Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   47.635650] ==================================================================
[   47.647827] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x324/0x37c
[   47.655181] Write of size 1 at addr cbaedf00 by task kunit_try_catch/200
[   47.661926] 
[   47.663452] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   47.663482] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.663482] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.663482] Call trace: 
[   47.663482]  unwind_backtrace from show_stack+0x18/0x1c
[   47.663513]  show_stack from dump_stack_lvl+0x70/0x90
[   47.663543]  dump_stack_lvl from print_report+0x158/0x528
[   47.663574]  print_report from kasan_report+0xdc/0x118
[   47.663604]  kasan_report from kmalloc_big_oob_right+0x324/0x37c
[   47.663604]  kmalloc_big_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.663635]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.663665]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.663696]  kthread from ret_from_fork+0x14/0x20
[   47.663696] Exception stack(0xf236bfb0 to 0xf236bff8)
[   47.663726] bfa0:                                     00000000 00000000 00000000 00000000
[   47.663726] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.663757] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.663757] 
[   47.769348] Allocated by task 200:
[   47.772766]  kasan_save_track+0x30/0x5c
[   47.776641]  __kasan_kmalloc+0x8c/0x94
[   47.780426]  kmalloc_big_oob_right+0xd0/0x37c
[   47.784820]  kunit_try_run_case+0x22c/0x5a8
[   47.789031]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.794555]  kthread+0x464/0x810
[   47.797790]  ret_from_fork+0x14/0x20
[   47.801422] 
[   47.802917] The buggy address belongs to the object at cbaec000
[   47.802917]  which belongs to the cache kmalloc-8k of size 8192
[   47.814819] The buggy address is located 0 bytes to the right of
[   47.814819]  allocated 7936-byte region [cbaec000, cbaedf00)
[   47.826538] 
[   47.828033] The buggy address belongs to the physical page:
[   47.833648] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8bae8
[   47.840911] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.848632] flags: 0x40(head|zone=0)
[   47.852233] page_type: f5(slab)
[   47.855407] raw: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000
[   47.863525] raw: 00000000
[   47.866180] head: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000
[   47.874420] head: 00000000 00000003 eeba38a1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   47.882659] head: 00000000 00000008
[   47.886169] page dumped because: kasan: bad access detected
[   47.891754] 
[   47.893280] Memory state around the buggy address:
[   47.898101]  cbaede00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.904663]  cbaede80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.911224] >cbaedf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.917816]            ^
[   47.920349]  cbaedf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.926910]  cbaee000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.933502] ==================================================================

[   15.731298] ==================================================================
[   15.743779] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   15.751094] Write of size 1 at addr ffff888101a95f00 by task kunit_try_catch/187
[   15.758496] 
[   15.759996] CPU: 2 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.760004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.760006] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.760009] Call Trace:
[   15.760011]  <TASK>
[   15.760013]  dump_stack_lvl+0x73/0xb0
[   15.760017]  print_report+0xd1/0x650
[   15.760021]  ? __virt_addr_valid+0x1db/0x2d0
[   15.760025]  ? kmalloc_big_oob_right+0x316/0x370
[   15.760029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.760033]  ? kmalloc_big_oob_right+0x316/0x370
[   15.760038]  kasan_report+0x141/0x180
[   15.760042]  ? kmalloc_big_oob_right+0x316/0x370
[   15.760047]  __asan_report_store1_noabort+0x1b/0x30
[   15.760051]  kmalloc_big_oob_right+0x316/0x370
[   15.760055]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   15.760060]  ? __schedule+0x10cc/0x2b30
[   15.760064]  ? ktime_get_ts64+0x83/0x230
[   15.760069]  kunit_try_run_case+0x1a2/0x480
[   15.760073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.760077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.760082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.760086]  ? __kthread_parkme+0x82/0x180
[   15.760090]  ? preempt_count_sub+0x50/0x80
[   15.760095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.760099]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.760103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.760107]  kthread+0x334/0x6f0
[   15.760111]  ? trace_preempt_on+0x20/0xc0
[   15.760116]  ? __pfx_kthread+0x10/0x10
[   15.760120]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.760124]  ? calculate_sigpending+0x7b/0xa0
[   15.760128]  ? __pfx_kthread+0x10/0x10
[   15.760132]  ret_from_fork+0x3e/0x80
[   15.760136]  ? __pfx_kthread+0x10/0x10
[   15.760141]  ret_from_fork_asm+0x1a/0x30
[   15.760146]  </TASK>
[   15.760148] 
[   15.924748] Allocated by task 187:
[   15.928154]  kasan_save_stack+0x45/0x70
[   15.931993]  kasan_save_track+0x18/0x40
[   15.935833]  kasan_save_alloc_info+0x3b/0x50
[   15.940105]  __kasan_kmalloc+0xb7/0xc0
[   15.943856]  __kmalloc_cache_noprof+0x189/0x420
[   15.948391]  kmalloc_big_oob_right+0xa9/0x370
[   15.952757]  kunit_try_run_case+0x1a2/0x480
[   15.956943]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.962342]  kthread+0x334/0x6f0
[   15.965575]  ret_from_fork+0x3e/0x80
[   15.969155]  ret_from_fork_asm+0x1a/0x30
[   15.973079] 
[   15.974571] The buggy address belongs to the object at ffff888101a94000
[   15.974571]  which belongs to the cache kmalloc-8k of size 8192
[   15.987087] The buggy address is located 0 bytes to the right of
[   15.987087]  allocated 7936-byte region [ffff888101a94000, ffff888101a95f00)
[   16.000127] 
[   16.001627] The buggy address belongs to the physical page:
[   16.007199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a90
[   16.015206] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.022858] flags: 0x200000000000040(head|node=0|zone=2)
[   16.028172] page_type: f5(slab)
[   16.031319] raw: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   16.039066] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.046813] head: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   16.054640] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.062472] head: 0200000000000003 ffffea000406a401 00000000ffffffff 00000000ffffffff
[   16.070300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.078124] page dumped because: kasan: bad access detected
[   16.083700] 
[   16.085211] Memory state around the buggy address:
[   16.090006]  ffff888101a95e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.097225]  ffff888101a95e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.104443] >ffff888101a95f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.111661]                    ^
[   16.114922]  ffff888101a95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.122140]  ffff888101a96000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.129360] ==================================================================