Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   47.060974] ==================================================================
[   47.072448] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c0/0x548
[   47.080596] Write of size 1 at addr cc228778 by task kunit_try_catch/198
[   47.087341] 
[   47.088867] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   47.088897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.088897] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.088897] Call trace: 
[   47.088897]  unwind_backtrace from show_stack+0x18/0x1c
[   47.088928]  show_stack from dump_stack_lvl+0x70/0x90
[   47.088958]  dump_stack_lvl from print_report+0x158/0x528
[   47.088989]  print_report from kasan_report+0xdc/0x118
[   47.089019]  kasan_report from kmalloc_track_caller_oob_right+0x4c0/0x548
[   47.089019]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.089050]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.089080]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.089111]  kthread from ret_from_fork+0x14/0x20
[   47.089111] Exception stack(0xf2363fb0 to 0xf2363ff8)
[   47.089141] 3fa0:                                     00000000 00000000 00000000 00000000
[   47.089141] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.089172] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.089172] 
[   47.196319] Allocated by task 198:
[   47.199737]  kasan_save_track+0x30/0x5c
[   47.203613]  __kasan_kmalloc+0x8c/0x94
[   47.207397]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   47.213012]  kmalloc_track_caller_oob_right+0x98/0x548
[   47.218200]  kunit_try_run_case+0x22c/0x5a8
[   47.222412]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.227935]  kthread+0x464/0x810
[   47.231201]  ret_from_fork+0x14/0x20
[   47.234802] 
[   47.236297] The buggy address belongs to the object at cc228700
[   47.236297]  which belongs to the cache kmalloc-128 of size 128
[   47.248199] The buggy address is located 0 bytes to the right of
[   47.248199]  allocated 120-byte region [cc228700, cc228778)
[   47.259826] 
[   47.261352] The buggy address belongs to the physical page:
[   47.266937] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   47.274230] flags: 0x0(zone=0)
[   47.277313] page_type: f5(slab)
[   47.280456] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   47.288604] raw: 00000000
[   47.291259] page dumped because: kasan: bad access detected
[   47.296844] 
[   47.298370] Memory state around the buggy address:
[   47.303192]  cc228600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.309753]  cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.316314] >cc228700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.322906]                                                         ^
[   47.329376]  cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.335937]  cc228800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.342529] ==================================================================
[   47.350158] ==================================================================
[   47.357421] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.365600] Write of size 1 at addr cc228878 by task kunit_try_catch/198
[   47.372344] 
[   47.373840] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   47.373870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.373870] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.373901] Call trace: 
[   47.373901]  unwind_backtrace from show_stack+0x18/0x1c
[   47.373931]  show_stack from dump_stack_lvl+0x70/0x90
[   47.373931]  dump_stack_lvl from print_report+0x158/0x528
[   47.373962]  print_report from kasan_report+0xdc/0x118
[   47.373992]  kasan_report from kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.374023]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.374053]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.374053]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.374084]  kthread from ret_from_fork+0x14/0x20
[   47.374114] Exception stack(0xf2363fb0 to 0xf2363ff8)
[   47.374114] 3fa0:                                     00000000 00000000 00000000 00000000
[   47.374145] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.374145] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.374176] 
[   47.481323] Allocated by task 198:
[   47.484741]  kasan_save_track+0x30/0x5c
[   47.488616]  __kasan_kmalloc+0x8c/0x94
[   47.492370]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   47.498016]  kmalloc_track_caller_oob_right+0x1c4/0x548
[   47.503265]  kunit_try_run_case+0x22c/0x5a8
[   47.507476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.513031]  kthread+0x464/0x810
[   47.516265]  ret_from_fork+0x14/0x20
[   47.519866] 
[   47.521362] The buggy address belongs to the object at cc228800
[   47.521362]  which belongs to the cache kmalloc-128 of size 128
[   47.533264] The buggy address is located 0 bytes to the right of
[   47.533264]  allocated 120-byte region [cc228800, cc228878)
[   47.544921] 
[   47.546417] The buggy address belongs to the physical page:
[   47.552032] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   47.559295] flags: 0x0(zone=0)
[   47.562377] page_type: f5(slab)
[   47.565551] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   47.573669] raw: 00000000
[   47.576324] page dumped because: kasan: bad access detected
[   47.581939] 
[   47.583435] Memory state around the buggy address:
[   47.588256]  cc228700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.594818]  cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.601409] >cc228800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.607971]                                                         ^
[   47.614440]  cc228880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.621032]  cc228900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.627593] ==================================================================

[   15.179200] ==================================================================
[   15.190630] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.198735] Write of size 1 at addr ffff88810633a478 by task kunit_try_catch/185
[   15.206133] 
[   15.207634] CPU: 3 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.207642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.207644] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.207648] Call Trace:
[   15.207649]  <TASK>
[   15.207651]  dump_stack_lvl+0x73/0xb0
[   15.207655]  print_report+0xd1/0x650
[   15.207659]  ? __virt_addr_valid+0x1db/0x2d0
[   15.207663]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207685]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.207689]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207694]  kasan_report+0x141/0x180
[   15.207699]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207705]  __asan_report_store1_noabort+0x1b/0x30
[   15.207708]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207726]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   15.207732]  ? __schedule+0x10cc/0x2b30
[   15.207736]  ? ktime_get_ts64+0x83/0x230
[   15.207741]  kunit_try_run_case+0x1a2/0x480
[   15.207745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.207749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.207754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.207758]  ? __kthread_parkme+0x82/0x180
[   15.207762]  ? preempt_count_sub+0x50/0x80
[   15.207767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.207771]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.207775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.207780]  kthread+0x334/0x6f0
[   15.207784]  ? trace_preempt_on+0x20/0xc0
[   15.207788]  ? __pfx_kthread+0x10/0x10
[   15.207792]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.207796]  ? calculate_sigpending+0x7b/0xa0
[   15.207800]  ? __pfx_kthread+0x10/0x10
[   15.207804]  ret_from_fork+0x3e/0x80
[   15.207808]  ? __pfx_kthread+0x10/0x10
[   15.207813]  ret_from_fork_asm+0x1a/0x30
[   15.207818]  </TASK>
[   15.207820] 
[   15.376434] Allocated by task 185:
[   15.379839]  kasan_save_stack+0x45/0x70
[   15.383704]  kasan_save_track+0x18/0x40
[   15.387570]  kasan_save_alloc_info+0x3b/0x50
[   15.391843]  __kasan_kmalloc+0xb7/0xc0
[   15.395596]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   15.401166]  kmalloc_track_caller_oob_right+0x99/0x520
[   15.406305]  kunit_try_run_case+0x1a2/0x480
[   15.410493]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.415898]  kthread+0x334/0x6f0
[   15.419131]  ret_from_fork+0x3e/0x80
[   15.422735]  ret_from_fork_asm+0x1a/0x30
[   15.426664] 
[   15.428189] The buggy address belongs to the object at ffff88810633a400
[   15.428189]  which belongs to the cache kmalloc-128 of size 128
[   15.440704] The buggy address is located 0 bytes to the right of
[   15.440704]  allocated 120-byte region [ffff88810633a400, ffff88810633a478)
[   15.453667] 
[   15.455194] The buggy address belongs to the physical page:
[   15.460764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a
[   15.468763] flags: 0x200000000000000(node=0|zone=2)
[   15.473643] page_type: f5(slab)
[   15.476789] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   15.484529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.492275] page dumped because: kasan: bad access detected
[   15.497849] 
[   15.499346] Memory state around the buggy address:
[   15.504141]  ffff88810633a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.511359]  ffff88810633a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.518579] >ffff88810633a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.525796]                                                                 ^
[   15.532931]  ffff88810633a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540147]  ffff88810633a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.547368] ==================================================================