Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.267985] ================================================================== [ 30.268828] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.269652] Write of size 1 at addr fff00000c64e60ea by task kunit_try_catch/150 [ 30.270398] [ 30.270751] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.272266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.272817] Hardware name: linux,dummy-virt (DT) [ 30.273409] Call trace: [ 30.273818] show_stack+0x20/0x38 (C) [ 30.274646] dump_stack_lvl+0x8c/0xd0 [ 30.275262] print_report+0x118/0x5e0 [ 30.275792] kasan_report+0xc8/0x118 [ 30.276390] __asan_report_store1_noabort+0x20/0x30 [ 30.277335] krealloc_less_oob_helper+0xae4/0xc50 [ 30.278033] krealloc_large_less_oob+0x20/0x38 [ 30.278616] kunit_try_run_case+0x14c/0x3d0 [ 30.279259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.279948] kthread+0x24c/0x2d0 [ 30.280522] ret_from_fork+0x10/0x20 [ 30.281294] [ 30.281533] The buggy address belongs to the physical page: [ 30.282217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.282938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.283825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.284586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.285706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.286519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.287340] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.288194] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.289819] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.290550] page dumped because: kasan: bad access detected [ 30.291130] [ 30.291464] Memory state around the buggy address: [ 30.292032] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.292817] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.293856] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.294589] ^ [ 30.295279] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.296068] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.296872] ================================================================== [ 30.238560] ================================================================== [ 30.239209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.240024] Write of size 1 at addr fff00000c64e60da by task kunit_try_catch/150 [ 30.240880] [ 30.241522] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.242786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.243406] Hardware name: linux,dummy-virt (DT) [ 30.243941] Call trace: [ 30.244383] show_stack+0x20/0x38 (C) [ 30.244977] dump_stack_lvl+0x8c/0xd0 [ 30.245835] print_report+0x118/0x5e0 [ 30.246431] kasan_report+0xc8/0x118 [ 30.246927] __asan_report_store1_noabort+0x20/0x30 [ 30.247661] krealloc_less_oob_helper+0xa80/0xc50 [ 30.248238] krealloc_large_less_oob+0x20/0x38 [ 30.248886] kunit_try_run_case+0x14c/0x3d0 [ 30.249792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.250492] kthread+0x24c/0x2d0 [ 30.251027] ret_from_fork+0x10/0x20 [ 30.251567] [ 30.251878] The buggy address belongs to the physical page: [ 30.252445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.253631] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.254381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.255241] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.256047] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.256895] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.258544] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.258931] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.259314] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.259663] page dumped because: kasan: bad access detected [ 30.259937] [ 30.260081] Memory state around the buggy address: [ 30.261226] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.262267] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.263005] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.263834] ^ [ 30.264515] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.265615] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.266376] ================================================================== [ 29.915466] ================================================================== [ 29.916089] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.918603] Write of size 1 at addr fff00000c1de7ed0 by task kunit_try_catch/146 [ 29.919324] [ 29.919651] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.920680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.922418] Hardware name: linux,dummy-virt (DT) [ 29.923029] Call trace: [ 29.923381] show_stack+0x20/0x38 (C) [ 29.923956] dump_stack_lvl+0x8c/0xd0 [ 29.924502] print_report+0x118/0x5e0 [ 29.925272] kasan_report+0xc8/0x118 [ 29.925761] __asan_report_store1_noabort+0x20/0x30 [ 29.926460] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.927068] krealloc_less_oob+0x20/0x38 [ 29.927744] kunit_try_run_case+0x14c/0x3d0 [ 29.928257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.929280] kthread+0x24c/0x2d0 [ 29.929837] ret_from_fork+0x10/0x20 [ 29.930390] [ 29.930714] Allocated by task 146: [ 29.931237] kasan_save_stack+0x3c/0x68 [ 29.931729] kasan_save_track+0x20/0x40 [ 29.932337] kasan_save_alloc_info+0x40/0x58 [ 29.932874] __kasan_krealloc+0x118/0x178 [ 29.934374] krealloc_noprof+0x128/0x360 [ 29.934903] krealloc_less_oob_helper+0x168/0xc50 [ 29.935521] krealloc_less_oob+0x20/0x38 [ 29.936034] kunit_try_run_case+0x14c/0x3d0 [ 29.937206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.937869] kthread+0x24c/0x2d0 [ 29.938340] ret_from_fork+0x10/0x20 [ 29.938882] [ 29.939243] The buggy address belongs to the object at fff00000c1de7e00 [ 29.939243] which belongs to the cache kmalloc-256 of size 256 [ 29.940375] The buggy address is located 7 bytes to the right of [ 29.940375] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 29.941819] [ 29.942171] The buggy address belongs to the physical page: [ 29.942801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 29.943646] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.944463] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.945558] page_type: f5(slab) [ 29.946002] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.946799] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.947587] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.948431] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.949472] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 29.950277] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.951068] page dumped because: kasan: bad access detected [ 29.951763] [ 29.952096] Memory state around the buggy address: [ 29.952683] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.953867] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.954834] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.955567] ^ [ 29.956188] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.956797] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.957965] ================================================================== [ 30.002764] ================================================================== [ 30.003546] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.004138] Write of size 1 at addr fff00000c1de7eea by task kunit_try_catch/146 [ 30.004848] [ 30.005513] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.006576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.007170] Hardware name: linux,dummy-virt (DT) [ 30.007768] Call trace: [ 30.008196] show_stack+0x20/0x38 (C) [ 30.008785] dump_stack_lvl+0x8c/0xd0 [ 30.009549] print_report+0x118/0x5e0 [ 30.010148] kasan_report+0xc8/0x118 [ 30.010714] __asan_report_store1_noabort+0x20/0x30 [ 30.011384] krealloc_less_oob_helper+0xae4/0xc50 [ 30.012031] krealloc_less_oob+0x20/0x38 [ 30.012636] kunit_try_run_case+0x14c/0x3d0 [ 30.013544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.014273] kthread+0x24c/0x2d0 [ 30.014723] ret_from_fork+0x10/0x20 [ 30.015312] [ 30.015657] Allocated by task 146: [ 30.016152] kasan_save_stack+0x3c/0x68 [ 30.016739] kasan_save_track+0x20/0x40 [ 30.017525] kasan_save_alloc_info+0x40/0x58 [ 30.018139] __kasan_krealloc+0x118/0x178 [ 30.018626] krealloc_noprof+0x128/0x360 [ 30.019214] krealloc_less_oob_helper+0x168/0xc50 [ 30.019759] krealloc_less_oob+0x20/0x38 [ 30.020358] kunit_try_run_case+0x14c/0x3d0 [ 30.021587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.022234] kthread+0x24c/0x2d0 [ 30.022759] ret_from_fork+0x10/0x20 [ 30.023281] [ 30.023629] The buggy address belongs to the object at fff00000c1de7e00 [ 30.023629] which belongs to the cache kmalloc-256 of size 256 [ 30.024730] The buggy address is located 33 bytes to the right of [ 30.024730] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 30.026183] [ 30.026523] The buggy address belongs to the physical page: [ 30.027209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 30.028025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.028847] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.029890] page_type: f5(slab) [ 30.030401] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.031130] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.032012] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.032791] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.033979] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 30.034803] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.035579] page dumped because: kasan: bad access detected [ 30.036200] [ 30.036547] Memory state around the buggy address: [ 30.037342] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.038147] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.038920] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.039687] ^ [ 30.040370] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.042057] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.042710] ================================================================== [ 30.044310] ================================================================== [ 30.045048] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.045938] Write of size 1 at addr fff00000c1de7eeb by task kunit_try_catch/146 [ 30.046792] [ 30.047474] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.048606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.049343] Hardware name: linux,dummy-virt (DT) [ 30.049946] Call trace: [ 30.050346] show_stack+0x20/0x38 (C) [ 30.050866] dump_stack_lvl+0x8c/0xd0 [ 30.051416] print_report+0x118/0x5e0 [ 30.052006] kasan_report+0xc8/0x118 [ 30.052562] __asan_report_store1_noabort+0x20/0x30 [ 30.053546] krealloc_less_oob_helper+0xa58/0xc50 [ 30.054218] krealloc_less_oob+0x20/0x38 [ 30.054821] kunit_try_run_case+0x14c/0x3d0 [ 30.055391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.056069] kthread+0x24c/0x2d0 [ 30.056641] ret_from_fork+0x10/0x20 [ 30.057531] [ 30.057869] Allocated by task 146: [ 30.058286] kasan_save_stack+0x3c/0x68 [ 30.058869] kasan_save_track+0x20/0x40 [ 30.059419] kasan_save_alloc_info+0x40/0x58 [ 30.060049] __kasan_krealloc+0x118/0x178 [ 30.060661] krealloc_noprof+0x128/0x360 [ 30.061881] krealloc_less_oob_helper+0x168/0xc50 [ 30.062965] krealloc_less_oob+0x20/0x38 [ 30.063429] kunit_try_run_case+0x14c/0x3d0 [ 30.064036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.064758] kthread+0x24c/0x2d0 [ 30.065545] ret_from_fork+0x10/0x20 [ 30.066082] [ 30.066488] The buggy address belongs to the object at fff00000c1de7e00 [ 30.066488] which belongs to the cache kmalloc-256 of size 256 [ 30.068054] The buggy address is located 34 bytes to the right of [ 30.068054] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 30.069991] [ 30.070485] The buggy address belongs to the physical page: [ 30.070997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 30.071766] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.072545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.073606] page_type: f5(slab) [ 30.074363] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.074742] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.075103] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.075931] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.076706] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 30.077904] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.078744] page dumped because: kasan: bad access detected [ 30.079381] [ 30.079754] Memory state around the buggy address: [ 30.080335] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.081970] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.082730] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.083572] ^ [ 30.084331] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.085295] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.086190] ================================================================== [ 30.298289] ================================================================== [ 30.298805] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.299643] Write of size 1 at addr fff00000c64e60eb by task kunit_try_catch/150 [ 30.300337] [ 30.300655] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.303198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.303838] Hardware name: linux,dummy-virt (DT) [ 30.304391] Call trace: [ 30.304740] show_stack+0x20/0x38 (C) [ 30.305448] dump_stack_lvl+0x8c/0xd0 [ 30.306076] print_report+0x118/0x5e0 [ 30.306715] kasan_report+0xc8/0x118 [ 30.307274] __asan_report_store1_noabort+0x20/0x30 [ 30.307913] krealloc_less_oob_helper+0xa58/0xc50 [ 30.308635] krealloc_large_less_oob+0x20/0x38 [ 30.309729] kunit_try_run_case+0x14c/0x3d0 [ 30.310296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.310943] kthread+0x24c/0x2d0 [ 30.311487] ret_from_fork+0x10/0x20 [ 30.312103] [ 30.312497] The buggy address belongs to the physical page: [ 30.313040] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.314211] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.314954] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.315890] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.316761] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.317868] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.318778] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.319553] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.320391] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.321263] page dumped because: kasan: bad access detected [ 30.322397] [ 30.322877] Memory state around the buggy address: [ 30.323584] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.324405] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.325378] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.326170] ^ [ 30.326808] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.328091] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.328960] ================================================================== [ 30.173671] ================================================================== [ 30.174719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.175762] Write of size 1 at addr fff00000c64e60c9 by task kunit_try_catch/150 [ 30.176851] [ 30.177641] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.178833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.179321] Hardware name: linux,dummy-virt (DT) [ 30.179975] Call trace: [ 30.180416] show_stack+0x20/0x38 (C) [ 30.181010] dump_stack_lvl+0x8c/0xd0 [ 30.181651] print_report+0x118/0x5e0 [ 30.182240] kasan_report+0xc8/0x118 [ 30.182748] __asan_report_store1_noabort+0x20/0x30 [ 30.183628] krealloc_less_oob_helper+0xa48/0xc50 [ 30.184273] krealloc_large_less_oob+0x20/0x38 [ 30.185161] kunit_try_run_case+0x14c/0x3d0 [ 30.185797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.186555] kthread+0x24c/0x2d0 [ 30.187169] ret_from_fork+0x10/0x20 [ 30.187743] [ 30.187912] The buggy address belongs to the physical page: [ 30.188308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.189726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.190456] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.191211] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.192075] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.192899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.193763] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.194660] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.195453] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.196291] page dumped because: kasan: bad access detected [ 30.196893] [ 30.197252] Memory state around the buggy address: [ 30.197874] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.198517] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.199369] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.200050] ^ [ 30.200781] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.201516] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.202859] ================================================================== [ 29.959568] ================================================================== [ 29.960249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.960847] Write of size 1 at addr fff00000c1de7eda by task kunit_try_catch/146 [ 29.961863] [ 29.962247] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.963432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.964510] Hardware name: linux,dummy-virt (DT) [ 29.965328] Call trace: [ 29.965692] show_stack+0x20/0x38 (C) [ 29.966177] dump_stack_lvl+0x8c/0xd0 [ 29.966778] print_report+0x118/0x5e0 [ 29.967489] kasan_report+0xc8/0x118 [ 29.968042] __asan_report_store1_noabort+0x20/0x30 [ 29.968681] krealloc_less_oob_helper+0xa80/0xc50 [ 29.969300] krealloc_less_oob+0x20/0x38 [ 29.969896] kunit_try_run_case+0x14c/0x3d0 [ 29.970479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.971456] kthread+0x24c/0x2d0 [ 29.971960] ret_from_fork+0x10/0x20 [ 29.972567] [ 29.972862] Allocated by task 146: [ 29.973621] kasan_save_stack+0x3c/0x68 [ 29.974169] kasan_save_track+0x20/0x40 [ 29.974695] kasan_save_alloc_info+0x40/0x58 [ 29.975344] __kasan_krealloc+0x118/0x178 [ 29.975924] krealloc_noprof+0x128/0x360 [ 29.976455] krealloc_less_oob_helper+0x168/0xc50 [ 29.977372] krealloc_less_oob+0x20/0x38 [ 29.977931] kunit_try_run_case+0x14c/0x3d0 [ 29.978504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.979079] kthread+0x24c/0x2d0 [ 29.979631] ret_from_fork+0x10/0x20 [ 29.980180] [ 29.980488] The buggy address belongs to the object at fff00000c1de7e00 [ 29.980488] which belongs to the cache kmalloc-256 of size 256 [ 29.982752] The buggy address is located 17 bytes to the right of [ 29.982752] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 29.983986] [ 29.984345] The buggy address belongs to the physical page: [ 29.984874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 29.985860] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.986942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.987702] page_type: f5(slab) [ 29.988226] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.989265] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.990171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.990989] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.991809] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 29.992632] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.993636] page dumped because: kasan: bad access detected [ 29.994238] [ 29.994565] Memory state around the buggy address: [ 29.995056] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995914] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.996636] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.997796] ^ [ 29.998504] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.999255] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.000061] ================================================================== [ 30.204946] ================================================================== [ 30.206349] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.207309] Write of size 1 at addr fff00000c64e60d0 by task kunit_try_catch/150 [ 30.208082] [ 30.208443] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.209878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.210730] Hardware name: linux,dummy-virt (DT) [ 30.211383] Call trace: [ 30.211697] show_stack+0x20/0x38 (C) [ 30.212171] dump_stack_lvl+0x8c/0xd0 [ 30.212710] print_report+0x118/0x5e0 [ 30.213856] kasan_report+0xc8/0x118 [ 30.214476] __asan_report_store1_noabort+0x20/0x30 [ 30.215195] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.215758] krealloc_large_less_oob+0x20/0x38 [ 30.216373] kunit_try_run_case+0x14c/0x3d0 [ 30.217015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.217689] kthread+0x24c/0x2d0 [ 30.218515] ret_from_fork+0x10/0x20 [ 30.219072] [ 30.219383] The buggy address belongs to the physical page: [ 30.219989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.220855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.222303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.223052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.223864] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.225007] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.225876] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.226981] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.227846] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.228591] page dumped because: kasan: bad access detected [ 30.229545] [ 30.229854] Memory state around the buggy address: [ 30.230412] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231109] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231959] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.232677] ^ [ 30.233685] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.234374] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.235134] ================================================================== [ 29.871834] ================================================================== [ 29.872911] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.874089] Write of size 1 at addr fff00000c1de7ec9 by task kunit_try_catch/146 [ 29.874902] [ 29.875329] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.876380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.876950] Hardware name: linux,dummy-virt (DT) [ 29.877643] Call trace: [ 29.878058] show_stack+0x20/0x38 (C) [ 29.878633] dump_stack_lvl+0x8c/0xd0 [ 29.879277] print_report+0x118/0x5e0 [ 29.879883] kasan_report+0xc8/0x118 [ 29.880403] __asan_report_store1_noabort+0x20/0x30 [ 29.881451] krealloc_less_oob_helper+0xa48/0xc50 [ 29.882080] krealloc_less_oob+0x20/0x38 [ 29.882654] kunit_try_run_case+0x14c/0x3d0 [ 29.883285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.883956] kthread+0x24c/0x2d0 [ 29.884543] ret_from_fork+0x10/0x20 [ 29.885304] [ 29.885742] Allocated by task 146: [ 29.886281] kasan_save_stack+0x3c/0x68 [ 29.886827] kasan_save_track+0x20/0x40 [ 29.887325] kasan_save_alloc_info+0x40/0x58 [ 29.887981] __kasan_krealloc+0x118/0x178 [ 29.888489] krealloc_noprof+0x128/0x360 [ 29.889073] krealloc_less_oob_helper+0x168/0xc50 [ 29.889688] krealloc_less_oob+0x20/0x38 [ 29.890463] kunit_try_run_case+0x14c/0x3d0 [ 29.891047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.891670] kthread+0x24c/0x2d0 [ 29.892095] ret_from_fork+0x10/0x20 [ 29.893149] [ 29.893789] The buggy address belongs to the object at fff00000c1de7e00 [ 29.893789] which belongs to the cache kmalloc-256 of size 256 [ 29.895130] The buggy address is located 0 bytes to the right of [ 29.895130] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 29.896656] [ 29.896917] The buggy address belongs to the physical page: [ 29.897906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 29.898697] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.899821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.900767] page_type: f5(slab) [ 29.901191] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.902301] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.903110] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.903891] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.904723] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 29.905935] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.906674] page dumped because: kasan: bad access detected [ 29.907671] [ 29.907949] Memory state around the buggy address: [ 29.908594] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.909293] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.910177] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.911077] ^ [ 29.911688] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.912579] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.913761] ==================================================================
[ 20.836535] ================================================================== [ 20.838323] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 [ 20.839706] Write of size 1 at addr ffff888100a966eb by task kunit_try_catch/166 [ 20.840977] [ 20.841283] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 20.842835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.843109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.844319] Call Trace: [ 20.844553] <TASK> [ 20.844751] dump_stack_lvl+0x73/0xb0 [ 20.845512] print_report+0xd1/0x640 [ 20.845815] ? __virt_addr_valid+0x1db/0x2d0 [ 20.846434] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.847289] kasan_report+0x102/0x140 [ 20.847585] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 20.847905] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 20.848274] __asan_report_store1_noabort+0x1b/0x30 [ 20.848664] krealloc_less_oob_helper+0xd49/0x11d0 [ 20.849115] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.849801] ? finish_task_switch.isra.0+0x153/0x700 [ 20.850727] ? __switch_to+0x5d9/0xf60 [ 20.851384] ? __schedule+0xc3e/0x2790 [ 20.852150] ? __pfx_read_tsc+0x10/0x10 [ 20.853204] krealloc_less_oob+0x1c/0x30 [ 20.854007] kunit_try_run_case+0x1b3/0x490 [ 20.854875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.855808] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.856922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.858443] ? __kthread_parkme+0x82/0x160 [ 20.858963] ? preempt_count_sub+0x50/0x80 [ 20.859866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.860679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.861875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.862759] kthread+0x257/0x310 [ 20.863305] ? __pfx_kthread+0x10/0x10 [ 20.863756] ret_from_fork+0x41/0x80 [ 20.864330] ? __pfx_kthread+0x10/0x10 [ 20.864913] ret_from_fork_asm+0x1a/0x30 [ 20.865284] </TASK> [ 20.865619] [ 20.865805] Allocated by task 166: [ 20.866206] kasan_save_stack+0x3d/0x60 [ 20.866686] kasan_save_track+0x18/0x40 [ 20.867143] kasan_save_alloc_info+0x3b/0x50 [ 20.868434] __kasan_krealloc+0x190/0x1f0 [ 20.868877] krealloc_noprof+0xf3/0x340 [ 20.869398] krealloc_less_oob_helper+0x1ab/0x11d0 [ 20.869895] krealloc_less_oob+0x1c/0x30 [ 20.870466] kunit_try_run_case+0x1b3/0x490 [ 20.870865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.871563] kthread+0x257/0x310 [ 20.871966] ret_from_fork+0x41/0x80 [ 20.872985] ret_from_fork_asm+0x1a/0x30 [ 20.873387] [ 20.873585] The buggy address belongs to the object at ffff888100a96600 [ 20.873585] which belongs to the cache kmalloc-256 of size 256 [ 20.874536] The buggy address is located 34 bytes to the right of [ 20.874536] allocated 201-byte region [ffff888100a96600, ffff888100a966c9) [ 20.875874] [ 20.876140] The buggy address belongs to the physical page: [ 20.876677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96 [ 20.877545] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.878491] flags: 0x200000000000040(head|node=0|zone=2) [ 20.878930] page_type: f5(slab) [ 20.880023] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.880641] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.881550] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.882333] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.883029] head: 0200000000000001 ffffea000402a581 ffffffffffffffff 0000000000000000 [ 20.883787] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.885372] page dumped because: kasan: bad access detected [ 20.885808] [ 20.885979] Memory state around the buggy address: [ 20.886501] ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.886973] ffff888100a96600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.887860] >ffff888100a96680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.888706] ^ [ 20.889522] ffff888100a96700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.890383] ffff888100a96780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.890892] ================================================================== [ 20.723396] ================================================================== [ 20.723901] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 [ 20.725126] Write of size 1 at addr ffff888100a966da by task kunit_try_catch/166 [ 20.725847] [ 20.726127] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 20.726901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.728212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.730136] Call Trace: [ 20.730323] <TASK> [ 20.731166] dump_stack_lvl+0x73/0xb0 [ 20.731902] print_report+0xd1/0x640 [ 20.732718] ? __virt_addr_valid+0x1db/0x2d0 [ 20.733308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.734050] kasan_report+0x102/0x140 [ 20.734666] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 20.735425] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 20.736032] __asan_report_store1_noabort+0x1b/0x30 [ 20.736933] krealloc_less_oob_helper+0xec8/0x11d0 [ 20.737665] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.738446] ? finish_task_switch.isra.0+0x153/0x700 [ 20.738929] ? __switch_to+0x5d9/0xf60 [ 20.740211] ? __schedule+0xc3e/0x2790 [ 20.741021] ? __pfx_read_tsc+0x10/0x10 [ 20.741521] krealloc_less_oob+0x1c/0x30 [ 20.741913] kunit_try_run_case+0x1b3/0x490 [ 20.742607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.742943] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.743564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.744000] ? __kthread_parkme+0x82/0x160 [ 20.744405] ? preempt_count_sub+0x50/0x80 [ 20.745797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.746486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.746903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.748213] kthread+0x257/0x310 [ 20.748508] ? __pfx_kthread+0x10/0x10 [ 20.748874] ret_from_fork+0x41/0x80 [ 20.749202] ? __pfx_kthread+0x10/0x10 [ 20.749804] ret_from_fork_asm+0x1a/0x30 [ 20.750688] </TASK> [ 20.751000] [ 20.751435] Allocated by task 166: [ 20.752434] kasan_save_stack+0x3d/0x60 [ 20.752688] kasan_save_track+0x18/0x40 [ 20.753175] kasan_save_alloc_info+0x3b/0x50 [ 20.753589] __kasan_krealloc+0x190/0x1f0 [ 20.753926] krealloc_noprof+0xf3/0x340 [ 20.754274] krealloc_less_oob_helper+0x1ab/0x11d0 [ 20.755374] krealloc_less_oob+0x1c/0x30 [ 20.755898] kunit_try_run_case+0x1b3/0x490 [ 20.756682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.757100] kthread+0x257/0x310 [ 20.757682] ret_from_fork+0x41/0x80 [ 20.758132] ret_from_fork_asm+0x1a/0x30 [ 20.758876] [ 20.759032] The buggy address belongs to the object at ffff888100a96600 [ 20.759032] which belongs to the cache kmalloc-256 of size 256 [ 20.760635] The buggy address is located 17 bytes to the right of [ 20.760635] allocated 201-byte region [ffff888100a96600, ffff888100a966c9) [ 20.761938] [ 20.762145] The buggy address belongs to the physical page: [ 20.762939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96 [ 20.763578] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.764390] flags: 0x200000000000040(head|node=0|zone=2) [ 20.765493] page_type: f5(slab) [ 20.765775] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.766545] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.767736] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.768314] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.768979] head: 0200000000000001 ffffea000402a581 ffffffffffffffff 0000000000000000 [ 20.769730] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.771153] page dumped because: kasan: bad access detected [ 20.771700] [ 20.771885] Memory state around the buggy address: [ 20.772925] ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.773829] ffff888100a96600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.774740] >ffff888100a96680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.775595] ^ [ 20.775984] ffff888100a96700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.777144] ffff888100a96780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.777886] ================================================================== [ 20.672311] ================================================================== [ 20.672950] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 [ 20.674624] Write of size 1 at addr ffff888100a966d0 by task kunit_try_catch/166 [ 20.675209] [ 20.675534] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 20.676323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.676792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.677794] Call Trace: [ 20.678031] <TASK> [ 20.678410] dump_stack_lvl+0x73/0xb0 [ 20.678705] print_report+0xd1/0x640 [ 20.679043] ? __virt_addr_valid+0x1db/0x2d0 [ 20.679999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.680654] kasan_report+0x102/0x140 [ 20.681027] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 20.681759] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 20.682368] __asan_report_store1_noabort+0x1b/0x30 [ 20.682726] krealloc_less_oob_helper+0xe25/0x11d0 [ 20.683414] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.683804] ? finish_task_switch.isra.0+0x153/0x700 [ 20.684321] ? __switch_to+0x5d9/0xf60 [ 20.684689] ? __schedule+0xc3e/0x2790 [ 20.685094] ? __pfx_read_tsc+0x10/0x10 [ 20.685464] krealloc_less_oob+0x1c/0x30 [ 20.685918] kunit_try_run_case+0x1b3/0x490 [ 20.686929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.687692] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.688111] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.688693] ? __kthread_parkme+0x82/0x160 [ 20.689316] ? preempt_count_sub+0x50/0x80 [ 20.689821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.690419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.691046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.692032] kthread+0x257/0x310 [ 20.692311] ? __pfx_kthread+0x10/0x10 [ 20.692832] ret_from_fork+0x41/0x80 [ 20.693296] ? __pfx_kthread+0x10/0x10 [ 20.693708] ret_from_fork_asm+0x1a/0x30 [ 20.694050] </TASK> [ 20.694462] [ 20.694693] Allocated by task 166: [ 20.694923] kasan_save_stack+0x3d/0x60 [ 20.695573] kasan_save_track+0x18/0x40 [ 20.696026] kasan_save_alloc_info+0x3b/0x50 [ 20.696514] __kasan_krealloc+0x190/0x1f0 [ 20.697004] krealloc_noprof+0xf3/0x340 [ 20.697582] krealloc_less_oob_helper+0x1ab/0x11d0 [ 20.698031] krealloc_less_oob+0x1c/0x30 [ 20.698917] kunit_try_run_case+0x1b3/0x490 [ 20.699615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.700039] kthread+0x257/0x310 [ 20.700595] ret_from_fork+0x41/0x80 [ 20.701024] ret_from_fork_asm+0x1a/0x30 [ 20.701416] [ 20.701677] The buggy address belongs to the object at ffff888100a96600 [ 20.701677] which belongs to the cache kmalloc-256 of size 256 [ 20.702661] The buggy address is located 7 bytes to the right of [ 20.702661] allocated 201-byte region [ffff888100a96600, ffff888100a966c9) [ 20.703929] [ 20.704797] The buggy address belongs to the physical page: [ 20.705812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96 [ 20.706780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.707386] flags: 0x200000000000040(head|node=0|zone=2) [ 20.707959] page_type: f5(slab) [ 20.708783] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.709564] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.710322] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.711496] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.712141] head: 0200000000000001 ffffea000402a581 ffffffffffffffff 0000000000000000 [ 20.712759] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.713628] page dumped because: kasan: bad access detected [ 20.714410] [ 20.714663] Memory state around the buggy address: [ 20.715635] ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.716414] ffff888100a96600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.716975] >ffff888100a96680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.718496] ^ [ 20.719000] ffff888100a96700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.719958] ffff888100a96780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.721000] ================================================================== [ 20.625922] ================================================================== [ 20.626840] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 [ 20.627363] Write of size 1 at addr ffff888100a966c9 by task kunit_try_catch/166 [ 20.628045] [ 20.628288] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 20.630064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.630372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.631459] Call Trace: [ 20.631865] <TASK> [ 20.632174] dump_stack_lvl+0x73/0xb0 [ 20.632513] print_report+0xd1/0x640 [ 20.633305] ? __virt_addr_valid+0x1db/0x2d0 [ 20.633789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.634356] kasan_report+0x102/0x140 [ 20.634753] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 20.635433] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 20.635805] __asan_report_store1_noabort+0x1b/0x30 [ 20.636131] krealloc_less_oob_helper+0xd72/0x11d0 [ 20.636723] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.637429] ? finish_task_switch.isra.0+0x153/0x700 [ 20.637816] ? __switch_to+0x5d9/0xf60 [ 20.638140] ? __schedule+0xc3e/0x2790 [ 20.638578] ? __pfx_read_tsc+0x10/0x10 [ 20.639041] krealloc_less_oob+0x1c/0x30 [ 20.640210] kunit_try_run_case+0x1b3/0x490 [ 20.640664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.640996] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.641606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.642134] ? __kthread_parkme+0x82/0x160 [ 20.642803] ? preempt_count_sub+0x50/0x80 [ 20.643374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.643897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.644741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.645442] kthread+0x257/0x310 [ 20.645901] ? __pfx_kthread+0x10/0x10 [ 20.646363] ret_from_fork+0x41/0x80 [ 20.646721] ? __pfx_kthread+0x10/0x10 [ 20.647044] ret_from_fork_asm+0x1a/0x30 [ 20.647787] </TASK> [ 20.648035] [ 20.648399] Allocated by task 166: [ 20.648815] kasan_save_stack+0x3d/0x60 [ 20.649151] kasan_save_track+0x18/0x40 [ 20.649767] kasan_save_alloc_info+0x3b/0x50 [ 20.650433] __kasan_krealloc+0x190/0x1f0 [ 20.650805] krealloc_noprof+0xf3/0x340 [ 20.651382] krealloc_less_oob_helper+0x1ab/0x11d0 [ 20.651813] krealloc_less_oob+0x1c/0x30 [ 20.652087] kunit_try_run_case+0x1b3/0x490 [ 20.652828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.653476] kthread+0x257/0x310 [ 20.653747] ret_from_fork+0x41/0x80 [ 20.654063] ret_from_fork_asm+0x1a/0x30 [ 20.654538] [ 20.654795] The buggy address belongs to the object at ffff888100a96600 [ 20.654795] which belongs to the cache kmalloc-256 of size 256 [ 20.655834] The buggy address is located 0 bytes to the right of [ 20.655834] allocated 201-byte region [ffff888100a96600, ffff888100a966c9) [ 20.657017] [ 20.657386] The buggy address belongs to the physical page: [ 20.657775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96 [ 20.658651] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.659682] flags: 0x200000000000040(head|node=0|zone=2) [ 20.660144] page_type: f5(slab) [ 20.660572] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.661455] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.662081] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.662712] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.663569] head: 0200000000000001 ffffea000402a581 ffffffffffffffff 0000000000000000 [ 20.664401] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.664973] page dumped because: kasan: bad access detected [ 20.665599] [ 20.665827] Memory state around the buggy address: [ 20.666315] ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.666995] ffff888100a96600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.667697] >ffff888100a96680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.668442] ^ [ 20.669027] ffff888100a96700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.669714] ffff888100a96780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.670648] ================================================================== [ 21.085883] ================================================================== [ 21.086504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 [ 21.087133] Write of size 1 at addr ffff88810236e0da by task kunit_try_catch/170 [ 21.087825] [ 21.088106] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 21.090437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.091436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.092219] Call Trace: [ 21.092550] <TASK> [ 21.092874] dump_stack_lvl+0x73/0xb0 [ 21.093280] print_report+0xd1/0x640 [ 21.093920] ? __virt_addr_valid+0x1db/0x2d0 [ 21.094986] ? kasan_addr_to_slab+0x11/0xa0 [ 21.095811] kasan_report+0x102/0x140 [ 21.096832] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 21.097573] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 21.098127] __asan_report_store1_noabort+0x1b/0x30 [ 21.099230] krealloc_less_oob_helper+0xec8/0x11d0 [ 21.100109] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.100742] ? finish_task_switch.isra.0+0x153/0x700 [ 21.101038] ? __switch_to+0x5d9/0xf60 [ 21.102001] ? __schedule+0xc3e/0x2790 [ 21.102584] ? __pfx_read_tsc+0x10/0x10 [ 21.103120] krealloc_large_less_oob+0x1c/0x30 [ 21.103678] kunit_try_run_case+0x1b3/0x490 [ 21.104139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.104802] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.105826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.106369] ? __kthread_parkme+0x82/0x160 [ 21.106682] ? preempt_count_sub+0x50/0x80 [ 21.107173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.108079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.108682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.109115] kthread+0x257/0x310 [ 21.110109] ? __pfx_kthread+0x10/0x10 [ 21.111154] ret_from_fork+0x41/0x80 [ 21.112449] ? __pfx_kthread+0x10/0x10 [ 21.112730] ret_from_fork_asm+0x1a/0x30 [ 21.113239] </TASK> [ 21.113602] [ 21.113797] The buggy address belongs to the physical page: [ 21.115175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10236c [ 21.116395] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.116766] flags: 0x200000000000040(head|node=0|zone=2) [ 21.117020] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.117829] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.118662] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.120115] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.121649] head: 0200000000000002 ffffea000408db01 ffffffffffffffff 0000000000000000 [ 21.122542] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.123176] page dumped because: kasan: bad access detected [ 21.123866] [ 21.123997] Memory state around the buggy address: [ 21.124480] ffff88810236df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.126104] ffff88810236e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.127165] >ffff88810236e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.128001] ^ [ 21.128833] ffff88810236e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.130107] ffff88810236e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.131715] ================================================================== [ 20.998030] ================================================================== [ 20.999466] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 [ 21.000390] Write of size 1 at addr ffff88810236e0c9 by task kunit_try_catch/170 [ 21.001724] [ 21.001995] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 21.002760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.003202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.004038] Call Trace: [ 21.004452] <TASK> [ 21.005010] dump_stack_lvl+0x73/0xb0 [ 21.005805] print_report+0xd1/0x640 [ 21.006397] ? __virt_addr_valid+0x1db/0x2d0 [ 21.007279] ? kasan_addr_to_slab+0x11/0xa0 [ 21.007817] kasan_report+0x102/0x140 [ 21.008398] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 21.009066] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 21.010104] __asan_report_store1_noabort+0x1b/0x30 [ 21.011017] krealloc_less_oob_helper+0xd72/0x11d0 [ 21.011422] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.012061] ? finish_task_switch.isra.0+0x153/0x700 [ 21.012957] ? __switch_to+0x5d9/0xf60 [ 21.014174] ? __schedule+0xc3e/0x2790 [ 21.014629] ? __pfx_read_tsc+0x10/0x10 [ 21.015379] krealloc_large_less_oob+0x1c/0x30 [ 21.016005] kunit_try_run_case+0x1b3/0x490 [ 21.017064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.017785] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.018553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.019088] ? __kthread_parkme+0x82/0x160 [ 21.019722] ? preempt_count_sub+0x50/0x80 [ 21.020232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.020926] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.021990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.022731] kthread+0x257/0x310 [ 21.023266] ? __pfx_kthread+0x10/0x10 [ 21.023592] ret_from_fork+0x41/0x80 [ 21.024080] ? __pfx_kthread+0x10/0x10 [ 21.024665] ret_from_fork_asm+0x1a/0x30 [ 21.025036] </TASK> [ 21.025467] [ 21.026056] The buggy address belongs to the physical page: [ 21.027174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10236c [ 21.027942] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.028776] flags: 0x200000000000040(head|node=0|zone=2) [ 21.029571] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.030144] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.031457] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.032127] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.033619] head: 0200000000000002 ffffea000408db01 ffffffffffffffff 0000000000000000 [ 21.034331] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.035359] page dumped because: kasan: bad access detected [ 21.035978] [ 21.036597] Memory state around the buggy address: [ 21.037122] ffff88810236df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.037839] ffff88810236e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.038774] >ffff88810236e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.039880] ^ [ 21.040666] ffff88810236e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.041953] ffff88810236e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.042864] ================================================================== [ 21.176954] ================================================================== [ 21.178010] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 [ 21.179530] Write of size 1 at addr ffff88810236e0eb by task kunit_try_catch/170 [ 21.180594] [ 21.180955] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 21.182283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.183395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.184707] Call Trace: [ 21.184996] <TASK> [ 21.185264] dump_stack_lvl+0x73/0xb0 [ 21.185697] print_report+0xd1/0x640 [ 21.186250] ? __virt_addr_valid+0x1db/0x2d0 [ 21.186635] ? kasan_addr_to_slab+0x11/0xa0 [ 21.186916] kasan_report+0x102/0x140 [ 21.187453] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 21.188496] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 21.189616] __asan_report_store1_noabort+0x1b/0x30 [ 21.190614] krealloc_less_oob_helper+0xd49/0x11d0 [ 21.191106] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.191946] ? finish_task_switch.isra.0+0x153/0x700 [ 21.193024] ? __switch_to+0x5d9/0xf60 [ 21.193902] ? __schedule+0xc3e/0x2790 [ 21.194509] ? __pfx_read_tsc+0x10/0x10 [ 21.195079] krealloc_large_less_oob+0x1c/0x30 [ 21.196100] kunit_try_run_case+0x1b3/0x490 [ 21.196727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.197123] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.197555] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.197960] ? __kthread_parkme+0x82/0x160 [ 21.198624] ? preempt_count_sub+0x50/0x80 [ 21.199680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.200633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.201479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.202228] kthread+0x257/0x310 [ 21.202498] ? __pfx_kthread+0x10/0x10 [ 21.203001] ret_from_fork+0x41/0x80 [ 21.204074] ? __pfx_kthread+0x10/0x10 [ 21.205076] ret_from_fork_asm+0x1a/0x30 [ 21.205379] </TASK> [ 21.205970] [ 21.206502] The buggy address belongs to the physical page: [ 21.207160] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10236c [ 21.207979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.208975] flags: 0x200000000000040(head|node=0|zone=2) [ 21.210251] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.211120] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.211947] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.213005] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.213801] head: 0200000000000002 ffffea000408db01 ffffffffffffffff 0000000000000000 [ 21.214567] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.215317] page dumped because: kasan: bad access detected [ 21.216245] [ 21.216896] Memory state around the buggy address: [ 21.217517] ffff88810236df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.218658] ffff88810236e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.219552] >ffff88810236e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.221069] ^ [ 21.222148] ffff88810236e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.222720] ffff88810236e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.223453] ================================================================== [ 21.043800] ================================================================== [ 21.044383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 [ 21.044815] Write of size 1 at addr ffff88810236e0d0 by task kunit_try_catch/170 [ 21.045404] [ 21.045688] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 21.046939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.047479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.048262] Call Trace: [ 21.048763] <TASK> [ 21.048965] dump_stack_lvl+0x73/0xb0 [ 21.049324] print_report+0xd1/0x640 [ 21.051642] ? __virt_addr_valid+0x1db/0x2d0 [ 21.052866] ? kasan_addr_to_slab+0x11/0xa0 [ 21.053567] kasan_report+0x102/0x140 [ 21.054372] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 21.054945] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 21.055797] __asan_report_store1_noabort+0x1b/0x30 [ 21.056397] krealloc_less_oob_helper+0xe25/0x11d0 [ 21.057029] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.057587] ? finish_task_switch.isra.0+0x153/0x700 [ 21.057998] ? __switch_to+0x5d9/0xf60 [ 21.058485] ? __schedule+0xc3e/0x2790 [ 21.058949] ? __pfx_read_tsc+0x10/0x10 [ 21.059629] krealloc_large_less_oob+0x1c/0x30 [ 21.060280] kunit_try_run_case+0x1b3/0x490 [ 21.060759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.061736] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.062173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.062786] ? __kthread_parkme+0x82/0x160 [ 21.063147] ? preempt_count_sub+0x50/0x80 [ 21.064498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.064936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.065435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.066444] kthread+0x257/0x310 [ 21.066798] ? __pfx_kthread+0x10/0x10 [ 21.067161] ret_from_fork+0x41/0x80 [ 21.067511] ? __pfx_kthread+0x10/0x10 [ 21.067911] ret_from_fork_asm+0x1a/0x30 [ 21.068403] </TASK> [ 21.069210] [ 21.069603] The buggy address belongs to the physical page: [ 21.070556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10236c [ 21.071380] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.072134] flags: 0x200000000000040(head|node=0|zone=2) [ 21.072732] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.073936] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.074777] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.075501] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.076161] head: 0200000000000002 ffffea000408db01 ffffffffffffffff 0000000000000000 [ 21.077065] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.077940] page dumped because: kasan: bad access detected [ 21.078920] [ 21.079068] Memory state around the buggy address: [ 21.079659] ffff88810236df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.080684] ffff88810236e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.081488] >ffff88810236e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.082061] ^ [ 21.082849] ffff88810236e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.084108] ffff88810236e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.084797] ================================================================== [ 20.779031] ================================================================== [ 20.780684] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 [ 20.782062] Write of size 1 at addr ffff888100a966ea by task kunit_try_catch/166 [ 20.783227] [ 20.783777] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 20.784860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.785111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.785892] Call Trace: [ 20.786259] <TASK> [ 20.786730] dump_stack_lvl+0x73/0xb0 [ 20.787028] print_report+0xd1/0x640 [ 20.787836] ? __virt_addr_valid+0x1db/0x2d0 [ 20.788638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.789478] kasan_report+0x102/0x140 [ 20.789994] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 20.790986] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 20.791646] __asan_report_store1_noabort+0x1b/0x30 [ 20.792273] krealloc_less_oob_helper+0xe92/0x11d0 [ 20.792811] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.793493] ? finish_task_switch.isra.0+0x153/0x700 [ 20.794172] ? __switch_to+0x5d9/0xf60 [ 20.794700] ? __schedule+0xc3e/0x2790 [ 20.795265] ? __pfx_read_tsc+0x10/0x10 [ 20.796159] krealloc_less_oob+0x1c/0x30 [ 20.796773] kunit_try_run_case+0x1b3/0x490 [ 20.797603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.798069] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.798790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.799233] ? __kthread_parkme+0x82/0x160 [ 20.800016] ? preempt_count_sub+0x50/0x80 [ 20.801439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.801859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.802940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.803460] kthread+0x257/0x310 [ 20.803922] ? __pfx_kthread+0x10/0x10 [ 20.804518] ret_from_fork+0x41/0x80 [ 20.805333] ? __pfx_kthread+0x10/0x10 [ 20.805641] ret_from_fork_asm+0x1a/0x30 [ 20.805938] </TASK> [ 20.806295] [ 20.806692] Allocated by task 166: [ 20.807243] kasan_save_stack+0x3d/0x60 [ 20.807873] kasan_save_track+0x18/0x40 [ 20.808535] kasan_save_alloc_info+0x3b/0x50 [ 20.809266] __kasan_krealloc+0x190/0x1f0 [ 20.810000] krealloc_noprof+0xf3/0x340 [ 20.810318] krealloc_less_oob_helper+0x1ab/0x11d0 [ 20.810886] krealloc_less_oob+0x1c/0x30 [ 20.811185] kunit_try_run_case+0x1b3/0x490 [ 20.812163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.812815] kthread+0x257/0x310 [ 20.813507] ret_from_fork+0x41/0x80 [ 20.814095] ret_from_fork_asm+0x1a/0x30 [ 20.814407] [ 20.814664] The buggy address belongs to the object at ffff888100a96600 [ 20.814664] which belongs to the cache kmalloc-256 of size 256 [ 20.815823] The buggy address is located 33 bytes to the right of [ 20.815823] allocated 201-byte region [ffff888100a96600, ffff888100a966c9) [ 20.817872] [ 20.818088] The buggy address belongs to the physical page: [ 20.818636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96 [ 20.819619] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.821118] flags: 0x200000000000040(head|node=0|zone=2) [ 20.822131] page_type: f5(slab) [ 20.822749] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.823712] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.824130] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 20.825614] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.826585] head: 0200000000000001 ffffea000402a581 ffffffffffffffff 0000000000000000 [ 20.827634] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.828200] page dumped because: kasan: bad access detected [ 20.829128] [ 20.829446] Memory state around the buggy address: [ 20.829744] ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.831224] ffff888100a96600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.832479] >ffff888100a96680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.833236] ^ [ 20.834280] ffff888100a96700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.835485] ffff888100a96780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.835769] ================================================================== [ 21.132710] ================================================================== [ 21.133107] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 [ 21.135147] Write of size 1 at addr ffff88810236e0ea by task kunit_try_catch/170 [ 21.135834] [ 21.136052] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 21.137983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.138585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.139458] Call Trace: [ 21.140309] <TASK> [ 21.140555] dump_stack_lvl+0x73/0xb0 [ 21.141140] print_report+0xd1/0x640 [ 21.141675] ? __virt_addr_valid+0x1db/0x2d0 [ 21.142124] ? kasan_addr_to_slab+0x11/0xa0 [ 21.142677] kasan_report+0x102/0x140 [ 21.143401] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 21.143899] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 21.144417] __asan_report_store1_noabort+0x1b/0x30 [ 21.145734] krealloc_less_oob_helper+0xe92/0x11d0 [ 21.146497] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.147017] ? finish_task_switch.isra.0+0x153/0x700 [ 21.147620] ? __switch_to+0x5d9/0xf60 [ 21.147942] ? __schedule+0xc3e/0x2790 [ 21.148649] ? __pfx_read_tsc+0x10/0x10 [ 21.149045] krealloc_large_less_oob+0x1c/0x30 [ 21.149845] kunit_try_run_case+0x1b3/0x490 [ 21.150493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.151067] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.152147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.152837] ? __kthread_parkme+0x82/0x160 [ 21.153478] ? preempt_count_sub+0x50/0x80 [ 21.153935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.154638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.155386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.155918] kthread+0x257/0x310 [ 21.156359] ? __pfx_kthread+0x10/0x10 [ 21.157017] ret_from_fork+0x41/0x80 [ 21.157871] ? __pfx_kthread+0x10/0x10 [ 21.158244] ret_from_fork_asm+0x1a/0x30 [ 21.158842] </TASK> [ 21.159596] [ 21.159925] The buggy address belongs to the physical page: [ 21.160627] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10236c [ 21.161765] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.162508] flags: 0x200000000000040(head|node=0|zone=2) [ 21.163194] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.163968] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.164679] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.165909] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.167554] head: 0200000000000002 ffffea000408db01 ffffffffffffffff 0000000000000000 [ 21.168095] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.169246] page dumped because: kasan: bad access detected [ 21.169805] [ 21.170005] Memory state around the buggy address: [ 21.170999] ffff88810236df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.171625] ffff88810236e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.172469] >ffff88810236e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.173742] ^ [ 21.174625] ffff88810236e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.174899] ffff88810236e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.175440] ==================================================================