Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 36.826608] ================================================================== [ 36.835869] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 36.842723] Read of size 1 at addr ffff000800ba165f by task kunit_try_catch/222 [ 36.850015] [ 36.851499] CPU: 3 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 36.851551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.851569] Hardware name: WinLink E850-96 board (DT) [ 36.851591] Call trace: [ 36.851605] show_stack+0x20/0x38 (C) [ 36.851642] dump_stack_lvl+0x8c/0xd0 [ 36.851673] print_report+0x118/0x5d0 [ 36.851701] kasan_report+0xdc/0x128 [ 36.851729] __asan_report_load1_noabort+0x20/0x30 [ 36.851763] kmalloc_oob_left+0x2ec/0x320 [ 36.851795] kunit_try_run_case+0x170/0x3f0 [ 36.851833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.851865] kthread+0x328/0x630 [ 36.851893] ret_from_fork+0x10/0x20 [ 36.851926] [ 36.915377] Allocated by task 12: [ 36.918680] kasan_save_stack+0x3c/0x68 [ 36.922495] kasan_save_track+0x20/0x40 [ 36.926314] kasan_save_alloc_info+0x40/0x58 [ 36.930568] __kasan_kmalloc+0xd4/0xd8 [ 36.934302] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 36.939856] kstrdup+0x54/0xc8 [ 36.942894] kstrdup_const+0x48/0x60 [ 36.946453] __kernfs_new_node+0xb0/0x578 [ 36.950446] kernfs_new_node+0x128/0x1a8 [ 36.954352] kernfs_create_link+0xac/0x228 [ 36.958432] sysfs_do_create_link_sd+0x8c/0x128 [ 36.962946] sysfs_create_link_nowarn+0x48/0xb8 [ 36.967461] link_and_create_debugfs+0x70/0x440 [ 36.971974] _regulator_get_common+0x2ac/0x8d0 [ 36.976400] _regulator_get+0x48/0xa0 [ 36.980046] _devm_regulator_get+0x60/0xd0 [ 36.984126] devm_regulator_get_optional+0x1c/0x30 [ 36.988900] usb_conn_probe+0x21c/0xa80 [ 36.992719] platform_probe+0xcc/0x180 [ 36.996452] really_probe+0x188/0x7f0 [ 37.000100] __driver_probe_device+0x164/0x378 [ 37.004525] driver_probe_device+0x64/0x180 [ 37.008692] __device_attach_driver+0x174/0x280 [ 37.013205] bus_for_each_drv+0x118/0x1b0 [ 37.017198] __device_attach+0x174/0x378 [ 37.021105] device_initial_probe+0x1c/0x30 [ 37.025271] bus_probe_device+0x12c/0x170 [ 37.029264] deferred_probe_work_func+0x140/0x208 [ 37.033953] process_one_work+0x530/0xf98 [ 37.037945] worker_thread+0x618/0xf38 [ 37.041677] kthread+0x328/0x630 [ 37.044889] ret_from_fork+0x10/0x20 [ 37.048448] [ 37.049925] Freed by task 0: [ 37.052792] kasan_save_stack+0x3c/0x68 [ 37.056608] kasan_save_track+0x20/0x40 [ 37.060428] kasan_save_free_info+0x4c/0x78 [ 37.064593] __kasan_slab_free+0x6c/0x98 [ 37.068500] kfree+0x214/0x3c8 [ 37.071538] kfree_const+0x3c/0x50 [ 37.074923] kernfs_free_rcu+0x4c/0x120 [ 37.078743] rcu_core+0x9f4/0x1e20 [ 37.082128] rcu_core_si+0x18/0x30 [ 37.085513] handle_softirqs+0x374/0xb28 [ 37.089421] __do_softirq+0x1c/0x28 [ 37.092892] [ 37.094371] The buggy address belongs to the object at ffff000800ba1640 [ 37.094371] which belongs to the cache kmalloc-16 of size 16 [ 37.106695] The buggy address is located 15 bytes to the right of [ 37.106695] allocated 16-byte region [ffff000800ba1640, ffff000800ba1650) [ 37.119627] [ 37.121108] The buggy address belongs to the physical page: [ 37.126663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ba1 [ 37.134647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.141158] page_type: f5(slab) [ 37.144293] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 37.152013] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 37.159733] page dumped because: kasan: bad access detected [ 37.165286] [ 37.166762] Memory state around the buggy address: [ 37.171542] ffff000800ba1500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.178745] ffff000800ba1580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.185954] >ffff000800ba1600: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 37.193151] ^ [ 37.199231] ffff000800ba1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.206435] ffff000800ba1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.213638] ==================================================================
[ 30.072525] ================================================================== [ 30.072697] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 30.072764] Read of size 1 at addr fff00000c918c5df by task kunit_try_catch/169 [ 30.072839] [ 30.072878] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.073068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.073138] Hardware name: linux,dummy-virt (DT) [ 30.073206] Call trace: [ 30.073281] show_stack+0x20/0x38 (C) [ 30.073363] dump_stack_lvl+0x8c/0xd0 [ 30.073529] print_report+0x118/0x5d0 [ 30.073651] kasan_report+0xdc/0x128 [ 30.073726] __asan_report_load1_noabort+0x20/0x30 [ 30.073774] kmalloc_oob_left+0x2ec/0x320 [ 30.073819] kunit_try_run_case+0x170/0x3f0 [ 30.073888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.073938] kthread+0x328/0x630 [ 30.073981] ret_from_fork+0x10/0x20 [ 30.074036] [ 30.074054] Allocated by task 21: [ 30.074084] kasan_save_stack+0x3c/0x68 [ 30.074125] kasan_save_track+0x20/0x40 [ 30.074162] kasan_save_alloc_info+0x40/0x58 [ 30.074198] __kasan_kmalloc+0xd4/0xd8 [ 30.074234] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 30.074276] build_sched_domains+0x32c/0x3768 [ 30.074318] partition_sched_domains+0x79c/0x1098 [ 30.074369] rebuild_sched_domains_locked+0x494/0xde0 [ 30.074424] cpuset_handle_hotplug+0xab0/0x1480 [ 30.074501] cpuset_update_active_cpus+0x18/0x30 [ 30.074581] sched_cpu_activate+0x2d0/0x388 [ 30.074655] cpuhp_invoke_callback+0x5b8/0x1620 [ 30.074746] cpuhp_thread_fun+0x230/0x5d8 [ 30.074804] smpboot_thread_fn+0x2e8/0x760 [ 30.074915] kthread+0x328/0x630 [ 30.074967] ret_from_fork+0x10/0x20 [ 30.075003] [ 30.075057] Freed by task 21: [ 30.075294] kasan_save_stack+0x3c/0x68 [ 30.075383] kasan_save_track+0x20/0x40 [ 30.075523] kasan_save_free_info+0x4c/0x78 [ 30.075619] __kasan_slab_free+0x6c/0x98 [ 30.075706] kfree+0x214/0x3c8 [ 30.075797] build_sched_domains+0x1c64/0x3768 [ 30.075844] partition_sched_domains+0x79c/0x1098 [ 30.075884] rebuild_sched_domains_locked+0x494/0xde0 [ 30.075968] cpuset_handle_hotplug+0xab0/0x1480 [ 30.076214] cpuset_update_active_cpus+0x18/0x30 [ 30.076252] sched_cpu_activate+0x2d0/0x388 [ 30.076289] cpuhp_invoke_callback+0x5b8/0x1620 [ 30.076342] cpuhp_thread_fun+0x230/0x5d8 [ 30.076383] smpboot_thread_fn+0x2e8/0x760 [ 30.076422] kthread+0x328/0x630 [ 30.076454] ret_from_fork+0x10/0x20 [ 30.076503] [ 30.076529] The buggy address belongs to the object at fff00000c918c5c0 [ 30.076529] which belongs to the cache kmalloc-16 of size 16 [ 30.076596] The buggy address is located 15 bytes to the right of [ 30.076596] allocated 16-byte region [fff00000c918c5c0, fff00000c918c5d0) [ 30.076668] [ 30.076689] The buggy address belongs to the physical page: [ 30.076719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c [ 30.076780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.076838] page_type: f5(slab) [ 30.076880] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.076929] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.076979] page dumped because: kasan: bad access detected [ 30.077014] [ 30.077032] Memory state around the buggy address: [ 30.077080] fff00000c918c480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.077123] fff00000c918c500: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 30.077172] >fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 30.077219] ^ [ 30.077271] fff00000c918c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077310] fff00000c918c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077355] ==================================================================
[ 23.073101] ================================================================== [ 23.074306] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0 [ 23.075147] Read of size 1 at addr ffff88810226ac5f by task kunit_try_catch/188 [ 23.076080] [ 23.076301] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 23.076362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.076374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.076396] Call Trace: [ 23.076411] <TASK> [ 23.076430] dump_stack_lvl+0x73/0xb0 [ 23.076464] print_report+0xd1/0x610 [ 23.076486] ? __virt_addr_valid+0x1db/0x2d0 [ 23.076511] ? kmalloc_oob_left+0x361/0x3c0 [ 23.076531] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.076560] ? kmalloc_oob_left+0x361/0x3c0 [ 23.076582] kasan_report+0x141/0x180 [ 23.076604] ? kmalloc_oob_left+0x361/0x3c0 [ 23.076628] __asan_report_load1_noabort+0x18/0x20 [ 23.076652] kmalloc_oob_left+0x361/0x3c0 [ 23.076672] ? __pfx_kmalloc_oob_left+0x10/0x10 [ 23.076694] ? __schedule+0x10cc/0x2b60 [ 23.076718] ? __pfx_read_tsc+0x10/0x10 [ 23.076752] ? ktime_get_ts64+0x86/0x230 [ 23.076778] kunit_try_run_case+0x1a5/0x480 [ 23.076802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.076821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.076844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.076867] ? __kthread_parkme+0x82/0x180 [ 23.076888] ? preempt_count_sub+0x50/0x80 [ 23.076911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.076932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.076956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.076981] kthread+0x337/0x6f0 [ 23.077000] ? trace_preempt_on+0x20/0xc0 [ 23.077024] ? __pfx_kthread+0x10/0x10 [ 23.077046] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.077067] ? calculate_sigpending+0x7b/0xa0 [ 23.077091] ? __pfx_kthread+0x10/0x10 [ 23.077113] ret_from_fork+0x116/0x1d0 [ 23.077132] ? __pfx_kthread+0x10/0x10 [ 23.077152] ret_from_fork_asm+0x1a/0x30 [ 23.077183] </TASK> [ 23.077194] [ 23.089921] Allocated by task 21: [ 23.090383] kasan_save_stack+0x45/0x70 [ 23.090820] kasan_save_track+0x18/0x40 [ 23.091304] kasan_save_alloc_info+0x3b/0x50 [ 23.091797] __kasan_kmalloc+0xb7/0xc0 [ 23.092207] __kmalloc_cache_node_noprof+0x188/0x420 [ 23.092861] build_sched_domains+0x38c/0x5dd0 [ 23.093373] partition_sched_domains+0x471/0x9c0 [ 23.093860] rebuild_sched_domains_locked+0x97d/0xd50 [ 23.094243] cpuset_update_active_cpus+0x80f/0x1a90 [ 23.094836] sched_cpu_activate+0x2bf/0x330 [ 23.095514] cpuhp_invoke_callback+0x2a1/0xf00 [ 23.095669] cpuhp_thread_fun+0x2ce/0x5c0 [ 23.095817] smpboot_thread_fn+0x2bc/0x730 [ 23.095954] kthread+0x337/0x6f0 [ 23.096068] ret_from_fork+0x116/0x1d0 [ 23.096193] ret_from_fork_asm+0x1a/0x30 [ 23.096787] [ 23.097197] Freed by task 21: [ 23.097703] kasan_save_stack+0x45/0x70 [ 23.098255] kasan_save_track+0x18/0x40 [ 23.098726] kasan_save_free_info+0x3f/0x60 [ 23.099165] __kasan_slab_free+0x56/0x70 [ 23.099679] kfree+0x222/0x3f0 [ 23.100100] build_sched_domains+0x1fff/0x5dd0 [ 23.100754] partition_sched_domains+0x471/0x9c0 [ 23.101247] rebuild_sched_domains_locked+0x97d/0xd50 [ 23.101781] cpuset_update_active_cpus+0x80f/0x1a90 [ 23.102274] sched_cpu_activate+0x2bf/0x330 [ 23.102450] cpuhp_invoke_callback+0x2a1/0xf00 [ 23.102599] cpuhp_thread_fun+0x2ce/0x5c0 [ 23.102747] smpboot_thread_fn+0x2bc/0x730 [ 23.102882] kthread+0x337/0x6f0 [ 23.102996] ret_from_fork+0x116/0x1d0 [ 23.103122] ret_from_fork_asm+0x1a/0x30 [ 23.103276] [ 23.103355] The buggy address belongs to the object at ffff88810226ac40 [ 23.103355] which belongs to the cache kmalloc-16 of size 16 [ 23.103798] The buggy address is located 15 bytes to the right of [ 23.103798] allocated 16-byte region [ffff88810226ac40, ffff88810226ac50) [ 23.104931] [ 23.105098] The buggy address belongs to the physical page: [ 23.105299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226a [ 23.105922] flags: 0x200000000000000(node=0|zone=2) [ 23.106201] page_type: f5(slab) [ 23.106415] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.107046] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.107432] page dumped because: kasan: bad access detected [ 23.107750] [ 23.108078] Memory state around the buggy address: [ 23.108660] ffff88810226ab00: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 23.108976] ffff88810226ab80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 23.109268] >ffff88810226ac00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 23.109750] ^ [ 23.110003] ffff88810226ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.110441] ffff88810226ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.110767] ==================================================================