Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 60.273284] ================================================================== [ 60.284179] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3e0/0x524 [ 60.290924] Read of size 1 at addr cc2310c8 by task kunit_try_catch/263 [ 60.297576] [ 60.299102] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 60.299133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 60.299133] Hardware name: Generic DRA74X (Flattened Device Tree) [ 60.299133] Call trace: [ 60.299163] unwind_backtrace from show_stack+0x18/0x1c [ 60.299163] show_stack from dump_stack_lvl+0x70/0x90 [ 60.299194] dump_stack_lvl from print_report+0x158/0x528 [ 60.299224] print_report from kasan_report+0xdc/0x118 [ 60.299255] kasan_report from kmem_cache_oob+0x3e0/0x524 [ 60.299285] kmem_cache_oob from kunit_try_run_case+0x22c/0x5a8 [ 60.299285] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.299316] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 60.299346] kthread from ret_from_fork+0x14/0x20 [ 60.299377] Exception stack(0xf254bfb0 to 0xf254bff8) [ 60.299377] bfa0: 00000000 00000000 00000000 00000000 [ 60.299407] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 60.299407] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 60.299438] [ 60.403778] Allocated by task 263: [ 60.407226] kasan_save_track+0x30/0x5c [ 60.411071] __kasan_slab_alloc+0x60/0x68 [ 60.415130] kmem_cache_alloc_noprof+0x17c/0x36c [ 60.419769] kmem_cache_oob+0x170/0x524 [ 60.423645] kunit_try_run_case+0x22c/0x5a8 [ 60.427856] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.433410] kthread+0x464/0x810 [ 60.436645] ret_from_fork+0x14/0x20 [ 60.440246] [ 60.441772] The buggy address belongs to the object at cc231000 [ 60.441772] which belongs to the cache test_cache of size 200 [ 60.453582] The buggy address is located 0 bytes to the right of [ 60.453582] allocated 200-byte region [cc231000, cc2310c8) [ 60.465209] [ 60.466735] The buggy address belongs to the physical page: [ 60.472320] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c231 [ 60.479614] flags: 0x0(zone=0) [ 60.482666] page_type: f5(slab) [ 60.485839] raw: 00000000 cc22f000 00000122 00000000 00000000 800f000f f5000000 00000000 [ 60.493988] raw: 00000000 [ 60.496643] page dumped because: kasan: bad access detected [ 60.502258] [ 60.503753] Memory state around the buggy address: [ 60.508575] cc230f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.515136] cc231000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.521697] >cc231080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 60.528289] ^ [ 60.533203] cc231100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.539764] cc231180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.546325] ==================================================================
[ 32.483043] ================================================================== [ 32.493851] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 32.500550] Read of size 1 at addr ffff888107fba0c8 by task kunit_try_catch/250 [ 32.507858] [ 32.509358] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 32.509366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.509369] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 32.509372] Call Trace: [ 32.509374] <TASK> [ 32.509375] dump_stack_lvl+0x73/0xb0 [ 32.509379] print_report+0xd1/0x650 [ 32.509384] ? __virt_addr_valid+0x1db/0x2d0 [ 32.509388] ? kmem_cache_oob+0x402/0x530 [ 32.509391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.509395] ? kmem_cache_oob+0x402/0x530 [ 32.509398] kasan_report+0x141/0x180 [ 32.509403] ? kmem_cache_oob+0x402/0x530 [ 32.509407] __asan_report_load1_noabort+0x18/0x20 [ 32.509410] kmem_cache_oob+0x402/0x530 [ 32.509413] ? trace_hardirqs_on+0x37/0xe0 [ 32.509418] ? __pfx_kmem_cache_oob+0x10/0x10 [ 32.509421] ? finish_task_switch.isra.0+0x153/0x700 [ 32.509425] ? __switch_to+0x5d9/0xf60 [ 32.509429] ? dequeue_task_fair+0x166/0x4e0 [ 32.509435] ? ktime_get_ts64+0x83/0x230 [ 32.509440] kunit_try_run_case+0x1a2/0x480 [ 32.509444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.509448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.509453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.509457] ? __kthread_parkme+0x82/0x180 [ 32.509461] ? preempt_count_sub+0x50/0x80 [ 32.509466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.509470] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.509475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.509479] kthread+0x334/0x6f0 [ 32.509483] ? trace_preempt_on+0x20/0xc0 [ 32.509487] ? __pfx_kthread+0x10/0x10 [ 32.509491] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.509495] ? calculate_sigpending+0x7b/0xa0 [ 32.509499] ? __pfx_kthread+0x10/0x10 [ 32.509503] ret_from_fork+0x3e/0x80 [ 32.509507] ? __pfx_kthread+0x10/0x10 [ 32.509512] ret_from_fork_asm+0x1a/0x30 [ 32.509517] </TASK> [ 32.509519] [ 32.684396] Allocated by task 250: [ 32.687803] kasan_save_stack+0x45/0x70 [ 32.691641] kasan_save_track+0x18/0x40 [ 32.695481] kasan_save_alloc_info+0x3b/0x50 [ 32.699760] __kasan_slab_alloc+0x91/0xa0 [ 32.703774] kmem_cache_alloc_noprof+0x123/0x3f0 [ 32.708393] kmem_cache_oob+0x157/0x530 [ 32.712233] kunit_try_run_case+0x1a2/0x480 [ 32.716417] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.721817] kthread+0x334/0x6f0 [ 32.725050] ret_from_fork+0x3e/0x80 [ 32.728630] ret_from_fork_asm+0x1a/0x30 [ 32.732554] [ 32.734054] The buggy address belongs to the object at ffff888107fba000 [ 32.734054] which belongs to the cache test_cache of size 200 [ 32.746482] The buggy address is located 0 bytes to the right of [ 32.746482] allocated 200-byte region [ffff888107fba000, ffff888107fba0c8) [ 32.759428] [ 32.760927] The buggy address belongs to the physical page: [ 32.766503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fba [ 32.774508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.782160] flags: 0x200000000000040(head|node=0|zone=2) [ 32.787474] page_type: f5(slab) [ 32.790622] raw: 0200000000000040 ffff8881003423c0 dead000000000122 0000000000000000 [ 32.798367] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.806108] head: 0200000000000040 ffff8881003423c0 dead000000000122 0000000000000000 [ 32.813940] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.821766] head: 0200000000000001 ffffea00041fee81 00000000ffffffff 00000000ffffffff [ 32.829592] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.837418] page dumped because: kasan: bad access detected [ 32.842989] [ 32.844489] Memory state around the buggy address: [ 32.849281] ffff888107fb9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.856500] ffff888107fba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.863758] >ffff888107fba080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.870980] ^ [ 32.876554] ffff888107fba100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883774] ffff888107fba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.890992] ==================================================================