Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.228730] ================================================================== [ 33.229800] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 33.230511] Read of size 1 at addr fff00000c66cd0c8 by task kunit_try_catch/195 [ 33.232062] [ 33.232402] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.234607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.235171] Hardware name: linux,dummy-virt (DT) [ 33.235917] Call trace: [ 33.236314] show_stack+0x20/0x38 (C) [ 33.236884] dump_stack_lvl+0x8c/0xd0 [ 33.237468] print_report+0x118/0x5e0 [ 33.238502] kasan_report+0xc8/0x118 [ 33.239337] __asan_report_load1_noabort+0x20/0x30 [ 33.240312] kmem_cache_oob+0x33c/0x428 [ 33.241363] kunit_try_run_case+0x14c/0x3d0 [ 33.242114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.243474] kthread+0x24c/0x2d0 [ 33.244743] ret_from_fork+0x10/0x20 [ 33.245356] [ 33.245734] Allocated by task 195: [ 33.246589] kasan_save_stack+0x3c/0x68 [ 33.247754] kasan_save_track+0x20/0x40 [ 33.248329] kasan_save_alloc_info+0x40/0x58 [ 33.248937] __kasan_slab_alloc+0xa8/0xb0 [ 33.249583] kmem_cache_alloc_noprof+0x108/0x398 [ 33.251057] kmem_cache_oob+0x12c/0x428 [ 33.251607] kunit_try_run_case+0x14c/0x3d0 [ 33.252570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.253376] kthread+0x24c/0x2d0 [ 33.254665] ret_from_fork+0x10/0x20 [ 33.255091] [ 33.255263] The buggy address belongs to the object at fff00000c66cd000 [ 33.255263] which belongs to the cache test_cache of size 200 [ 33.256244] The buggy address is located 0 bytes to the right of [ 33.256244] allocated 200-byte region [fff00000c66cd000, fff00000c66cd0c8) [ 33.257792] [ 33.258692] The buggy address belongs to the physical page: [ 33.259420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066cd [ 33.260359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.261573] page_type: f5(slab) [ 33.262762] raw: 0bfffe0000000000 fff00000c5699a00 dead000000000122 0000000000000000 [ 33.263894] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.264857] page dumped because: kasan: bad access detected [ 33.265939] [ 33.266533] Memory state around the buggy address: [ 33.268116] fff00000c66ccf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.269106] fff00000c66cd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.270147] >fff00000c66cd080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.271011] ^ [ 33.272552] fff00000c66cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.273336] fff00000c66cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.275463] ==================================================================
[ 24.023466] ================================================================== [ 24.024390] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x404/0x530 [ 24.025097] Read of size 1 at addr ffff888101af20c8 by task kunit_try_catch/215 [ 24.025956] [ 24.026203] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 24.028522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.029128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.030894] Call Trace: [ 24.031439] <TASK> [ 24.031887] dump_stack_lvl+0x73/0xb0 [ 24.032907] print_report+0xd1/0x640 [ 24.033681] ? __virt_addr_valid+0x1db/0x2d0 [ 24.034160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.035618] kasan_report+0x102/0x140 [ 24.036036] ? kmem_cache_oob+0x404/0x530 [ 24.037085] ? kmem_cache_oob+0x404/0x530 [ 24.037757] __asan_report_load1_noabort+0x18/0x20 [ 24.038277] kmem_cache_oob+0x404/0x530 [ 24.038673] ? trace_hardirqs_on+0x37/0xe0 [ 24.039079] ? __pfx_kmem_cache_oob+0x10/0x10 [ 24.039409] ? finish_task_switch.isra.0+0x153/0x700 [ 24.040059] ? __switch_to+0x5d9/0xf60 [ 24.040369] ? __pfx_read_tsc+0x10/0x10 [ 24.040851] ? ktime_get_ts64+0x86/0x230 [ 24.041480] kunit_try_run_case+0x1b3/0x490 [ 24.042493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.043058] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.044292] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.045571] ? __kthread_parkme+0x82/0x160 [ 24.046084] ? preempt_count_sub+0x50/0x80 [ 24.047082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.047691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.048315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.048848] kthread+0x257/0x310 [ 24.049817] ? __pfx_kthread+0x10/0x10 [ 24.050764] ret_from_fork+0x41/0x80 [ 24.052101] ? __pfx_kthread+0x10/0x10 [ 24.052804] ret_from_fork_asm+0x1a/0x30 [ 24.053593] </TASK> [ 24.054064] [ 24.054198] Allocated by task 215: [ 24.055078] kasan_save_stack+0x3d/0x60 [ 24.055720] kasan_save_track+0x18/0x40 [ 24.056770] kasan_save_alloc_info+0x3b/0x50 [ 24.057778] __kasan_slab_alloc+0x91/0xa0 [ 24.058347] kmem_cache_alloc_noprof+0x11e/0x3e0 [ 24.059777] kmem_cache_oob+0x158/0x530 [ 24.060582] kunit_try_run_case+0x1b3/0x490 [ 24.061141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.062510] kthread+0x257/0x310 [ 24.063479] ret_from_fork+0x41/0x80 [ 24.063884] ret_from_fork_asm+0x1a/0x30 [ 24.065073] [ 24.065253] The buggy address belongs to the object at ffff888101af2000 [ 24.065253] which belongs to the cache test_cache of size 200 [ 24.066768] The buggy address is located 0 bytes to the right of [ 24.066768] allocated 200-byte region [ffff888101af2000, ffff888101af20c8) [ 24.068363] [ 24.068505] The buggy address belongs to the physical page: [ 24.069309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101af2 [ 24.071090] flags: 0x200000000000000(node=0|zone=2) [ 24.071955] page_type: f5(slab) [ 24.072399] raw: 0200000000000000 ffff888101a9c500 dead000000000122 0000000000000000 [ 24.073805] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 24.074442] page dumped because: kasan: bad access detected [ 24.075833] [ 24.076042] Memory state around the buggy address: [ 24.076573] ffff888101af1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.077948] ffff888101af2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.078655] >ffff888101af2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 24.080115] ^ [ 24.080705] ffff888101af2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.081867] ffff888101af2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.082309] ==================================================================