Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-arm64

[  180.319239] ==================================================================
[  180.321285] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd8/0x268
[  180.323132] Read of size 1 at addr ffff0000c5ed50c8 by task kunit_try_catch/174
[  180.325226] 
[  180.325795] CPU: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  180.327644] Hardware name: linux,dummy-virt (DT)
[  180.329207] Call trace:
[  180.329883]  dump_backtrace+0x9c/0x128
[  180.331207]  show_stack+0x20/0x38
[  180.332199]  dump_stack_lvl+0x60/0xb0
[  180.333547]  print_report+0xf8/0x5d8
[  180.334735]  kasan_report+0xc8/0x118
[  180.335869]  __asan_load1+0x60/0x70
[  180.337079]  kmem_cache_oob+0xd8/0x268
[  180.338536]  kunit_try_run_case+0xf8/0x260
[  180.339925]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  180.341390]  kthread+0x18c/0x1a8
[  180.342559]  ret_from_fork+0x10/0x20
[  180.343468] 
[  180.343919] Allocated by task 174:
[  180.344999]  kasan_save_stack+0x3c/0x68
[  180.346547]  kasan_set_track+0x2c/0x40
[  180.347756]  kasan_save_alloc_info+0x24/0x38
[  180.349090]  __kasan_slab_alloc+0xa8/0xb0
[  180.350466]  kmem_cache_alloc+0x134/0x330
[  180.351647]  kmem_cache_oob+0xb8/0x268
[  180.352749]  kunit_try_run_case+0xf8/0x260
[  180.354097]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  180.355544]  kthread+0x18c/0x1a8
[  180.356480]  ret_from_fork+0x10/0x20
[  180.357600] 
[  180.358122] The buggy address belongs to the object at ffff0000c5ed5000
[  180.358122]  which belongs to the cache test_cache of size 200
[  180.360619] The buggy address is located 0 bytes to the right of
[  180.360619]  allocated 200-byte region [ffff0000c5ed5000, ffff0000c5ed50c8)
[  180.364417] 
[  180.364916] The buggy address belongs to the physical page:
[  180.366783] page:00000000e3c6efe7 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed5
[  180.368791] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  180.370639] page_type: 0xffffffff()
[  180.371697] raw: 0bfffc0000000800 ffff0000c56c0500 dead000000000122 0000000000000000
[  180.373671] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  180.375298] page dumped because: kasan: bad access detected
[  180.376482] 
[  180.377075] Memory state around the buggy address:
[  180.378680]  ffff0000c5ed4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  180.380225]  ffff0000c5ed5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  180.381917] >ffff0000c5ed5080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  180.383544]                                               ^
[  180.385424]  ffff0000c5ed5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  180.386743]  ffff0000c5ed5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  180.388802] ==================================================================