Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 20.394489] ================================================================== [ 20.404316] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.412385] Write of size 1 at addr ffff000801dea278 by task kunit_try_catch/189 [ 20.419761] [ 20.421247] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.421306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.421324] Hardware name: WinLink E850-96 board (DT) [ 20.421346] Call trace: [ 20.421360] show_stack+0x20/0x38 (C) [ 20.421398] dump_stack_lvl+0x8c/0xd0 [ 20.421436] print_report+0x118/0x608 [ 20.421473] kasan_report+0xdc/0x128 [ 20.421507] __asan_report_store1_noabort+0x20/0x30 [ 20.421540] kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.421576] kunit_try_run_case+0x170/0x3f0 [ 20.421616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.421653] kthread+0x328/0x630 [ 20.421681] ret_from_fork+0x10/0x20 [ 20.421715] [ 20.485213] Allocated by task 189: [ 20.488600] kasan_save_stack+0x3c/0x68 [ 20.492417] kasan_save_track+0x20/0x40 [ 20.496238] kasan_save_alloc_info+0x40/0x58 [ 20.500489] __kasan_kmalloc+0xd4/0xd8 [ 20.504221] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 20.509777] kmalloc_track_caller_oob_right+0xa8/0x488 [ 20.514899] kunit_try_run_case+0x170/0x3f0 [ 20.519066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.524534] kthread+0x328/0x630 [ 20.527745] ret_from_fork+0x10/0x20 [ 20.531304] [ 20.532781] The buggy address belongs to the object at ffff000801dea200 [ 20.532781] which belongs to the cache kmalloc-128 of size 128 [ 20.545282] The buggy address is located 0 bytes to the right of [ 20.545282] allocated 120-byte region [ffff000801dea200, ffff000801dea278) [ 20.558213] [ 20.559692] The buggy address belongs to the physical page: [ 20.565249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea [ 20.573233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.580871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.587814] page_type: f5(slab) [ 20.590952] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.598672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.606398] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.614209] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.622022] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff [ 20.629834] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.637640] page dumped because: kasan: bad access detected [ 20.643195] [ 20.644670] Memory state around the buggy address: [ 20.649452] ffff000801dea100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.656654] ffff000801dea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.663860] >ffff000801dea200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.671059] ^ [ 20.678181] ffff000801dea280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.685386] ffff000801dea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.692590] ==================================================================
[ 24.669057] ================================================================== [ 24.669178] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 24.669331] Write of size 1 at addr fff00000c6507278 by task kunit_try_catch/142 [ 24.669490] [ 24.669566] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.669797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.669867] Hardware name: linux,dummy-virt (DT) [ 24.669961] Call trace: [ 24.670064] show_stack+0x20/0x38 (C) [ 24.670913] dump_stack_lvl+0x8c/0xd0 [ 24.671096] print_report+0x118/0x608 [ 24.671318] kasan_report+0xdc/0x128 [ 24.671460] __asan_report_store1_noabort+0x20/0x30 [ 24.671732] kmalloc_track_caller_oob_right+0x40c/0x488 [ 24.671887] kunit_try_run_case+0x170/0x3f0 [ 24.672066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.672221] kthread+0x328/0x630 [ 24.672408] ret_from_fork+0x10/0x20 [ 24.672721] [ 24.672776] Allocated by task 142: [ 24.672856] kasan_save_stack+0x3c/0x68 [ 24.673059] kasan_save_track+0x20/0x40 [ 24.673254] kasan_save_alloc_info+0x40/0x58 [ 24.673363] __kasan_kmalloc+0xd4/0xd8 [ 24.673461] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 24.673591] kmalloc_track_caller_oob_right+0xa8/0x488 [ 24.673869] kunit_try_run_case+0x170/0x3f0 [ 24.674043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.674245] kthread+0x328/0x630 [ 24.674344] ret_from_fork+0x10/0x20 [ 24.674433] [ 24.674480] The buggy address belongs to the object at fff00000c6507200 [ 24.674480] which belongs to the cache kmalloc-128 of size 128 [ 24.674673] The buggy address is located 0 bytes to the right of [ 24.674673] allocated 120-byte region [fff00000c6507200, fff00000c6507278) [ 24.675154] [ 24.675219] The buggy address belongs to the physical page: [ 24.675425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507 [ 24.675568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.675795] page_type: f5(slab) [ 24.675901] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.676117] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.676377] page dumped because: kasan: bad access detected [ 24.676454] [ 24.676496] Memory state around the buggy address: [ 24.676604] fff00000c6507100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.676744] fff00000c6507180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.676906] >fff00000c6507200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.677071] ^ [ 24.677287] fff00000c6507280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.677429] fff00000c6507300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.677575] ==================================================================
[ 24.820181] ================================================================== [ 24.820408] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 24.820517] Write of size 1 at addr fff00000c7747178 by task kunit_try_catch/142 [ 24.820631] [ 24.820699] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.820904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.820969] Hardware name: linux,dummy-virt (DT) [ 24.821039] Call trace: [ 24.821092] show_stack+0x20/0x38 (C) [ 24.821210] dump_stack_lvl+0x8c/0xd0 [ 24.821332] print_report+0x118/0x608 [ 24.821448] kasan_report+0xdc/0x128 [ 24.821558] __asan_report_store1_noabort+0x20/0x30 [ 24.821674] kmalloc_track_caller_oob_right+0x418/0x488 [ 24.821796] kunit_try_run_case+0x170/0x3f0 [ 24.821954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.822109] kthread+0x328/0x630 [ 24.822291] ret_from_fork+0x10/0x20 [ 24.822560] [ 24.822720] Allocated by task 142: [ 24.823157] kasan_save_stack+0x3c/0x68 [ 24.823358] kasan_save_track+0x20/0x40 [ 24.823812] kasan_save_alloc_info+0x40/0x58 [ 24.824393] __kasan_kmalloc+0xd4/0xd8 [ 24.824700] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 24.824848] kmalloc_track_caller_oob_right+0x184/0x488 [ 24.824956] kunit_try_run_case+0x170/0x3f0 [ 24.825107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.825233] kthread+0x328/0x630 [ 24.825559] ret_from_fork+0x10/0x20 [ 24.825848] [ 24.825908] The buggy address belongs to the object at fff00000c7747100 [ 24.825908] which belongs to the cache kmalloc-128 of size 128 [ 24.826326] The buggy address is located 0 bytes to the right of [ 24.826326] allocated 120-byte region [fff00000c7747100, fff00000c7747178) [ 24.826489] [ 24.826607] The buggy address belongs to the physical page: [ 24.826720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747 [ 24.826924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.827130] page_type: f5(slab) [ 24.827238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.827366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.827462] page dumped because: kasan: bad access detected [ 24.827533] [ 24.827595] Memory state around the buggy address: [ 24.827685] fff00000c7747000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.827966] fff00000c7747080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.828139] >fff00000c7747100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.828396] ^ [ 24.828497] fff00000c7747180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.828599] fff00000c7747200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.828689] ==================================================================
[ 17.480151] ================================================================== [ 17.481975] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 17.482931] Write of size 1 at addr ffff888102b80e78 by task kunit_try_catch/160 [ 17.483774] [ 17.484108] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.484256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.484295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.484353] Call Trace: [ 17.484400] <TASK> [ 17.484451] dump_stack_lvl+0x73/0xb0 [ 17.484574] print_report+0xd1/0x650 [ 17.484656] ? __virt_addr_valid+0x1db/0x2d0 [ 17.484840] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 17.484923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.484997] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 17.485055] kasan_report+0x141/0x180 [ 17.485092] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 17.485136] __asan_report_store1_noabort+0x1b/0x30 [ 17.485174] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 17.485210] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 17.485285] ? __schedule+0x10cc/0x2b60 [ 17.485326] ? __pfx_read_tsc+0x10/0x10 [ 17.485358] ? ktime_get_ts64+0x86/0x230 [ 17.485395] kunit_try_run_case+0x1a5/0x480 [ 17.485435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.485470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.485531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.485572] ? __kthread_parkme+0x82/0x180 [ 17.485602] ? preempt_count_sub+0x50/0x80 [ 17.485654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.485693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.485726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.485760] kthread+0x337/0x6f0 [ 17.485787] ? trace_preempt_on+0x20/0xc0 [ 17.485821] ? __pfx_kthread+0x10/0x10 [ 17.485850] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.485881] ? calculate_sigpending+0x7b/0xa0 [ 17.485915] ? __pfx_kthread+0x10/0x10 [ 17.485944] ret_from_fork+0x116/0x1d0 [ 17.485969] ? __pfx_kthread+0x10/0x10 [ 17.485997] ret_from_fork_asm+0x1a/0x30 [ 17.486040] </TASK> [ 17.486055] [ 17.505278] Allocated by task 160: [ 17.505720] kasan_save_stack+0x45/0x70 [ 17.506217] kasan_save_track+0x18/0x40 [ 17.506736] kasan_save_alloc_info+0x3b/0x50 [ 17.507300] __kasan_kmalloc+0xb7/0xc0 [ 17.507723] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 17.508292] kmalloc_track_caller_oob_right+0x99/0x520 [ 17.508816] kunit_try_run_case+0x1a5/0x480 [ 17.509308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.509800] kthread+0x337/0x6f0 [ 17.510302] ret_from_fork+0x116/0x1d0 [ 17.510769] ret_from_fork_asm+0x1a/0x30 [ 17.511151] [ 17.511434] The buggy address belongs to the object at ffff888102b80e00 [ 17.511434] which belongs to the cache kmalloc-128 of size 128 [ 17.512553] The buggy address is located 0 bytes to the right of [ 17.512553] allocated 120-byte region [ffff888102b80e00, ffff888102b80e78) [ 17.513572] [ 17.513846] The buggy address belongs to the physical page: [ 17.514360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b80 [ 17.515108] flags: 0x200000000000000(node=0|zone=2) [ 17.515627] page_type: f5(slab) [ 17.516049] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.516809] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.517533] page dumped because: kasan: bad access detected [ 17.518079] [ 17.518417] Memory state around the buggy address: [ 17.518842] ffff888102b80d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.519574] ffff888102b80d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.520196] >ffff888102b80e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.520904] ^ [ 17.521462] ffff888102b80e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.522154] ffff888102b80f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.522870] ==================================================================
[ 16.642312] ================================================================== [ 16.643650] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 16.645091] Write of size 1 at addr ffff8881038d5078 by task kunit_try_catch/160 [ 16.645744] [ 16.645868] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 16.646006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.646284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.646354] Call Trace: [ 16.646385] <TASK> [ 16.646424] dump_stack_lvl+0x73/0xb0 [ 16.646472] print_report+0xd1/0x650 [ 16.646508] ? __virt_addr_valid+0x1db/0x2d0 [ 16.646724] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 16.646789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.646824] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 16.646895] kasan_report+0x141/0x180 [ 16.646939] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 16.646996] __asan_report_store1_noabort+0x1b/0x30 [ 16.647039] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 16.647092] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 16.647133] ? __schedule+0x10cc/0x2b60 [ 16.647182] ? __pfx_read_tsc+0x10/0x10 [ 16.647256] ? ktime_get_ts64+0x86/0x230 [ 16.647296] kunit_try_run_case+0x1a5/0x480 [ 16.647381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.647419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.647454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.647487] ? __kthread_parkme+0x82/0x180 [ 16.647524] ? preempt_count_sub+0x50/0x80 [ 16.647642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.647679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.647712] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.647745] kthread+0x337/0x6f0 [ 16.647773] ? trace_preempt_on+0x20/0xc0 [ 16.647806] ? __pfx_kthread+0x10/0x10 [ 16.647834] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.647863] ? calculate_sigpending+0x7b/0xa0 [ 16.647925] ? __pfx_kthread+0x10/0x10 [ 16.647956] ret_from_fork+0x116/0x1d0 [ 16.647982] ? __pfx_kthread+0x10/0x10 [ 16.648010] ret_from_fork_asm+0x1a/0x30 [ 16.648051] </TASK> [ 16.648066] [ 16.671191] Allocated by task 160: [ 16.671519] kasan_save_stack+0x45/0x70 [ 16.672013] kasan_save_track+0x18/0x40 [ 16.672682] kasan_save_alloc_info+0x3b/0x50 [ 16.673119] __kasan_kmalloc+0xb7/0xc0 [ 16.673449] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 16.673866] kmalloc_track_caller_oob_right+0x99/0x520 [ 16.674967] kunit_try_run_case+0x1a5/0x480 [ 16.675774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.676445] kthread+0x337/0x6f0 [ 16.677335] ret_from_fork+0x116/0x1d0 [ 16.678315] ret_from_fork_asm+0x1a/0x30 [ 16.678676] [ 16.679035] The buggy address belongs to the object at ffff8881038d5000 [ 16.679035] which belongs to the cache kmalloc-128 of size 128 [ 16.680682] The buggy address is located 0 bytes to the right of [ 16.680682] allocated 120-byte region [ffff8881038d5000, ffff8881038d5078) [ 16.681913] [ 16.682183] The buggy address belongs to the physical page: [ 16.682874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 16.683750] flags: 0x200000000000000(node=0|zone=2) [ 16.684523] page_type: f5(slab) [ 16.684977] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.686386] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.687012] page dumped because: kasan: bad access detected [ 16.687629] [ 16.687859] Memory state around the buggy address: [ 16.688378] ffff8881038d4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.689335] ffff8881038d4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.690121] >ffff8881038d5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.691047] ^ [ 16.692081] ffff8881038d5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.692851] ffff8881038d5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.693722] ================================================================== [ 16.695906] ================================================================== [ 16.696528] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 16.697437] Write of size 1 at addr ffff8881038d5178 by task kunit_try_catch/160 [ 16.698245] [ 16.698539] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 16.698660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.698697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.698756] Call Trace: [ 16.698791] <TASK> [ 16.698836] dump_stack_lvl+0x73/0xb0 [ 16.698942] print_report+0xd1/0x650 [ 16.699021] ? __virt_addr_valid+0x1db/0x2d0 [ 16.699080] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 16.699178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.699256] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 16.699332] kasan_report+0x141/0x180 [ 16.699404] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 16.699491] __asan_report_store1_noabort+0x1b/0x30 [ 16.699572] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 16.699657] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 16.699720] ? __schedule+0x10cc/0x2b60 [ 16.699755] ? __pfx_read_tsc+0x10/0x10 [ 16.699786] ? ktime_get_ts64+0x86/0x230 [ 16.699818] kunit_try_run_case+0x1a5/0x480 [ 16.699854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.699914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.699951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.699985] ? __kthread_parkme+0x82/0x180 [ 16.700013] ? preempt_count_sub+0x50/0x80 [ 16.700044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.700078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.700110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.700145] kthread+0x337/0x6f0 [ 16.700172] ? trace_preempt_on+0x20/0xc0 [ 16.700222] ? __pfx_kthread+0x10/0x10 [ 16.700264] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.700297] ? calculate_sigpending+0x7b/0xa0 [ 16.700332] ? __pfx_kthread+0x10/0x10 [ 16.700361] ret_from_fork+0x116/0x1d0 [ 16.700386] ? __pfx_kthread+0x10/0x10 [ 16.700414] ret_from_fork_asm+0x1a/0x30 [ 16.700453] </TASK> [ 16.700468] [ 16.722370] Allocated by task 160: [ 16.722994] kasan_save_stack+0x45/0x70 [ 16.723874] kasan_save_track+0x18/0x40 [ 16.724627] kasan_save_alloc_info+0x3b/0x50 [ 16.725251] __kasan_kmalloc+0xb7/0xc0 [ 16.725843] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 16.726459] kmalloc_track_caller_oob_right+0x19a/0x520 [ 16.726964] kunit_try_run_case+0x1a5/0x480 [ 16.727869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.728478] kthread+0x337/0x6f0 [ 16.729313] ret_from_fork+0x116/0x1d0 [ 16.729857] ret_from_fork_asm+0x1a/0x30 [ 16.730705] [ 16.730873] The buggy address belongs to the object at ffff8881038d5100 [ 16.730873] which belongs to the cache kmalloc-128 of size 128 [ 16.731918] The buggy address is located 0 bytes to the right of [ 16.731918] allocated 120-byte region [ffff8881038d5100, ffff8881038d5178) [ 16.733735] [ 16.733912] The buggy address belongs to the physical page: [ 16.734966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 16.735679] flags: 0x200000000000000(node=0|zone=2) [ 16.736095] page_type: f5(slab) [ 16.736586] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.737700] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.738466] page dumped because: kasan: bad access detected [ 16.739435] [ 16.739697] Memory state around the buggy address: [ 16.740539] ffff8881038d5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.741075] ffff8881038d5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.741611] >ffff8881038d5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.742822] ^ [ 16.743979] ffff8881038d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.744791] ffff8881038d5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.745413] ==================================================================
[ 19.818710] ================================================================== [ 19.819784] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.820557] Write of size 1 at addr ffff00000ba33c78 by task kunit_try_catch/195 [ 19.821256] [ 19.821428] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 19.821488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.821506] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.821525] Call trace: [ 19.821539] show_stack+0x20/0x38 (C) [ 19.821582] dump_stack_lvl+0x8c/0xd0 [ 19.821624] print_report+0x118/0x608 [ 19.821666] kasan_report+0xdc/0x128 [ 19.821704] __asan_report_store1_noabort+0x20/0x30 [ 19.821740] kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.821782] kunit_try_run_case+0x170/0x3f0 [ 19.821823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.821868] kthread+0x328/0x630 [ 19.821900] ret_from_fork+0x10/0x20 [ 19.821939] [ 19.827651] Allocated by task 195: [ 19.827981] kasan_save_stack+0x3c/0x68 [ 19.828368] kasan_save_track+0x20/0x40 [ 19.828753] kasan_save_alloc_info+0x40/0x58 [ 19.829178] __kasan_kmalloc+0xd4/0xd8 [ 19.829554] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.830096] kmalloc_track_caller_oob_right+0xa8/0x488 [ 19.830597] kunit_try_run_case+0x170/0x3f0 [ 19.831012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.831545] kthread+0x328/0x630 [ 19.831869] ret_from_fork+0x10/0x20 [ 19.832228] [ 19.832387] The buggy address belongs to the object at ffff00000ba33c00 [ 19.832387] which belongs to the cache kmalloc-128 of size 128 [ 19.833529] The buggy address is located 0 bytes to the right of [ 19.833529] allocated 120-byte region [ffff00000ba33c00, ffff00000ba33c78) [ 19.834713] [ 19.834873] The buggy address belongs to the physical page: [ 19.835394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xba33 [ 19.836125] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.836745] page_type: f5(slab) [ 19.837083] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.837830] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.838563] page dumped because: kasan: bad access detected [ 19.839097] [ 19.839264] Memory state around the buggy address: [ 19.839734] ffff00000ba33b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.840425] ffff00000ba33b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.841118] >ffff00000ba33c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.841802] ^ [ 19.842481] ffff00000ba33c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843173] ffff00000ba33d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843858] ================================================================== [ 19.844834] ================================================================== [ 19.845534] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 19.846322] Write of size 1 at addr ffff00000ba33d78 by task kunit_try_catch/195 [ 19.847035] [ 19.847217] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 19.847294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.847316] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.847342] Call trace: [ 19.847360] show_stack+0x20/0x38 (C) [ 19.847412] dump_stack_lvl+0x8c/0xd0 [ 19.847468] print_report+0x118/0x608 [ 19.847522] kasan_report+0xdc/0x128 [ 19.847573] __asan_report_store1_noabort+0x20/0x30 [ 19.847622] kmalloc_track_caller_oob_right+0x418/0x488 [ 19.847678] kunit_try_run_case+0x170/0x3f0 [ 19.847732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.847793] kthread+0x328/0x630 [ 19.847835] ret_from_fork+0x10/0x20 [ 19.847885] [ 19.853672] Allocated by task 195: [ 19.854016] kasan_save_stack+0x3c/0x68 [ 19.854421] kasan_save_track+0x20/0x40 [ 19.854823] kasan_save_alloc_info+0x40/0x58 [ 19.855270] __kasan_kmalloc+0xd4/0xd8 [ 19.855666] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.856228] kmalloc_track_caller_oob_right+0x184/0x488 [ 19.856756] kunit_try_run_case+0x170/0x3f0 [ 19.857192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.857747] kthread+0x328/0x630 [ 19.858086] ret_from_fork+0x10/0x20 [ 19.858462] [ 19.858631] The buggy address belongs to the object at ffff00000ba33d00 [ 19.858631] which belongs to the cache kmalloc-128 of size 128 [ 19.859793] The buggy address is located 0 bytes to the right of [ 19.859793] allocated 120-byte region [ffff00000ba33d00, ffff00000ba33d78) [ 19.861001] [ 19.861170] The buggy address belongs to the physical page: [ 19.861703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xba33 [ 19.862455] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.863092] page_type: f5(slab) [ 19.863428] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.864172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.864903] page dumped because: kasan: bad access detected [ 19.865437] [ 19.865604] Memory state around the buggy address: [ 19.866072] ffff00000ba33c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.866764] ffff00000ba33c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.867455] >ffff00000ba33d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.868139] ^ [ 19.868819] ffff00000ba33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.869510] ffff00000ba33e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.870194] ==================================================================