Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 177.763827] ================================================================== [ 177.765808] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x1e0 [ 177.767613] Write of size 1 at addr ffff0000c6039f00 by task kunit_try_catch/132 [ 177.769814] [ 177.770298] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 177.772271] Hardware name: linux,dummy-virt (DT) [ 177.774423] Call trace: [ 177.775219] dump_backtrace+0x9c/0x128 [ 177.776325] show_stack+0x20/0x38 [ 177.777532] dump_stack_lvl+0x60/0xb0 [ 177.778604] print_report+0xf8/0x5d8 [ 177.779683] kasan_report+0xc8/0x118 [ 177.781047] __asan_store1+0x60/0x70 [ 177.782559] kmalloc_large_oob_right+0xc8/0x1e0 [ 177.783826] kunit_try_run_case+0xf8/0x260 [ 177.785225] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 177.787331] kthread+0x18c/0x1a8 [ 177.788310] ret_from_fork+0x10/0x20 [ 177.789899] [ 177.790541] Allocated by task 132: [ 177.791337] kasan_save_stack+0x3c/0x68 [ 177.792593] kasan_set_track+0x2c/0x40 [ 177.793834] kasan_save_alloc_info+0x24/0x38 [ 177.794956] __kasan_kmalloc+0xd4/0xd8 [ 177.796365] kmalloc_trace+0x68/0x130 [ 177.797759] kmalloc_large_oob_right+0x9c/0x1e0 [ 177.799253] kunit_try_run_case+0xf8/0x260 [ 177.800633] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 177.802310] kthread+0x18c/0x1a8 [ 177.803102] ret_from_fork+0x10/0x20 [ 177.804537] [ 177.805560] The buggy address belongs to the object at ffff0000c6038000 [ 177.805560] which belongs to the cache kmalloc-8k of size 8192 [ 177.808140] The buggy address is located 0 bytes to the right of [ 177.808140] allocated 7936-byte region [ffff0000c6038000, ffff0000c6039f00) [ 177.811129] [ 177.811597] The buggy address belongs to the physical page: [ 177.813054] page:00000000ade0eed0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 177.815301] head:00000000ade0eed0 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 177.817377] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 177.819500] page_type: 0xffffffff() [ 177.820666] raw: 0bfffc0000000840 ffff0000c0002280 dead000000000122 0000000000000000 [ 177.823023] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 177.824608] page dumped because: kasan: bad access detected [ 177.826242] [ 177.827263] Memory state around the buggy address: [ 177.828767] ffff0000c6039e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 177.830356] ffff0000c6039e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 177.832357] >ffff0000c6039f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 177.834078] ^ [ 177.835061] ffff0000c6039f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 177.837172] ffff0000c603a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 177.838630] ==================================================================
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure