Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 182.332001] ================================================================== [ 182.334548] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0 [ 182.335707] Read of size 1 at addr ffff0000c5f6eb98 by task kunit_try_catch/202 [ 182.337593] [ 182.338372] CPU: 1 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 182.340668] Hardware name: linux,dummy-virt (DT) [ 182.342342] Call trace: [ 182.343092] dump_backtrace+0x9c/0x128 [ 182.344150] show_stack+0x20/0x38 [ 182.345138] dump_stack_lvl+0x60/0xb0 [ 182.346456] print_report+0xf8/0x5d8 [ 182.347615] kasan_report+0xc8/0x118 [ 182.348746] __asan_load1+0x60/0x70 [ 182.350698] memcmp+0x44/0xd0 [ 182.351726] kasan_memcmp+0xf0/0x208 [ 182.352869] kunit_try_run_case+0xf8/0x260 [ 182.354340] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 182.355780] kthread+0x18c/0x1a8 [ 182.356729] ret_from_fork+0x10/0x20 [ 182.357864] [ 182.358443] Allocated by task 202: [ 182.359412] kasan_save_stack+0x3c/0x68 [ 182.360602] kasan_set_track+0x2c/0x40 [ 182.361785] kasan_save_alloc_info+0x24/0x38 [ 182.363037] __kasan_kmalloc+0xd4/0xd8 [ 182.364234] kmalloc_trace+0x68/0x130 [ 182.365328] kasan_memcmp+0xac/0x208 [ 182.366401] kunit_try_run_case+0xf8/0x260 [ 182.367795] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 182.369465] kthread+0x18c/0x1a8 [ 182.370983] ret_from_fork+0x10/0x20 [ 182.372661] [ 182.373606] The buggy address belongs to the object at ffff0000c5f6eb80 [ 182.373606] which belongs to the cache kmalloc-32 of size 32 [ 182.376181] The buggy address is located 0 bytes to the right of [ 182.376181] allocated 24-byte region [ffff0000c5f6eb80, ffff0000c5f6eb98) [ 182.378975] [ 182.379634] The buggy address belongs to the physical page: [ 182.380907] page:00000000e8269612 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f6e [ 182.383197] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 182.384763] page_type: 0xffffffff() [ 182.386204] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000 [ 182.387844] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000 [ 182.389658] page dumped because: kasan: bad access detected [ 182.390971] [ 182.391759] Memory state around the buggy address: [ 182.392833] ffff0000c5f6ea80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 182.395270] ffff0000c5f6eb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 182.397027] >ffff0000c5f6eb80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 182.398548] ^ [ 182.399605] ffff0000c5f6ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 182.401415] ffff0000c5f6ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 182.402877] ==================================================================