Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 55.808807] ================================================================== [ 55.820983] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1b4/0x360 [ 55.828979] Read of size 64 at addr cc22bc04 by task kunit_try_catch/238 [ 55.835723] [ 55.837219] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 55.837249] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.837249] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.837280] Call trace: [ 55.837280] unwind_backtrace from show_stack+0x18/0x1c [ 55.837310] show_stack from dump_stack_lvl+0x70/0x90 [ 55.837341] dump_stack_lvl from print_report+0x158/0x528 [ 55.837371] print_report from kasan_report+0xdc/0x118 [ 55.837371] kasan_report from kasan_check_range+0x14c/0x198 [ 55.837402] kasan_check_range from __asan_memmove+0x28/0x68 [ 55.837432] __asan_memmove from kmalloc_memmove_invalid_size+0x1b4/0x360 [ 55.837463] kmalloc_memmove_invalid_size from kunit_try_run_case+0x22c/0x5a8 [ 55.837463] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.837493] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.837524] kthread from ret_from_fork+0x14/0x20 [ 55.837554] Exception stack(0xf248bfb0 to 0xf248bff8) [ 55.837554] bfa0: 00000000 00000000 00000000 00000000 [ 55.837585] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.837585] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.837615] [ 55.955932] Allocated by task 238: [ 55.959350] kasan_save_track+0x30/0x5c [ 55.963226] __kasan_kmalloc+0x8c/0x94 [ 55.967010] kmalloc_memmove_invalid_size+0xd0/0x360 [ 55.972015] kunit_try_run_case+0x22c/0x5a8 [ 55.976226] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.981750] kthread+0x464/0x810 [ 55.985015] ret_from_fork+0x14/0x20 [ 55.988616] [ 55.990142] The buggy address belongs to the object at cc22bc00 [ 55.990142] which belongs to the cache kmalloc-64 of size 64 [ 56.001861] The buggy address is located 4 bytes inside of [ 56.001861] allocated 64-byte region [cc22bc00, cc22bc40) [ 56.012878] [ 56.014373] The buggy address belongs to the physical page: [ 56.019989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 56.027252] flags: 0x0(zone=0) [ 56.030334] page_type: f5(slab) [ 56.033508] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.041656] raw: 00000000 [ 56.044281] page dumped because: kasan: bad access detected [ 56.049896] [ 56.051391] Memory state around the buggy address: [ 56.056243] cc22bb00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.062805] cc22bb80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.069366] >cc22bc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.075958] ^ [ 56.080596] cc22bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.087158] cc22bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.093749] ==================================================================
[ 26.659488] ================================================================== [ 26.671596] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.679515] Read of size 64 at addr ffff888107f06204 by task kunit_try_catch/225 [ 26.686906] [ 26.688409] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 26.688417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.688419] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.688422] Call Trace: [ 26.688423] <TASK> [ 26.688425] dump_stack_lvl+0x73/0xb0 [ 26.688429] print_report+0xd1/0x650 [ 26.688433] ? __virt_addr_valid+0x1db/0x2d0 [ 26.688436] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.688445] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688450] kasan_report+0x141/0x180 [ 26.688454] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688459] kasan_check_range+0x10c/0x1c0 [ 26.688464] __asan_memmove+0x27/0x70 [ 26.688467] kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688472] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 26.688477] ? __schedule+0x10cc/0x2b30 [ 26.688481] ? ktime_get_ts64+0x83/0x230 [ 26.688486] kunit_try_run_case+0x1a2/0x480 [ 26.688490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.688494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.688499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.688503] ? __kthread_parkme+0x82/0x180 [ 26.688507] ? preempt_count_sub+0x50/0x80 [ 26.688512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.688516] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.688520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.688524] kthread+0x334/0x6f0 [ 26.688528] ? trace_preempt_on+0x20/0xc0 [ 26.688532] ? __pfx_kthread+0x10/0x10 [ 26.688536] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.688540] ? calculate_sigpending+0x7b/0xa0 [ 26.688544] ? __pfx_kthread+0x10/0x10 [ 26.688548] ret_from_fork+0x3e/0x80 [ 26.688552] ? __pfx_kthread+0x10/0x10 [ 26.688556] ret_from_fork_asm+0x1a/0x30 [ 26.688562] </TASK> [ 26.688563] [ 26.859210] Allocated by task 225: [ 26.862617] kasan_save_stack+0x45/0x70 [ 26.866454] kasan_save_track+0x18/0x40 [ 26.870296] kasan_save_alloc_info+0x3b/0x50 [ 26.874567] __kasan_kmalloc+0xb7/0xc0 [ 26.878319] __kmalloc_cache_noprof+0x189/0x420 [ 26.882852] kmalloc_memmove_invalid_size+0xac/0x330 [ 26.887827] kunit_try_run_case+0x1a2/0x480 [ 26.892012] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.897412] kthread+0x334/0x6f0 [ 26.900644] ret_from_fork+0x3e/0x80 [ 26.904248] ret_from_fork_asm+0x1a/0x30 [ 26.908175] [ 26.909687] The buggy address belongs to the object at ffff888107f06200 [ 26.909687] which belongs to the cache kmalloc-64 of size 64 [ 26.922040] The buggy address is located 4 bytes inside of [ 26.922040] allocated 64-byte region [ffff888107f06200, ffff888107f06240) [ 26.934383] [ 26.935881] The buggy address belongs to the physical page: [ 26.941452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06 [ 26.949451] flags: 0x200000000000000(node=0|zone=2) [ 26.954331] page_type: f5(slab) [ 26.957478] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 26.965216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.972955] page dumped because: kasan: bad access detected [ 26.978527] [ 26.980025] Memory state around the buggy address: [ 26.984818] ffff888107f06100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 26.992038] ffff888107f06180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.999256] >ffff888107f06200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 27.006475] ^ [ 27.011788] ffff888107f06280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.019008] ffff888107f06300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.026227] ==================================================================