Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 54.059204] ================================================================== [ 54.070068] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1a4/0x350 [ 54.077423] Write of size 128 at addr cc228900 by task kunit_try_catch/226 [ 54.084350] [ 54.085845] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 54.085876] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.085906] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.085906] Call trace: [ 54.085906] unwind_backtrace from show_stack+0x18/0x1c [ 54.085937] show_stack from dump_stack_lvl+0x70/0x90 [ 54.085968] dump_stack_lvl from print_report+0x158/0x528 [ 54.085998] print_report from kasan_report+0xdc/0x118 [ 54.085998] kasan_report from kasan_check_range+0x14c/0x198 [ 54.086029] kasan_check_range from __asan_memset+0x20/0x3c [ 54.086059] __asan_memset from kmalloc_oob_in_memset+0x1a4/0x350 [ 54.086059] kmalloc_oob_in_memset from kunit_try_run_case+0x22c/0x5a8 [ 54.086090] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.086120] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.086151] kthread from ret_from_fork+0x14/0x20 [ 54.086181] Exception stack(0xf242bfb0 to 0xf242bff8) [ 54.086181] bfa0: 00000000 00000000 00000000 00000000 [ 54.086212] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.086212] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.086242] [ 54.203155] Allocated by task 226: [ 54.206573] kasan_save_track+0x30/0x5c [ 54.210449] __kasan_kmalloc+0x8c/0x94 [ 54.214233] kmalloc_oob_in_memset+0xd0/0x350 [ 54.218627] kunit_try_run_case+0x22c/0x5a8 [ 54.222839] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.228363] kthread+0x464/0x810 [ 54.231628] ret_from_fork+0x14/0x20 [ 54.235229] [ 54.236724] The buggy address belongs to the object at cc228900 [ 54.236724] which belongs to the cache kmalloc-128 of size 128 [ 54.248626] The buggy address is located 0 bytes inside of [ 54.248626] allocated 120-byte region [cc228900, cc228978) [ 54.259735] [ 54.261230] The buggy address belongs to the physical page: [ 54.266845] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 54.274108] flags: 0x0(zone=0) [ 54.277191] page_type: f5(slab) [ 54.280364] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.288513] raw: 00000000 [ 54.291137] page dumped because: kasan: bad access detected [ 54.296752] [ 54.298248] Memory state around the buggy address: [ 54.303070] cc228800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.309661] cc228880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.316223] >cc228900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.322784] ^ [ 54.329284] cc228980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.335845] cc228a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.342407] ==================================================================
[ 24.432623] ================================================================== [ 24.443429] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 24.450742] Write of size 128 at addr ffff888104ee9100 by task kunit_try_catch/213 [ 24.458316] [ 24.459817] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.459825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.459827] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.459831] Call Trace: [ 24.459832] <TASK> [ 24.459834] dump_stack_lvl+0x73/0xb0 [ 24.459838] print_report+0xd1/0x650 [ 24.459842] ? __virt_addr_valid+0x1db/0x2d0 [ 24.459846] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.459850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.459854] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.459859] kasan_report+0x141/0x180 [ 24.459863] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.459868] kasan_check_range+0x10c/0x1c0 [ 24.459872] __asan_memset+0x27/0x50 [ 24.459876] kmalloc_oob_in_memset+0x15f/0x320 [ 24.459880] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 24.459884] ? __schedule+0x10cc/0x2b30 [ 24.459889] ? ktime_get_ts64+0x83/0x230 [ 24.459893] kunit_try_run_case+0x1a2/0x480 [ 24.459898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.459902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.459906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.459911] ? __kthread_parkme+0x82/0x180 [ 24.459915] ? preempt_count_sub+0x50/0x80 [ 24.459919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.459923] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.459927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.459932] kthread+0x334/0x6f0 [ 24.459936] ? trace_preempt_on+0x20/0xc0 [ 24.459940] ? __pfx_kthread+0x10/0x10 [ 24.459944] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.459948] ? calculate_sigpending+0x7b/0xa0 [ 24.459952] ? __pfx_kthread+0x10/0x10 [ 24.459956] ret_from_fork+0x3e/0x80 [ 24.459960] ? __pfx_kthread+0x10/0x10 [ 24.459964] ret_from_fork_asm+0x1a/0x30 [ 24.459970] </TASK> [ 24.459971] [ 24.627455] Allocated by task 213: [ 24.630863] kasan_save_stack+0x45/0x70 [ 24.634702] kasan_save_track+0x18/0x40 [ 24.638592] kasan_save_alloc_info+0x3b/0x50 [ 24.642865] __kasan_kmalloc+0xb7/0xc0 [ 24.646617] __kmalloc_cache_noprof+0x189/0x420 [ 24.651148] kmalloc_oob_in_memset+0xac/0x320 [ 24.655507] kunit_try_run_case+0x1a2/0x480 [ 24.659702] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.665144] kthread+0x334/0x6f0 [ 24.668377] ret_from_fork+0x3e/0x80 [ 24.671957] ret_from_fork_asm+0x1a/0x30 [ 24.675883] [ 24.677381] The buggy address belongs to the object at ffff888104ee9100 [ 24.677381] which belongs to the cache kmalloc-128 of size 128 [ 24.689888] The buggy address is located 0 bytes inside of [ 24.689888] allocated 120-byte region [ffff888104ee9100, ffff888104ee9178) [ 24.702315] [ 24.703814] The buggy address belongs to the physical page: [ 24.709387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 24.717393] flags: 0x200000000000000(node=0|zone=2) [ 24.722274] page_type: f5(slab) [ 24.725420] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 24.733158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.740898] page dumped because: kasan: bad access detected [ 24.746469] [ 24.747970] Memory state around the buggy address: [ 24.752762] ffff888104ee9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.759982] ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.767210] >ffff888104ee9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.774426] ^ [ 24.781560] ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.788780] ffff888104ee9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.796007] ==================================================================