Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 17.218050] ================================================================== [ 17.218148] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.218266] Write of size 1 at addr fff00000c62d4478 by task kunit_try_catch/138 [ 17.218412] [ 17.218513] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 17.218672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.218726] Hardware name: linux,dummy-virt (DT) [ 17.218790] Call trace: [ 17.218829] show_stack+0x20/0x38 (C) [ 17.218943] dump_stack_lvl+0x8c/0xd0 [ 17.219026] print_report+0x118/0x608 [ 17.219106] kasan_report+0xdc/0x128 [ 17.219192] __asan_report_store1_noabort+0x20/0x30 [ 17.219289] kmalloc_oob_right+0x538/0x660 [ 17.219726] kunit_try_run_case+0x170/0x3f0 [ 17.220047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.220150] kthread+0x328/0x630 [ 17.220226] ret_from_fork+0x10/0x20 [ 17.220426] [ 17.220491] Allocated by task 138: [ 17.220639] kasan_save_stack+0x3c/0x68 [ 17.220907] kasan_save_track+0x20/0x40 [ 17.221161] kasan_save_alloc_info+0x40/0x58 [ 17.221268] __kasan_kmalloc+0xd4/0xd8 [ 17.221347] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.221433] kmalloc_oob_right+0xb0/0x660 [ 17.221551] kunit_try_run_case+0x170/0x3f0 [ 17.221648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.221742] kthread+0x328/0x630 [ 17.221810] ret_from_fork+0x10/0x20 [ 17.222826] [ 17.222880] The buggy address belongs to the object at fff00000c62d4400 [ 17.222880] which belongs to the cache kmalloc-128 of size 128 [ 17.223038] The buggy address is located 5 bytes to the right of [ 17.223038] allocated 115-byte region [fff00000c62d4400, fff00000c62d4473) [ 17.223183] [ 17.223222] The buggy address belongs to the physical page: [ 17.223286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4 [ 17.223402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.224150] page_type: f5(slab) [ 17.224273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.224499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.224662] page dumped because: kasan: bad access detected [ 17.225695] [ 17.225790] Memory state around the buggy address: [ 17.226200] fff00000c62d4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.226633] fff00000c62d4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.226907] >fff00000c62d4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.226997] ^ [ 17.227086] fff00000c62d4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.227179] fff00000c62d4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.227267] ================================================================== [ 17.208783] ================================================================== [ 17.209173] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.210185] Write of size 1 at addr fff00000c62d4473 by task kunit_try_catch/138 [ 17.210314] [ 17.211352] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.0-rc3 #1 PREEMPT [ 17.211667] Tainted: [N]=TEST [ 17.211739] Hardware name: linux,dummy-virt (DT) [ 17.212144] Call trace: [ 17.212326] show_stack+0x20/0x38 (C) [ 17.212494] dump_stack_lvl+0x8c/0xd0 [ 17.212584] print_report+0x118/0x608 [ 17.212635] kasan_report+0xdc/0x128 [ 17.212680] __asan_report_store1_noabort+0x20/0x30 [ 17.212728] kmalloc_oob_right+0x5a4/0x660 [ 17.212773] kunit_try_run_case+0x170/0x3f0 [ 17.212823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.212873] kthread+0x328/0x630 [ 17.212918] ret_from_fork+0x10/0x20 [ 17.213087] [ 17.213134] Allocated by task 138: [ 17.213313] kasan_save_stack+0x3c/0x68 [ 17.213388] kasan_save_track+0x20/0x40 [ 17.213426] kasan_save_alloc_info+0x40/0x58 [ 17.213478] __kasan_kmalloc+0xd4/0xd8 [ 17.213520] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.213582] kmalloc_oob_right+0xb0/0x660 [ 17.213623] kunit_try_run_case+0x170/0x3f0 [ 17.213659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.213700] kthread+0x328/0x630 [ 17.213734] ret_from_fork+0x10/0x20 [ 17.213791] [ 17.213857] The buggy address belongs to the object at fff00000c62d4400 [ 17.213857] which belongs to the cache kmalloc-128 of size 128 [ 17.213959] The buggy address is located 0 bytes to the right of [ 17.213959] allocated 115-byte region [fff00000c62d4400, fff00000c62d4473) [ 17.214025] [ 17.214117] The buggy address belongs to the physical page: [ 17.214355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4 [ 17.214690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.215020] page_type: f5(slab) [ 17.215433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.215576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.215787] page dumped because: kasan: bad access detected [ 17.215875] [ 17.215935] Memory state around the buggy address: [ 17.216274] fff00000c62d4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.216353] fff00000c62d4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.216412] >fff00000c62d4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.216468] ^ [ 17.216584] fff00000c62d4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.216628] fff00000c62d4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.216697] ================================================================== [ 17.227970] ================================================================== [ 17.228072] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.228172] Read of size 1 at addr fff00000c62d4480 by task kunit_try_catch/138 [ 17.228271] [ 17.228561] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 17.228875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.228947] Hardware name: linux,dummy-virt (DT) [ 17.229062] Call trace: [ 17.229149] show_stack+0x20/0x38 (C) [ 17.229352] dump_stack_lvl+0x8c/0xd0 [ 17.229528] print_report+0x118/0x608 [ 17.229646] kasan_report+0xdc/0x128 [ 17.229771] __asan_report_load1_noabort+0x20/0x30 [ 17.229905] kmalloc_oob_right+0x5d0/0x660 [ 17.230503] kunit_try_run_case+0x170/0x3f0 [ 17.230663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.230813] kthread+0x328/0x630 [ 17.230908] ret_from_fork+0x10/0x20 [ 17.231010] [ 17.231046] Allocated by task 138: [ 17.231101] kasan_save_stack+0x3c/0x68 [ 17.231185] kasan_save_track+0x20/0x40 [ 17.231262] kasan_save_alloc_info+0x40/0x58 [ 17.231340] __kasan_kmalloc+0xd4/0xd8 [ 17.231410] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.231658] kmalloc_oob_right+0xb0/0x660 [ 17.231800] kunit_try_run_case+0x170/0x3f0 [ 17.231880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.232104] kthread+0x328/0x630 [ 17.232186] ret_from_fork+0x10/0x20 [ 17.232251] [ 17.232289] The buggy address belongs to the object at fff00000c62d4400 [ 17.232289] which belongs to the cache kmalloc-128 of size 128 [ 17.232428] The buggy address is located 13 bytes to the right of [ 17.232428] allocated 115-byte region [fff00000c62d4400, fff00000c62d4473) [ 17.232625] [ 17.232696] The buggy address belongs to the physical page: [ 17.232758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4 [ 17.232878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.232975] page_type: f5(slab) [ 17.233210] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.233377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.233505] page dumped because: kasan: bad access detected [ 17.233582] [ 17.233621] Memory state around the buggy address: [ 17.233687] fff00000c62d4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.233991] fff00000c62d4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.234127] >fff00000c62d4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.234214] ^ [ 17.234272] fff00000c62d4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.234369] fff00000c62d4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.234456] ==================================================================
[ 16.604278] ================================================================== [ 16.605050] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 16.605937] Write of size 1 at addr ffff888103199578 by task kunit_try_catch/156 [ 16.607326] [ 16.607626] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 16.607752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.607789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.607847] Call Trace: [ 16.607889] <TASK> [ 16.607934] dump_stack_lvl+0x73/0xb0 [ 16.608012] print_report+0xd1/0x650 [ 16.608068] ? __virt_addr_valid+0x1db/0x2d0 [ 16.608105] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.608154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.608186] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.608216] kasan_report+0x141/0x180 [ 16.608246] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.608282] __asan_report_store1_noabort+0x1b/0x30 [ 16.608310] kmalloc_oob_right+0x6bd/0x7f0 [ 16.608341] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.608371] ? __schedule+0x10cc/0x2b30 [ 16.608403] ? __pfx_read_tsc+0x10/0x10 [ 16.608429] ? ktime_get_ts64+0x86/0x230 [ 16.608535] kunit_try_run_case+0x1a5/0x480 [ 16.608602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.608635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.608667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.608699] ? __kthread_parkme+0x82/0x180 [ 16.608728] ? preempt_count_sub+0x50/0x80 [ 16.608761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.608792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.608822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.608852] kthread+0x337/0x6f0 [ 16.608880] ? trace_preempt_on+0x20/0xc0 [ 16.608911] ? __pfx_kthread+0x10/0x10 [ 16.608940] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.608970] ? calculate_sigpending+0x7b/0xa0 [ 16.608998] ? __pfx_kthread+0x10/0x10 [ 16.609028] ret_from_fork+0x41/0x80 [ 16.609056] ? __pfx_kthread+0x10/0x10 [ 16.609086] ret_from_fork_asm+0x1a/0x30 [ 16.609127] </TASK> [ 16.609139] [ 16.629790] Allocated by task 156: [ 16.630416] kasan_save_stack+0x45/0x70 [ 16.631303] kasan_save_track+0x18/0x40 [ 16.631934] kasan_save_alloc_info+0x3b/0x50 [ 16.632366] __kasan_kmalloc+0xb7/0xc0 [ 16.633211] __kmalloc_cache_noprof+0x189/0x420 [ 16.634190] kmalloc_oob_right+0xa9/0x7f0 [ 16.634558] kunit_try_run_case+0x1a5/0x480 [ 16.635320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.636270] kthread+0x337/0x6f0 [ 16.636903] ret_from_fork+0x41/0x80 [ 16.637196] ret_from_fork_asm+0x1a/0x30 [ 16.638359] [ 16.638656] The buggy address belongs to the object at ffff888103199500 [ 16.638656] which belongs to the cache kmalloc-128 of size 128 [ 16.639558] The buggy address is located 5 bytes to the right of [ 16.639558] allocated 115-byte region [ffff888103199500, ffff888103199573) [ 16.641163] [ 16.641331] The buggy address belongs to the physical page: [ 16.641845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199 [ 16.643122] flags: 0x200000000000000(node=0|zone=2) [ 16.643860] page_type: f5(slab) [ 16.644375] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.645301] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.646455] page dumped because: kasan: bad access detected [ 16.647060] [ 16.647220] Memory state around the buggy address: [ 16.648331] ffff888103199400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.649207] ffff888103199480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.650204] >ffff888103199500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.651190] ^ [ 16.652009] ffff888103199580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.652599] ffff888103199600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653445] ================================================================== [ 16.554271] ================================================================== [ 16.555837] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 16.556900] Write of size 1 at addr ffff888103199573 by task kunit_try_catch/156 [ 16.557861] [ 16.559575] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 16.560067] Tainted: [N]=TEST [ 16.560112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.560380] Call Trace: [ 16.560538] <TASK> [ 16.560761] dump_stack_lvl+0x73/0xb0 [ 16.560876] print_report+0xd1/0x650 [ 16.560921] ? __virt_addr_valid+0x1db/0x2d0 [ 16.560956] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.560986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.561016] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.561046] kasan_report+0x141/0x180 [ 16.561076] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.561112] __asan_report_store1_noabort+0x1b/0x30 [ 16.561140] kmalloc_oob_right+0x6f0/0x7f0 [ 16.561171] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.561202] ? __schedule+0x10cc/0x2b30 [ 16.561235] ? __pfx_read_tsc+0x10/0x10 [ 16.561262] ? ktime_get_ts64+0x86/0x230 [ 16.561297] kunit_try_run_case+0x1a5/0x480 [ 16.561331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.561359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.561392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.561424] ? __kthread_parkme+0x82/0x180 [ 16.561528] ? preempt_count_sub+0x50/0x80 [ 16.561634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.561672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.561718] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.561786] kthread+0x337/0x6f0 [ 16.561838] ? trace_preempt_on+0x20/0xc0 [ 16.561873] ? __pfx_kthread+0x10/0x10 [ 16.561903] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.561933] ? calculate_sigpending+0x7b/0xa0 [ 16.561962] ? __pfx_kthread+0x10/0x10 [ 16.561992] ret_from_fork+0x41/0x80 [ 16.562020] ? __pfx_kthread+0x10/0x10 [ 16.562050] ret_from_fork_asm+0x1a/0x30 [ 16.562131] </TASK> [ 16.562215] [ 16.576242] Allocated by task 156: [ 16.578041] kasan_save_stack+0x45/0x70 [ 16.578707] kasan_save_track+0x18/0x40 [ 16.579119] kasan_save_alloc_info+0x3b/0x50 [ 16.579723] __kasan_kmalloc+0xb7/0xc0 [ 16.580125] __kmalloc_cache_noprof+0x189/0x420 [ 16.580746] kmalloc_oob_right+0xa9/0x7f0 [ 16.581177] kunit_try_run_case+0x1a5/0x480 [ 16.582471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.582900] kthread+0x337/0x6f0 [ 16.583189] ret_from_fork+0x41/0x80 [ 16.583763] ret_from_fork_asm+0x1a/0x30 [ 16.584297] [ 16.584805] The buggy address belongs to the object at ffff888103199500 [ 16.584805] which belongs to the cache kmalloc-128 of size 128 [ 16.586115] The buggy address is located 0 bytes to the right of [ 16.586115] allocated 115-byte region [ffff888103199500, ffff888103199573) [ 16.587263] [ 16.588655] The buggy address belongs to the physical page: [ 16.589637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199 [ 16.590890] flags: 0x200000000000000(node=0|zone=2) [ 16.592051] page_type: f5(slab) [ 16.593122] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.593736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.594450] page dumped because: kasan: bad access detected [ 16.594998] [ 16.595250] Memory state around the buggy address: [ 16.596465] ffff888103199400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.597168] ffff888103199480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.598017] >ffff888103199500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.599077] ^ [ 16.599657] ffff888103199580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.600402] ffff888103199600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.601099] ================================================================== [ 16.654677] ================================================================== [ 16.656405] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 16.657143] Read of size 1 at addr ffff888103199580 by task kunit_try_catch/156 [ 16.658236] [ 16.658518] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 16.658651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.658687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.658820] Call Trace: [ 16.658866] <TASK> [ 16.658913] dump_stack_lvl+0x73/0xb0 [ 16.658953] print_report+0xd1/0x650 [ 16.658987] ? __virt_addr_valid+0x1db/0x2d0 [ 16.659018] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.659050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.659081] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.659113] kasan_report+0x141/0x180 [ 16.659145] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.659182] __asan_report_load1_noabort+0x18/0x20 [ 16.659210] kmalloc_oob_right+0x68a/0x7f0 [ 16.659243] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.659276] ? __schedule+0x10cc/0x2b30 [ 16.659309] ? __pfx_read_tsc+0x10/0x10 [ 16.659336] ? ktime_get_ts64+0x86/0x230 [ 16.659372] kunit_try_run_case+0x1a5/0x480 [ 16.659406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.659440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.659630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.659707] ? __kthread_parkme+0x82/0x180 [ 16.659778] ? preempt_count_sub+0x50/0x80 [ 16.659856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.659913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.659949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.659981] kthread+0x337/0x6f0 [ 16.660012] ? trace_preempt_on+0x20/0xc0 [ 16.660046] ? __pfx_kthread+0x10/0x10 [ 16.660078] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.660109] ? calculate_sigpending+0x7b/0xa0 [ 16.660139] ? __pfx_kthread+0x10/0x10 [ 16.660170] ret_from_fork+0x41/0x80 [ 16.660199] ? __pfx_kthread+0x10/0x10 [ 16.660231] ret_from_fork_asm+0x1a/0x30 [ 16.660276] </TASK> [ 16.660290] [ 16.678212] Allocated by task 156: [ 16.678565] kasan_save_stack+0x45/0x70 [ 16.679153] kasan_save_track+0x18/0x40 [ 16.679663] kasan_save_alloc_info+0x3b/0x50 [ 16.680111] __kasan_kmalloc+0xb7/0xc0 [ 16.680696] __kmalloc_cache_noprof+0x189/0x420 [ 16.681099] kmalloc_oob_right+0xa9/0x7f0 [ 16.682382] kunit_try_run_case+0x1a5/0x480 [ 16.683758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.684146] kthread+0x337/0x6f0 [ 16.684484] ret_from_fork+0x41/0x80 [ 16.685234] ret_from_fork_asm+0x1a/0x30 [ 16.685697] [ 16.685898] The buggy address belongs to the object at ffff888103199500 [ 16.685898] which belongs to the cache kmalloc-128 of size 128 [ 16.687072] The buggy address is located 13 bytes to the right of [ 16.687072] allocated 115-byte region [ffff888103199500, ffff888103199573) [ 16.689344] [ 16.689761] The buggy address belongs to the physical page: [ 16.690274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199 [ 16.691298] flags: 0x200000000000000(node=0|zone=2) [ 16.692112] page_type: f5(slab) [ 16.692613] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.693219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.693609] page dumped because: kasan: bad access detected [ 16.693918] [ 16.694200] Memory state around the buggy address: [ 16.694669] ffff888103199480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696142] ffff888103199500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.697128] >ffff888103199580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.697818] ^ [ 16.698100] ffff888103199600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.699184] ffff888103199680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.699668] ==================================================================
[ 18.933917] ================================================================== [ 18.934632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.935300] Write of size 1 at addr ffff00000d788473 by task kunit_try_catch/194 [ 18.935985] [ 18.936151] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G N 6.15.0-rc3 #1 PREEMPT [ 18.936196] Tainted: [N]=TEST [ 18.936208] Hardware name: Radxa ROCK Pi 4B (DT) [ 18.936225] Call trace: [ 18.936236] show_stack+0x20/0x38 (C) [ 18.936269] dump_stack_lvl+0x8c/0xd0 [ 18.936300] print_report+0x118/0x608 [ 18.936329] kasan_report+0xdc/0x128 [ 18.936357] __asan_report_store1_noabort+0x20/0x30 [ 18.936391] kmalloc_oob_right+0x5a4/0x660 [ 18.936424] kunit_try_run_case+0x170/0x3f0 [ 18.936459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.936498] kthread+0x328/0x630 [ 18.936531] ret_from_fork+0x10/0x20 [ 18.936564] [ 18.942047] Allocated by task 194: [ 18.942378] kasan_save_stack+0x3c/0x68 [ 18.942755] kasan_save_track+0x20/0x40 [ 18.943127] kasan_save_alloc_info+0x40/0x58 [ 18.943539] __kasan_kmalloc+0xd4/0xd8 [ 18.943903] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.944344] kmalloc_oob_right+0xb0/0x660 [ 18.944735] kunit_try_run_case+0x170/0x3f0 [ 18.945143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.945667] kthread+0x328/0x630 [ 18.945991] ret_from_fork+0x10/0x20 [ 18.946341] [ 18.946494] The buggy address belongs to the object at ffff00000d788400 [ 18.946494] which belongs to the cache kmalloc-128 of size 128 [ 18.947627] The buggy address is located 0 bytes to the right of [ 18.947627] allocated 115-byte region [ffff00000d788400, ffff00000d788473) [ 18.948800] [ 18.948954] The buggy address belongs to the physical page: [ 18.949469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788 [ 18.950193] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 18.950804] page_type: f5(slab) [ 18.951118] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 18.951834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.952540] page dumped because: kasan: bad access detected [ 18.953054] [ 18.953206] Memory state around the buggy address: [ 18.953655] ffff00000d788300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.954320] ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.954985] >ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.955646] ^ [ 18.956278] ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.956943] ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.957604] ================================================================== [ 18.959082] ================================================================== [ 18.959740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.960393] Write of size 1 at addr ffff00000d788478 by task kunit_try_catch/194 [ 18.961070] [ 18.961230] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 18.961271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.961282] Hardware name: Radxa ROCK Pi 4B (DT) [ 18.961297] Call trace: [ 18.961307] show_stack+0x20/0x38 (C) [ 18.961333] dump_stack_lvl+0x8c/0xd0 [ 18.961359] print_report+0x118/0x608 [ 18.961383] kasan_report+0xdc/0x128 [ 18.961407] __asan_report_store1_noabort+0x20/0x30 [ 18.961435] kmalloc_oob_right+0x538/0x660 [ 18.961463] kunit_try_run_case+0x170/0x3f0 [ 18.961493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.961526] kthread+0x328/0x630 [ 18.961554] ret_from_fork+0x10/0x20 [ 18.961582] [ 18.967140] Allocated by task 194: [ 18.967460] kasan_save_stack+0x3c/0x68 [ 18.967826] kasan_save_track+0x20/0x40 [ 18.968191] kasan_save_alloc_info+0x40/0x58 [ 18.968596] __kasan_kmalloc+0xd4/0xd8 [ 18.968951] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.969384] kmalloc_oob_right+0xb0/0x660 [ 18.969768] kunit_try_run_case+0x170/0x3f0 [ 18.970168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.970684] kthread+0x328/0x630 [ 18.970999] ret_from_fork+0x10/0x20 [ 18.971342] [ 18.971491] The buggy address belongs to the object at ffff00000d788400 [ 18.971491] which belongs to the cache kmalloc-128 of size 128 [ 18.972615] The buggy address is located 5 bytes to the right of [ 18.972615] allocated 115-byte region [ffff00000d788400, ffff00000d788473) [ 18.973780] [ 18.973930] The buggy address belongs to the physical page: [ 18.974440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788 [ 18.975156] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 18.975759] page_type: f5(slab) [ 18.976063] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 18.976771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.977471] page dumped because: kasan: bad access detected [ 18.977980] [ 18.978129] Memory state around the buggy address: [ 18.978572] ffff00000d788300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.979230] ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.979889] >ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.980544] ^ [ 18.981192] ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.981851] ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.982506] ================================================================== [ 18.983417] ================================================================== [ 18.984085] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.984733] Read of size 1 at addr ffff00000d788480 by task kunit_try_catch/194 [ 18.985401] [ 18.985560] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 18.985600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.985612] Hardware name: Radxa ROCK Pi 4B (DT) [ 18.985626] Call trace: [ 18.985636] show_stack+0x20/0x38 (C) [ 18.985662] dump_stack_lvl+0x8c/0xd0 [ 18.985688] print_report+0x118/0x608 [ 18.985713] kasan_report+0xdc/0x128 [ 18.985736] __asan_report_load1_noabort+0x20/0x30 [ 18.985764] kmalloc_oob_right+0x5d0/0x660 [ 18.985792] kunit_try_run_case+0x170/0x3f0 [ 18.985821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.985853] kthread+0x328/0x630 [ 18.985880] ret_from_fork+0x10/0x20 [ 18.985907] [ 18.991455] Allocated by task 194: [ 18.991776] kasan_save_stack+0x3c/0x68 [ 18.992141] kasan_save_track+0x20/0x40 [ 18.992506] kasan_save_alloc_info+0x40/0x58 [ 18.992912] __kasan_kmalloc+0xd4/0xd8 [ 18.993270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.993703] kmalloc_oob_right+0xb0/0x660 [ 18.994087] kunit_try_run_case+0x170/0x3f0 [ 18.994486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.995001] kthread+0x328/0x630 [ 18.995316] ret_from_fork+0x10/0x20 [ 18.995659] [ 18.995808] The buggy address belongs to the object at ffff00000d788400 [ 18.995808] which belongs to the cache kmalloc-128 of size 128 [ 18.996931] The buggy address is located 13 bytes to the right of [ 18.996931] allocated 115-byte region [ffff00000d788400, ffff00000d788473) [ 18.998103] [ 18.998252] The buggy address belongs to the physical page: [ 18.998763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788 [ 18.999478] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.000081] page_type: f5(slab) [ 19.000387] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.001093] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.001794] page dumped because: kasan: bad access detected [ 19.002303] [ 19.002451] Memory state around the buggy address: [ 19.002894] ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.003552] ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.004211] >ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.004866] ^ [ 19.005171] ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.005829] ffff00000d788580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.006484] ==================================================================