Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 179.556118] ================================================================== [ 179.558335] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x1e8 [ 179.560321] Write of size 8 at addr ffff0000c6017d71 by task kunit_try_catch/154 [ 179.562378] [ 179.562875] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 179.564626] Hardware name: linux,dummy-virt (DT) [ 179.565756] Call trace: [ 179.566490] dump_backtrace+0x9c/0x128 [ 179.567597] show_stack+0x20/0x38 [ 179.568608] dump_stack_lvl+0x60/0xb0 [ 179.569991] print_report+0xf8/0x5d8 [ 179.571417] kasan_report+0xc8/0x118 [ 179.573094] kasan_check_range+0xe8/0x190 [ 179.574039] __asan_memset+0x34/0x78 [ 179.575121] kmalloc_oob_memset_8+0xd8/0x1e8 [ 179.576324] kunit_try_run_case+0xf8/0x260 [ 179.577779] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 179.579055] kthread+0x18c/0x1a8 [ 179.580565] ret_from_fork+0x10/0x20 [ 179.581691] [ 179.582168] Allocated by task 154: [ 179.583069] kasan_save_stack+0x3c/0x68 [ 179.584241] kasan_set_track+0x2c/0x40 [ 179.585466] kasan_save_alloc_info+0x24/0x38 [ 179.587685] __kasan_kmalloc+0xd4/0xd8 [ 179.588772] kmalloc_trace+0x68/0x130 [ 179.589802] kmalloc_oob_memset_8+0xa0/0x1e8 [ 179.590999] kunit_try_run_case+0xf8/0x260 [ 179.592263] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 179.593587] kthread+0x18c/0x1a8 [ 179.594689] ret_from_fork+0x10/0x20 [ 179.595893] [ 179.596762] The buggy address belongs to the object at ffff0000c6017d00 [ 179.596762] which belongs to the cache kmalloc-128 of size 128 [ 179.599213] The buggy address is located 113 bytes inside of [ 179.599213] allocated 120-byte region [ffff0000c6017d00, ffff0000c6017d78) [ 179.602193] [ 179.602663] The buggy address belongs to the physical page: [ 179.603566] page:00000000d97f6f57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106017 [ 179.606007] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 179.607677] page_type: 0xffffffff() [ 179.608751] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 179.610482] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 179.613180] page dumped because: kasan: bad access detected [ 179.614442] [ 179.614979] Memory state around the buggy address: [ 179.616176] ffff0000c6017c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 179.617924] ffff0000c6017c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 179.619890] >ffff0000c6017d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 179.621194] ^ [ 179.622799] ffff0000c6017d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 179.624345] ffff0000c6017e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 179.625941] ==================================================================