Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 31.102112] ================================================================== [ 31.113158] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 31.120661] Read of size 1 at addr ffff0000954d9000 by task kunit_try_catch/226 [ 31.128074] [ 31.129605] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 31.129636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.129644] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.129657] Call trace: [ 31.129664] show_stack+0x20/0x38 (C) [ 31.129682] dump_stack_lvl+0x8c/0xd0 [ 31.129701] print_report+0x118/0x608 [ 31.129719] kasan_report+0xdc/0x128 [ 31.129737] __asan_report_load1_noabort+0x20/0x30 [ 31.129754] kmalloc_node_oob_right+0x2f4/0x330 [ 31.129773] kunit_try_run_case+0x170/0x3f0 [ 31.129793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.129815] kthread+0x328/0x630 [ 31.129829] ret_from_fork+0x10/0x20 [ 31.129847] [ 31.195900] Allocated by task 226: [ 31.199361] kasan_save_stack+0x3c/0x68 [ 31.203271] kasan_save_track+0x20/0x40 [ 31.207180] kasan_save_alloc_info+0x40/0x58 [ 31.211515] __kasan_kmalloc+0xd4/0xd8 [ 31.215335] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 31.220375] kmalloc_node_oob_right+0xbc/0x330 [ 31.224899] kunit_try_run_case+0x170/0x3f0 [ 31.229152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.234724] kthread+0x328/0x630 [ 31.238014] ret_from_fork+0x10/0x20 [ 31.241651] [ 31.243180] The buggy address belongs to the object at ffff0000954d8000 [ 31.243180] which belongs to the cache kmalloc-4k of size 4096 [ 31.255840] The buggy address is located 0 bytes to the right of [ 31.255840] allocated 4096-byte region [ffff0000954d8000, ffff0000954d9000) [ 31.269029] [ 31.270560] The buggy address belongs to the physical page: [ 31.276211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1154d8 [ 31.284322] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.292079] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.299138] page_type: f5(slab) [ 31.302343] raw: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000 [ 31.310186] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 31.318031] head: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000 [ 31.325960] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 31.333888] head: 0bfffe0000000003 fffffdffc2553601 00000000ffffffff 00000000ffffffff [ 31.341820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 31.349747] page dumped because: kasan: bad access detected [ 31.355393] [ 31.356928] Memory state around the buggy address: [ 31.361791] ffff0000954d8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.369112] ffff0000954d8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.376426] >ffff0000954d9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.383738] ^ [ 31.387027] ffff0000954d9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.394350] ffff0000954d9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.401670] ==================================================================
[ 26.559365] ================================================================== [ 26.559424] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 26.559477] Read of size 1 at addr fff00000c65c5000 by task kunit_try_catch/152 [ 26.559526] [ 26.559842] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.559962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.560156] Hardware name: linux,dummy-virt (DT) [ 26.560189] Call trace: [ 26.560211] show_stack+0x20/0x38 (C) [ 26.560278] dump_stack_lvl+0x8c/0xd0 [ 26.560326] print_report+0x118/0x608 [ 26.560373] kasan_report+0xdc/0x128 [ 26.560419] __asan_report_load1_noabort+0x20/0x30 [ 26.560467] kmalloc_node_oob_right+0x2f4/0x330 [ 26.560515] kunit_try_run_case+0x170/0x3f0 [ 26.560563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.560614] kthread+0x328/0x630 [ 26.560657] ret_from_fork+0x10/0x20 [ 26.560705] [ 26.560722] Allocated by task 152: [ 26.560748] kasan_save_stack+0x3c/0x68 [ 26.560799] kasan_save_track+0x20/0x40 [ 26.560835] kasan_save_alloc_info+0x40/0x58 [ 26.560871] __kasan_kmalloc+0xd4/0xd8 [ 26.560906] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 26.560946] kmalloc_node_oob_right+0xbc/0x330 [ 26.560983] kunit_try_run_case+0x170/0x3f0 [ 26.561020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.561233] kthread+0x328/0x630 [ 26.561395] ret_from_fork+0x10/0x20 [ 26.561437] [ 26.561455] The buggy address belongs to the object at fff00000c65c4000 [ 26.561455] which belongs to the cache kmalloc-4k of size 4096 [ 26.561659] The buggy address is located 0 bytes to the right of [ 26.561659] allocated 4096-byte region [fff00000c65c4000, fff00000c65c5000) [ 26.561811] [ 26.561831] The buggy address belongs to the physical page: [ 26.561904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 26.562690] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.562910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.563027] page_type: f5(slab) [ 26.563133] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 26.563216] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 26.563325] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 26.563372] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 26.563419] head: 0bfffe0000000003 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff [ 26.563466] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 26.563507] page dumped because: kasan: bad access detected [ 26.563551] [ 26.563568] Memory state around the buggy address: [ 26.563597] fff00000c65c4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.563637] fff00000c65c4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.563677] >fff00000c65c5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.563722] ^ [ 26.563839] fff00000c65c5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.563892] fff00000c65c5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.563927] ==================================================================
[ 21.546177] ================================================================== [ 21.546980] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 21.547388] Read of size 1 at addr ffff888103ab3000 by task kunit_try_catch/169 [ 21.547608] [ 21.547703] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 21.547754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.547766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.547789] Call Trace: [ 21.547814] <TASK> [ 21.547835] dump_stack_lvl+0x73/0xb0 [ 21.547864] print_report+0xd1/0x650 [ 21.547885] ? __virt_addr_valid+0x1db/0x2d0 [ 21.547909] ? kmalloc_node_oob_right+0x369/0x3c0 [ 21.547931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.547956] ? kmalloc_node_oob_right+0x369/0x3c0 [ 21.547978] kasan_report+0x141/0x180 [ 21.547998] ? kmalloc_node_oob_right+0x369/0x3c0 [ 21.548024] __asan_report_load1_noabort+0x18/0x20 [ 21.548047] kmalloc_node_oob_right+0x369/0x3c0 [ 21.548069] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 21.548092] ? __schedule+0x10cc/0x2b60 [ 21.548116] ? __pfx_read_tsc+0x10/0x10 [ 21.548137] ? ktime_get_ts64+0x86/0x230 [ 21.548161] kunit_try_run_case+0x1a5/0x480 [ 21.548186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.548233] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.548257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.548282] ? __kthread_parkme+0x82/0x180 [ 21.548302] ? preempt_count_sub+0x50/0x80 [ 21.548325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.548348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.548371] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.548393] kthread+0x337/0x6f0 [ 21.548412] ? trace_preempt_on+0x20/0xc0 [ 21.548435] ? __pfx_kthread+0x10/0x10 [ 21.548454] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.548476] ? calculate_sigpending+0x7b/0xa0 [ 21.548500] ? __pfx_kthread+0x10/0x10 [ 21.548520] ret_from_fork+0x116/0x1d0 [ 21.548538] ? __pfx_kthread+0x10/0x10 [ 21.548558] ret_from_fork_asm+0x1a/0x30 [ 21.548588] </TASK> [ 21.548600] [ 21.561605] Allocated by task 169: [ 21.561749] kasan_save_stack+0x45/0x70 [ 21.561910] kasan_save_track+0x18/0x40 [ 21.562103] kasan_save_alloc_info+0x3b/0x50 [ 21.562508] __kasan_kmalloc+0xb7/0xc0 [ 21.562740] __kmalloc_cache_node_noprof+0x188/0x420 [ 21.563148] kmalloc_node_oob_right+0xab/0x3c0 [ 21.563345] kunit_try_run_case+0x1a5/0x480 [ 21.563484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.563650] kthread+0x337/0x6f0 [ 21.563899] ret_from_fork+0x116/0x1d0 [ 21.564088] ret_from_fork_asm+0x1a/0x30 [ 21.564333] [ 21.564454] The buggy address belongs to the object at ffff888103ab2000 [ 21.564454] which belongs to the cache kmalloc-4k of size 4096 [ 21.565398] The buggy address is located 0 bytes to the right of [ 21.565398] allocated 4096-byte region [ffff888103ab2000, ffff888103ab3000) [ 21.566373] [ 21.566476] The buggy address belongs to the physical page: [ 21.567446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab0 [ 21.567943] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.568356] flags: 0x200000000000040(head|node=0|zone=2) [ 21.568684] page_type: f5(slab) [ 21.568920] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 21.569409] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 21.569826] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 21.570207] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 21.570779] head: 0200000000000003 ffffea00040eac01 00000000ffffffff 00000000ffffffff [ 21.571177] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.571722] page dumped because: kasan: bad access detected [ 21.572152] [ 21.572605] Memory state around the buggy address: [ 21.572912] ffff888103ab2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.573375] ffff888103ab2f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.573990] >ffff888103ab3000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.574388] ^ [ 21.574504] ffff888103ab3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.574713] ffff888103ab3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.575312] ==================================================================