Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 55.518432] ================================================================== [ 55.529907] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1b4/0x360 [ 55.537536] Read of size 4294967294 at addr cc22ba84 by task kunit_try_catch/236 [ 55.544982] [ 55.546508] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 55.546508] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.546539] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.546539] Call trace: [ 55.546539] unwind_backtrace from show_stack+0x18/0x1c [ 55.546569] show_stack from dump_stack_lvl+0x70/0x90 [ 55.546600] dump_stack_lvl from print_report+0x158/0x528 [ 55.546630] print_report from kasan_report+0xdc/0x118 [ 55.546661] kasan_report from kasan_check_range+0x14c/0x198 [ 55.546661] kasan_check_range from __asan_memmove+0x28/0x68 [ 55.546691] __asan_memmove from kmalloc_memmove_negative_size+0x1b4/0x360 [ 55.546722] kmalloc_memmove_negative_size from kunit_try_run_case+0x22c/0x5a8 [ 55.546752] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.546783] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.546783] kthread from ret_from_fork+0x14/0x20 [ 55.546813] Exception stack(0xf247bfb0 to 0xf247bff8) [ 55.546844] bfa0: 00000000 00000000 00000000 00000000 [ 55.546844] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.546874] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.546874] [ 55.665374] Allocated by task 236: [ 55.668823] kasan_save_track+0x30/0x5c [ 55.672668] __kasan_kmalloc+0x8c/0x94 [ 55.676452] kmalloc_memmove_negative_size+0xd0/0x360 [ 55.681549] kunit_try_run_case+0x22c/0x5a8 [ 55.685760] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.691314] kthread+0x464/0x810 [ 55.694549] ret_from_fork+0x14/0x20 [ 55.698150] [ 55.699676] The buggy address belongs to the object at cc22ba80 [ 55.699676] which belongs to the cache kmalloc-64 of size 64 [ 55.711395] The buggy address is located 4 bytes inside of [ 55.711395] 64-byte region [cc22ba80, cc22bac0) [ 55.721557] [ 55.723052] The buggy address belongs to the physical page: [ 55.728637] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 55.735931] flags: 0x0(zone=0) [ 55.739013] page_type: f5(slab) [ 55.742187] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 55.750305] raw: 00000000 [ 55.752960] page dumped because: kasan: bad access detected [ 55.758575] [ 55.760070] Memory state around the buggy address: [ 55.764892] cc22b980: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.771453] cc22ba00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.778045] >cc22ba80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.784606] ^ [ 55.787170] cc22bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.793731] cc22bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.800292] ==================================================================
[ 26.287332] ================================================================== [ 26.298762] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 26.306338] Read of size 18446744073709551614 at addr ffff888107f06084 by task kunit_try_catch/223 [ 26.315299] [ 26.316797] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 26.316805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.316807] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.316810] Call Trace: [ 26.316812] <TASK> [ 26.316813] dump_stack_lvl+0x73/0xb0 [ 26.316817] print_report+0xd1/0x650 [ 26.316821] ? __virt_addr_valid+0x1db/0x2d0 [ 26.316824] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.316829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.316833] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.316838] kasan_report+0x141/0x180 [ 26.316842] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.316848] kasan_check_range+0x10c/0x1c0 [ 26.316853] __asan_memmove+0x27/0x70 [ 26.316856] kmalloc_memmove_negative_size+0x171/0x330 [ 26.316861] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 26.316866] ? __schedule+0x10cc/0x2b30 [ 26.316871] ? ktime_get_ts64+0x83/0x230 [ 26.316875] kunit_try_run_case+0x1a2/0x480 [ 26.316879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.316883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.316888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.316892] ? __kthread_parkme+0x82/0x180 [ 26.316896] ? preempt_count_sub+0x50/0x80 [ 26.316901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.316905] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.316909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.316913] kthread+0x334/0x6f0 [ 26.316917] ? trace_preempt_on+0x20/0xc0 [ 26.316921] ? __pfx_kthread+0x10/0x10 [ 26.316926] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.316930] ? calculate_sigpending+0x7b/0xa0 [ 26.316933] ? __pfx_kthread+0x10/0x10 [ 26.316938] ret_from_fork+0x3e/0x80 [ 26.316941] ? __pfx_kthread+0x10/0x10 [ 26.316946] ret_from_fork_asm+0x1a/0x30 [ 26.316951] </TASK> [ 26.316953] [ 26.487896] Allocated by task 223: [ 26.491300] kasan_save_stack+0x45/0x70 [ 26.495141] kasan_save_track+0x18/0x40 [ 26.498979] kasan_save_alloc_info+0x3b/0x50 [ 26.503251] __kasan_kmalloc+0xb7/0xc0 [ 26.507005] __kmalloc_cache_noprof+0x189/0x420 [ 26.511536] kmalloc_memmove_negative_size+0xac/0x330 [ 26.516588] kunit_try_run_case+0x1a2/0x480 [ 26.520776] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.526184] kthread+0x334/0x6f0 [ 26.529416] ret_from_fork+0x3e/0x80 [ 26.532993] ret_from_fork_asm+0x1a/0x30 [ 26.536921] [ 26.538419] The buggy address belongs to the object at ffff888107f06080 [ 26.538419] which belongs to the cache kmalloc-64 of size 64 [ 26.550757] The buggy address is located 4 bytes inside of [ 26.550757] 64-byte region [ffff888107f06080, ffff888107f060c0) [ 26.562226] [ 26.563756] The buggy address belongs to the physical page: [ 26.569334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06 [ 26.577341] flags: 0x200000000000000(node=0|zone=2) [ 26.582218] page_type: f5(slab) [ 26.585365] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 26.593104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.600842] page dumped because: kasan: bad access detected [ 26.606415] [ 26.607915] Memory state around the buggy address: [ 26.612721] ffff888107f05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.619971] ffff888107f06000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.627198] >ffff888107f06080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.634415] ^ [ 26.637648] ffff888107f06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.644866] ffff888107f06180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.652088] ==================================================================