Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   53.472595] ==================================================================
[   53.483306] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x4b0/0x520
[   53.490051] Write of size 16 at addr cc22b180 by task kunit_try_catch/222
[   53.496887] 
[   53.498382] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   53.498413] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   53.498413] Hardware name: Generic DRA74X (Flattened Device Tree)
[   53.498443] Call trace: 
[   53.498443]  unwind_backtrace from show_stack+0x18/0x1c
[   53.498474]  show_stack from dump_stack_lvl+0x70/0x90
[   53.498504]  dump_stack_lvl from print_report+0x158/0x528
[   53.498504]  print_report from kasan_report+0xdc/0x118
[   53.498535]  kasan_report from kmalloc_oob_16+0x4b0/0x520
[   53.498565]  kmalloc_oob_16 from kunit_try_run_case+0x22c/0x5a8
[   53.498596]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.498596]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   53.498626]  kthread from ret_from_fork+0x14/0x20
[   53.498657] Exception stack(0xf240bfb0 to 0xf240bff8)
[   53.498657] bfa0:                                     00000000 00000000 00000000 00000000
[   53.498687] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   53.498687] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   53.498718] 
[   53.603057] Allocated by task 222:
[   53.606475]  kasan_save_track+0x30/0x5c
[   53.610351]  __kasan_kmalloc+0x8c/0x94
[   53.614135]  kmalloc_oob_16+0xcc/0x520
[   53.617919]  kunit_try_run_case+0x22c/0x5a8
[   53.622131]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.627655]  kthread+0x464/0x810
[   53.630920]  ret_from_fork+0x14/0x20
[   53.634521] 
[   53.636016] The buggy address belongs to the object at cc22b180
[   53.636016]  which belongs to the cache kmalloc-64 of size 64
[   53.647735] The buggy address is located 0 bytes inside of
[   53.647735]  allocated 13-byte region [cc22b180, cc22b18d)
[   53.658782] 
[   53.660278] The buggy address belongs to the physical page:
[   53.665893] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   53.673156] flags: 0x0(zone=0)
[   53.676239] page_type: f5(slab)
[   53.679412] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   53.687561] raw: 00000000
[   53.690185] page dumped because: kasan: bad access detected
[   53.695800] 
[   53.697296] Memory state around the buggy address:
[   53.702117]  cc22b080: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.708679]  cc22b100: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.715270] >cc22b180: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.721832]               ^
[   53.724639]  cc22b200: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.731231]  cc22b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.737792] ==================================================================

[   23.663724] ==================================================================
[   23.674359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   23.681064] Write of size 16 at addr ffff888105b98500 by task kunit_try_catch/209
[   23.688546] 
[   23.690045] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.690054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.690056] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.690059] Call Trace:
[   23.690061]  <TASK>
[   23.690063]  dump_stack_lvl+0x73/0xb0
[   23.690067]  print_report+0xd1/0x650
[   23.690071]  ? __virt_addr_valid+0x1db/0x2d0
[   23.690075]  ? kmalloc_oob_16+0x452/0x4a0
[   23.690078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.690083]  ? kmalloc_oob_16+0x452/0x4a0
[   23.690087]  kasan_report+0x141/0x180
[   23.690091]  ? kmalloc_oob_16+0x452/0x4a0
[   23.690095]  __asan_report_store16_noabort+0x1b/0x30
[   23.690099]  kmalloc_oob_16+0x452/0x4a0
[   23.690103]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   23.690107]  ? __schedule+0x10cc/0x2b30
[   23.690112]  ? ktime_get_ts64+0x83/0x230
[   23.690116]  kunit_try_run_case+0x1a2/0x480
[   23.690121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.690125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.690129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.690134]  ? __kthread_parkme+0x82/0x180
[   23.690138]  ? preempt_count_sub+0x50/0x80
[   23.690142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.690147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.690151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.690155]  kthread+0x334/0x6f0
[   23.690159]  ? trace_preempt_on+0x20/0xc0
[   23.690163]  ? __pfx_kthread+0x10/0x10
[   23.690167]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.690171]  ? calculate_sigpending+0x7b/0xa0
[   23.690175]  ? __pfx_kthread+0x10/0x10
[   23.690179]  ret_from_fork+0x3e/0x80
[   23.690183]  ? __pfx_kthread+0x10/0x10
[   23.690187]  ret_from_fork_asm+0x1a/0x30
[   23.690193]  </TASK>
[   23.690195] 
[   23.851885] Allocated by task 209:
[   23.855291]  kasan_save_stack+0x45/0x70
[   23.859132]  kasan_save_track+0x18/0x40
[   23.862971]  kasan_save_alloc_info+0x3b/0x50
[   23.867243]  __kasan_kmalloc+0xb7/0xc0
[   23.870994]  __kmalloc_cache_noprof+0x189/0x420
[   23.875529]  kmalloc_oob_16+0xa8/0x4a0
[   23.879287]  kunit_try_run_case+0x1a2/0x480
[   23.883474]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.888875]  kthread+0x334/0x6f0
[   23.892115]  ret_from_fork+0x3e/0x80
[   23.895701]  ret_from_fork_asm+0x1a/0x30
[   23.899654] 
[   23.901155] The buggy address belongs to the object at ffff888105b98500
[   23.901155]  which belongs to the cache kmalloc-16 of size 16
[   23.913494] The buggy address is located 0 bytes inside of
[   23.913494]  allocated 13-byte region [ffff888105b98500, ffff888105b9850d)
[   23.925836] 
[   23.927336] The buggy address belongs to the physical page:
[   23.932908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98
[   23.940914] flags: 0x200000000000000(node=0|zone=2)
[   23.945795] page_type: f5(slab)
[   23.948940] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   23.956704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.964469] page dumped because: kasan: bad access detected
[   23.970040] 
[   23.971532] Memory state around the buggy address:
[   23.976325]  ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.983544]  ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc
[   23.990763] >ffff888105b98500: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.997983]                       ^
[   24.001473]  ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.008703]  ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.015922] ==================================================================