Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 18.026733] ================================================================== [ 18.026844] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.026952] Read of size 1 at addr fff00000c62d4c78 by task kunit_try_catch/196 [ 18.027056] [ 18.027945] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 18.028225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.028613] Hardware name: linux,dummy-virt (DT) [ 18.028719] Call trace: [ 18.028789] show_stack+0x20/0x38 (C) [ 18.028909] dump_stack_lvl+0x8c/0xd0 [ 18.029011] print_report+0x118/0x608 [ 18.029105] kasan_report+0xdc/0x128 [ 18.029206] __asan_report_load1_noabort+0x20/0x30 [ 18.029725] ksize_unpoisons_memory+0x618/0x740 [ 18.030194] kunit_try_run_case+0x170/0x3f0 [ 18.030416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.030556] kthread+0x328/0x630 [ 18.030663] ret_from_fork+0x10/0x20 [ 18.030778] [ 18.031454] Allocated by task 196: [ 18.031538] kasan_save_stack+0x3c/0x68 [ 18.031631] kasan_save_track+0x20/0x40 [ 18.031706] kasan_save_alloc_info+0x40/0x58 [ 18.031793] __kasan_kmalloc+0xd4/0xd8 [ 18.032622] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.033131] ksize_unpoisons_memory+0xc0/0x740 [ 18.033270] kunit_try_run_case+0x170/0x3f0 [ 18.033361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.033457] kthread+0x328/0x630 [ 18.033924] ret_from_fork+0x10/0x20 [ 18.034029] [ 18.034087] The buggy address belongs to the object at fff00000c62d4c00 [ 18.034087] which belongs to the cache kmalloc-128 of size 128 [ 18.034220] The buggy address is located 5 bytes to the right of [ 18.034220] allocated 115-byte region [fff00000c62d4c00, fff00000c62d4c73) [ 18.034376] [ 18.034765] The buggy address belongs to the physical page: [ 18.034847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4 [ 18.034969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.035086] page_type: f5(slab) [ 18.035618] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.035744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.035836] page dumped because: kasan: bad access detected [ 18.035907] [ 18.035953] Memory state around the buggy address: [ 18.036025] fff00000c62d4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.037092] fff00000c62d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.037444] >fff00000c62d4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.037884] ^ [ 18.038102] fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.038618] fff00000c62d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.038751] ================================================================== [ 18.042441] ================================================================== [ 18.042621] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.042787] Read of size 1 at addr fff00000c62d4c7f by task kunit_try_catch/196 [ 18.042932] [ 18.043007] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 18.043185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.043522] Hardware name: linux,dummy-virt (DT) [ 18.043738] Call trace: [ 18.043804] show_stack+0x20/0x38 (C) [ 18.043925] dump_stack_lvl+0x8c/0xd0 [ 18.044042] print_report+0x118/0x608 [ 18.044142] kasan_report+0xdc/0x128 [ 18.044510] __asan_report_load1_noabort+0x20/0x30 [ 18.044708] ksize_unpoisons_memory+0x690/0x740 [ 18.044882] kunit_try_run_case+0x170/0x3f0 [ 18.044998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.045115] kthread+0x328/0x630 [ 18.045198] ret_from_fork+0x10/0x20 [ 18.045295] [ 18.045339] Allocated by task 196: [ 18.045407] kasan_save_stack+0x3c/0x68 [ 18.045515] kasan_save_track+0x20/0x40 [ 18.045605] kasan_save_alloc_info+0x40/0x58 [ 18.045702] __kasan_kmalloc+0xd4/0xd8 [ 18.045791] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.045894] ksize_unpoisons_memory+0xc0/0x740 [ 18.045988] kunit_try_run_case+0x170/0x3f0 [ 18.046112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.046218] kthread+0x328/0x630 [ 18.046303] ret_from_fork+0x10/0x20 [ 18.046614] [ 18.046677] The buggy address belongs to the object at fff00000c62d4c00 [ 18.046677] which belongs to the cache kmalloc-128 of size 128 [ 18.046963] The buggy address is located 12 bytes to the right of [ 18.046963] allocated 115-byte region [fff00000c62d4c00, fff00000c62d4c73) [ 18.047130] [ 18.047351] The buggy address belongs to the physical page: [ 18.047509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4 [ 18.047663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.047781] page_type: f5(slab) [ 18.047928] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.048188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.048350] page dumped because: kasan: bad access detected [ 18.048413] [ 18.048453] Memory state around the buggy address: [ 18.048859] fff00000c62d4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.049073] fff00000c62d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.049196] >fff00000c62d4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.049297] ^ [ 18.049437] fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.049605] fff00000c62d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.049740] ================================================================== [ 18.013119] ================================================================== [ 18.013262] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.013385] Read of size 1 at addr fff00000c62d4c73 by task kunit_try_catch/196 [ 18.013717] [ 18.013921] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 18.014139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.014205] Hardware name: linux,dummy-virt (DT) [ 18.014281] Call trace: [ 18.014333] show_stack+0x20/0x38 (C) [ 18.014446] dump_stack_lvl+0x8c/0xd0 [ 18.014566] print_report+0x118/0x608 [ 18.014676] kasan_report+0xdc/0x128 [ 18.014779] __asan_report_load1_noabort+0x20/0x30 [ 18.014891] ksize_unpoisons_memory+0x628/0x740 [ 18.015006] kunit_try_run_case+0x170/0x3f0 [ 18.015118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.015240] kthread+0x328/0x630 [ 18.015345] ret_from_fork+0x10/0x20 [ 18.015456] [ 18.015499] Allocated by task 196: [ 18.016049] kasan_save_stack+0x3c/0x68 [ 18.017125] kasan_save_track+0x20/0x40 [ 18.017214] kasan_save_alloc_info+0x40/0x58 [ 18.017295] __kasan_kmalloc+0xd4/0xd8 [ 18.017362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.017444] ksize_unpoisons_memory+0xc0/0x740 [ 18.017644] kunit_try_run_case+0x170/0x3f0 [ 18.017863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.017972] kthread+0x328/0x630 [ 18.018056] ret_from_fork+0x10/0x20 [ 18.018139] [ 18.018182] The buggy address belongs to the object at fff00000c62d4c00 [ 18.018182] which belongs to the cache kmalloc-128 of size 128 [ 18.018322] The buggy address is located 0 bytes to the right of [ 18.018322] allocated 115-byte region [fff00000c62d4c00, fff00000c62d4c73) [ 18.018473] [ 18.018832] The buggy address belongs to the physical page: [ 18.019373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4 [ 18.019920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.020247] page_type: f5(slab) [ 18.020527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.020853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.020999] page dumped because: kasan: bad access detected [ 18.021127] [ 18.021170] Memory state around the buggy address: [ 18.021284] fff00000c62d4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.021435] fff00000c62d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.022011] >fff00000c62d4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.022169] ^ [ 18.022653] fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.022845] fff00000c62d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.022982] ==================================================================
[ 18.803416] ================================================================== [ 18.804030] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.804733] Read of size 1 at addr ffff888103199b78 by task kunit_try_catch/214 [ 18.805588] [ 18.805875] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 18.806060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.806099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.806207] Call Trace: [ 18.806257] <TASK> [ 18.806720] dump_stack_lvl+0x73/0xb0 [ 18.806767] print_report+0xd1/0x650 [ 18.806804] ? __virt_addr_valid+0x1db/0x2d0 [ 18.806837] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.806870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.806902] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.806936] kasan_report+0x141/0x180 [ 18.806967] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.807008] __asan_report_load1_noabort+0x18/0x20 [ 18.807036] ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.807072] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.807105] ? __schedule+0x2077/0x2b30 [ 18.807137] ? schedule+0x7c/0x2e0 [ 18.807167] ? trace_hardirqs_on+0x37/0xe0 [ 18.807201] ? __schedule+0x2077/0x2b30 [ 18.807232] ? __pfx_read_tsc+0x10/0x10 [ 18.807259] ? ktime_get_ts64+0x86/0x230 [ 18.807294] kunit_try_run_case+0x1a5/0x480 [ 18.807328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.807359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.807392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.807431] ? __kthread_parkme+0x82/0x180 [ 18.807528] ? preempt_count_sub+0x50/0x80 [ 18.807569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.807603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.807636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.807667] kthread+0x337/0x6f0 [ 18.807697] ? trace_preempt_on+0x20/0xc0 [ 18.807728] ? __pfx_kthread+0x10/0x10 [ 18.807761] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.807793] ? calculate_sigpending+0x7b/0xa0 [ 18.807822] ? __pfx_kthread+0x10/0x10 [ 18.807854] ret_from_fork+0x41/0x80 [ 18.807883] ? __pfx_kthread+0x10/0x10 [ 18.807913] ret_from_fork_asm+0x1a/0x30 [ 18.807956] </TASK> [ 18.807969] [ 18.826828] Allocated by task 214: [ 18.827282] kasan_save_stack+0x45/0x70 [ 18.827951] kasan_save_track+0x18/0x40 [ 18.828257] kasan_save_alloc_info+0x3b/0x50 [ 18.829276] __kasan_kmalloc+0xb7/0xc0 [ 18.829588] __kmalloc_cache_noprof+0x189/0x420 [ 18.830062] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.831012] kunit_try_run_case+0x1a5/0x480 [ 18.831372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.831873] kthread+0x337/0x6f0 [ 18.832203] ret_from_fork+0x41/0x80 [ 18.833081] ret_from_fork_asm+0x1a/0x30 [ 18.833535] [ 18.833818] The buggy address belongs to the object at ffff888103199b00 [ 18.833818] which belongs to the cache kmalloc-128 of size 128 [ 18.835108] The buggy address is located 5 bytes to the right of [ 18.835108] allocated 115-byte region [ffff888103199b00, ffff888103199b73) [ 18.837259] [ 18.837445] The buggy address belongs to the physical page: [ 18.838071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199 [ 18.839004] flags: 0x200000000000000(node=0|zone=2) [ 18.839389] page_type: f5(slab) [ 18.840288] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.841029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.841607] page dumped because: kasan: bad access detected [ 18.842230] [ 18.842389] Memory state around the buggy address: [ 18.843360] ffff888103199a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.843918] ffff888103199a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.844389] >ffff888103199b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.844954] ^ [ 18.845467] ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.846203] ffff888103199c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.846856] ================================================================== [ 18.758491] ================================================================== [ 18.759527] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 18.760297] Read of size 1 at addr ffff888103199b73 by task kunit_try_catch/214 [ 18.761155] [ 18.761520] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 18.761764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.761804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.761862] Call Trace: [ 18.761911] <TASK> [ 18.761965] dump_stack_lvl+0x73/0xb0 [ 18.762051] print_report+0xd1/0x650 [ 18.762124] ? __virt_addr_valid+0x1db/0x2d0 [ 18.762197] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.762269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.762340] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.762413] kasan_report+0x141/0x180 [ 18.762565] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.762608] __asan_report_load1_noabort+0x18/0x20 [ 18.762636] ksize_unpoisons_memory+0x81c/0x9b0 [ 18.762670] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.762702] ? __schedule+0x2077/0x2b30 [ 18.762733] ? schedule+0x7c/0x2e0 [ 18.762760] ? trace_hardirqs_on+0x37/0xe0 [ 18.762794] ? __schedule+0x2077/0x2b30 [ 18.762824] ? __pfx_read_tsc+0x10/0x10 [ 18.762852] ? ktime_get_ts64+0x86/0x230 [ 18.762888] kunit_try_run_case+0x1a5/0x480 [ 18.762923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.762952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.762985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.763018] ? __kthread_parkme+0x82/0x180 [ 18.763049] ? preempt_count_sub+0x50/0x80 [ 18.763083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.763115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.763144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.763174] kthread+0x337/0x6f0 [ 18.763202] ? trace_preempt_on+0x20/0xc0 [ 18.763232] ? __pfx_kthread+0x10/0x10 [ 18.763262] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.763292] ? calculate_sigpending+0x7b/0xa0 [ 18.763321] ? __pfx_kthread+0x10/0x10 [ 18.763351] ret_from_fork+0x41/0x80 [ 18.763379] ? __pfx_kthread+0x10/0x10 [ 18.763409] ret_from_fork_asm+0x1a/0x30 [ 18.763491] </TASK> [ 18.763530] [ 18.781881] Allocated by task 214: [ 18.782323] kasan_save_stack+0x45/0x70 [ 18.782982] kasan_save_track+0x18/0x40 [ 18.783390] kasan_save_alloc_info+0x3b/0x50 [ 18.784132] __kasan_kmalloc+0xb7/0xc0 [ 18.784571] __kmalloc_cache_noprof+0x189/0x420 [ 18.784910] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.785345] kunit_try_run_case+0x1a5/0x480 [ 18.786131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.786800] kthread+0x337/0x6f0 [ 18.787175] ret_from_fork+0x41/0x80 [ 18.787715] ret_from_fork_asm+0x1a/0x30 [ 18.788032] [ 18.788626] The buggy address belongs to the object at ffff888103199b00 [ 18.788626] which belongs to the cache kmalloc-128 of size 128 [ 18.789873] The buggy address is located 0 bytes to the right of [ 18.789873] allocated 115-byte region [ffff888103199b00, ffff888103199b73) [ 18.790861] [ 18.791364] The buggy address belongs to the physical page: [ 18.791960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199 [ 18.792785] flags: 0x200000000000000(node=0|zone=2) [ 18.793298] page_type: f5(slab) [ 18.793792] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.794646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.795233] page dumped because: kasan: bad access detected [ 18.795763] [ 18.796000] Memory state around the buggy address: [ 18.796468] ffff888103199a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.796984] ffff888103199a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.798135] >ffff888103199b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.798680] ^ [ 18.799490] ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.800060] ffff888103199c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.800735] ================================================================== [ 18.848330] ================================================================== [ 18.848895] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.849751] Read of size 1 at addr ffff888103199b7f by task kunit_try_catch/214 [ 18.850806] [ 18.851152] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 18.851274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.851308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.851362] Call Trace: [ 18.851414] <TASK> [ 18.851524] dump_stack_lvl+0x73/0xb0 [ 18.851626] print_report+0xd1/0x650 [ 18.851731] ? __virt_addr_valid+0x1db/0x2d0 [ 18.851804] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.851880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.851974] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.852082] kasan_report+0x141/0x180 [ 18.852161] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.852272] __asan_report_load1_noabort+0x18/0x20 [ 18.852370] ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.852492] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.852578] ? __schedule+0x2077/0x2b30 [ 18.852611] ? schedule+0x7c/0x2e0 [ 18.852641] ? trace_hardirqs_on+0x37/0xe0 [ 18.852675] ? __schedule+0x2077/0x2b30 [ 18.852706] ? __pfx_read_tsc+0x10/0x10 [ 18.852731] ? ktime_get_ts64+0x86/0x230 [ 18.852765] kunit_try_run_case+0x1a5/0x480 [ 18.852800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.852830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.852863] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.852895] ? __kthread_parkme+0x82/0x180 [ 18.852924] ? preempt_count_sub+0x50/0x80 [ 18.852958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.852989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.853018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.853048] kthread+0x337/0x6f0 [ 18.853076] ? trace_preempt_on+0x20/0xc0 [ 18.853107] ? __pfx_kthread+0x10/0x10 [ 18.853136] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.853166] ? calculate_sigpending+0x7b/0xa0 [ 18.853194] ? __pfx_kthread+0x10/0x10 [ 18.853224] ret_from_fork+0x41/0x80 [ 18.853253] ? __pfx_kthread+0x10/0x10 [ 18.853282] ret_from_fork_asm+0x1a/0x30 [ 18.853324] </TASK> [ 18.853336] [ 18.870513] Allocated by task 214: [ 18.871012] kasan_save_stack+0x45/0x70 [ 18.871574] kasan_save_track+0x18/0x40 [ 18.872079] kasan_save_alloc_info+0x3b/0x50 [ 18.872550] __kasan_kmalloc+0xb7/0xc0 [ 18.873197] __kmalloc_cache_noprof+0x189/0x420 [ 18.874938] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.875317] kunit_try_run_case+0x1a5/0x480 [ 18.875661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.876036] kthread+0x337/0x6f0 [ 18.876396] ret_from_fork+0x41/0x80 [ 18.876878] ret_from_fork_asm+0x1a/0x30 [ 18.877353] [ 18.877680] The buggy address belongs to the object at ffff888103199b00 [ 18.877680] which belongs to the cache kmalloc-128 of size 128 [ 18.878810] The buggy address is located 12 bytes to the right of [ 18.878810] allocated 115-byte region [ffff888103199b00, ffff888103199b73) [ 18.879838] [ 18.880026] The buggy address belongs to the physical page: [ 18.880588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199 [ 18.881365] flags: 0x200000000000000(node=0|zone=2) [ 18.881926] page_type: f5(slab) [ 18.882305] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.882798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.884748] page dumped because: kasan: bad access detected [ 18.885285] [ 18.886737] Memory state around the buggy address: [ 18.887093] ffff888103199a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.888561] ffff888103199a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.889965] >ffff888103199b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.891867] ^ [ 18.893546] ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.895110] ffff888103199c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.896303] ==================================================================
[ 20.156249] ================================================================== [ 20.156909] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 20.157590] Read of size 1 at addr ffff00000c99267f by task kunit_try_catch/252 [ 20.158254] [ 20.158408] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.158442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.158453] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.158464] Call trace: [ 20.158473] show_stack+0x20/0x38 (C) [ 20.158495] dump_stack_lvl+0x8c/0xd0 [ 20.158518] print_report+0x118/0x608 [ 20.158539] kasan_report+0xdc/0x128 [ 20.158559] __asan_report_load1_noabort+0x20/0x30 [ 20.158583] ksize_unpoisons_memory+0x690/0x740 [ 20.158608] kunit_try_run_case+0x170/0x3f0 [ 20.158634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.158662] kthread+0x328/0x630 [ 20.158685] ret_from_fork+0x10/0x20 [ 20.158708] [ 20.164275] Allocated by task 252: [ 20.164592] kasan_save_stack+0x3c/0x68 [ 20.164952] kasan_save_track+0x20/0x40 [ 20.165313] kasan_save_alloc_info+0x40/0x58 [ 20.165713] __kasan_kmalloc+0xd4/0xd8 [ 20.166066] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.166493] ksize_unpoisons_memory+0xc0/0x740 [ 20.166912] kunit_try_run_case+0x170/0x3f0 [ 20.167307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.167816] kthread+0x328/0x630 [ 20.168128] ret_from_fork+0x10/0x20 [ 20.168466] [ 20.168612] The buggy address belongs to the object at ffff00000c992600 [ 20.168612] which belongs to the cache kmalloc-128 of size 128 [ 20.169731] The buggy address is located 12 bytes to the right of [ 20.169731] allocated 115-byte region [ffff00000c992600, ffff00000c992673) [ 20.170899] [ 20.171046] The buggy address belongs to the physical page: [ 20.171553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.172263] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.172860] page_type: f5(slab) [ 20.173162] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.173864] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.174561] page dumped because: kasan: bad access detected [ 20.175068] [ 20.175213] Memory state around the buggy address: [ 20.175651] ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.176305] ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.176960] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.177612] ^ [ 20.178258] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.178912] ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.179564] ================================================================== [ 20.132071] ================================================================== [ 20.132743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 20.133434] Read of size 1 at addr ffff00000c992678 by task kunit_try_catch/252 [ 20.134104] [ 20.134267] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.134308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.134319] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.134333] Call trace: [ 20.134342] show_stack+0x20/0x38 (C) [ 20.134368] dump_stack_lvl+0x8c/0xd0 [ 20.134391] print_report+0x118/0x608 [ 20.134413] kasan_report+0xdc/0x128 [ 20.134433] __asan_report_load1_noabort+0x20/0x30 [ 20.134457] ksize_unpoisons_memory+0x618/0x740 [ 20.134483] kunit_try_run_case+0x170/0x3f0 [ 20.134509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.134538] kthread+0x328/0x630 [ 20.134562] ret_from_fork+0x10/0x20 [ 20.134586] [ 20.140155] Allocated by task 252: [ 20.140473] kasan_save_stack+0x3c/0x68 [ 20.140836] kasan_save_track+0x20/0x40 [ 20.141195] kasan_save_alloc_info+0x40/0x58 [ 20.141595] __kasan_kmalloc+0xd4/0xd8 [ 20.141947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.142374] ksize_unpoisons_memory+0xc0/0x740 [ 20.142794] kunit_try_run_case+0x170/0x3f0 [ 20.143188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.143699] kthread+0x328/0x630 [ 20.144009] ret_from_fork+0x10/0x20 [ 20.144348] [ 20.144495] The buggy address belongs to the object at ffff00000c992600 [ 20.144495] which belongs to the cache kmalloc-128 of size 128 [ 20.145616] The buggy address is located 5 bytes to the right of [ 20.145616] allocated 115-byte region [ffff00000c992600, ffff00000c992673) [ 20.146775] [ 20.146922] The buggy address belongs to the physical page: [ 20.147429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.148142] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.148743] page_type: f5(slab) [ 20.149044] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.149747] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.150444] page dumped because: kasan: bad access detected [ 20.150950] [ 20.151095] Memory state around the buggy address: [ 20.151534] ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.152189] ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.152844] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.153495] ^ [ 20.154141] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.154796] ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.155448] ================================================================== [ 20.106980] ================================================================== [ 20.108064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 20.108770] Read of size 1 at addr ffff00000c992673 by task kunit_try_catch/252 [ 20.109449] [ 20.109615] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.109667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.109683] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.109702] Call trace: [ 20.109714] show_stack+0x20/0x38 (C) [ 20.109749] dump_stack_lvl+0x8c/0xd0 [ 20.109780] print_report+0x118/0x608 [ 20.109810] kasan_report+0xdc/0x128 [ 20.109839] __asan_report_load1_noabort+0x20/0x30 [ 20.109873] ksize_unpoisons_memory+0x628/0x740 [ 20.109909] kunit_try_run_case+0x170/0x3f0 [ 20.109946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.109986] kthread+0x328/0x630 [ 20.110020] ret_from_fork+0x10/0x20 [ 20.110054] [ 20.115666] Allocated by task 252: [ 20.115993] kasan_save_stack+0x3c/0x68 [ 20.116368] kasan_save_track+0x20/0x40 [ 20.116740] kasan_save_alloc_info+0x40/0x58 [ 20.117153] __kasan_kmalloc+0xd4/0xd8 [ 20.117516] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.117958] ksize_unpoisons_memory+0xc0/0x740 [ 20.118391] kunit_try_run_case+0x170/0x3f0 [ 20.118797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.119322] kthread+0x328/0x630 [ 20.119646] ret_from_fork+0x10/0x20 [ 20.119997] [ 20.120151] The buggy address belongs to the object at ffff00000c992600 [ 20.120151] which belongs to the cache kmalloc-128 of size 128 [ 20.121284] The buggy address is located 0 bytes to the right of [ 20.121284] allocated 115-byte region [ffff00000c992600, ffff00000c992673) [ 20.122458] [ 20.122613] The buggy address belongs to the physical page: [ 20.123129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.123853] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.124465] page_type: f5(slab) [ 20.124780] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.125495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.126202] page dumped because: kasan: bad access detected [ 20.126717] [ 20.126870] Memory state around the buggy address: [ 20.127318] ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.127984] ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.128650] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.129313] ^ [ 20.129945] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.130613] ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.131275] ==================================================================