Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.057851] ================================================================== [ 33.058892] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 33.059602] Write of size 1 at addr fff00000c69f60f0 by task kunit_try_catch/149 [ 33.060029] [ 33.060211] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 33.062551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.063476] Hardware name: linux,dummy-virt (DT) [ 33.064770] Call trace: [ 33.065366] show_stack+0x20/0x38 (C) [ 33.066521] dump_stack_lvl+0x8c/0xd0 [ 33.067209] print_report+0x118/0x5e0 [ 33.067772] kasan_report+0xc8/0x118 [ 33.068289] __asan_report_store1_noabort+0x20/0x30 [ 33.069277] krealloc_more_oob_helper+0x5c8/0x680 [ 33.070280] krealloc_large_more_oob+0x20/0x38 [ 33.071548] kunit_try_run_case+0x14c/0x3d0 [ 33.072040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.073005] kthread+0x24c/0x2d0 [ 33.073940] ret_from_fork+0x10/0x20 [ 33.074367] [ 33.074864] The buggy address belongs to the physical page: [ 33.075887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069f4 [ 33.077362] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.078835] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.080831] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.081528] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.082158] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.082860] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.086176] head: 0bfffe0000000002 ffffc1ffc31a7d01 ffffffffffffffff 0000000000000000 [ 33.089301] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.091163] page dumped because: kasan: bad access detected [ 33.091693] [ 33.091940] Memory state around the buggy address: [ 33.092375] fff00000c69f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.096598] fff00000c69f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.098782] >fff00000c69f6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 33.099891] ^ [ 33.100855] fff00000c69f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.101600] fff00000c69f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.102273] ================================================================== [ 32.626724] ================================================================== [ 32.627720] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 32.629025] Write of size 1 at addr fff00000c5c6f2f0 by task kunit_try_catch/145 [ 32.631927] [ 32.632335] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 32.635340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.635843] Hardware name: linux,dummy-virt (DT) [ 32.636937] Call trace: [ 32.637925] show_stack+0x20/0x38 (C) [ 32.639146] dump_stack_lvl+0x8c/0xd0 [ 32.639705] print_report+0x118/0x5e0 [ 32.640320] kasan_report+0xc8/0x118 [ 32.640877] __asan_report_store1_noabort+0x20/0x30 [ 32.641847] krealloc_more_oob_helper+0x5c8/0x680 [ 32.642840] krealloc_more_oob+0x20/0x38 [ 32.644020] kunit_try_run_case+0x14c/0x3d0 [ 32.644794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.646079] kthread+0x24c/0x2d0 [ 32.646920] ret_from_fork+0x10/0x20 [ 32.647567] [ 32.647894] Allocated by task 145: [ 32.648420] kasan_save_stack+0x3c/0x68 [ 32.649636] kasan_save_track+0x20/0x40 [ 32.650109] kasan_save_alloc_info+0x40/0x58 [ 32.651932] __kasan_krealloc+0x118/0x178 [ 32.653181] krealloc_noprof+0x128/0x360 [ 32.653997] krealloc_more_oob_helper+0x168/0x680 [ 32.654869] krealloc_more_oob+0x20/0x38 [ 32.655427] kunit_try_run_case+0x14c/0x3d0 [ 32.656119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.657348] kthread+0x24c/0x2d0 [ 32.658398] ret_from_fork+0x10/0x20 [ 32.659468] [ 32.659770] The buggy address belongs to the object at fff00000c5c6f200 [ 32.659770] which belongs to the cache kmalloc-256 of size 256 [ 32.662320] The buggy address is located 5 bytes to the right of [ 32.662320] allocated 235-byte region [fff00000c5c6f200, fff00000c5c6f2eb) [ 32.664039] [ 32.664409] The buggy address belongs to the physical page: [ 32.665803] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c6e [ 32.666485] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.667465] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.668343] page_type: f5(slab) [ 32.669076] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.670171] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.671264] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.672142] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.673281] head: 0bfffe0000000001 ffffc1ffc3171b81 ffffffffffffffff 0000000000000000 [ 32.674501] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 32.675690] page dumped because: kasan: bad access detected [ 32.676232] [ 32.676537] Memory state around the buggy address: [ 32.677555] fff00000c5c6f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.678392] fff00000c5c6f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.679678] >fff00000c5c6f280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.680784] ^ [ 32.681570] fff00000c5c6f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.682901] fff00000c5c6f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.683799] ================================================================== [ 33.017103] ================================================================== [ 33.018499] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 33.019401] Write of size 1 at addr fff00000c69f60eb by task kunit_try_catch/149 [ 33.020466] [ 33.021233] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 33.022835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.023339] Hardware name: linux,dummy-virt (DT) [ 33.023890] Call trace: [ 33.024350] show_stack+0x20/0x38 (C) [ 33.025102] dump_stack_lvl+0x8c/0xd0 [ 33.026545] print_report+0x118/0x5e0 [ 33.027248] kasan_report+0xc8/0x118 [ 33.028014] __asan_report_store1_noabort+0x20/0x30 [ 33.028757] krealloc_more_oob_helper+0x614/0x680 [ 33.029361] krealloc_large_more_oob+0x20/0x38 [ 33.030603] kunit_try_run_case+0x14c/0x3d0 [ 33.031234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.032055] kthread+0x24c/0x2d0 [ 33.033148] ret_from_fork+0x10/0x20 [ 33.033693] [ 33.034028] The buggy address belongs to the physical page: [ 33.034589] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069f4 [ 33.035702] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.036761] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.037799] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.038781] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.039791] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.040621] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.041677] head: 0bfffe0000000002 ffffc1ffc31a7d01 ffffffffffffffff 0000000000000000 [ 33.042635] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.044018] page dumped because: kasan: bad access detected [ 33.044951] [ 33.045243] Memory state around the buggy address: [ 33.045981] fff00000c69f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.046796] fff00000c69f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.048341] >fff00000c69f6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 33.049729] ^ [ 33.050700] fff00000c69f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.051728] fff00000c69f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.053098] ================================================================== [ 32.569385] ================================================================== [ 32.570844] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 32.572127] Write of size 1 at addr fff00000c5c6f2eb by task kunit_try_catch/145 [ 32.573050] [ 32.574087] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 32.576472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.577088] Hardware name: linux,dummy-virt (DT) [ 32.577749] Call trace: [ 32.578132] show_stack+0x20/0x38 (C) [ 32.579316] dump_stack_lvl+0x8c/0xd0 [ 32.580188] print_report+0x118/0x5e0 [ 32.582295] kasan_report+0xc8/0x118 [ 32.582761] __asan_report_store1_noabort+0x20/0x30 [ 32.583805] krealloc_more_oob_helper+0x614/0x680 [ 32.584731] krealloc_more_oob+0x20/0x38 [ 32.585271] kunit_try_run_case+0x14c/0x3d0 [ 32.586020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.587281] kthread+0x24c/0x2d0 [ 32.588131] ret_from_fork+0x10/0x20 [ 32.588976] [ 32.589286] Allocated by task 145: [ 32.589964] kasan_save_stack+0x3c/0x68 [ 32.590542] kasan_save_track+0x20/0x40 [ 32.591096] kasan_save_alloc_info+0x40/0x58 [ 32.591812] __kasan_krealloc+0x118/0x178 [ 32.592421] krealloc_noprof+0x128/0x360 [ 32.593313] krealloc_more_oob_helper+0x168/0x680 [ 32.594227] krealloc_more_oob+0x20/0x38 [ 32.595390] kunit_try_run_case+0x14c/0x3d0 [ 32.596052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.597405] kthread+0x24c/0x2d0 [ 32.598457] ret_from_fork+0x10/0x20 [ 32.599351] [ 32.599801] The buggy address belongs to the object at fff00000c5c6f200 [ 32.599801] which belongs to the cache kmalloc-256 of size 256 [ 32.601087] The buggy address is located 0 bytes to the right of [ 32.601087] allocated 235-byte region [fff00000c5c6f200, fff00000c5c6f2eb) [ 32.602547] [ 32.603023] The buggy address belongs to the physical page: [ 32.603814] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c6e [ 32.604805] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.605524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.606815] page_type: f5(slab) [ 32.607316] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.609024] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.610666] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.611648] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.613298] head: 0bfffe0000000001 ffffc1ffc3171b81 ffffffffffffffff 0000000000000000 [ 32.614950] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 32.615831] page dumped because: kasan: bad access detected [ 32.616175] [ 32.616337] Memory state around the buggy address: [ 32.617560] fff00000c5c6f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.618293] fff00000c5c6f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.619850] >fff00000c5c6f280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.621415] ^ [ 32.622419] fff00000c5c6f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.623305] fff00000c5c6f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.624246] ==================================================================
[ 24.604553] ================================================================== [ 24.605032] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 24.605687] Write of size 1 at addr ffff88810232a0f0 by task kunit_try_catch/168 [ 24.606427] [ 24.606610] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 24.607282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.607889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.608650] Call Trace: [ 24.609102] <TASK> [ 24.609517] dump_stack_lvl+0x73/0xb0 [ 24.610033] print_report+0xd1/0x640 [ 24.610530] ? __virt_addr_valid+0x1db/0x2d0 [ 24.611290] ? kasan_addr_to_slab+0x11/0xa0 [ 24.612002] kasan_report+0x102/0x140 [ 24.612562] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.613478] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.614057] __asan_report_store1_noabort+0x1b/0x30 [ 24.614639] krealloc_more_oob_helper+0x7ed/0x930 [ 24.615387] ? __schedule+0xc3e/0x2790 [ 24.616106] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.616729] ? finish_task_switch.isra.0+0x153/0x700 [ 24.617476] ? __switch_to+0x5d9/0xf60 [ 24.618201] ? __schedule+0xc3e/0x2790 [ 24.618768] ? __pfx_read_tsc+0x10/0x10 [ 24.619497] krealloc_large_more_oob+0x1c/0x30 [ 24.620028] kunit_try_run_case+0x1b3/0x490 [ 24.620900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.621199] ? irqentry_exit+0x2a/0x60 [ 24.622138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.623127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.623552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.624509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.624982] kthread+0x257/0x310 [ 24.626266] ? __pfx_kthread+0x10/0x10 [ 24.626621] ret_from_fork+0x41/0x80 [ 24.627480] ? __pfx_kthread+0x10/0x10 [ 24.627808] ret_from_fork_asm+0x1a/0x30 [ 24.628332] </TASK> [ 24.628641] [ 24.628934] The buggy address belongs to the physical page: [ 24.630026] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102328 [ 24.630552] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.631660] flags: 0x200000000000040(head|node=0|zone=2) [ 24.632530] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.633265] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.633921] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.634481] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.635104] head: 0200000000000002 ffffea000408ca01 ffffffffffffffff 0000000000000000 [ 24.635951] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 24.636478] page dumped because: kasan: bad access detected [ 24.637562] [ 24.637783] Memory state around the buggy address: [ 24.638437] ffff888102329f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.639644] ffff88810232a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.640181] >ffff88810232a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.641065] ^ [ 24.641687] ffff88810232a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.642458] ffff88810232a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.643294] ================================================================== [ 24.562363] ================================================================== [ 24.563347] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 24.564556] Write of size 1 at addr ffff88810232a0eb by task kunit_try_catch/168 [ 24.565456] [ 24.565711] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 24.566776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.568107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.568990] Call Trace: [ 24.569426] <TASK> [ 24.569666] dump_stack_lvl+0x73/0xb0 [ 24.570396] print_report+0xd1/0x640 [ 24.570839] ? __virt_addr_valid+0x1db/0x2d0 [ 24.571464] ? kasan_addr_to_slab+0x11/0xa0 [ 24.571679] kasan_report+0x102/0x140 [ 24.572050] ? krealloc_more_oob_helper+0x823/0x930 [ 24.572947] ? krealloc_more_oob_helper+0x823/0x930 [ 24.573683] __asan_report_store1_noabort+0x1b/0x30 [ 24.574444] krealloc_more_oob_helper+0x823/0x930 [ 24.574962] ? __schedule+0xc3e/0x2790 [ 24.575588] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.576284] ? finish_task_switch.isra.0+0x153/0x700 [ 24.576789] ? __switch_to+0x5d9/0xf60 [ 24.577620] ? __schedule+0xc3e/0x2790 [ 24.578242] ? __pfx_read_tsc+0x10/0x10 [ 24.578723] krealloc_large_more_oob+0x1c/0x30 [ 24.579495] kunit_try_run_case+0x1b3/0x490 [ 24.580030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.580653] ? irqentry_exit+0x2a/0x60 [ 24.581210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.582334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.582789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.583538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.584318] kthread+0x257/0x310 [ 24.584745] ? __pfx_kthread+0x10/0x10 [ 24.585308] ret_from_fork+0x41/0x80 [ 24.585722] ? __pfx_kthread+0x10/0x10 [ 24.586401] ret_from_fork_asm+0x1a/0x30 [ 24.587407] </TASK> [ 24.587601] [ 24.587849] The buggy address belongs to the physical page: [ 24.588622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102328 [ 24.589446] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.590227] flags: 0x200000000000040(head|node=0|zone=2) [ 24.590798] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.591891] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.592878] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.594200] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.595071] head: 0200000000000002 ffffea000408ca01 ffffffffffffffff 0000000000000000 [ 24.595927] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 24.596527] page dumped because: kasan: bad access detected [ 24.597616] [ 24.598096] Memory state around the buggy address: [ 24.598813] ffff888102329f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.600150] ffff88810232a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.600784] >ffff88810232a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.601514] ^ [ 24.602142] ffff88810232a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.602719] ffff88810232a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.603497] ================================================================== [ 24.251199] ================================================================== [ 24.251925] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 24.252545] Write of size 1 at addr ffff888100394cf0 by task kunit_try_catch/164 [ 24.253105] [ 24.253381] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 24.253998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.254398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.255090] Call Trace: [ 24.255416] <TASK> [ 24.255675] dump_stack_lvl+0x73/0xb0 [ 24.256057] print_report+0xd1/0x640 [ 24.256579] ? __virt_addr_valid+0x1db/0x2d0 [ 24.257226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.257588] kasan_report+0x102/0x140 [ 24.257973] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.259482] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.259948] __asan_report_store1_noabort+0x1b/0x30 [ 24.260424] krealloc_more_oob_helper+0x7ed/0x930 [ 24.260729] ? trace_hardirqs_on+0x37/0xe0 [ 24.261030] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.261341] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.262500] ? __pfx_krealloc_more_oob+0x10/0x10 [ 24.263272] krealloc_more_oob+0x1c/0x30 [ 24.263710] kunit_try_run_case+0x1b3/0x490 [ 24.264466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.265150] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.265865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.266409] ? __kthread_parkme+0x82/0x160 [ 24.266901] ? preempt_count_sub+0x50/0x80 [ 24.267210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.268091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.268733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.270396] kthread+0x257/0x310 [ 24.270861] ? __pfx_kthread+0x10/0x10 [ 24.271197] ret_from_fork+0x41/0x80 [ 24.271784] ? __pfx_kthread+0x10/0x10 [ 24.272388] ret_from_fork_asm+0x1a/0x30 [ 24.272692] </TASK> [ 24.273031] [ 24.273743] Allocated by task 164: [ 24.274210] kasan_save_stack+0x3d/0x60 [ 24.274749] kasan_save_track+0x18/0x40 [ 24.275040] kasan_save_alloc_info+0x3b/0x50 [ 24.275438] __kasan_krealloc+0x190/0x1f0 [ 24.275931] krealloc_noprof+0xf3/0x340 [ 24.276366] krealloc_more_oob_helper+0x1aa/0x930 [ 24.277179] krealloc_more_oob+0x1c/0x30 [ 24.278026] kunit_try_run_case+0x1b3/0x490 [ 24.278601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.279039] kthread+0x257/0x310 [ 24.279443] ret_from_fork+0x41/0x80 [ 24.280182] ret_from_fork_asm+0x1a/0x30 [ 24.280584] [ 24.280737] The buggy address belongs to the object at ffff888100394c00 [ 24.280737] which belongs to the cache kmalloc-256 of size 256 [ 24.281409] The buggy address is located 5 bytes to the right of [ 24.281409] allocated 235-byte region [ffff888100394c00, ffff888100394ceb) [ 24.282969] [ 24.283226] The buggy address belongs to the physical page: [ 24.283697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394 [ 24.284209] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.285344] flags: 0x200000000000040(head|node=0|zone=2) [ 24.286604] page_type: f5(slab) [ 24.286870] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.287532] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.288429] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.289343] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.290666] head: 0200000000000001 ffffea000400e501 ffffffffffffffff 0000000000000000 [ 24.292148] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 24.292951] page dumped because: kasan: bad access detected [ 24.293501] [ 24.293651] Memory state around the buggy address: [ 24.294109] ffff888100394b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.295011] ffff888100394c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.295442] >ffff888100394c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.296215] ^ [ 24.296744] ffff888100394d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.297634] ffff888100394d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.298167] ================================================================== [ 24.195661] ================================================================== [ 24.196728] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 24.197183] Write of size 1 at addr ffff888100394ceb by task kunit_try_catch/164 [ 24.197997] [ 24.198235] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 24.199931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.200352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.201040] Call Trace: [ 24.201243] <TASK> [ 24.201741] dump_stack_lvl+0x73/0xb0 [ 24.203129] print_report+0xd1/0x640 [ 24.203634] ? __virt_addr_valid+0x1db/0x2d0 [ 24.204406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.204761] kasan_report+0x102/0x140 [ 24.205405] ? krealloc_more_oob_helper+0x823/0x930 [ 24.206572] ? krealloc_more_oob_helper+0x823/0x930 [ 24.207346] __asan_report_store1_noabort+0x1b/0x30 [ 24.207720] krealloc_more_oob_helper+0x823/0x930 [ 24.208847] ? trace_hardirqs_on+0x37/0xe0 [ 24.209642] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.210076] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.210465] ? __pfx_krealloc_more_oob+0x10/0x10 [ 24.211252] krealloc_more_oob+0x1c/0x30 [ 24.211848] kunit_try_run_case+0x1b3/0x490 [ 24.212773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.213374] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.213817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.215046] ? __kthread_parkme+0x82/0x160 [ 24.215421] ? preempt_count_sub+0x50/0x80 [ 24.216149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.216799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.217249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.217922] kthread+0x257/0x310 [ 24.219366] ? __pfx_kthread+0x10/0x10 [ 24.220052] ret_from_fork+0x41/0x80 [ 24.220411] ? __pfx_kthread+0x10/0x10 [ 24.220933] ret_from_fork_asm+0x1a/0x30 [ 24.221498] </TASK> [ 24.221795] [ 24.222304] Allocated by task 164: [ 24.222727] kasan_save_stack+0x3d/0x60 [ 24.223786] kasan_save_track+0x18/0x40 [ 24.224268] kasan_save_alloc_info+0x3b/0x50 [ 24.224481] __kasan_krealloc+0x190/0x1f0 [ 24.224629] krealloc_noprof+0xf3/0x340 [ 24.224765] krealloc_more_oob_helper+0x1aa/0x930 [ 24.225168] krealloc_more_oob+0x1c/0x30 [ 24.225625] kunit_try_run_case+0x1b3/0x490 [ 24.226344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.227495] kthread+0x257/0x310 [ 24.227950] ret_from_fork+0x41/0x80 [ 24.228553] ret_from_fork_asm+0x1a/0x30 [ 24.229285] [ 24.229523] The buggy address belongs to the object at ffff888100394c00 [ 24.229523] which belongs to the cache kmalloc-256 of size 256 [ 24.230770] The buggy address is located 0 bytes to the right of [ 24.230770] allocated 235-byte region [ffff888100394c00, ffff888100394ceb) [ 24.233061] [ 24.233227] The buggy address belongs to the physical page: [ 24.234063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394 [ 24.234777] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.235785] flags: 0x200000000000040(head|node=0|zone=2) [ 24.236478] page_type: f5(slab) [ 24.236866] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.237409] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.238213] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.238850] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.240110] head: 0200000000000001 ffffea000400e501 ffffffffffffffff 0000000000000000 [ 24.240770] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 24.241540] page dumped because: kasan: bad access detected [ 24.242279] [ 24.242504] Memory state around the buggy address: [ 24.243456] ffff888100394b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.243982] ffff888100394c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.244519] >ffff888100394c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.245142] ^ [ 24.246085] ffff888100394d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.246759] ffff888100394d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.247786] ==================================================================