Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 180.319239] ================================================================== [ 180.321285] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd8/0x268 [ 180.323132] Read of size 1 at addr ffff0000c5ed50c8 by task kunit_try_catch/174 [ 180.325226] [ 180.325795] CPU: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 180.327644] Hardware name: linux,dummy-virt (DT) [ 180.329207] Call trace: [ 180.329883] dump_backtrace+0x9c/0x128 [ 180.331207] show_stack+0x20/0x38 [ 180.332199] dump_stack_lvl+0x60/0xb0 [ 180.333547] print_report+0xf8/0x5d8 [ 180.334735] kasan_report+0xc8/0x118 [ 180.335869] __asan_load1+0x60/0x70 [ 180.337079] kmem_cache_oob+0xd8/0x268 [ 180.338536] kunit_try_run_case+0xf8/0x260 [ 180.339925] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 180.341390] kthread+0x18c/0x1a8 [ 180.342559] ret_from_fork+0x10/0x20 [ 180.343468] [ 180.343919] Allocated by task 174: [ 180.344999] kasan_save_stack+0x3c/0x68 [ 180.346547] kasan_set_track+0x2c/0x40 [ 180.347756] kasan_save_alloc_info+0x24/0x38 [ 180.349090] __kasan_slab_alloc+0xa8/0xb0 [ 180.350466] kmem_cache_alloc+0x134/0x330 [ 180.351647] kmem_cache_oob+0xb8/0x268 [ 180.352749] kunit_try_run_case+0xf8/0x260 [ 180.354097] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 180.355544] kthread+0x18c/0x1a8 [ 180.356480] ret_from_fork+0x10/0x20 [ 180.357600] [ 180.358122] The buggy address belongs to the object at ffff0000c5ed5000 [ 180.358122] which belongs to the cache test_cache of size 200 [ 180.360619] The buggy address is located 0 bytes to the right of [ 180.360619] allocated 200-byte region [ffff0000c5ed5000, ffff0000c5ed50c8) [ 180.364417] [ 180.364916] The buggy address belongs to the physical page: [ 180.366783] page:00000000e3c6efe7 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed5 [ 180.368791] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 180.370639] page_type: 0xffffffff() [ 180.371697] raw: 0bfffc0000000800 ffff0000c56c0500 dead000000000122 0000000000000000 [ 180.373671] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 180.375298] page dumped because: kasan: bad access detected [ 180.376482] [ 180.377075] Memory state around the buggy address: [ 180.378680] ffff0000c5ed4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 180.380225] ffff0000c5ed5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 180.381917] >ffff0000c5ed5080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 180.383544] ^ [ 180.385424] ffff0000c5ed5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 180.386743] ffff0000c5ed5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 180.388802] ==================================================================