Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.757739] ================================================================== [ 30.758822] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.759653] Write of size 1 at addr fff00000c64660eb by task kunit_try_catch/149 [ 30.760383] [ 30.761291] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.762806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.763652] Hardware name: linux,dummy-virt (DT) [ 30.764771] Call trace: [ 30.765411] show_stack+0x20/0x38 (C) [ 30.766486] dump_stack_lvl+0x8c/0xd0 [ 30.767237] print_report+0x118/0x5e0 [ 30.767872] kasan_report+0xc8/0x118 [ 30.768415] __asan_report_store1_noabort+0x20/0x30 [ 30.769452] krealloc_more_oob_helper+0x614/0x680 [ 30.770298] krealloc_large_more_oob+0x20/0x38 [ 30.770977] kunit_try_run_case+0x14c/0x3d0 [ 30.771608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.772635] kthread+0x24c/0x2d0 [ 30.773104] ret_from_fork+0x10/0x20 [ 30.773586] [ 30.774031] The buggy address belongs to the physical page: [ 30.774834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464 [ 30.776013] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.777097] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.777990] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.778886] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.779923] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.780881] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.782597] head: 0bfffe0000000002 ffffc1ffc3191901 ffffffffffffffff 0000000000000000 [ 30.783406] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.784203] page dumped because: kasan: bad access detected [ 30.784920] [ 30.785283] Memory state around the buggy address: [ 30.785804] fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.787123] fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.787930] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.789403] ^ [ 30.790211] fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.791034] fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.791828] ================================================================== [ 30.794851] ================================================================== [ 30.795673] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.797465] Write of size 1 at addr fff00000c64660f0 by task kunit_try_catch/149 [ 30.798236] [ 30.798643] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.799694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.800360] Hardware name: linux,dummy-virt (DT) [ 30.801104] Call trace: [ 30.801803] show_stack+0x20/0x38 (C) [ 30.802529] dump_stack_lvl+0x8c/0xd0 [ 30.803290] print_report+0x118/0x5e0 [ 30.804059] kasan_report+0xc8/0x118 [ 30.804673] __asan_report_store1_noabort+0x20/0x30 [ 30.805310] krealloc_more_oob_helper+0x5c8/0x680 [ 30.806297] krealloc_large_more_oob+0x20/0x38 [ 30.807114] kunit_try_run_case+0x14c/0x3d0 [ 30.807615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.808376] kthread+0x24c/0x2d0 [ 30.809288] ret_from_fork+0x10/0x20 [ 30.809938] [ 30.810337] The buggy address belongs to the physical page: [ 30.811126] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464 [ 30.812024] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.813061] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.813693] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.814355] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.815620] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.817219] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.818188] head: 0bfffe0000000002 ffffc1ffc3191901 ffffffffffffffff 0000000000000000 [ 30.818980] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.819923] page dumped because: kasan: bad access detected [ 30.820515] [ 30.820872] Memory state around the buggy address: [ 30.821477] fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.822715] fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.823341] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.824814] ^ [ 30.825869] fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.826890] fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.827933] ================================================================== [ 30.469505] ================================================================== [ 30.470461] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.471205] Write of size 1 at addr fff00000c4481cf0 by task kunit_try_catch/145 [ 30.472132] [ 30.473323] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.474408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.475111] Hardware name: linux,dummy-virt (DT) [ 30.475759] Call trace: [ 30.476944] show_stack+0x20/0x38 (C) [ 30.477831] dump_stack_lvl+0x8c/0xd0 [ 30.478474] print_report+0x118/0x5e0 [ 30.479471] kasan_report+0xc8/0x118 [ 30.480206] __asan_report_store1_noabort+0x20/0x30 [ 30.481161] krealloc_more_oob_helper+0x5c8/0x680 [ 30.481954] krealloc_more_oob+0x20/0x38 [ 30.482699] kunit_try_run_case+0x14c/0x3d0 [ 30.483263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.484159] kthread+0x24c/0x2d0 [ 30.484802] ret_from_fork+0x10/0x20 [ 30.485426] [ 30.485753] Allocated by task 145: [ 30.486556] kasan_save_stack+0x3c/0x68 [ 30.487616] kasan_save_track+0x20/0x40 [ 30.488186] kasan_save_alloc_info+0x40/0x58 [ 30.488792] __kasan_krealloc+0x118/0x178 [ 30.489877] krealloc_noprof+0x128/0x360 [ 30.490523] krealloc_more_oob_helper+0x168/0x680 [ 30.491210] krealloc_more_oob+0x20/0x38 [ 30.491797] kunit_try_run_case+0x14c/0x3d0 [ 30.493343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.494264] kthread+0x24c/0x2d0 [ 30.494819] ret_from_fork+0x10/0x20 [ 30.495408] [ 30.495738] The buggy address belongs to the object at fff00000c4481c00 [ 30.495738] which belongs to the cache kmalloc-256 of size 256 [ 30.497420] The buggy address is located 5 bytes to the right of [ 30.497420] allocated 235-byte region [fff00000c4481c00, fff00000c4481ceb) [ 30.498726] [ 30.499103] The buggy address belongs to the physical page: [ 30.499701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 30.500521] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.502610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.503339] page_type: f5(slab) [ 30.503881] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.505109] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.505988] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.507090] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.508143] head: 0bfffe0000000001 ffffc1ffc3112001 ffffffffffffffff 0000000000000000 [ 30.509445] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.510109] page dumped because: kasan: bad access detected [ 30.510846] [ 30.511347] Memory state around the buggy address: [ 30.512092] fff00000c4481b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.513098] fff00000c4481c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.514378] >fff00000c4481c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.515140] ^ [ 30.515895] fff00000c4481d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.516921] fff00000c4481d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.517687] ================================================================== [ 30.420851] ================================================================== [ 30.422277] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.423221] Write of size 1 at addr fff00000c4481ceb by task kunit_try_catch/145 [ 30.424135] [ 30.424518] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.425937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.426370] Hardware name: linux,dummy-virt (DT) [ 30.427030] Call trace: [ 30.427415] show_stack+0x20/0x38 (C) [ 30.428117] dump_stack_lvl+0x8c/0xd0 [ 30.428873] print_report+0x118/0x5e0 [ 30.430080] kasan_report+0xc8/0x118 [ 30.430923] __asan_report_store1_noabort+0x20/0x30 [ 30.431629] krealloc_more_oob_helper+0x614/0x680 [ 30.432354] krealloc_more_oob+0x20/0x38 [ 30.433267] kunit_try_run_case+0x14c/0x3d0 [ 30.433968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.434722] kthread+0x24c/0x2d0 [ 30.435376] ret_from_fork+0x10/0x20 [ 30.435935] [ 30.436297] Allocated by task 145: [ 30.436839] kasan_save_stack+0x3c/0x68 [ 30.437484] kasan_save_track+0x20/0x40 [ 30.438114] kasan_save_alloc_info+0x40/0x58 [ 30.438660] __kasan_krealloc+0x118/0x178 [ 30.439132] krealloc_noprof+0x128/0x360 [ 30.439780] krealloc_more_oob_helper+0x168/0x680 [ 30.440502] krealloc_more_oob+0x20/0x38 [ 30.441745] kunit_try_run_case+0x14c/0x3d0 [ 30.442356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.443208] kthread+0x24c/0x2d0 [ 30.443766] ret_from_fork+0x10/0x20 [ 30.444745] [ 30.445073] The buggy address belongs to the object at fff00000c4481c00 [ 30.445073] which belongs to the cache kmalloc-256 of size 256 [ 30.445991] The buggy address is located 0 bytes to the right of [ 30.445991] allocated 235-byte region [fff00000c4481c00, fff00000c4481ceb) [ 30.447560] [ 30.447993] The buggy address belongs to the physical page: [ 30.448823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 30.450034] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.451104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.452109] page_type: f5(slab) [ 30.453030] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.453994] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.454837] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.455988] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.457455] head: 0bfffe0000000001 ffffc1ffc3112001 ffffffffffffffff 0000000000000000 [ 30.458526] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.459555] page dumped because: kasan: bad access detected [ 30.460508] [ 30.460788] Memory state around the buggy address: [ 30.461272] fff00000c4481b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.462681] fff00000c4481c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.463657] >fff00000c4481c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.464819] ^ [ 30.465700] fff00000c4481d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.466499] fff00000c4481d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.467220] ==================================================================
[ 30.732905] ================================================================== [ 30.734511] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.735362] Write of size 1 at addr fff00000c65720eb by task kunit_try_catch/149 [ 30.736199] [ 30.736673] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.738140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.739000] Hardware name: linux,dummy-virt (DT) [ 30.739636] Call trace: [ 30.740137] show_stack+0x20/0x38 (C) [ 30.740776] dump_stack_lvl+0x8c/0xd0 [ 30.741452] print_report+0x118/0x5e0 [ 30.742467] kasan_report+0xc8/0x118 [ 30.743145] __asan_report_store1_noabort+0x20/0x30 [ 30.743912] krealloc_more_oob_helper+0x614/0x680 [ 30.744606] krealloc_large_more_oob+0x20/0x38 [ 30.745296] kunit_try_run_case+0x14c/0x3d0 [ 30.746319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.747117] kthread+0x24c/0x2d0 [ 30.747664] ret_from_fork+0x10/0x20 [ 30.748229] [ 30.749216] The buggy address belongs to the physical page: [ 30.749970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570 [ 30.751157] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.752135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.753143] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.753565] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.754411] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.756012] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.757075] head: 0bfffe0000000002 ffffc1ffc3195c01 ffffffffffffffff 0000000000000000 [ 30.758054] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.759040] page dumped because: kasan: bad access detected [ 30.759843] [ 30.760185] Memory state around the buggy address: [ 30.760862] fff00000c6571f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.761801] fff00000c6572000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.762630] >fff00000c6572080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.763363] ^ [ 30.764130] fff00000c6572100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.765077] fff00000c6572180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.765792] ================================================================== [ 30.767693] ================================================================== [ 30.769369] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.771140] Write of size 1 at addr fff00000c65720f0 by task kunit_try_catch/149 [ 30.772493] [ 30.772864] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.773918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.774542] Hardware name: linux,dummy-virt (DT) [ 30.775151] Call trace: [ 30.775515] show_stack+0x20/0x38 (C) [ 30.776162] dump_stack_lvl+0x8c/0xd0 [ 30.776763] print_report+0x118/0x5e0 [ 30.777400] kasan_report+0xc8/0x118 [ 30.778036] __asan_report_store1_noabort+0x20/0x30 [ 30.778779] krealloc_more_oob_helper+0x5c8/0x680 [ 30.779334] krealloc_large_more_oob+0x20/0x38 [ 30.780047] kunit_try_run_case+0x14c/0x3d0 [ 30.780722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.781546] kthread+0x24c/0x2d0 [ 30.782129] ret_from_fork+0x10/0x20 [ 30.782695] [ 30.783065] The buggy address belongs to the physical page: [ 30.783731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570 [ 30.784719] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.785552] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.786424] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.787172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.788201] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.789015] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.789956] head: 0bfffe0000000002 ffffc1ffc3195c01 ffffffffffffffff 0000000000000000 [ 30.790873] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.791729] page dumped because: kasan: bad access detected [ 30.792471] [ 30.792982] Memory state around the buggy address: [ 30.793668] fff00000c6571f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.794669] fff00000c6572000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.795459] >fff00000c6572080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.796300] ^ [ 30.797093] fff00000c6572100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.797993] fff00000c6572180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.798849] ================================================================== [ 30.368770] ================================================================== [ 30.370156] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.372059] Write of size 1 at addr fff00000c47dfaeb by task kunit_try_catch/145 [ 30.372773] [ 30.373218] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.375129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.375702] Hardware name: linux,dummy-virt (DT) [ 30.376283] Call trace: [ 30.376795] show_stack+0x20/0x38 (C) [ 30.377434] dump_stack_lvl+0x8c/0xd0 [ 30.378353] print_report+0x118/0x5e0 [ 30.378955] kasan_report+0xc8/0x118 [ 30.379460] __asan_report_store1_noabort+0x20/0x30 [ 30.380101] krealloc_more_oob_helper+0x614/0x680 [ 30.380880] krealloc_more_oob+0x20/0x38 [ 30.381588] kunit_try_run_case+0x14c/0x3d0 [ 30.382541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.383240] kthread+0x24c/0x2d0 [ 30.383900] ret_from_fork+0x10/0x20 [ 30.384599] [ 30.384909] Allocated by task 145: [ 30.385511] kasan_save_stack+0x3c/0x68 [ 30.386800] kasan_save_track+0x20/0x40 [ 30.387453] kasan_save_alloc_info+0x40/0x58 [ 30.388550] __kasan_krealloc+0x118/0x178 [ 30.389178] krealloc_noprof+0x128/0x360 [ 30.389861] krealloc_more_oob_helper+0x168/0x680 [ 30.390778] krealloc_more_oob+0x20/0x38 [ 30.391393] kunit_try_run_case+0x14c/0x3d0 [ 30.392011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.392714] kthread+0x24c/0x2d0 [ 30.393323] ret_from_fork+0x10/0x20 [ 30.394101] [ 30.394558] The buggy address belongs to the object at fff00000c47dfa00 [ 30.394558] which belongs to the cache kmalloc-256 of size 256 [ 30.395761] The buggy address is located 0 bytes to the right of [ 30.395761] allocated 235-byte region [fff00000c47dfa00, fff00000c47dfaeb) [ 30.398221] [ 30.398698] The buggy address belongs to the physical page: [ 30.399408] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.400462] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.401748] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.402856] page_type: f5(slab) [ 30.403558] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.404581] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.405463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.406600] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.407492] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.408407] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.409330] page dumped because: kasan: bad access detected [ 30.410264] [ 30.410638] Memory state around the buggy address: [ 30.411120] fff00000c47df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.411941] fff00000c47dfa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.412708] >fff00000c47dfa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.413493] ^ [ 30.414275] fff00000c47dfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.415595] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.416664] ================================================================== [ 30.419087] ================================================================== [ 30.419996] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.420843] Write of size 1 at addr fff00000c47dfaf0 by task kunit_try_catch/145 [ 30.422818] [ 30.423213] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.424387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.424948] Hardware name: linux,dummy-virt (DT) [ 30.425553] Call trace: [ 30.426076] show_stack+0x20/0x38 (C) [ 30.427055] dump_stack_lvl+0x8c/0xd0 [ 30.427963] print_report+0x118/0x5e0 [ 30.428671] kasan_report+0xc8/0x118 [ 30.429361] __asan_report_store1_noabort+0x20/0x30 [ 30.430165] krealloc_more_oob_helper+0x5c8/0x680 [ 30.431302] krealloc_more_oob+0x20/0x38 [ 30.431945] kunit_try_run_case+0x14c/0x3d0 [ 30.432460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.433274] kthread+0x24c/0x2d0 [ 30.433973] ret_from_fork+0x10/0x20 [ 30.434633] [ 30.435006] Allocated by task 145: [ 30.436449] kasan_save_stack+0x3c/0x68 [ 30.437148] kasan_save_track+0x20/0x40 [ 30.437922] kasan_save_alloc_info+0x40/0x58 [ 30.438738] __kasan_krealloc+0x118/0x178 [ 30.439361] krealloc_noprof+0x128/0x360 [ 30.439865] krealloc_more_oob_helper+0x168/0x680 [ 30.440596] krealloc_more_oob+0x20/0x38 [ 30.441199] kunit_try_run_case+0x14c/0x3d0 [ 30.442468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.443468] kthread+0x24c/0x2d0 [ 30.444097] ret_from_fork+0x10/0x20 [ 30.444655] [ 30.444982] The buggy address belongs to the object at fff00000c47dfa00 [ 30.444982] which belongs to the cache kmalloc-256 of size 256 [ 30.446799] The buggy address is located 5 bytes to the right of [ 30.446799] allocated 235-byte region [fff00000c47dfa00, fff00000c47dfaeb) [ 30.448084] [ 30.448461] The buggy address belongs to the physical page: [ 30.449578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.451176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.452275] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.453149] page_type: f5(slab) [ 30.454083] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.455159] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.456072] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.456940] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.457976] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.458930] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.459778] page dumped because: kasan: bad access detected [ 30.460491] [ 30.461657] Memory state around the buggy address: [ 30.462155] fff00000c47df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.463286] fff00000c47dfa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.464144] >fff00000c47dfa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.465298] ^ [ 30.466513] fff00000c47dfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.467363] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.468139] ==================================================================
[ 24.827215] ================================================================== [ 24.827215] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 24.827856] clocksource: Checking clocksource tsc synchronization from CPU 0 to CPUs 1. [ 24.827215] Write of size 1 at addr ffff888102b120eb by task kunit_try_catch/169 [ 24.827215] [ 24.827215] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.827215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.827215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.827215] Call Trace: [ 24.827215] <TASK> [ 24.827215] dump_stack_lvl+0x73/0xb0 [ 24.827215] print_report+0xd1/0x640 [ 24.827215] ? __virt_addr_valid+0x1db/0x2d0 [ 24.827215] ? kasan_addr_to_slab+0x11/0xa0 [ 24.827215] kasan_report+0x102/0x140 [ 24.827215] ? krealloc_more_oob_helper+0x823/0x930 [ 24.827215] ? krealloc_more_oob_helper+0x823/0x930 [ 24.827215] __asan_report_store1_noabort+0x1b/0x30 [ 24.827215] krealloc_more_oob_helper+0x823/0x930 [ 24.827215] ? __schedule+0xc3e/0x2790 [ 24.827215] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.827215] ? finish_task_switch.isra.0+0x153/0x700 [ 24.827215] ? __switch_to+0x5d9/0xf60 [ 24.827215] ? __schedule+0xc3e/0x2790 [ 24.827215] ? __pfx_read_tsc+0x10/0x10 [ 24.827215] krealloc_large_more_oob+0x1c/0x30 [ 24.827215] kunit_try_run_case+0x1b3/0x490 [ 24.827215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.827215] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.827215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.827215] ? __kthread_parkme+0x82/0x160 [ 24.827215] ? preempt_count_sub+0x50/0x80 [ 24.827215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.827215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.827215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.827215] kthread+0x257/0x310 [ 24.827215] ? __pfx_kthread+0x10/0x10 [ 24.827215] ret_from_fork+0x41/0x80 [ 24.827215] ? __pfx_kthread+0x10/0x10 [ 24.827215] ret_from_fork_asm+0x1a/0x30 [ 24.827215] </TASK> [ 24.827215] [ 24.827215] The buggy address belongs to the physical page: [ 24.827215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b10 [ 24.827215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.827215] flags: 0x200000000000040(head|node=0|zone=2) [ 24.827215] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.827215] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.827215] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.827215] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.827215] head: 0200000000000002 ffffea00040ac401 ffffffffffffffff 0000000000000000 [ 24.827215] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 24.827215] page dumped because: kasan: bad access detected [ 24.827215] [ 24.827215] Memory state around the buggy address: [ 24.827215] ffff888102b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.827215] ffff888102b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.827215] >ffff888102b12080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.827215] ^ [ 24.827215] ffff888102b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.827215] ffff888102b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.827215] ================================================================== [ 24.451305] ================================================================== [ 24.451869] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 24.452777] Write of size 1 at addr ffff88810038e6f0 by task kunit_try_catch/163 [ 24.454463] [ 24.454646] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.455405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.456480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.457141] Call Trace: [ 24.458050] <TASK> [ 24.458298] dump_stack_lvl+0x73/0xb0 [ 24.459206] print_report+0xd1/0x640 [ 24.459574] ? __virt_addr_valid+0x1db/0x2d0 [ 24.460594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.461395] kasan_report+0x102/0x140 [ 24.461794] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.462823] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.463627] __asan_report_store1_noabort+0x1b/0x30 [ 24.464762] krealloc_more_oob_helper+0x7ed/0x930 [ 24.465171] ? __schedule+0xc3e/0x2790 [ 24.465722] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.466086] ? finish_task_switch.isra.0+0x153/0x700 [ 24.466739] ? __switch_to+0x5d9/0xf60 [ 24.467170] ? __schedule+0xc3e/0x2790 [ 24.467478] ? __pfx_read_tsc+0x10/0x10 [ 24.467951] krealloc_more_oob+0x1c/0x30 [ 24.468328] kunit_try_run_case+0x1b3/0x490 [ 24.468634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.469933] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.470418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.471240] ? __kthread_parkme+0x82/0x160 [ 24.471593] ? preempt_count_sub+0x50/0x80 [ 24.471981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.472539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.473175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.473624] kthread+0x257/0x310 [ 24.473916] ? __pfx_kthread+0x10/0x10 [ 24.474328] ret_from_fork+0x41/0x80 [ 24.474642] ? __pfx_kthread+0x10/0x10 [ 24.475763] ret_from_fork_asm+0x1a/0x30 [ 24.476144] </TASK> [ 24.476388] [ 24.476636] Allocated by task 163: [ 24.477277] kasan_save_stack+0x3d/0x60 [ 24.477614] kasan_save_track+0x18/0x40 [ 24.478070] kasan_save_alloc_info+0x3b/0x50 [ 24.478538] __kasan_krealloc+0x190/0x1f0 [ 24.479514] krealloc_noprof+0xf3/0x340 [ 24.479943] krealloc_more_oob_helper+0x1aa/0x930 [ 24.480628] krealloc_more_oob+0x1c/0x30 [ 24.481143] kunit_try_run_case+0x1b3/0x490 [ 24.481656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.482149] kthread+0x257/0x310 [ 24.482404] ret_from_fork+0x41/0x80 [ 24.482664] ret_from_fork_asm+0x1a/0x30 [ 24.482956] [ 24.483807] The buggy address belongs to the object at ffff88810038e600 [ 24.483807] which belongs to the cache kmalloc-256 of size 256 [ 24.485724] The buggy address is located 5 bytes to the right of [ 24.485724] allocated 235-byte region [ffff88810038e600, ffff88810038e6eb) [ 24.487408] [ 24.487642] The buggy address belongs to the physical page: [ 24.488056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10038e [ 24.489162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.489545] flags: 0x200000000000040(head|node=0|zone=2) [ 24.490789] page_type: f5(slab) [ 24.491189] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.492418] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.493488] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.494407] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.495480] head: 0200000000000001 ffffea000400e381 ffffffffffffffff 0000000000000000 [ 24.497006] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 24.498024] page dumped because: kasan: bad access detected [ 24.498978] [ 24.499221] Memory state around the buggy address: [ 24.499527] ffff88810038e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.500162] ffff88810038e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.500572] >ffff88810038e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.502454] ^ [ 24.503114] ffff88810038e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.504009] ffff88810038e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.505073] ================================================================== [ 24.394034] ================================================================== [ 24.394803] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 24.395464] Write of size 1 at addr ffff88810038e6eb by task kunit_try_catch/163 [ 24.395994] [ 24.396163] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.397098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.397725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.398845] Call Trace: [ 24.399379] <TASK> [ 24.399713] dump_stack_lvl+0x73/0xb0 [ 24.400487] print_report+0xd1/0x640 [ 24.401450] ? __virt_addr_valid+0x1db/0x2d0 [ 24.402123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.402835] kasan_report+0x102/0x140 [ 24.403649] ? krealloc_more_oob_helper+0x823/0x930 [ 24.404551] ? krealloc_more_oob_helper+0x823/0x930 [ 24.405297] __asan_report_store1_noabort+0x1b/0x30 [ 24.405871] krealloc_more_oob_helper+0x823/0x930 [ 24.406367] ? __schedule+0xc3e/0x2790 [ 24.406970] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.407517] ? finish_task_switch.isra.0+0x153/0x700 [ 24.408613] ? __switch_to+0x5d9/0xf60 [ 24.409368] ? __schedule+0xc3e/0x2790 [ 24.409791] ? __pfx_read_tsc+0x10/0x10 [ 24.410240] krealloc_more_oob+0x1c/0x30 [ 24.410598] kunit_try_run_case+0x1b3/0x490 [ 24.411641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.411975] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.412997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.413478] ? __kthread_parkme+0x82/0x160 [ 24.414437] ? preempt_count_sub+0x50/0x80 [ 24.414824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.415317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.416642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.417042] kthread+0x257/0x310 [ 24.418142] ? __pfx_kthread+0x10/0x10 [ 24.418470] ret_from_fork+0x41/0x80 [ 24.418757] ? __pfx_kthread+0x10/0x10 [ 24.419017] ret_from_fork_asm+0x1a/0x30 [ 24.419487] </TASK> [ 24.420302] [ 24.420571] Allocated by task 163: [ 24.421198] kasan_save_stack+0x3d/0x60 [ 24.421492] kasan_save_track+0x18/0x40 [ 24.421775] kasan_save_alloc_info+0x3b/0x50 [ 24.422920] __kasan_krealloc+0x190/0x1f0 [ 24.423474] krealloc_noprof+0xf3/0x340 [ 24.424367] krealloc_more_oob_helper+0x1aa/0x930 [ 24.424602] krealloc_more_oob+0x1c/0x30 [ 24.424855] kunit_try_run_case+0x1b3/0x490 [ 24.426162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.427076] kthread+0x257/0x310 [ 24.427324] ret_from_fork+0x41/0x80 [ 24.428310] ret_from_fork_asm+0x1a/0x30 [ 24.428714] [ 24.428871] The buggy address belongs to the object at ffff88810038e600 [ 24.428871] which belongs to the cache kmalloc-256 of size 256 [ 24.430459] The buggy address is located 0 bytes to the right of [ 24.430459] allocated 235-byte region [ffff88810038e600, ffff88810038e6eb) [ 24.431238] [ 24.431462] The buggy address belongs to the physical page: [ 24.432852] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10038e [ 24.433534] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.434396] flags: 0x200000000000040(head|node=0|zone=2) [ 24.434857] page_type: f5(slab) [ 24.435506] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.436688] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.437280] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.438407] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.438770] head: 0200000000000001 ffffea000400e381 ffffffffffffffff 0000000000000000 [ 24.439383] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 24.440981] page dumped because: kasan: bad access detected [ 24.441575] [ 24.442001] Memory state around the buggy address: [ 24.442985] ffff88810038e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.443498] ffff88810038e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.444479] >ffff88810038e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.446200] ^ [ 24.446667] ffff88810038e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.447325] ffff88810038e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.448580] ================================================================== [ 24.877040] ================================================================== [ 24.877282] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 24.877282] Write of size 1 at addr ffff888102b120f0 by task kunit_try_catch/169 [ 24.877282] [ 24.877282] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.880279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.880279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.880279] Call Trace: [ 24.880279] <TASK> [ 24.880279] dump_stack_lvl+0x73/0xb0 [ 24.880279] print_report+0xd1/0x640 [ 24.880279] ? __virt_addr_valid+0x1db/0x2d0 [ 24.880279] ? kasan_addr_to_slab+0x11/0xa0 [ 24.880279] kasan_report+0x102/0x140 [ 24.880279] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.880279] ? krealloc_more_oob_helper+0x7ed/0x930 [ 24.880279] __asan_report_store1_noabort+0x1b/0x30 [ 24.880279] krealloc_more_oob_helper+0x7ed/0x930 [ 24.880279] ? __schedule+0xc3e/0x2790 [ 24.880279] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.880279] ? finish_task_switch.isra.0+0x153/0x700 [ 24.880279] ? __switch_to+0x5d9/0xf60 [ 24.880279] ? __schedule+0xc3e/0x2790 [ 24.880279] ? __pfx_read_tsc+0x10/0x10 [ 24.880279] krealloc_large_more_oob+0x1c/0x30 [ 24.880279] kunit_try_run_case+0x1b3/0x490 [ 24.880279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.880279] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.880279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.880279] ? __kthread_parkme+0x82/0x160 [ 24.880279] ? preempt_count_sub+0x50/0x80 [ 24.880279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.880279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.880279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.880279] kthread+0x257/0x310 [ 24.880279] ? __pfx_kthread+0x10/0x10 [ 24.880279] ret_from_fork+0x41/0x80 [ 24.880279] ? __pfx_kthread+0x10/0x10 [ 24.880279] ret_from_fork_asm+0x1a/0x30 [ 24.880279] </TASK> [ 24.880279] [ 24.880279] The buggy address belongs to the physical page: [ 24.880279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b10 [ 24.880279] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.880279] flags: 0x200000000000040(head|node=0|zone=2) [ 24.880279] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.880279] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.880279] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.880279] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.880279] head: 0200000000000002 ffffea00040ac401 ffffffffffffffff 0000000000000000 [ 24.880279] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 24.880279] page dumped because: kasan: bad access detected [ 24.880279] [ 24.880279] Memory state around the buggy address: [ 24.880279] ffff888102b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.880279] ffff888102b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.880279] >ffff888102b12080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.880279] ^ [ 24.880279] ffff888102b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.880279] ffff888102b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.880279] ==================================================================
[ 19.633342] ================================================================== [ 19.634085] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 19.634717] Write of size 1 at addr ffff888100a22ef0 by task kunit_try_catch/163 [ 19.635450] [ 19.635777] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.636354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.636855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.637553] Call Trace: [ 19.637912] <TASK> [ 19.638251] dump_stack_lvl+0x73/0xb0 [ 19.639744] print_report+0xd1/0x640 [ 19.640031] ? __virt_addr_valid+0x1db/0x2d0 [ 19.640433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.641080] kasan_report+0x102/0x140 [ 19.641522] ? krealloc_more_oob_helper+0x7ed/0x930 [ 19.642120] ? krealloc_more_oob_helper+0x7ed/0x930 [ 19.642671] __asan_report_store1_noabort+0x1b/0x30 [ 19.643189] krealloc_more_oob_helper+0x7ed/0x930 [ 19.643697] ? __schedule+0xc3e/0x2790 [ 19.644169] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 19.644653] ? finish_task_switch.isra.0+0x153/0x700 [ 19.645097] ? __switch_to+0x5d9/0xf60 [ 19.645548] ? __schedule+0xc3e/0x2790 [ 19.646064] ? __pfx_read_tsc+0x10/0x10 [ 19.646477] krealloc_more_oob+0x1c/0x30 [ 19.646981] kunit_try_run_case+0x1b3/0x490 [ 19.647408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.647799] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.648112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.648690] ? __kthread_parkme+0x82/0x160 [ 19.649170] ? preempt_count_sub+0x50/0x80 [ 19.649679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.650178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.650822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.651409] kthread+0x257/0x310 [ 19.651887] ? __pfx_kthread+0x10/0x10 [ 19.652350] ret_from_fork+0x41/0x80 [ 19.653066] ? __pfx_kthread+0x10/0x10 [ 19.654271] ret_from_fork_asm+0x1a/0x30 [ 19.654998] </TASK> [ 19.655334] [ 19.656081] Allocated by task 163: [ 19.656780] kasan_save_stack+0x3d/0x60 [ 19.657123] kasan_save_track+0x18/0x40 [ 19.657516] kasan_save_alloc_info+0x3b/0x50 [ 19.657846] __kasan_krealloc+0x190/0x1f0 [ 19.658136] krealloc_noprof+0xf3/0x340 [ 19.658445] krealloc_more_oob_helper+0x1aa/0x930 [ 19.659007] krealloc_more_oob+0x1c/0x30 [ 19.659432] kunit_try_run_case+0x1b3/0x490 [ 19.659935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.660313] kthread+0x257/0x310 [ 19.660621] ret_from_fork+0x41/0x80 [ 19.661027] ret_from_fork_asm+0x1a/0x30 [ 19.661432] [ 19.661713] The buggy address belongs to the object at ffff888100a22e00 [ 19.661713] which belongs to the cache kmalloc-256 of size 256 [ 19.662739] The buggy address is located 5 bytes to the right of [ 19.662739] allocated 235-byte region [ffff888100a22e00, ffff888100a22eeb) [ 19.663545] [ 19.663817] The buggy address belongs to the physical page: [ 19.664280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22 [ 19.664940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.665564] flags: 0x200000000000040(head|node=0|zone=2) [ 19.666140] page_type: f5(slab) [ 19.666432] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 19.667078] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.667742] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 19.668201] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.668715] head: 0200000000000001 ffffea0004028881 ffffffffffffffff 0000000000000000 [ 19.669386] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.670089] page dumped because: kasan: bad access detected [ 19.670450] [ 19.670673] Memory state around the buggy address: [ 19.671121] ffff888100a22d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671812] ffff888100a22e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.672280] >ffff888100a22e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.672975] ^ [ 19.673344] ffff888100a22f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.673986] ffff888100a22f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.674546] ================================================================== [ 19.590635] ================================================================== [ 19.591541] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 19.592184] Write of size 1 at addr ffff888100a22eeb by task kunit_try_catch/163 [ 19.592728] [ 19.592924] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.593956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.594413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.595120] Call Trace: [ 19.595609] <TASK> [ 19.595944] dump_stack_lvl+0x73/0xb0 [ 19.596470] print_report+0xd1/0x640 [ 19.596987] ? __virt_addr_valid+0x1db/0x2d0 [ 19.597181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.597370] kasan_report+0x102/0x140 [ 19.597571] ? krealloc_more_oob_helper+0x823/0x930 [ 19.598173] ? krealloc_more_oob_helper+0x823/0x930 [ 19.598634] __asan_report_store1_noabort+0x1b/0x30 [ 19.599202] krealloc_more_oob_helper+0x823/0x930 [ 19.599648] ? __schedule+0xc3e/0x2790 [ 19.600118] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 19.600754] ? finish_task_switch.isra.0+0x153/0x700 [ 19.601088] ? __switch_to+0x5d9/0xf60 [ 19.601383] ? __schedule+0xc3e/0x2790 [ 19.601909] ? __pfx_read_tsc+0x10/0x10 [ 19.602365] krealloc_more_oob+0x1c/0x30 [ 19.602877] kunit_try_run_case+0x1b3/0x490 [ 19.603391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.603934] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.604370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.604947] ? __kthread_parkme+0x82/0x160 [ 19.605481] ? preempt_count_sub+0x50/0x80 [ 19.605835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.606168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.606765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.607302] kthread+0x257/0x310 [ 19.607802] ? __pfx_kthread+0x10/0x10 [ 19.608230] ret_from_fork+0x41/0x80 [ 19.608685] ? __pfx_kthread+0x10/0x10 [ 19.608967] ret_from_fork_asm+0x1a/0x30 [ 19.609317] </TASK> [ 19.609656] [ 19.609893] Allocated by task 163: [ 19.610300] kasan_save_stack+0x3d/0x60 [ 19.610791] kasan_save_track+0x18/0x40 [ 19.611249] kasan_save_alloc_info+0x3b/0x50 [ 19.611804] __kasan_krealloc+0x190/0x1f0 [ 19.612187] krealloc_noprof+0xf3/0x340 [ 19.612455] krealloc_more_oob_helper+0x1aa/0x930 [ 19.612823] krealloc_more_oob+0x1c/0x30 [ 19.613325] kunit_try_run_case+0x1b3/0x490 [ 19.613857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.614399] kthread+0x257/0x310 [ 19.614858] ret_from_fork+0x41/0x80 [ 19.615260] ret_from_fork_asm+0x1a/0x30 [ 19.615758] [ 19.615922] The buggy address belongs to the object at ffff888100a22e00 [ 19.615922] which belongs to the cache kmalloc-256 of size 256 [ 19.616812] The buggy address is located 0 bytes to the right of [ 19.616812] allocated 235-byte region [ffff888100a22e00, ffff888100a22eeb) [ 19.617925] [ 19.618134] The buggy address belongs to the physical page: [ 19.618432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22 [ 19.618918] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.619300] flags: 0x200000000000040(head|node=0|zone=2) [ 19.619909] page_type: f5(slab) [ 19.620280] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 19.621005] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.621760] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 19.622452] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.624367] head: 0200000000000001 ffffea0004028881 ffffffffffffffff 0000000000000000 [ 19.625087] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.625889] page dumped because: kasan: bad access detected [ 19.626968] [ 19.627191] Memory state around the buggy address: [ 19.627716] ffff888100a22d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.628296] ffff888100a22e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.628913] >ffff888100a22e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.629518] ^ [ 19.629960] ffff888100a22f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630686] ffff888100a22f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.631145] ================================================================== [ 19.920320] ================================================================== [ 19.921128] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 19.922063] Write of size 1 at addr ffff888102a1e0eb by task kunit_try_catch/167 [ 19.922586] [ 19.922907] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.923922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.924336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.925386] Call Trace: [ 19.925747] <TASK> [ 19.926154] dump_stack_lvl+0x73/0xb0 [ 19.926663] print_report+0xd1/0x640 [ 19.927197] ? __virt_addr_valid+0x1db/0x2d0 [ 19.927782] ? kasan_addr_to_slab+0x11/0xa0 [ 19.928453] kasan_report+0x102/0x140 [ 19.928973] ? krealloc_more_oob_helper+0x823/0x930 [ 19.929612] ? krealloc_more_oob_helper+0x823/0x930 [ 19.930232] __asan_report_store1_noabort+0x1b/0x30 [ 19.930962] krealloc_more_oob_helper+0x823/0x930 [ 19.931587] ? __schedule+0xc3e/0x2790 [ 19.932092] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 19.933041] ? finish_task_switch.isra.0+0x153/0x700 [ 19.933859] ? __switch_to+0x5d9/0xf60 [ 19.934295] ? __schedule+0xc3e/0x2790 [ 19.934672] ? __pfx_read_tsc+0x10/0x10 [ 19.935394] krealloc_large_more_oob+0x1c/0x30 [ 19.935857] kunit_try_run_case+0x1b3/0x490 [ 19.936412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.936849] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.937537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.938144] ? __kthread_parkme+0x82/0x160 [ 19.938570] ? preempt_count_sub+0x50/0x80 [ 19.939117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.939703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.940330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.940982] kthread+0x257/0x310 [ 19.941321] ? __pfx_kthread+0x10/0x10 [ 19.941670] ret_from_fork+0x41/0x80 [ 19.942099] ? __pfx_kthread+0x10/0x10 [ 19.942404] ret_from_fork_asm+0x1a/0x30 [ 19.942945] </TASK> [ 19.943154] [ 19.943315] The buggy address belongs to the physical page: [ 19.943819] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c [ 19.944594] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.945343] flags: 0x200000000000040(head|node=0|zone=2) [ 19.946005] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.946779] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.947264] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.947835] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.948370] head: 0200000000000002 ffffea00040a8701 ffffffffffffffff 0000000000000000 [ 19.948985] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.949558] page dumped because: kasan: bad access detected [ 19.950052] [ 19.950266] Memory state around the buggy address: [ 19.950612] ffff888102a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.951058] ffff888102a1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.951736] >ffff888102a1e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.952135] ^ [ 19.952762] ffff888102a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.953379] ffff888102a1e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.953932] ================================================================== [ 19.955328] ================================================================== [ 19.955897] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 19.957215] Write of size 1 at addr ffff888102a1e0f0 by task kunit_try_catch/167 [ 19.958152] [ 19.958363] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.958949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.959347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.960158] Call Trace: [ 19.960370] <TASK> [ 19.960645] dump_stack_lvl+0x73/0xb0 [ 19.961080] print_report+0xd1/0x640 [ 19.961512] ? __virt_addr_valid+0x1db/0x2d0 [ 19.962025] ? kasan_addr_to_slab+0x11/0xa0 [ 19.962420] kasan_report+0x102/0x140 [ 19.962776] ? krealloc_more_oob_helper+0x7ed/0x930 [ 19.963294] ? krealloc_more_oob_helper+0x7ed/0x930 [ 19.963805] __asan_report_store1_noabort+0x1b/0x30 [ 19.964310] krealloc_more_oob_helper+0x7ed/0x930 [ 19.964753] ? __schedule+0xc3e/0x2790 [ 19.965041] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 19.965382] ? finish_task_switch.isra.0+0x153/0x700 [ 19.966787] ? __switch_to+0x5d9/0xf60 [ 19.967217] ? __schedule+0xc3e/0x2790 [ 19.967649] ? __pfx_read_tsc+0x10/0x10 [ 19.968072] krealloc_large_more_oob+0x1c/0x30 [ 19.968644] kunit_try_run_case+0x1b3/0x490 [ 19.969117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.969644] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.970147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.970645] ? __kthread_parkme+0x82/0x160 [ 19.970987] ? preempt_count_sub+0x50/0x80 [ 19.971282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.971719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.972296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.972890] kthread+0x257/0x310 [ 19.973287] ? __pfx_kthread+0x10/0x10 [ 19.973729] ret_from_fork+0x41/0x80 [ 19.974073] ? __pfx_kthread+0x10/0x10 [ 19.974352] ret_from_fork_asm+0x1a/0x30 [ 19.974822] </TASK> [ 19.975109] [ 19.975328] The buggy address belongs to the physical page: [ 19.975889] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c [ 19.976537] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.976962] flags: 0x200000000000040(head|node=0|zone=2) [ 19.977304] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.977970] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.978713] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.979387] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.980105] head: 0200000000000002 ffffea00040a8701 ffffffffffffffff 0000000000000000 [ 19.980752] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.981134] page dumped because: kasan: bad access detected [ 19.981431] [ 19.981643] Memory state around the buggy address: [ 19.982054] ffff888102a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.982727] ffff888102a1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.983352] >ffff888102a1e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.984039] ^ [ 19.984702] ffff888102a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.985311] ffff888102a1e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.985973] ==================================================================