmalloc_big_oob_right+0xb8/0x2f0 [ 21.106323] kunit_try_run_case+0x170/0x3f0 [ 21.110490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.115958] kthread+0x328/0x630 [ 21.119170] ret_from_fork+0x10/0x20 [ 21.122729] [ 21.124206] The buggy address belongs to the object at ffff000805f78000 [ 21.124206] which belongs to the cache kmalloc-8k of size 8192 [ 21.136708] The buggy address is located 0 bytes to the right of [ 21.136708] allocated 7936-byte region [ffff000805f78000, ffff000805f79f00) [ 21.149725] [ 21.151203] The buggy address belongs to the physical page: [ 21.156761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f78 [ 21.164744] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.172383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.179327] page_type: f5(slab) [ 21.182464] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.190183] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.197911] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.205720] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.213533] head: 0bfffe0000000003 fffffdffe017de01 00000000ffffffff 00000000ffffffff [ 21.221345] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.229151] page dumped because: kasan: bad access detected [ 21.234708] [ 21.236182] Memory state around the buggy address: [ 21.240962] ffff000805f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.248165] ffff000805f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.255371] >ffff000805f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.262571] ^ [ 21.265786] ffff000805f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.272991] ffff000805f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.280193] ==================================================================
[ 24.158658] ================================================================== [ 24.159043] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.159334] Write of size 1 at addr fff00000c77c9f00 by task kunit_try_catch/145 [ 24.159514] [ 24.159956] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.160198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.160878] Hardware name: linux,dummy-virt (DT) [ 24.160967] Call trace: [ 24.161044] show_stack+0x20/0x38 (C) [ 24.161736] dump_stack_lvl+0x8c/0xd0 [ 24.161861] print_report+0x118/0x608 [ 24.161983] kasan_report+0xdc/0x128 [ 24.162769] __asan_report_store1_noabort+0x20/0x30 [ 24.163614] kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.163760] kunit_try_run_case+0x170/0x3f0 [ 24.163892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.164604] kthread+0x328/0x630 [ 24.165241] ret_from_fork+0x10/0x20 [ 24.165668] [ 24.165765] Allocated by task 145: [ 24.166218] kasan_save_stack+0x3c/0x68 [ 24.166325] kasan_save_track+0x20/0x40 [ 24.166801] kasan_save_alloc_info+0x40/0x58 [ 24.167471] __kasan_kmalloc+0xd4/0xd8 [ 24.167624] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.167843] kmalloc_big_oob_right+0xb8/0x2f0 [ 24.168179] kunit_try_run_case+0x170/0x3f0 [ 24.168300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.168605] kthread+0x328/0x630 [ 24.168980] ret_from_fork+0x10/0x20 [ 24.169501] [ 24.169615] The buggy address belongs to the object at fff00000c77c8000 [ 24.169615] which belongs to the cache kmalloc-8k of size 8192 [ 24.169921] The buggy address is located 0 bytes to the right of [ 24.169921] allocated 7936-byte region [fff00000c77c8000, fff00000c77c9f00) [ 24.170076] [ 24.170223] The buggy address belongs to the physical page: [ 24.170523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c8 [ 24.170957] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.171182] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.171361] page_type: f5(slab) [ 24.171552] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.171699] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.171840] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.172175] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.172442] head: 0bfffe0000000003 ffffc1ffc31df201 00000000ffffffff 00000000ffffffff [ 24.172568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 24.172966] page dumped because: kasan: bad access detected [ 24.173073] [ 24.173348] Memory state around the buggy address: [ 24.173560] fff00000c77c9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.173662] fff00000c77c9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.173783] >fff00000c77c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.174832] ^ [ 24.175048] fff00000c77c9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.175184] fff00000c77ca000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.175274] ==================================================================
[ 16.923626] ================================================================== [ 16.924923] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 16.926163] Write of size 1 at addr ffff888102cf5f00 by task kunit_try_catch/161 [ 16.926761] [ 16.927072] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 16.927199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.927237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.927297] Call Trace: [ 16.927343] <TASK> [ 16.927397] dump_stack_lvl+0x73/0xb0 [ 16.927483] print_report+0xd1/0x650 [ 16.927563] ? __virt_addr_valid+0x1db/0x2d0 [ 16.927645] ? kmalloc_big_oob_right+0x316/0x370 [ 16.927720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.927797] ? kmalloc_big_oob_right+0x316/0x370 [ 16.927875] kasan_report+0x141/0x180 [ 16.927954] ? kmalloc_big_oob_right+0x316/0x370 [ 16.928039] __asan_report_store1_noabort+0x1b/0x30 [ 16.928528] kmalloc_big_oob_right+0x316/0x370 [ 16.928565] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 16.928599] ? __schedule+0x10cc/0x2b60 [ 16.928634] ? __pfx_read_tsc+0x10/0x10 [ 16.928665] ? ktime_get_ts64+0x86/0x230 [ 16.928699] kunit_try_run_case+0x1a5/0x480 [ 16.928729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.928756] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.928809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.928860] ? __kthread_parkme+0x82/0x180 [ 16.928890] ? preempt_count_sub+0x50/0x80 [ 16.928922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.928951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.928985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.929019] kthread+0x337/0x6f0 [ 16.929046] ? trace_preempt_on+0x20/0xc0 [ 16.929107] ? __pfx_kthread+0x10/0x10 [ 16.929137] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.929180] ? calculate_sigpending+0x7b/0xa0 [ 16.929320] ? __pfx_kthread+0x10/0x10 [ 16.929352] ret_from_fork+0x116/0x1d0 [ 16.929378] ? __pfx_kthread+0x10/0x10 [ 16.929406] ret_from_fork_asm+0x1a/0x30 [ 16.929448] </TASK> [ 16.929463] [ 16.949813] Allocated by task 161: [ 16.950222] kasan_save_stack+0x45/0x70 [ 16.950689] kasan_save_track+0x18/0x40 [ 16.951248] kasan_save_alloc_info+0x3b/0x50 [ 16.951597] __kasan_kmalloc+0xb7/0xc0 [ 16.952143] __kmalloc_cache_noprof+0x189/0x420 [ 16.953150] kmalloc_big_oob_right+0xa9/0x370 [ 16.954280] kunit_try_run_case+0x1a5/0x480 [ 16.954962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.955739] kthread+0x337/0x6f0 [ 16.956245] ret_from_fork+0x116/0x1d0 [ 16.956962] ret_from_fork_asm+0x1a/0x30 [ 16.957649] [ 16.957806] The buggy address belongs to the object at ffff888102cf4000 [ 16.957806] which belongs to the cache kmalloc-8k of size 8192 [ 16.959397] The buggy address is located 0 bytes to the right of [ 16.959397] allocated 7936-byte region [ffff888102cf4000, ffff888102cf5f00) [ 16.961371] [ 16.961577] The buggy address belongs to the physical page: [ 16.962222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cf0 [ 16.962946] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.963581] flags: 0x200000000000040(head|node=0|zone=2) [ 16.964549] page_type: f5(slab) [ 16.965508] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 16.966027] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.967171] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 16.967808] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.969134] head: 0200000000000003 ffffea00040b3c01 00000000ffffffff 00000000ffffffff [ 16.970422] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.971596] page dumped because: kasan: bad access detected [ 16.972517] [ 16.972688] Memory state around the buggy address: [ 16.973016] ffff888102cf5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.973826] ffff888102cf5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.974427] >ffff888102cf5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.975529] ^ [ 16.975781] ffff888102cf5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.976976] ffff888102cf6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.977829] ==================================================================
[ 47.347839] ================================================================== [ 47.359985] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x324/0x37c [ 47.367370] Write of size 1 at addr ca82df00 by task kunit_try_catch/196 [ 47.374114] [ 47.375610] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 47.375640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.375640] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.375671] Call trace: [ 47.375671] unwind_backtrace from show_stack+0x18/0x1c [ 47.375701] show_stack from dump_stack_lvl+0x70/0x90 [ 47.375701] dump_stack_lvl from print_report+0x158/0x528 [ 47.375732] print_report from kasan_report+0xdc/0x118 [ 47.375762] kasan_report from kmalloc_big_oob_right+0x324/0x37c [ 47.375793] kmalloc_big_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.375793] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.375823] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.375854] kthread from ret_from_fork+0x14/0x20 [ 47.375885] Exception stack(0xf21c3fb0 to 0xf21c3ff8) [ 47.375885] 3fa0: 00000000 00000000 00000000 00000000 [ 47.375915] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.375915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.375946] [ 47.482360] Allocated by task 196: [ 47.485809] kasan_save_track+0x30/0x5c [ 47.489654] __kasan_kmalloc+0x8c/0x94 [ 47.493438] kmalloc_big_oob_right+0xd0/0x37c [ 47.497833] kunit_try_run_case+0x22c/0x5a8 [ 47.502044] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.507568] kthread+0x464/0x810 [ 47.510833] ret_from_fork+0x14/0x20 [ 47.514434] [ 47.515930] The buggy address belongs to the object at ca82c000 [ 47.515930] which belongs to the cache kmalloc-8k of size 8192 [ 47.527832] The buggy address is located 0 bytes to the right of [ 47.527832] allocated 7936-byte region [ca82c000, ca82df00) [ 47.539550] [ 47.541046] The buggy address belongs to the physical page: [ 47.546661] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8a828 [ 47.553924] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.561645] flags: 0x40(head|zone=0) [ 47.565246] page_type: f5(slab) [ 47.568420] raw: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000 [ 47.576568] raw: 00000000 [ 47.579193] head: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000 [ 47.587432] head: 00000000 00000003 eeb795a1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 47.595672] head: 00000000 00000008 [ 47.599182] page dumped because: kasan: bad access detected [ 47.604797] [ 47.606292] Memory state around the buggy address: [ 47.611114] ca82de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.617675] ca82de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.624237] >ca82df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.630828] ^ [ 47.633361] ca82df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.639923] ca82e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.646514] ==================================================================