Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 17.715385] ================================================================== [ 17.724711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.731565] Read of size 1 at addr ffff000803af22ff by task kunit_try_catch/187 [ 17.738856] [ 17.740340] CPU: 2 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.740392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.740409] Hardware name: WinLink E850-96 board (DT) [ 17.740429] Call trace: [ 17.740443] show_stack+0x20/0x38 (C) [ 17.740476] dump_stack_lvl+0x8c/0xd0 [ 17.740513] print_report+0x118/0x608 [ 17.740543] kasan_report+0xdc/0x128 [ 17.740575] __asan_report_load1_noabort+0x20/0x30 [ 17.740610] kmalloc_oob_left+0x2ec/0x320 [ 17.740641] kunit_try_run_case+0x170/0x3f0 [ 17.740676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.740711] kthread+0x328/0x630 [ 17.740744] ret_from_fork+0x10/0x20 [ 17.740778] [ 17.803004] Allocated by task 67: [ 17.806305] kasan_save_stack+0x3c/0x68 [ 17.810121] kasan_save_track+0x20/0x40 [ 17.813940] kasan_save_alloc_info+0x40/0x58 [ 17.818194] __kasan_kmalloc+0xd4/0xd8 [ 17.821928] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.827482] kstrdup+0x54/0xc8 [ 17.830520] kstrdup_const+0x48/0x60 [ 17.834079] __kernfs_new_node+0xb0/0x578 [ 17.838072] kernfs_new_node+0x128/0x1a8 [ 17.841979] kernfs_create_link+0xac/0x228 [ 17.846058] sysfs_do_create_link_sd+0x8c/0x128 [ 17.850572] sysfs_create_link+0x48/0xb8 [ 17.854480] bus_add_device+0xf4/0x3a0 [ 17.858211] device_add+0x694/0x12b8 [ 17.861770] cdev_device_add+0xdc/0x208 [ 17.865589] mmc_blk_probe+0xa94/0x1508 [ 17.869409] mmc_bus_probe+0x60/0x88 [ 17.872967] really_probe+0x188/0x7f0 [ 17.876613] __driver_probe_device+0x164/0x378 [ 17.881041] driver_probe_device+0x64/0x180 [ 17.885208] __device_attach_driver+0x174/0x280 [ 17.889721] bus_for_each_drv+0x118/0x1b0 [ 17.893714] __device_attach+0x174/0x378 [ 17.897620] device_initial_probe+0x1c/0x30 [ 17.901787] bus_probe_device+0x12c/0x170 [ 17.905780] device_add+0xc44/0x12b8 [ 17.909339] mmc_add_card+0x304/0x660 [ 17.912984] mmc_attach_mmc+0x290/0x388 [ 17.916805] mmc_rescan+0x5d8/0xc80 [ 17.920276] process_one_work+0x530/0xf98 [ 17.924269] worker_thread+0x618/0xf38 [ 17.928002] kthread+0x328/0x630 [ 17.931214] ret_from_fork+0x10/0x20 [ 17.934772] [ 17.936250] The buggy address belongs to the object at ffff000803af22e0 [ 17.936250] which belongs to the cache kmalloc-16 of size 16 [ 17.948576] The buggy address is located 19 bytes to the right of [ 17.948576] allocated 12-byte region [ffff000803af22e0, ffff000803af22ec) [ 17.961508] [ 17.962987] The buggy address belongs to the physical page: [ 17.968545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883af2 [ 17.976529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.983037] page_type: f5(slab) [ 17.986173] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 17.993892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.001613] page dumped because: kasan: bad access detected [ 18.007167] [ 18.008642] Memory state around the buggy address: [ 18.013423] ffff000803af2180: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc [ 18.020627] ffff000803af2200: 00 00 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc [ 18.027835] >ffff000803af2280: 00 05 fc fc 00 04 fc fc 00 04 fc fc 00 04 fc fc [ 18.035031] ^ [ 18.042153] ffff000803af2300: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.049358] ffff000803af2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.056561] ==================================================================
[ 15.228070] ================================================================== [ 15.228128] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 15.228181] Read of size 1 at addr fff00000c627125f by task kunit_try_catch/143 [ 15.228229] [ 15.228262] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.228340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.228365] Hardware name: linux,dummy-virt (DT) [ 15.228394] Call trace: [ 15.228415] show_stack+0x20/0x38 (C) [ 15.228461] dump_stack_lvl+0x8c/0xd0 [ 15.228508] print_report+0x118/0x608 [ 15.228574] kasan_report+0xdc/0x128 [ 15.228619] __asan_report_load1_noabort+0x20/0x30 [ 15.228977] kmalloc_oob_left+0x2ec/0x320 [ 15.229104] kunit_try_run_case+0x170/0x3f0 [ 15.229202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.229543] kthread+0x328/0x630 [ 15.229864] ret_from_fork+0x10/0x20 [ 15.230015] [ 15.230034] Allocated by task 10: [ 15.230138] kasan_save_stack+0x3c/0x68 [ 15.230196] kasan_save_track+0x20/0x40 [ 15.230291] kasan_save_alloc_info+0x40/0x58 [ 15.230418] __kasan_kmalloc+0xd4/0xd8 [ 15.230451] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 15.230493] kvasprintf+0xe0/0x180 [ 15.230548] __kthread_create_on_node+0x16c/0x350 [ 15.230585] kthread_create_on_node+0xe4/0x130 [ 15.230619] create_worker+0x380/0x6b8 [ 15.230663] worker_thread+0x808/0xf38 [ 15.230947] kthread+0x328/0x630 [ 15.230985] ret_from_fork+0x10/0x20 [ 15.231019] [ 15.231038] The buggy address belongs to the object at fff00000c6271240 [ 15.231038] which belongs to the cache kmalloc-16 of size 16 [ 15.231092] The buggy address is located 19 bytes to the right of [ 15.231092] allocated 12-byte region [fff00000c6271240, fff00000c627124c) [ 15.231314] [ 15.231495] The buggy address belongs to the physical page: [ 15.231542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106271 [ 15.231727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.231797] page_type: f5(slab) [ 15.231890] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.232037] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.232279] page dumped because: kasan: bad access detected [ 15.232406] [ 15.232494] Memory state around the buggy address: [ 15.232607] fff00000c6271100: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 15.232756] fff00000c6271180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.232938] >fff00000c6271200: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc [ 15.233028] ^ [ 15.233171] fff00000c6271280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233213] fff00000c6271300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233248] ==================================================================
[ 13.270855] ================================================================== [ 13.271473] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0 [ 13.272330] Read of size 1 at addr ffff88810231789f by task kunit_try_catch/159 [ 13.272937] [ 13.273111] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.273219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.273242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.273282] Call Trace: [ 13.273306] <TASK> [ 13.273359] dump_stack_lvl+0x73/0xb0 [ 13.273425] print_report+0xd1/0x650 [ 13.273472] ? __virt_addr_valid+0x1db/0x2d0 [ 13.273523] ? kmalloc_oob_left+0x361/0x3c0 [ 13.273566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.273603] ? kmalloc_oob_left+0x361/0x3c0 [ 13.273638] kasan_report+0x141/0x180 [ 13.273675] ? kmalloc_oob_left+0x361/0x3c0 [ 13.273720] __asan_report_load1_noabort+0x18/0x20 [ 13.273754] kmalloc_oob_left+0x361/0x3c0 [ 13.273789] ? __pfx_kmalloc_oob_left+0x10/0x10 [ 13.273824] ? __schedule+0x10cc/0x2b60 [ 13.273865] ? __pfx_read_tsc+0x10/0x10 [ 13.273900] ? ktime_get_ts64+0x86/0x230 [ 13.273944] kunit_try_run_case+0x1a5/0x480 [ 13.273982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.274013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.274047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.274640] ? __kthread_parkme+0x82/0x180 [ 13.274732] ? preempt_count_sub+0x50/0x80 [ 13.274845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.274889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.274929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.274967] kthread+0x337/0x6f0 [ 13.274996] ? trace_preempt_on+0x20/0xc0 [ 13.275038] ? __pfx_kthread+0x10/0x10 [ 13.275070] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.275111] ? calculate_sigpending+0x7b/0xa0 [ 13.275154] ? __pfx_kthread+0x10/0x10 [ 13.275194] ret_from_fork+0x41/0x80 [ 13.275239] ? __pfx_kthread+0x10/0x10 [ 13.275280] ret_from_fork_asm+0x1a/0x30 [ 13.275368] </TASK> [ 13.275493] [ 13.288112] Allocated by task 24: [ 13.288360] kasan_save_stack+0x45/0x70 [ 13.288556] kasan_save_track+0x18/0x40 [ 13.288707] kasan_save_alloc_info+0x3b/0x50 [ 13.289109] __kasan_kmalloc+0xb7/0xc0 [ 13.289686] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 13.290581] kvasprintf+0xc5/0x150 [ 13.290932] __kthread_create_on_node+0x18b/0x3a0 [ 13.291482] kthread_create_on_node+0xab/0xe0 [ 13.292095] create_worker+0x3e5/0x7b0 [ 13.292309] worker_thread+0x992/0x1220 [ 13.292503] kthread+0x337/0x6f0 [ 13.293177] ret_from_fork+0x41/0x80 [ 13.293819] ret_from_fork_asm+0x1a/0x30 [ 13.294101] [ 13.294701] The buggy address belongs to the object at ffff888102317880 [ 13.294701] which belongs to the cache kmalloc-16 of size 16 [ 13.295682] The buggy address is located 19 bytes to the right of [ 13.295682] allocated 12-byte region [ffff888102317880, ffff88810231788c) [ 13.297162] [ 13.297420] The buggy address belongs to the physical page: [ 13.297652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102317 [ 13.298568] flags: 0x200000000000000(node=0|zone=2) [ 13.298825] page_type: f5(slab) [ 13.299120] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.299461] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.299793] page dumped because: kasan: bad access detected [ 13.300070] [ 13.300238] Memory state around the buggy address: [ 13.301487] ffff888102317780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.301903] ffff888102317800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.303145] >ffff888102317880: 00 04 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 13.303541] ^ [ 13.303859] ffff888102317900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.304914] ffff888102317980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.305494] ==================================================================
[ 18.900421] ================================================================== [ 18.911392] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0 [ 18.918265] Read of size 1 at addr ffff88810496299f by task kunit_try_catch/181 [ 18.925570] [ 18.927072] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.927080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.927082] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.927085] Call Trace: [ 18.927087] <TASK> [ 18.927089] dump_stack_lvl+0x73/0xb0 [ 18.927093] print_report+0xd1/0x650 [ 18.927097] ? __virt_addr_valid+0x1db/0x2d0 [ 18.927101] ? kmalloc_oob_left+0x361/0x3c0 [ 18.927105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.927110] ? kmalloc_oob_left+0x361/0x3c0 [ 18.927114] kasan_report+0x141/0x180 [ 18.927118] ? kmalloc_oob_left+0x361/0x3c0 [ 18.927123] __asan_report_load1_noabort+0x18/0x20 [ 18.927127] kmalloc_oob_left+0x361/0x3c0 [ 18.927132] ? __pfx_kmalloc_oob_left+0x10/0x10 [ 18.927136] ? __schedule+0x10cc/0x2b60 [ 18.927140] ? ktime_get_ts64+0x83/0x230 [ 18.927145] kunit_try_run_case+0x1a2/0x480 [ 18.927150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.927154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.927159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.927163] ? __kthread_parkme+0x82/0x180 [ 18.927168] ? preempt_count_sub+0x50/0x80 [ 18.927172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.927177] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.927181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.927186] kthread+0x334/0x6f0 [ 18.927189] ? trace_preempt_on+0x20/0xc0 [ 18.927193] ? __pfx_kthread+0x10/0x10 [ 18.927196] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.927200] ? calculate_sigpending+0x7b/0xa0 [ 18.927204] ? __pfx_kthread+0x10/0x10 [ 18.927207] ret_from_fork+0x3e/0x80 [ 18.927211] ? __pfx_kthread+0x10/0x10 [ 18.927214] ret_from_fork_asm+0x1a/0x30 [ 18.927220] </TASK> [ 18.927221] [ 19.089604] Allocated by task 25: [ 19.092926] kasan_save_stack+0x45/0x70 [ 19.096815] kasan_save_track+0x18/0x40 [ 19.100653] kasan_save_alloc_info+0x3b/0x50 [ 19.104927] __kasan_kmalloc+0xb7/0xc0 [ 19.108724] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 19.114303] kvasprintf+0xc5/0x150 [ 19.117712] __kthread_create_on_node+0x18b/0x3a0 [ 19.122416] kthread_create_on_node+0xab/0xe0 [ 19.126777] create_worker+0x3e5/0x7b0 [ 19.130528] worker_thread+0x992/0x1220 [ 19.134369] kthread+0x334/0x6f0 [ 19.137601] ret_from_fork+0x3e/0x80 [ 19.141181] ret_from_fork_asm+0x1a/0x30 [ 19.145105] [ 19.146605] The buggy address belongs to the object at ffff888104962980 [ 19.146605] which belongs to the cache kmalloc-16 of size 16 [ 19.158939] The buggy address is located 18 bytes to the right of [ 19.158939] allocated 13-byte region [ffff888104962980, ffff88810496298d) [ 19.171927] [ 19.173471] The buggy address belongs to the physical page: [ 19.179043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962 [ 19.187045] flags: 0x200000000000000(node=0|zone=2) [ 19.191928] page_type: f5(slab) [ 19.195123] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 19.202871] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.210610] page dumped because: kasan: bad access detected [ 19.216181] [ 19.217682] Memory state around the buggy address: [ 19.222475] ffff888104962880: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 19.229701] ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.236930] >ffff888104962980: 00 05 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 19.244200] ^ [ 19.248212] ffff888104962a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255432] ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.262651] ==================================================================