Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 37.523285] ================================================================== [ 37.533081] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.541150] Write of size 1 at addr ffff00080193aa78 by task kunit_try_catch/226 [ 37.548527] [ 37.550015] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 37.550073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.550089] Hardware name: WinLink E850-96 board (DT) [ 37.550111] Call trace: [ 37.550126] show_stack+0x20/0x38 (C) [ 37.550159] dump_stack_lvl+0x8c/0xd0 [ 37.550194] print_report+0x118/0x5d0 [ 37.550223] kasan_report+0xdc/0x128 [ 37.550249] __asan_report_store1_noabort+0x20/0x30 [ 37.550289] kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.550325] kunit_try_run_case+0x170/0x3f0 [ 37.550362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.550395] kthread+0x328/0x630 [ 37.550425] ret_from_fork+0x10/0x20 [ 37.550461] [ 37.615194] Allocated by task 226: [ 37.618584] kasan_save_stack+0x3c/0x68 [ 37.622398] kasan_save_track+0x20/0x40 [ 37.626217] kasan_save_alloc_info+0x40/0x58 [ 37.630470] __kasan_kmalloc+0xd4/0xd8 [ 37.634203] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 37.639758] kmalloc_track_caller_oob_right+0xa8/0x488 [ 37.644880] kunit_try_run_case+0x170/0x3f0 [ 37.649046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.654517] kthread+0x328/0x630 [ 37.657727] ret_from_fork+0x10/0x20 [ 37.661286] [ 37.662764] The buggy address belongs to the object at ffff00080193aa00 [ 37.662764] which belongs to the cache kmalloc-128 of size 128 [ 37.675264] The buggy address is located 0 bytes to the right of [ 37.675264] allocated 120-byte region [ffff00080193aa00, ffff00080193aa78) [ 37.688195] [ 37.689674] The buggy address belongs to the physical page: [ 37.695232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 37.703214] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.710853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.717797] page_type: f5(slab) [ 37.720931] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.728652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.736381] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.744191] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.752004] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 37.759816] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.767621] page dumped because: kasan: bad access detected [ 37.773176] [ 37.774652] Memory state around the buggy address: [ 37.779431] ffff00080193a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.786635] ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.793842] >ffff00080193aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.801041] ^ [ 37.808163] ffff00080193aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.815367] ffff00080193ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.822570] ==================================================================
[ 30.091483] ================================================================== [ 30.091548] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.091611] Write of size 1 at addr fff00000c91b3478 by task kunit_try_catch/173 [ 30.091661] [ 30.091699] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.091781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.091807] Hardware name: linux,dummy-virt (DT) [ 30.091838] Call trace: [ 30.091861] show_stack+0x20/0x38 (C) [ 30.091910] dump_stack_lvl+0x8c/0xd0 [ 30.091956] print_report+0x118/0x5d0 [ 30.091999] kasan_report+0xdc/0x128 [ 30.092041] __asan_report_store1_noabort+0x20/0x30 [ 30.092132] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.092186] kunit_try_run_case+0x170/0x3f0 [ 30.092301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.092371] kthread+0x328/0x630 [ 30.092432] ret_from_fork+0x10/0x20 [ 30.092493] [ 30.092512] Allocated by task 173: [ 30.092559] kasan_save_stack+0x3c/0x68 [ 30.092628] kasan_save_track+0x20/0x40 [ 30.092667] kasan_save_alloc_info+0x40/0x58 [ 30.092703] __kasan_kmalloc+0xd4/0xd8 [ 30.092739] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.092800] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.092869] kunit_try_run_case+0x170/0x3f0 [ 30.092926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.092994] kthread+0x328/0x630 [ 30.093060] ret_from_fork+0x10/0x20 [ 30.093095] [ 30.093113] The buggy address belongs to the object at fff00000c91b3400 [ 30.093113] which belongs to the cache kmalloc-128 of size 128 [ 30.093185] The buggy address is located 0 bytes to the right of [ 30.093185] allocated 120-byte region [fff00000c91b3400, fff00000c91b3478) [ 30.093466] [ 30.093596] The buggy address belongs to the physical page: [ 30.093706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.093822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.093892] page_type: f5(slab) [ 30.093970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.094020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.094058] page dumped because: kasan: bad access detected [ 30.094112] [ 30.094130] Memory state around the buggy address: [ 30.094162] fff00000c91b3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.094203] fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094243] >fff00000c91b3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.094279] ^ [ 30.094317] fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094367] fff00000c91b3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094403] ================================================================== [ 30.095650] ================================================================== [ 30.095714] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.095771] Write of size 1 at addr fff00000c91b3578 by task kunit_try_catch/173 [ 30.095966] [ 30.096035] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.096117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.096205] Hardware name: linux,dummy-virt (DT) [ 30.096255] Call trace: [ 30.096293] show_stack+0x20/0x38 (C) [ 30.096373] dump_stack_lvl+0x8c/0xd0 [ 30.096440] print_report+0x118/0x5d0 [ 30.096485] kasan_report+0xdc/0x128 [ 30.096529] __asan_report_store1_noabort+0x20/0x30 [ 30.096603] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.096670] kunit_try_run_case+0x170/0x3f0 [ 30.096737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.096786] kthread+0x328/0x630 [ 30.096842] ret_from_fork+0x10/0x20 [ 30.096909] [ 30.096928] Allocated by task 173: [ 30.096955] kasan_save_stack+0x3c/0x68 [ 30.097011] kasan_save_track+0x20/0x40 [ 30.097073] kasan_save_alloc_info+0x40/0x58 [ 30.097110] __kasan_kmalloc+0xd4/0xd8 [ 30.097157] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.097207] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.097252] kunit_try_run_case+0x170/0x3f0 [ 30.097397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.097524] kthread+0x328/0x630 [ 30.097602] ret_from_fork+0x10/0x20 [ 30.097756] [ 30.097857] The buggy address belongs to the object at fff00000c91b3500 [ 30.097857] which belongs to the cache kmalloc-128 of size 128 [ 30.097963] The buggy address is located 0 bytes to the right of [ 30.097963] allocated 120-byte region [fff00000c91b3500, fff00000c91b3578) [ 30.098114] [ 30.098193] The buggy address belongs to the physical page: [ 30.098291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.098406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.098460] page_type: f5(slab) [ 30.098502] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.098557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.098603] page dumped because: kasan: bad access detected [ 30.098840] [ 30.098952] Memory state around the buggy address: [ 30.099101] fff00000c91b3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.099168] fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099214] >fff00000c91b3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.099257] ^ [ 30.099303] fff00000c91b3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099359] fff00000c91b3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099401] ==================================================================
[ 23.153157] ================================================================== [ 23.154000] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 23.154667] Write of size 1 at addr ffff888105a7ae78 by task kunit_try_catch/192 [ 23.155130] [ 23.155391] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 23.155499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.155512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.155556] Call Trace: [ 23.155569] <TASK> [ 23.155589] dump_stack_lvl+0x73/0xb0 [ 23.155621] print_report+0xd1/0x610 [ 23.155642] ? __virt_addr_valid+0x1db/0x2d0 [ 23.155666] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 23.155690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.155715] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 23.155749] kasan_report+0x141/0x180 [ 23.155770] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 23.155797] __asan_report_store1_noabort+0x1b/0x30 [ 23.155821] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 23.155844] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 23.155869] ? __schedule+0x10cc/0x2b60 [ 23.155892] ? __pfx_read_tsc+0x10/0x10 [ 23.155913] ? ktime_get_ts64+0x86/0x230 [ 23.155938] kunit_try_run_case+0x1a5/0x480 [ 23.155961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.155981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.156003] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.156026] ? __kthread_parkme+0x82/0x180 [ 23.156047] ? preempt_count_sub+0x50/0x80 [ 23.156070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.156091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.156115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.156139] kthread+0x337/0x6f0 [ 23.156158] ? trace_preempt_on+0x20/0xc0 [ 23.156182] ? __pfx_kthread+0x10/0x10 [ 23.156202] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.156223] ? calculate_sigpending+0x7b/0xa0 [ 23.156247] ? __pfx_kthread+0x10/0x10 [ 23.156297] ret_from_fork+0x116/0x1d0 [ 23.156321] ? __pfx_kthread+0x10/0x10 [ 23.156341] ret_from_fork_asm+0x1a/0x30 [ 23.156371] </TASK> [ 23.156383] [ 23.164347] Allocated by task 192: [ 23.164475] kasan_save_stack+0x45/0x70 [ 23.164674] kasan_save_track+0x18/0x40 [ 23.164888] kasan_save_alloc_info+0x3b/0x50 [ 23.165156] __kasan_kmalloc+0xb7/0xc0 [ 23.165324] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 23.165603] kmalloc_track_caller_oob_right+0x99/0x520 [ 23.165930] kunit_try_run_case+0x1a5/0x480 [ 23.166099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.166267] kthread+0x337/0x6f0 [ 23.166381] ret_from_fork+0x116/0x1d0 [ 23.166524] ret_from_fork_asm+0x1a/0x30 [ 23.166675] [ 23.166799] The buggy address belongs to the object at ffff888105a7ae00 [ 23.166799] which belongs to the cache kmalloc-128 of size 128 [ 23.167335] The buggy address is located 0 bytes to the right of [ 23.167335] allocated 120-byte region [ffff888105a7ae00, ffff888105a7ae78) [ 23.167746] [ 23.167812] The buggy address belongs to the physical page: [ 23.167979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a [ 23.168540] flags: 0x200000000000000(node=0|zone=2) [ 23.168898] page_type: f5(slab) [ 23.169084] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.169610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.169894] page dumped because: kasan: bad access detected [ 23.170059] [ 23.170121] Memory state around the buggy address: [ 23.170268] ffff888105a7ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.170608] ffff888105a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.171043] >ffff888105a7ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.171497] ^ [ 23.171832] ffff888105a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.172117] ffff888105a7af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.172427] ================================================================== [ 23.173069] ================================================================== [ 23.173441] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 23.173685] Write of size 1 at addr ffff888105a7af78 by task kunit_try_catch/192 [ 23.173909] [ 23.173994] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 23.174044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.174056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.174077] Call Trace: [ 23.174091] <TASK> [ 23.174106] dump_stack_lvl+0x73/0xb0 [ 23.174134] print_report+0xd1/0x610 [ 23.174155] ? __virt_addr_valid+0x1db/0x2d0 [ 23.174178] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 23.174202] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.174227] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 23.174251] kasan_report+0x141/0x180 [ 23.174271] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 23.174299] __asan_report_store1_noabort+0x1b/0x30 [ 23.174322] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 23.174346] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 23.174370] ? __schedule+0x10cc/0x2b60 [ 23.174436] ? __pfx_read_tsc+0x10/0x10 [ 23.174478] ? ktime_get_ts64+0x86/0x230 [ 23.174503] kunit_try_run_case+0x1a5/0x480 [ 23.174525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.174544] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.174569] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.174591] ? __kthread_parkme+0x82/0x180 [ 23.174611] ? preempt_count_sub+0x50/0x80 [ 23.174635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.174656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.174680] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.174704] kthread+0x337/0x6f0 [ 23.174723] ? trace_preempt_on+0x20/0xc0 [ 23.174755] ? __pfx_kthread+0x10/0x10 [ 23.174776] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.174797] ? calculate_sigpending+0x7b/0xa0 [ 23.174820] ? __pfx_kthread+0x10/0x10 [ 23.174841] ret_from_fork+0x116/0x1d0 [ 23.174860] ? __pfx_kthread+0x10/0x10 [ 23.174881] ret_from_fork_asm+0x1a/0x30 [ 23.174912] </TASK> [ 23.174923] [ 23.182071] Allocated by task 192: [ 23.182220] kasan_save_stack+0x45/0x70 [ 23.182438] kasan_save_track+0x18/0x40 [ 23.182654] kasan_save_alloc_info+0x3b/0x50 [ 23.182942] __kasan_kmalloc+0xb7/0xc0 [ 23.183109] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 23.183392] kmalloc_track_caller_oob_right+0x19a/0x520 [ 23.183687] kunit_try_run_case+0x1a5/0x480 [ 23.184002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.184250] kthread+0x337/0x6f0 [ 23.184433] ret_from_fork+0x116/0x1d0 [ 23.184684] ret_from_fork_asm+0x1a/0x30 [ 23.184891] [ 23.184996] The buggy address belongs to the object at ffff888105a7af00 [ 23.184996] which belongs to the cache kmalloc-128 of size 128 [ 23.185652] The buggy address is located 0 bytes to the right of [ 23.185652] allocated 120-byte region [ffff888105a7af00, ffff888105a7af78) [ 23.186174] [ 23.186272] The buggy address belongs to the physical page: [ 23.186521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a [ 23.186883] flags: 0x200000000000000(node=0|zone=2) [ 23.187106] page_type: f5(slab) [ 23.187250] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.187487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.187842] page dumped because: kasan: bad access detected [ 23.188121] [ 23.188199] Memory state around the buggy address: [ 23.188353] ffff888105a7ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.188874] ffff888105a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.189192] >ffff888105a7af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.189421] ^ [ 23.189626] ffff888105a7af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.189981] ffff888105a7b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.190252] ==================================================================