Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 54.350830] ================================================================== [ 54.362304] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b0/0x35c [ 54.369567] Write of size 2 at addr cc228a77 by task kunit_try_catch/228 [ 54.376312] [ 54.377838] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 54.377868] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.377868] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.377868] Call trace: [ 54.377899] unwind_backtrace from show_stack+0x18/0x1c [ 54.377899] show_stack from dump_stack_lvl+0x70/0x90 [ 54.377929] dump_stack_lvl from print_report+0x158/0x528 [ 54.377960] print_report from kasan_report+0xdc/0x118 [ 54.377990] kasan_report from kasan_check_range+0x14c/0x198 [ 54.377990] kasan_check_range from __asan_memset+0x20/0x3c [ 54.378021] __asan_memset from kmalloc_oob_memset_2+0x1b0/0x35c [ 54.378051] kmalloc_oob_memset_2 from kunit_try_run_case+0x22c/0x5a8 [ 54.378051] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.378082] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.378112] kthread from ret_from_fork+0x14/0x20 [ 54.378143] Exception stack(0xf243bfb0 to 0xf243bff8) [ 54.378143] bfa0: 00000000 00000000 00000000 00000000 [ 54.378173] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.378173] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.378204] [ 54.494934] Allocated by task 228: [ 54.498382] kasan_save_track+0x30/0x5c [ 54.502227] __kasan_kmalloc+0x8c/0x94 [ 54.506011] kmalloc_oob_memset_2+0xcc/0x35c [ 54.510314] kunit_try_run_case+0x22c/0x5a8 [ 54.514556] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.520080] kthread+0x464/0x810 [ 54.523315] ret_from_fork+0x14/0x20 [ 54.526947] [ 54.528442] The buggy address belongs to the object at cc228a00 [ 54.528442] which belongs to the cache kmalloc-128 of size 128 [ 54.540344] The buggy address is located 119 bytes inside of [ 54.540344] allocated 120-byte region [cc228a00, cc228a78) [ 54.551635] [ 54.553131] The buggy address belongs to the physical page: [ 54.558746] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 54.566009] flags: 0x0(zone=0) [ 54.569091] page_type: f5(slab) [ 54.572265] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.580383] raw: 00000000 [ 54.583038] page dumped because: kasan: bad access detected [ 54.588653] [ 54.590148] Memory state around the buggy address: [ 54.594970] cc228900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.601531] cc228980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.608093] >cc228a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.614685] ^ [ 54.621154] cc228a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.627716] cc228b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.634307] ==================================================================
[ 24.803587] ================================================================== [ 24.815002] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 24.822223] Write of size 2 at addr ffff888107f05077 by task kunit_try_catch/215 [ 24.829621] [ 24.831122] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.831131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.831133] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.831136] Call Trace: [ 24.831138] <TASK> [ 24.831140] dump_stack_lvl+0x73/0xb0 [ 24.831144] print_report+0xd1/0x650 [ 24.831148] ? __virt_addr_valid+0x1db/0x2d0 [ 24.831152] ? kmalloc_oob_memset_2+0x166/0x330 [ 24.831156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.831160] ? kmalloc_oob_memset_2+0x166/0x330 [ 24.831164] kasan_report+0x141/0x180 [ 24.831168] ? kmalloc_oob_memset_2+0x166/0x330 [ 24.831173] kasan_check_range+0x10c/0x1c0 [ 24.831177] __asan_memset+0x27/0x50 [ 24.831181] kmalloc_oob_memset_2+0x166/0x330 [ 24.831185] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 24.831189] ? __schedule+0x10cc/0x2b30 [ 24.831194] ? ktime_get_ts64+0x83/0x230 [ 24.831198] kunit_try_run_case+0x1a2/0x480 [ 24.831203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.831207] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.831211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.831216] ? __kthread_parkme+0x82/0x180 [ 24.831220] ? preempt_count_sub+0x50/0x80 [ 24.831224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.831228] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.831233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.831237] kthread+0x334/0x6f0 [ 24.831240] ? trace_preempt_on+0x20/0xc0 [ 24.831245] ? __pfx_kthread+0x10/0x10 [ 24.831249] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.831253] ? calculate_sigpending+0x7b/0xa0 [ 24.831257] ? __pfx_kthread+0x10/0x10 [ 24.831261] ret_from_fork+0x3e/0x80 [ 24.831265] ? __pfx_kthread+0x10/0x10 [ 24.831269] ret_from_fork_asm+0x1a/0x30 [ 24.831275] </TASK> [ 24.831276] [ 24.998293] Allocated by task 215: [ 25.001700] kasan_save_stack+0x45/0x70 [ 25.005582] kasan_save_track+0x18/0x40 [ 25.009420] kasan_save_alloc_info+0x3b/0x50 [ 25.013714] __kasan_kmalloc+0xb7/0xc0 [ 25.017499] __kmalloc_cache_noprof+0x189/0x420 [ 25.022030] kmalloc_oob_memset_2+0xac/0x330 [ 25.026304] kunit_try_run_case+0x1a2/0x480 [ 25.030490] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.035889] kthread+0x334/0x6f0 [ 25.039121] ret_from_fork+0x3e/0x80 [ 25.042701] ret_from_fork_asm+0x1a/0x30 [ 25.046699] [ 25.048213] The buggy address belongs to the object at ffff888107f05000 [ 25.048213] which belongs to the cache kmalloc-128 of size 128 [ 25.060761] The buggy address is located 119 bytes inside of [ 25.060761] allocated 120-byte region [ffff888107f05000, ffff888107f05078) [ 25.073362] [ 25.074860] The buggy address belongs to the physical page: [ 25.080432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 25.088434] flags: 0x200000000000000(node=0|zone=2) [ 25.093320] page_type: f5(slab) [ 25.096468] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 25.104213] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.111953] page dumped because: kasan: bad access detected [ 25.117525] [ 25.119024] Memory state around the buggy address: [ 25.123817] ffff888107f04f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.131035] ffff888107f04f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.138254] >ffff888107f05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.145473] ^ [ 25.152605] ffff888107f05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.159827] ffff888107f05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.167053] ==================================================================