Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   55.808807] ==================================================================
[   55.820983] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1b4/0x360
[   55.828979] Read of size 64 at addr cc22bc04 by task kunit_try_catch/238
[   55.835723] 
[   55.837219] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   55.837249] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.837249] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.837280] Call trace: 
[   55.837280]  unwind_backtrace from show_stack+0x18/0x1c
[   55.837310]  show_stack from dump_stack_lvl+0x70/0x90
[   55.837341]  dump_stack_lvl from print_report+0x158/0x528
[   55.837371]  print_report from kasan_report+0xdc/0x118
[   55.837371]  kasan_report from kasan_check_range+0x14c/0x198
[   55.837402]  kasan_check_range from __asan_memmove+0x28/0x68
[   55.837432]  __asan_memmove from kmalloc_memmove_invalid_size+0x1b4/0x360
[   55.837463]  kmalloc_memmove_invalid_size from kunit_try_run_case+0x22c/0x5a8
[   55.837463]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.837493]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.837524]  kthread from ret_from_fork+0x14/0x20
[   55.837554] Exception stack(0xf248bfb0 to 0xf248bff8)
[   55.837554] bfa0:                                     00000000 00000000 00000000 00000000
[   55.837585] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.837585] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.837615] 
[   55.955932] Allocated by task 238:
[   55.959350]  kasan_save_track+0x30/0x5c
[   55.963226]  __kasan_kmalloc+0x8c/0x94
[   55.967010]  kmalloc_memmove_invalid_size+0xd0/0x360
[   55.972015]  kunit_try_run_case+0x22c/0x5a8
[   55.976226]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.981750]  kthread+0x464/0x810
[   55.985015]  ret_from_fork+0x14/0x20
[   55.988616] 
[   55.990142] The buggy address belongs to the object at cc22bc00
[   55.990142]  which belongs to the cache kmalloc-64 of size 64
[   56.001861] The buggy address is located 4 bytes inside of
[   56.001861]  allocated 64-byte region [cc22bc00, cc22bc40)
[   56.012878] 
[   56.014373] The buggy address belongs to the physical page:
[   56.019989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b
[   56.027252] flags: 0x0(zone=0)
[   56.030334] page_type: f5(slab)
[   56.033508] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.041656] raw: 00000000
[   56.044281] page dumped because: kasan: bad access detected
[   56.049896] 
[   56.051391] Memory state around the buggy address:
[   56.056243]  cc22bb00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.062805]  cc22bb80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.069366] >cc22bc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.075958]                                    ^
[   56.080596]  cc22bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.087158]  cc22bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.093749] ==================================================================

[   26.659488] ==================================================================
[   26.671596] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   26.679515] Read of size 64 at addr ffff888107f06204 by task kunit_try_catch/225
[   26.686906] 
[   26.688409] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   26.688417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.688419] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.688422] Call Trace:
[   26.688423]  <TASK>
[   26.688425]  dump_stack_lvl+0x73/0xb0
[   26.688429]  print_report+0xd1/0x650
[   26.688433]  ? __virt_addr_valid+0x1db/0x2d0
[   26.688436]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.688445]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688450]  kasan_report+0x141/0x180
[   26.688454]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688459]  kasan_check_range+0x10c/0x1c0
[   26.688464]  __asan_memmove+0x27/0x70
[   26.688467]  kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688472]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   26.688477]  ? __schedule+0x10cc/0x2b30
[   26.688481]  ? ktime_get_ts64+0x83/0x230
[   26.688486]  kunit_try_run_case+0x1a2/0x480
[   26.688490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.688494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.688499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.688503]  ? __kthread_parkme+0x82/0x180
[   26.688507]  ? preempt_count_sub+0x50/0x80
[   26.688512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.688516]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.688520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.688524]  kthread+0x334/0x6f0
[   26.688528]  ? trace_preempt_on+0x20/0xc0
[   26.688532]  ? __pfx_kthread+0x10/0x10
[   26.688536]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.688540]  ? calculate_sigpending+0x7b/0xa0
[   26.688544]  ? __pfx_kthread+0x10/0x10
[   26.688548]  ret_from_fork+0x3e/0x80
[   26.688552]  ? __pfx_kthread+0x10/0x10
[   26.688556]  ret_from_fork_asm+0x1a/0x30
[   26.688562]  </TASK>
[   26.688563] 
[   26.859210] Allocated by task 225:
[   26.862617]  kasan_save_stack+0x45/0x70
[   26.866454]  kasan_save_track+0x18/0x40
[   26.870296]  kasan_save_alloc_info+0x3b/0x50
[   26.874567]  __kasan_kmalloc+0xb7/0xc0
[   26.878319]  __kmalloc_cache_noprof+0x189/0x420
[   26.882852]  kmalloc_memmove_invalid_size+0xac/0x330
[   26.887827]  kunit_try_run_case+0x1a2/0x480
[   26.892012]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.897412]  kthread+0x334/0x6f0
[   26.900644]  ret_from_fork+0x3e/0x80
[   26.904248]  ret_from_fork_asm+0x1a/0x30
[   26.908175] 
[   26.909687] The buggy address belongs to the object at ffff888107f06200
[   26.909687]  which belongs to the cache kmalloc-64 of size 64
[   26.922040] The buggy address is located 4 bytes inside of
[   26.922040]  allocated 64-byte region [ffff888107f06200, ffff888107f06240)
[   26.934383] 
[   26.935881] The buggy address belongs to the physical page:
[   26.941452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06
[   26.949451] flags: 0x200000000000000(node=0|zone=2)
[   26.954331] page_type: f5(slab)
[   26.957478] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   26.965216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.972955] page dumped because: kasan: bad access detected
[   26.978527] 
[   26.980025] Memory state around the buggy address:
[   26.984818]  ffff888107f06100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   26.992038]  ffff888107f06180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.999256] >ffff888107f06200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   27.006475]                                            ^
[   27.011788]  ffff888107f06280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.019008]  ffff888107f06300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.026227] ==================================================================