Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 23.162567] ================================================================== [ 23.162694] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 23.162805] Write of size 16 at addr fff00000c412bb40 by task kunit_try_catch/168 [ 23.162922] [ 23.163946] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.164143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.164225] Hardware name: linux,dummy-virt (DT) [ 23.164439] Call trace: [ 23.164574] show_stack+0x20/0x38 (C) [ 23.164706] dump_stack_lvl+0x8c/0xd0 [ 23.164895] print_report+0x118/0x608 [ 23.165241] kasan_report+0xdc/0x128 [ 23.165424] __asan_report_store16_noabort+0x20/0x30 [ 23.165603] kmalloc_oob_16+0x3a0/0x3f8 [ 23.165920] kunit_try_run_case+0x170/0x3f0 [ 23.166122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.166306] kthread+0x328/0x630 [ 23.166605] ret_from_fork+0x10/0x20 [ 23.166746] [ 23.166868] Allocated by task 168: [ 23.167203] kasan_save_stack+0x3c/0x68 [ 23.167313] kasan_save_track+0x20/0x40 [ 23.167412] kasan_save_alloc_info+0x40/0x58 [ 23.167524] __kasan_kmalloc+0xd4/0xd8 [ 23.167733] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.167914] kmalloc_oob_16+0xb4/0x3f8 [ 23.168043] kunit_try_run_case+0x170/0x3f0 [ 23.168277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.168476] kthread+0x328/0x630 [ 23.168606] ret_from_fork+0x10/0x20 [ 23.168701] [ 23.168752] The buggy address belongs to the object at fff00000c412bb40 [ 23.168752] which belongs to the cache kmalloc-16 of size 16 [ 23.168958] The buggy address is located 0 bytes inside of [ 23.168958] allocated 13-byte region [fff00000c412bb40, fff00000c412bb4d) [ 23.169142] [ 23.169197] The buggy address belongs to the physical page: [ 23.169277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10412b [ 23.169462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.169675] page_type: f5(slab) [ 23.169952] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 23.170080] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.170205] page dumped because: kasan: bad access detected [ 23.170427] [ 23.170473] Memory state around the buggy address: [ 23.170617] fff00000c412ba00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 23.170722] fff00000c412ba80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.170900] >fff00000c412bb00: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 23.171170] ^ [ 23.171356] fff00000c412bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.171472] fff00000c412bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.171632] ==================================================================
[ 11.512840] ================================================================== [ 11.513301] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 11.513682] Write of size 16 at addr ffff8881023b8f60 by task kunit_try_catch/186 [ 11.513951] [ 11.514061] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.514105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.514117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.514138] Call Trace: [ 11.514149] <TASK> [ 11.514165] dump_stack_lvl+0x73/0xb0 [ 11.514190] print_report+0xd1/0x650 [ 11.514212] ? __virt_addr_valid+0x1db/0x2d0 [ 11.514235] ? kmalloc_oob_16+0x452/0x4a0 [ 11.514255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.514277] ? kmalloc_oob_16+0x452/0x4a0 [ 11.514298] kasan_report+0x141/0x180 [ 11.514320] ? kmalloc_oob_16+0x452/0x4a0 [ 11.514358] __asan_report_store16_noabort+0x1b/0x30 [ 11.514379] kmalloc_oob_16+0x452/0x4a0 [ 11.514513] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 11.514536] ? __schedule+0x10cc/0x2b30 [ 11.514560] ? __pfx_read_tsc+0x10/0x10 [ 11.514581] ? ktime_get_ts64+0x86/0x230 [ 11.514607] kunit_try_run_case+0x1a5/0x480 [ 11.514632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.514653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.514676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.514699] ? __kthread_parkme+0x82/0x180 [ 11.514721] ? preempt_count_sub+0x50/0x80 [ 11.514745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.514768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.514790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.514812] kthread+0x337/0x6f0 [ 11.514833] ? trace_preempt_on+0x20/0xc0 [ 11.514857] ? __pfx_kthread+0x10/0x10 [ 11.514879] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.514900] ? calculate_sigpending+0x7b/0xa0 [ 11.514922] ? __pfx_kthread+0x10/0x10 [ 11.514944] ret_from_fork+0x41/0x80 [ 11.514964] ? __pfx_kthread+0x10/0x10 [ 11.514986] ret_from_fork_asm+0x1a/0x30 [ 11.515018] </TASK> [ 11.515028] [ 11.523174] Allocated by task 186: [ 11.523313] kasan_save_stack+0x45/0x70 [ 11.523598] kasan_save_track+0x18/0x40 [ 11.523733] kasan_save_alloc_info+0x3b/0x50 [ 11.523875] __kasan_kmalloc+0xb7/0xc0 [ 11.524212] __kmalloc_cache_noprof+0x189/0x420 [ 11.524454] kmalloc_oob_16+0xa8/0x4a0 [ 11.524645] kunit_try_run_case+0x1a5/0x480 [ 11.524842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.525060] kthread+0x337/0x6f0 [ 11.525523] ret_from_fork+0x41/0x80 [ 11.525663] ret_from_fork_asm+0x1a/0x30 [ 11.525809] [ 11.525879] The buggy address belongs to the object at ffff8881023b8f60 [ 11.525879] which belongs to the cache kmalloc-16 of size 16 [ 11.526483] The buggy address is located 0 bytes inside of [ 11.526483] allocated 13-byte region [ffff8881023b8f60, ffff8881023b8f6d) [ 11.527016] [ 11.527112] The buggy address belongs to the physical page: [ 11.527382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023b8 [ 11.527852] flags: 0x200000000000000(node=0|zone=2) [ 11.528069] page_type: f5(slab) [ 11.528357] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 11.528833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 11.529083] page dumped because: kasan: bad access detected [ 11.529251] [ 11.529319] Memory state around the buggy address: [ 11.529533] ffff8881023b8e00: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 11.529854] ffff8881023b8e80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 11.530303] >ffff8881023b8f00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc [ 11.530782] ^ [ 11.531042] ffff8881023b8f80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.531446] ffff8881023b9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.531658] ==================================================================
[ 21.384046] ================================================================== [ 21.385091] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 21.385742] Write of size 16 at addr ffff00000aa08600 by task kunit_try_catch/220 [ 21.386437] [ 21.386603] CPU: 3 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.386653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.386667] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.386684] Call trace: [ 21.386696] show_stack+0x20/0x38 (C) [ 21.386729] dump_stack_lvl+0x8c/0xd0 [ 21.386760] print_report+0x118/0x608 [ 21.386790] kasan_report+0xdc/0x128 [ 21.386818] __asan_report_store16_noabort+0x20/0x30 [ 21.386853] kmalloc_oob_16+0x3a0/0x3f8 [ 21.386885] kunit_try_run_case+0x170/0x3f0 [ 21.386920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.386959] kthread+0x328/0x630 [ 21.386993] ret_from_fork+0x10/0x20 [ 21.387025] [ 21.392595] Allocated by task 220: [ 21.392921] kasan_save_stack+0x3c/0x68 [ 21.393294] kasan_save_track+0x20/0x40 [ 21.393665] kasan_save_alloc_info+0x40/0x58 [ 21.394076] __kasan_kmalloc+0xd4/0xd8 [ 21.394439] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.394880] kmalloc_oob_16+0xb4/0x3f8 [ 21.395247] kunit_try_run_case+0x170/0x3f0 [ 21.395653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.396177] kthread+0x328/0x630 [ 21.396500] ret_from_fork+0x10/0x20 [ 21.396849] [ 21.397002] The buggy address belongs to the object at ffff00000aa08600 [ 21.397002] which belongs to the cache kmalloc-16 of size 16 [ 21.398119] The buggy address is located 0 bytes inside of [ 21.398119] allocated 13-byte region [ffff00000aa08600, ffff00000aa0860d) [ 21.399239] [ 21.399392] The buggy address belongs to the physical page: [ 21.399908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xaa08 [ 21.400632] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.401243] page_type: f5(slab) [ 21.401555] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.402270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.402977] page dumped because: kasan: bad access detected [ 21.403490] [ 21.403643] Memory state around the buggy address: [ 21.404091] ffff00000aa08500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.404756] ffff00000aa08580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.405421] >ffff00000aa08600: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.406082] ^ [ 21.406416] ffff00000aa08680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.407081] ffff00000aa08700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.407742] ==================================================================