Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 18.065469] ================================================================== [ 18.074620] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 18.081993] Read of size 1 at addr ffff00080476f000 by task kunit_try_catch/189 [ 18.089284] [ 18.090771] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.090823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.090841] Hardware name: WinLink E850-96 board (DT) [ 18.090863] Call trace: [ 18.090875] show_stack+0x20/0x38 (C) [ 18.090911] dump_stack_lvl+0x8c/0xd0 [ 18.090952] print_report+0x118/0x608 [ 18.090983] kasan_report+0xdc/0x128 [ 18.091013] __asan_report_load1_noabort+0x20/0x30 [ 18.091049] kmalloc_node_oob_right+0x2f4/0x330 [ 18.091077] kunit_try_run_case+0x170/0x3f0 [ 18.091112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.091148] kthread+0x328/0x630 [ 18.091184] ret_from_fork+0x10/0x20 [ 18.091218] [ 18.153953] Allocated by task 189: [ 18.157342] kasan_save_stack+0x3c/0x68 [ 18.161157] kasan_save_track+0x20/0x40 [ 18.164979] kasan_save_alloc_info+0x40/0x58 [ 18.169231] __kasan_kmalloc+0xd4/0xd8 [ 18.172963] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 18.177911] kmalloc_node_oob_right+0xbc/0x330 [ 18.182338] kunit_try_run_case+0x170/0x3f0 [ 18.186504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.191973] kthread+0x328/0x630 [ 18.195185] ret_from_fork+0x10/0x20 [ 18.198744] [ 18.200221] The buggy address belongs to the object at ffff00080476e000 [ 18.200221] which belongs to the cache kmalloc-4k of size 4096 [ 18.212723] The buggy address is located 0 bytes to the right of [ 18.212723] allocated 4096-byte region [ffff00080476e000, ffff00080476f000) [ 18.225740] [ 18.227218] The buggy address belongs to the physical page: [ 18.232774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884768 [ 18.240759] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.248398] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.255340] page_type: f5(slab) [ 18.258479] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 18.266198] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.273924] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 18.281735] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.289548] head: 0bfffe0000000003 fffffdffe011da01 00000000ffffffff 00000000ffffffff [ 18.297360] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.305169] page dumped because: kasan: bad access detected [ 18.310722] [ 18.312197] Memory state around the buggy address: [ 18.316979] ffff00080476ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.324180] ffff00080476ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.331386] >ffff00080476f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.338586] ^ [ 18.341801] ffff00080476f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.349006] ffff00080476f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.356208] ==================================================================
[ 15.242218] ================================================================== [ 15.242279] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 15.242328] Read of size 1 at addr fff00000c652f000 by task kunit_try_catch/145 [ 15.242375] [ 15.242405] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.242481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.242506] Hardware name: linux,dummy-virt (DT) [ 15.242536] Call trace: [ 15.242556] show_stack+0x20/0x38 (C) [ 15.242602] dump_stack_lvl+0x8c/0xd0 [ 15.243406] print_report+0x118/0x608 [ 15.243648] kasan_report+0xdc/0x128 [ 15.243710] __asan_report_load1_noabort+0x20/0x30 [ 15.243760] kmalloc_node_oob_right+0x2f4/0x330 [ 15.243805] kunit_try_run_case+0x170/0x3f0 [ 15.243889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.243963] kthread+0x328/0x630 [ 15.244008] ret_from_fork+0x10/0x20 [ 15.244054] [ 15.244072] Allocated by task 145: [ 15.244100] kasan_save_stack+0x3c/0x68 [ 15.244137] kasan_save_track+0x20/0x40 [ 15.244340] kasan_save_alloc_info+0x40/0x58 [ 15.244575] __kasan_kmalloc+0xd4/0xd8 [ 15.244858] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 15.244949] kmalloc_node_oob_right+0xbc/0x330 [ 15.245132] kunit_try_run_case+0x170/0x3f0 [ 15.245178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.245221] kthread+0x328/0x630 [ 15.245254] ret_from_fork+0x10/0x20 [ 15.245288] [ 15.245307] The buggy address belongs to the object at fff00000c652e000 [ 15.245307] which belongs to the cache kmalloc-4k of size 4096 [ 15.245362] The buggy address is located 0 bytes to the right of [ 15.245362] allocated 4096-byte region [fff00000c652e000, fff00000c652f000) [ 15.245423] [ 15.245493] The buggy address belongs to the physical page: [ 15.245687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106528 [ 15.246451] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.246551] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.247090] page_type: f5(slab) [ 15.247239] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 15.247427] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.247743] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 15.247822] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.247888] head: 0bfffe0000000003 ffffc1ffc3194a01 00000000ffffffff 00000000ffffffff [ 15.247935] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 15.248655] page dumped because: kasan: bad access detected [ 15.248753] [ 15.248773] Memory state around the buggy address: [ 15.248813] fff00000c652ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.248855] fff00000c652ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.248899] >fff00000c652f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.248965] ^ [ 15.249052] fff00000c652f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.249250] fff00000c652f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.249487] ==================================================================
[ 13.311431] ================================================================== [ 13.311930] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 13.312674] Read of size 1 at addr ffff888102667000 by task kunit_try_catch/161 [ 13.313460] [ 13.313763] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.313911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.313941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.313987] Call Trace: [ 13.314018] <TASK> [ 13.314060] dump_stack_lvl+0x73/0xb0 [ 13.314166] print_report+0xd1/0x650 [ 13.314275] ? __virt_addr_valid+0x1db/0x2d0 [ 13.314329] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.314390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.314439] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.314478] kasan_report+0x141/0x180 [ 13.314532] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.314582] __asan_report_load1_noabort+0x18/0x20 [ 13.314615] kmalloc_node_oob_right+0x369/0x3c0 [ 13.314639] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 13.314662] ? __schedule+0x10cc/0x2b60 [ 13.314688] ? __pfx_read_tsc+0x10/0x10 [ 13.314712] ? ktime_get_ts64+0x86/0x230 [ 13.314740] kunit_try_run_case+0x1a5/0x480 [ 13.314769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314792] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.314819] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.314844] ? __kthread_parkme+0x82/0x180 [ 13.314868] ? preempt_count_sub+0x50/0x80 [ 13.314897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.314947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.314971] kthread+0x337/0x6f0 [ 13.314989] ? trace_preempt_on+0x20/0xc0 [ 13.315015] ? __pfx_kthread+0x10/0x10 [ 13.315034] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.315057] ? calculate_sigpending+0x7b/0xa0 [ 13.315101] ? __pfx_kthread+0x10/0x10 [ 13.315122] ret_from_fork+0x41/0x80 [ 13.315145] ? __pfx_kthread+0x10/0x10 [ 13.315164] ret_from_fork_asm+0x1a/0x30 [ 13.315199] </TASK> [ 13.315221] [ 13.329115] Allocated by task 161: [ 13.329662] kasan_save_stack+0x45/0x70 [ 13.329973] kasan_save_track+0x18/0x40 [ 13.330884] kasan_save_alloc_info+0x3b/0x50 [ 13.331175] __kasan_kmalloc+0xb7/0xc0 [ 13.331419] __kmalloc_cache_node_noprof+0x188/0x420 [ 13.332079] kmalloc_node_oob_right+0xab/0x3c0 [ 13.332288] kunit_try_run_case+0x1a5/0x480 [ 13.332695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.332992] kthread+0x337/0x6f0 [ 13.333746] ret_from_fork+0x41/0x80 [ 13.334067] ret_from_fork_asm+0x1a/0x30 [ 13.334600] [ 13.334881] The buggy address belongs to the object at ffff888102666000 [ 13.334881] which belongs to the cache kmalloc-4k of size 4096 [ 13.335705] The buggy address is located 0 bytes to the right of [ 13.335705] allocated 4096-byte region [ffff888102666000, ffff888102667000) [ 13.337114] [ 13.337264] The buggy address belongs to the physical page: [ 13.337651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102660 [ 13.338892] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.339243] flags: 0x200000000000040(head|node=0|zone=2) [ 13.340031] page_type: f5(slab) [ 13.340715] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 13.341428] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 13.341917] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 13.342672] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 13.343015] head: 0200000000000003 ffffea0004099801 00000000ffffffff 00000000ffffffff [ 13.344009] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 13.344614] page dumped because: kasan: bad access detected [ 13.344950] [ 13.345464] Memory state around the buggy address: [ 13.345907] ffff888102666f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.346439] ffff888102666f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.346972] >ffff888102667000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.347513] ^ [ 13.347817] ffff888102667080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.348122] ffff888102667100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.348632] ==================================================================
[ 19.270235] ================================================================== [ 19.281190] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 19.288590] Read of size 1 at addr ffff888105f47000 by task kunit_try_catch/183 [ 19.295927] [ 19.297477] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.297485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.297487] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.297491] Call Trace: [ 19.297492] <TASK> [ 19.297494] dump_stack_lvl+0x73/0xb0 [ 19.297498] print_report+0xd1/0x650 [ 19.297503] ? __virt_addr_valid+0x1db/0x2d0 [ 19.297507] ? kmalloc_node_oob_right+0x369/0x3c0 [ 19.297510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.297515] ? kmalloc_node_oob_right+0x369/0x3c0 [ 19.297519] kasan_report+0x141/0x180 [ 19.297523] ? kmalloc_node_oob_right+0x369/0x3c0 [ 19.297528] __asan_report_load1_noabort+0x18/0x20 [ 19.297532] kmalloc_node_oob_right+0x369/0x3c0 [ 19.297535] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 19.297539] ? __schedule+0x10cc/0x2b60 [ 19.297544] ? ktime_get_ts64+0x83/0x230 [ 19.297549] kunit_try_run_case+0x1a2/0x480 [ 19.297553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.297558] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.297563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.297567] ? __kthread_parkme+0x82/0x180 [ 19.297571] ? preempt_count_sub+0x50/0x80 [ 19.297576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.297581] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.297585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.297590] kthread+0x334/0x6f0 [ 19.297593] ? trace_preempt_on+0x20/0xc0 [ 19.297597] ? __pfx_kthread+0x10/0x10 [ 19.297600] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.297605] ? calculate_sigpending+0x7b/0xa0 [ 19.297609] ? __pfx_kthread+0x10/0x10 [ 19.297612] ret_from_fork+0x3e/0x80 [ 19.297616] ? __pfx_kthread+0x10/0x10 [ 19.297619] ret_from_fork_asm+0x1a/0x30 [ 19.297625] </TASK> [ 19.297626] [ 19.462694] Allocated by task 183: [ 19.466101] kasan_save_stack+0x45/0x70 [ 19.469956] kasan_save_track+0x18/0x40 [ 19.473813] kasan_save_alloc_info+0x3b/0x50 [ 19.478087] __kasan_kmalloc+0xb7/0xc0 [ 19.481838] __kmalloc_cache_node_noprof+0x188/0x420 [ 19.486806] kmalloc_node_oob_right+0xab/0x3c0 [ 19.491251] kunit_try_run_case+0x1a2/0x480 [ 19.495438] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.500845] kthread+0x334/0x6f0 [ 19.504077] ret_from_fork+0x3e/0x80 [ 19.507657] ret_from_fork_asm+0x1a/0x30 [ 19.511584] [ 19.513082] The buggy address belongs to the object at ffff888105f46000 [ 19.513082] which belongs to the cache kmalloc-4k of size 4096 [ 19.525597] The buggy address is located 0 bytes to the right of [ 19.525597] allocated 4096-byte region [ffff888105f46000, ffff888105f47000) [ 19.538631] [ 19.540130] The buggy address belongs to the physical page: [ 19.545705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f40 [ 19.553711] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.561364] flags: 0x200000000000040(head|node=0|zone=2) [ 19.566678] page_type: f5(slab) [ 19.569825] raw: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 19.577573] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.585319] head: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 19.593161] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.600995] head: 0200000000000003 ffffea000417d001 00000000ffffffff 00000000ffffffff [ 19.608824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.616649] page dumped because: kasan: bad access detected [ 19.622220] [ 19.623712] Memory state around the buggy address: [ 19.628505] ffff888105f46f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.635725] ffff888105f46f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.642977] >ffff888105f47000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650198] ^ [ 19.653429] ffff888105f47080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660648] ffff888105f47100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.667868] ==================================================================