Date
Dec. 3, 2024, 11:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.361146] ================================================================== [ 29.362726] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.363992] Write of size 1 at addr fff00000c62c600a by task kunit_try_catch/135 [ 29.365954] [ 29.366402] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.368201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.368628] Hardware name: linux,dummy-virt (DT) [ 29.369890] Call trace: [ 29.370280] show_stack+0x20/0x38 (C) [ 29.370993] dump_stack_lvl+0x8c/0xd0 [ 29.372236] print_report+0x118/0x5e0 [ 29.372817] kasan_report+0xc8/0x118 [ 29.373488] __asan_report_store1_noabort+0x20/0x30 [ 29.374161] kmalloc_large_oob_right+0x278/0x2b8 [ 29.374960] kunit_try_run_case+0x14c/0x3d0 [ 29.375620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.376824] kthread+0x24c/0x2d0 [ 29.377302] ret_from_fork+0x10/0x20 [ 29.377869] [ 29.378266] The buggy address belongs to the physical page: [ 29.380016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4 [ 29.380991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.381894] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.382937] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.383879] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.385136] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.386148] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.387580] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000 [ 29.388299] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.389241] page dumped because: kasan: bad access detected [ 29.389999] [ 29.390276] Memory state around the buggy address: [ 29.390997] fff00000c62c5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.392449] fff00000c62c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.393197] >fff00000c62c6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.394164] ^ [ 29.395075] fff00000c62c6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.395943] fff00000c62c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.397195] ==================================================================
[ 24.981252] ================================================================== [ 24.982589] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2eb/0x340 [ 24.983390] Write of size 1 at addr ffff888102a3a00a by task kunit_try_catch/155 [ 24.983953] [ 24.984083] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 24.984622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.984873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.985440] Call Trace: [ 24.985671] <TASK> [ 24.986029] dump_stack_lvl+0x73/0xb0 [ 24.986893] print_report+0xd1/0x640 [ 24.987215] ? __virt_addr_valid+0x1db/0x2d0 [ 24.987711] ? kasan_addr_to_slab+0x11/0xa0 [ 24.988121] kasan_report+0x102/0x140 [ 24.988748] ? kmalloc_large_oob_right+0x2eb/0x340 [ 24.989403] ? kmalloc_large_oob_right+0x2eb/0x340 [ 24.989808] __asan_report_store1_noabort+0x1b/0x30 [ 24.990543] kmalloc_large_oob_right+0x2eb/0x340 [ 24.990930] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 24.991382] ? __schedule+0xc3e/0x2790 [ 24.991867] ? __pfx_read_tsc+0x10/0x10 [ 24.992222] ? ktime_get_ts64+0x86/0x230 [ 24.992592] kunit_try_run_case+0x1b3/0x490 [ 24.993091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.993629] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.994142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.994688] ? __kthread_parkme+0x82/0x160 [ 24.995168] ? preempt_count_sub+0x50/0x80 [ 24.995668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.996182] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.996845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.997199] kthread+0x257/0x310 [ 24.997367] ? __pfx_kthread+0x10/0x10 [ 24.997625] ret_from_fork+0x41/0x80 [ 24.997885] ? __pfx_kthread+0x10/0x10 [ 24.998161] ret_from_fork_asm+0x1a/0x30 [ 24.998470] </TASK> [ 24.998710] [ 24.998952] The buggy address belongs to the physical page: [ 24.999420] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38 [ 24.999851] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.000520] flags: 0x200000000000040(head|node=0|zone=2) [ 25.000960] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.001492] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.002100] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.002778] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.003281] head: 0200000000000002 ffffea00040a8e01 ffffffffffffffff 0000000000000000 [ 25.003772] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 25.004329] page dumped because: kasan: bad access detected [ 25.004852] [ 25.005048] Memory state around the buggy address: [ 25.005419] ffff888102a39f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.005950] ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.006324] >ffff888102a3a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.006948] ^ [ 25.007306] ffff888102a3a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.007942] ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.008554] ==================================================================