Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   55.226196] ==================================================================
[   55.237579] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b0/0x35c
[   55.244964] Write of size 16 at addr cc228d69 by task kunit_try_catch/234
[   55.251800] 
[   55.253295] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   55.253326] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.253326] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.253356] Call trace: 
[   55.253356]  unwind_backtrace from show_stack+0x18/0x1c
[   55.253387]  show_stack from dump_stack_lvl+0x70/0x90
[   55.253417]  dump_stack_lvl from print_report+0x158/0x528
[   55.253417]  print_report from kasan_report+0xdc/0x118
[   55.253448]  kasan_report from kasan_check_range+0x14c/0x198
[   55.253479]  kasan_check_range from __asan_memset+0x20/0x3c
[   55.253479]  __asan_memset from kmalloc_oob_memset_16+0x1b0/0x35c
[   55.253509]  kmalloc_oob_memset_16 from kunit_try_run_case+0x22c/0x5a8
[   55.253540]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.253570]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.253601]  kthread from ret_from_fork+0x14/0x20
[   55.253601] Exception stack(0xf246bfb0 to 0xf246bff8)
[   55.253631] bfa0:                                     00000000 00000000 00000000 00000000
[   55.253631] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.253662] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.253662] 
[   55.370605] Allocated by task 234:
[   55.374023]  kasan_save_track+0x30/0x5c
[   55.377899]  __kasan_kmalloc+0x8c/0x94
[   55.381683]  kmalloc_oob_memset_16+0xcc/0x35c
[   55.386047]  kunit_try_run_case+0x22c/0x5a8
[   55.390289]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.395812]  kthread+0x464/0x810
[   55.399047]  ret_from_fork+0x14/0x20
[   55.402679] 
[   55.404174] The buggy address belongs to the object at cc228d00
[   55.404174]  which belongs to the cache kmalloc-128 of size 128
[   55.416076] The buggy address is located 105 bytes inside of
[   55.416076]  allocated 120-byte region [cc228d00, cc228d78)
[   55.427337] 
[   55.428863] The buggy address belongs to the physical page:
[   55.434448] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   55.441741] flags: 0x0(zone=0)
[   55.444824] page_type: f5(slab)
[   55.447998] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   55.456115] raw: 00000000
[   55.458770] page dumped because: kasan: bad access detected
[   55.464355] 
[   55.465881] Memory state around the buggy address:
[   55.470703]  cc228c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.477264]  cc228c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.483825] >cc228d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.490417]                                                         ^
[   55.496887]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.503479]  cc228e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.510040] ==================================================================

[   25.916056] ==================================================================
[   25.927389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   25.934703] Write of size 16 at addr ffff888107f05269 by task kunit_try_catch/221
[   25.942207] 
[   25.943720] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.943728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.943730] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.943734] Call Trace:
[   25.943735]  <TASK>
[   25.943737]  dump_stack_lvl+0x73/0xb0
[   25.943740]  print_report+0xd1/0x650
[   25.943745]  ? __virt_addr_valid+0x1db/0x2d0
[   25.943748]  ? kmalloc_oob_memset_16+0x166/0x330
[   25.943752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.943756]  ? kmalloc_oob_memset_16+0x166/0x330
[   25.943760]  kasan_report+0x141/0x180
[   25.943765]  ? kmalloc_oob_memset_16+0x166/0x330
[   25.943770]  kasan_check_range+0x10c/0x1c0
[   25.943774]  __asan_memset+0x27/0x50
[   25.943778]  kmalloc_oob_memset_16+0x166/0x330
[   25.943782]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   25.943786]  ? __schedule+0x10cc/0x2b30
[   25.943791]  ? ktime_get_ts64+0x83/0x230
[   25.943795]  kunit_try_run_case+0x1a2/0x480
[   25.943799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.943803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.943808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.943812]  ? __kthread_parkme+0x82/0x180
[   25.943816]  ? preempt_count_sub+0x50/0x80
[   25.943821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.943825]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.943829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.943833]  kthread+0x334/0x6f0
[   25.943837]  ? trace_preempt_on+0x20/0xc0
[   25.943841]  ? __pfx_kthread+0x10/0x10
[   25.943845]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.943849]  ? calculate_sigpending+0x7b/0xa0
[   25.943853]  ? __pfx_kthread+0x10/0x10
[   25.943857]  ret_from_fork+0x3e/0x80
[   25.943861]  ? __pfx_kthread+0x10/0x10
[   25.943865]  ret_from_fork_asm+0x1a/0x30
[   25.943871]  </TASK>
[   25.943872] 
[   26.111241] Allocated by task 221:
[   26.114648]  kasan_save_stack+0x45/0x70
[   26.118486]  kasan_save_track+0x18/0x40
[   26.122325]  kasan_save_alloc_info+0x3b/0x50
[   26.126598]  __kasan_kmalloc+0xb7/0xc0
[   26.130352]  __kmalloc_cache_noprof+0x189/0x420
[   26.134884]  kmalloc_oob_memset_16+0xac/0x330
[   26.139242]  kunit_try_run_case+0x1a2/0x480
[   26.143428]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.148827]  kthread+0x334/0x6f0
[   26.152060]  ret_from_fork+0x3e/0x80
[   26.155639]  ret_from_fork_asm+0x1a/0x30
[   26.159565] 
[   26.161063] The buggy address belongs to the object at ffff888107f05200
[   26.161063]  which belongs to the cache kmalloc-128 of size 128
[   26.173571] The buggy address is located 105 bytes inside of
[   26.173571]  allocated 120-byte region [ffff888107f05200, ffff888107f05278)
[   26.186171] 
[   26.187687] The buggy address belongs to the physical page:
[   26.193268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   26.201269] flags: 0x200000000000000(node=0|zone=2)
[   26.206147] page_type: f5(slab)
[   26.209293] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   26.217040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.224780] page dumped because: kasan: bad access detected
[   26.230351] 
[   26.231851] Memory state around the buggy address:
[   26.236642]  ffff888107f05100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.243863]  ffff888107f05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.251083] >ffff888107f05200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.258301]                                                                 ^
[   26.265433]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.272652]  ffff888107f05300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.279905] ==================================================================