Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
rk3399-rock-pi-4b |
[ 17.269832] ================================================================== [ 17.269975] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 17.270092] Read of size 1 at addr fff00000c6837000 by task kunit_try_catch/142 [ 17.270207] [ 17.270279] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 17.270458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.270519] Hardware name: linux,dummy-virt (DT) [ 17.270645] Call trace: [ 17.270697] show_stack+0x20/0x38 (C) [ 17.270802] dump_stack_lvl+0x8c/0xd0 [ 17.271182] print_report+0x118/0x608 [ 17.271305] kasan_report+0xdc/0x128 [ 17.271497] __asan_report_load1_noabort+0x20/0x30 [ 17.271632] kmalloc_node_oob_right+0x2f4/0x330 [ 17.271912] kunit_try_run_case+0x170/0x3f0 [ 17.272034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.272240] kthread+0x328/0x630 [ 17.272337] ret_from_fork+0x10/0x20 [ 17.272437] [ 17.272475] Allocated by task 142: [ 17.272560] kasan_save_stack+0x3c/0x68 [ 17.272730] kasan_save_track+0x20/0x40 [ 17.272817] kasan_save_alloc_info+0x40/0x58 [ 17.272894] __kasan_kmalloc+0xd4/0xd8 [ 17.272974] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 17.273061] kmalloc_node_oob_right+0xbc/0x330 [ 17.273153] kunit_try_run_case+0x170/0x3f0 [ 17.273238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.273353] kthread+0x328/0x630 [ 17.273429] ret_from_fork+0x10/0x20 [ 17.273578] [ 17.273622] The buggy address belongs to the object at fff00000c6836000 [ 17.273622] which belongs to the cache kmalloc-4k of size 4096 [ 17.274112] The buggy address is located 0 bytes to the right of [ 17.274112] allocated 4096-byte region [fff00000c6836000, fff00000c6837000) [ 17.274343] [ 17.274389] The buggy address belongs to the physical page: [ 17.274523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106830 [ 17.274873] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.274984] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.275160] page_type: f5(slab) [ 17.275263] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.275392] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.275504] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.276217] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.276556] head: 0bfffe0000000003 ffffc1ffc31a0c01 00000000ffffffff 00000000ffffffff [ 17.277100] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.277291] page dumped because: kasan: bad access detected [ 17.277364] [ 17.277407] Memory state around the buggy address: [ 17.277504] fff00000c6836f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.277653] fff00000c6836f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.277758] >fff00000c6837000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.277832] ^ [ 17.277889] fff00000c6837080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.278038] fff00000c6837100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.278137] ==================================================================
[ 19.056743] ================================================================== [ 19.057776] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 19.058478] Read of size 1 at addr ffff00000d213000 by task kunit_try_catch/198 [ 19.059148] [ 19.059309] CPU: 2 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.059349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.059361] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.059376] Call trace: [ 19.059386] show_stack+0x20/0x38 (C) [ 19.059414] dump_stack_lvl+0x8c/0xd0 [ 19.059441] print_report+0x118/0x608 [ 19.059465] kasan_report+0xdc/0x128 [ 19.059489] __asan_report_load1_noabort+0x20/0x30 [ 19.059517] kmalloc_node_oob_right+0x2f4/0x330 [ 19.059547] kunit_try_run_case+0x170/0x3f0 [ 19.059577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.059610] kthread+0x328/0x630 [ 19.059639] ret_from_fork+0x10/0x20 [ 19.059666] [ 19.065254] Allocated by task 198: [ 19.065575] kasan_save_stack+0x3c/0x68 [ 19.065942] kasan_save_track+0x20/0x40 [ 19.066306] kasan_save_alloc_info+0x40/0x58 [ 19.066713] __kasan_kmalloc+0xd4/0xd8 [ 19.067069] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 19.067535] kmalloc_node_oob_right+0xbc/0x330 [ 19.067960] kunit_try_run_case+0x170/0x3f0 [ 19.068360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.068875] kthread+0x328/0x630 [ 19.069191] ret_from_fork+0x10/0x20 [ 19.069534] [ 19.069684] The buggy address belongs to the object at ffff00000d212000 [ 19.069684] which belongs to the cache kmalloc-4k of size 4096 [ 19.070810] The buggy address is located 0 bytes to the right of [ 19.070810] allocated 4096-byte region [ffff00000d212000, ffff00000d213000) [ 19.071982] [ 19.072133] The buggy address belongs to the physical page: [ 19.072645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd210 [ 19.073362] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.074060] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.074705] page_type: f5(slab) [ 19.075012] raw: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000 [ 19.075720] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.076428] head: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000 [ 19.077143] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.077859] head: 03fffe0000000003 fffffdffc0348401 00000000ffffffff 00000000ffffffff [ 19.078575] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.079283] page dumped because: kasan: bad access detected [ 19.079793] [ 19.079941] Memory state around the buggy address: [ 19.080384] ffff00000d212f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.081044] ffff00000d212f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.081703] >ffff00000d213000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082357] ^ [ 19.082662] ffff00000d213080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.083321] ffff00000d213100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.083976] ==================================================================