Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 37.180037] ================================================================== [ 37.189376] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 37.196746] Read of size 1 at addr ffff00080806b000 by task kunit_try_catch/224 [ 37.204036] [ 37.205522] CPU: 3 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 37.205575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.205593] Hardware name: WinLink E850-96 board (DT) [ 37.205610] Call trace: [ 37.205623] show_stack+0x20/0x38 (C) [ 37.205660] dump_stack_lvl+0x8c/0xd0 [ 37.205693] print_report+0x118/0x5d0 [ 37.205722] kasan_report+0xdc/0x128 [ 37.205747] __asan_report_load1_noabort+0x20/0x30 [ 37.205779] kmalloc_node_oob_right+0x2f4/0x330 [ 37.205813] kunit_try_run_case+0x170/0x3f0 [ 37.205852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.205883] kthread+0x328/0x630 [ 37.205911] ret_from_fork+0x10/0x20 [ 37.205946] [ 37.269922] Allocated by task 224: [ 37.273309] kasan_save_stack+0x3c/0x68 [ 37.277125] kasan_save_track+0x20/0x40 [ 37.280944] kasan_save_alloc_info+0x40/0x58 [ 37.285198] __kasan_kmalloc+0xd4/0xd8 [ 37.288932] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 37.293878] kmalloc_node_oob_right+0xbc/0x330 [ 37.298305] kunit_try_run_case+0x170/0x3f0 [ 37.302472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.307941] kthread+0x328/0x630 [ 37.311152] ret_from_fork+0x10/0x20 [ 37.314711] [ 37.316190] The buggy address belongs to the object at ffff00080806a000 [ 37.316190] which belongs to the cache kmalloc-4k of size 4096 [ 37.328690] The buggy address is located 0 bytes to the right of [ 37.328690] allocated 4096-byte region [ffff00080806a000, ffff00080806b000) [ 37.341707] [ 37.343186] The buggy address belongs to the physical page: [ 37.348744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888068 [ 37.356726] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.364365] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.371309] page_type: f5(slab) [ 37.374446] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.382165] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.389891] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.397702] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.405516] head: 0bfffe0000000003 fffffdffe0201a01 00000000ffffffff 00000000ffffffff [ 37.413327] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 37.421133] page dumped because: kasan: bad access detected [ 37.426690] [ 37.428166] Memory state around the buggy address: [ 37.432945] ffff00080806af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.440147] ffff00080806af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.447354] >ffff00080806b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.454554] ^ [ 37.457768] ffff00080806b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.464973] ffff00080806b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.472174] ==================================================================
[ 29.310269] ================================================================== [ 29.310332] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.310386] Read of size 1 at addr fff00000c8f19000 by task kunit_try_catch/171 [ 29.310481] [ 29.310515] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.310857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.310958] Hardware name: linux,dummy-virt (DT) [ 29.310994] Call trace: [ 29.311110] show_stack+0x20/0x38 (C) [ 29.311164] dump_stack_lvl+0x8c/0xd0 [ 29.311212] print_report+0x118/0x5d0 [ 29.311253] kasan_report+0xdc/0x128 [ 29.311294] __asan_report_load1_noabort+0x20/0x30 [ 29.311543] kmalloc_node_oob_right+0x2f4/0x330 [ 29.311617] kunit_try_run_case+0x170/0x3f0 [ 29.311719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.311808] kthread+0x328/0x630 [ 29.311909] ret_from_fork+0x10/0x20 [ 29.311974] [ 29.312013] Allocated by task 171: [ 29.312099] kasan_save_stack+0x3c/0x68 [ 29.312144] kasan_save_track+0x20/0x40 [ 29.312190] kasan_save_alloc_info+0x40/0x58 [ 29.312257] __kasan_kmalloc+0xd4/0xd8 [ 29.312375] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.312435] kmalloc_node_oob_right+0xbc/0x330 [ 29.312540] kunit_try_run_case+0x170/0x3f0 [ 29.312598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.312676] kthread+0x328/0x630 [ 29.312707] ret_from_fork+0x10/0x20 [ 29.312741] [ 29.312759] The buggy address belongs to the object at fff00000c8f18000 [ 29.312759] which belongs to the cache kmalloc-4k of size 4096 [ 29.312960] The buggy address is located 0 bytes to the right of [ 29.312960] allocated 4096-byte region [fff00000c8f18000, fff00000c8f19000) [ 29.313023] [ 29.313043] The buggy address belongs to the physical page: [ 29.313127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f18 [ 29.313621] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.313689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.313862] page_type: f5(slab) [ 29.314013] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.314160] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.314236] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.314332] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.314426] head: 0bfffe0000000003 ffffc1ffc323c601 00000000ffffffff 00000000ffffffff [ 29.314476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.314556] page dumped because: kasan: bad access detected [ 29.314585] [ 29.314603] Memory state around the buggy address: [ 29.314633] fff00000c8f18f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.314718] fff00000c8f18f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.314761] >fff00000c8f19000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314796] ^ [ 29.314823] fff00000c8f19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314892] fff00000c8f19100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314966] ==================================================================
[ 23.607163] ================================================================== [ 23.608219] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 23.608483] Read of size 1 at addr ffff888105ff5000 by task kunit_try_catch/189 [ 23.608711] [ 23.609005] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 23.609078] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.609090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.609115] Call Trace: [ 23.609129] <TASK> [ 23.609150] dump_stack_lvl+0x73/0xb0 [ 23.609220] print_report+0xd1/0x610 [ 23.609242] ? __virt_addr_valid+0x1db/0x2d0 [ 23.609278] ? kmalloc_node_oob_right+0x369/0x3c0 [ 23.609300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.609325] ? kmalloc_node_oob_right+0x369/0x3c0 [ 23.609347] kasan_report+0x141/0x180 [ 23.609368] ? kmalloc_node_oob_right+0x369/0x3c0 [ 23.609395] __asan_report_load1_noabort+0x18/0x20 [ 23.609418] kmalloc_node_oob_right+0x369/0x3c0 [ 23.609470] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 23.609495] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 23.609521] kunit_try_run_case+0x1a5/0x480 [ 23.609555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.609575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.609600] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.609623] ? __kthread_parkme+0x82/0x180 [ 23.609645] ? preempt_count_sub+0x50/0x80 [ 23.609677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.609698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.609722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.609794] kthread+0x337/0x6f0 [ 23.609814] ? trace_preempt_on+0x20/0xc0 [ 23.609851] ? __pfx_kthread+0x10/0x10 [ 23.609873] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.609894] ? calculate_sigpending+0x7b/0xa0 [ 23.609964] ? __pfx_kthread+0x10/0x10 [ 23.609985] ret_from_fork+0x116/0x1d0 [ 23.610016] ? __pfx_kthread+0x10/0x10 [ 23.610037] ret_from_fork_asm+0x1a/0x30 [ 23.610087] </TASK> [ 23.610107] [ 23.622233] Allocated by task 189: [ 23.622422] kasan_save_stack+0x45/0x70 [ 23.622613] kasan_save_track+0x18/0x40 [ 23.622898] kasan_save_alloc_info+0x3b/0x50 [ 23.623056] __kasan_kmalloc+0xb7/0xc0 [ 23.623344] __kmalloc_cache_node_noprof+0x188/0x420 [ 23.623508] kmalloc_node_oob_right+0xab/0x3c0 [ 23.623653] kunit_try_run_case+0x1a5/0x480 [ 23.623826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.624108] kthread+0x337/0x6f0 [ 23.624274] ret_from_fork+0x116/0x1d0 [ 23.624457] ret_from_fork_asm+0x1a/0x30 [ 23.624651] [ 23.624814] The buggy address belongs to the object at ffff888105ff4000 [ 23.624814] which belongs to the cache kmalloc-4k of size 4096 [ 23.625348] The buggy address is located 0 bytes to the right of [ 23.625348] allocated 4096-byte region [ffff888105ff4000, ffff888105ff5000) [ 23.626077] [ 23.626254] The buggy address belongs to the physical page: [ 23.626618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ff0 [ 23.627407] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.627815] flags: 0x200000000000040(head|node=0|zone=2) [ 23.628151] page_type: f5(slab) [ 23.628357] raw: 0200000000000040 ffff888100042140 ffffea0004180000 dead000000000002 [ 23.628597] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 23.629122] head: 0200000000000040 ffff888100042140 ffffea0004180000 dead000000000002 [ 23.629426] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 23.629806] head: 0200000000000003 ffffea000417fc01 00000000ffffffff 00000000ffffffff [ 23.630189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 23.630490] page dumped because: kasan: bad access detected [ 23.630846] [ 23.631008] Memory state around the buggy address: [ 23.631248] ffff888105ff4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.631589] ffff888105ff4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.631836] >ffff888105ff5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.632098] ^ [ 23.632259] ffff888105ff5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.632620] ffff888105ff5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633044] ==================================================================