Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.814799] ==================================================================
[   29.816550] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   29.817426] Write of size 1 at addr fff00000c61a20f0 by task kunit_try_catch/144
[   29.818256] 
[   29.818683] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.819942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.820613] Hardware name: linux,dummy-virt (DT)
[   29.821157] Call trace:
[   29.821545]  show_stack+0x20/0x38 (C)
[   29.822031]  dump_stack_lvl+0x8c/0xd0
[   29.822650]  print_report+0x118/0x5e0
[   29.823176]  kasan_report+0xc8/0x118
[   29.823771]  __asan_report_store1_noabort+0x20/0x30
[   29.824746]  krealloc_more_oob_helper+0x5c8/0x680
[   29.826052]  krealloc_more_oob+0x20/0x38
[   29.826649]  kunit_try_run_case+0x14c/0x3d0
[   29.827292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.827967]  kthread+0x24c/0x2d0
[   29.828583]  ret_from_fork+0x10/0x20
[   29.829511] 
[   29.829856] Allocated by task 144:
[   29.830344]  kasan_save_stack+0x3c/0x68
[   29.830968]  kasan_save_track+0x20/0x40
[   29.831559]  kasan_save_alloc_info+0x40/0x58
[   29.832181]  __kasan_krealloc+0x118/0x178
[   29.832703]  krealloc_noprof+0x128/0x360
[   29.833369]  krealloc_more_oob_helper+0x168/0x680
[   29.834764]  krealloc_more_oob+0x20/0x38
[   29.835494]  kunit_try_run_case+0x14c/0x3d0
[   29.836231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.837107]  kthread+0x24c/0x2d0
[   29.837835]  ret_from_fork+0x10/0x20
[   29.838302] 
[   29.838607] The buggy address belongs to the object at fff00000c61a2000
[   29.838607]  which belongs to the cache kmalloc-256 of size 256
[   29.840312] The buggy address is located 5 bytes to the right of
[   29.840312]  allocated 235-byte region [fff00000c61a2000, fff00000c61a20eb)
[   29.841994] 
[   29.842402] The buggy address belongs to the physical page:
[   29.843657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a2
[   29.844719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.845731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.846739] page_type: f5(slab)
[   29.847217] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.848103] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.849795] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.850569] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.851448] head: 0bfffe0000000001 ffffc1ffc3186881 ffffffffffffffff 0000000000000000
[   29.852327] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.853192] page dumped because: kasan: bad access detected
[   29.854204] 
[   29.854564] Memory state around the buggy address:
[   29.855191]  fff00000c61a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.855917]  fff00000c61a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.856819] >fff00000c61a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.858299]                                                              ^
[   29.859054]  fff00000c61a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.859862]  fff00000c61a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.860665] ==================================================================
[   29.768598] ==================================================================
[   29.770253] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   29.771161] Write of size 1 at addr fff00000c61a20eb by task kunit_try_catch/144
[   29.771901] 
[   29.772362] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.773692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.774720] Hardware name: linux,dummy-virt (DT)
[   29.775367] Call trace:
[   29.775685]  show_stack+0x20/0x38 (C)
[   29.776140]  dump_stack_lvl+0x8c/0xd0
[   29.776665]  print_report+0x118/0x5e0
[   29.777458]  kasan_report+0xc8/0x118
[   29.778720]  __asan_report_store1_noabort+0x20/0x30
[   29.779468]  krealloc_more_oob_helper+0x614/0x680
[   29.780091]  krealloc_more_oob+0x20/0x38
[   29.780629]  kunit_try_run_case+0x14c/0x3d0
[   29.781558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.782263]  kthread+0x24c/0x2d0
[   29.782824]  ret_from_fork+0x10/0x20
[   29.783369] 
[   29.783746] Allocated by task 144:
[   29.784316]  kasan_save_stack+0x3c/0x68
[   29.784888]  kasan_save_track+0x20/0x40
[   29.786212]  kasan_save_alloc_info+0x40/0x58
[   29.786833]  __kasan_krealloc+0x118/0x178
[   29.787465]  krealloc_noprof+0x128/0x360
[   29.788026]  krealloc_more_oob_helper+0x168/0x680
[   29.788731]  krealloc_more_oob+0x20/0x38
[   29.789281]  kunit_try_run_case+0x14c/0x3d0
[   29.790310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.790938]  kthread+0x24c/0x2d0
[   29.791524]  ret_from_fork+0x10/0x20
[   29.792086] 
[   29.792491] The buggy address belongs to the object at fff00000c61a2000
[   29.792491]  which belongs to the cache kmalloc-256 of size 256
[   29.794473] The buggy address is located 0 bytes to the right of
[   29.794473]  allocated 235-byte region [fff00000c61a2000, fff00000c61a20eb)
[   29.795787] 
[   29.796175] The buggy address belongs to the physical page:
[   29.796763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a2
[   29.797670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.798928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.799759] page_type: f5(slab)
[   29.800332] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.801387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.802157] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.802928] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.804190] head: 0bfffe0000000001 ffffc1ffc3186881 ffffffffffffffff 0000000000000000
[   29.804877] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.806056] page dumped because: kasan: bad access detected
[   29.806698] 
[   29.807034] Memory state around the buggy address:
[   29.807526]  fff00000c61a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.808394]  fff00000c61a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.809102] >fff00000c61a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.810066]                                                           ^
[   29.810778]  fff00000c61a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.811943]  fff00000c61a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.812828] ==================================================================
[   30.096251] ==================================================================
[   30.097650] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.098555] Write of size 1 at addr fff00000c65260eb by task kunit_try_catch/148
[   30.099180] 
[   30.099562] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.100606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.102009] Hardware name: linux,dummy-virt (DT)
[   30.102658] Call trace:
[   30.103188]  show_stack+0x20/0x38 (C)
[   30.103867]  dump_stack_lvl+0x8c/0xd0
[   30.104596]  print_report+0x118/0x5e0
[   30.105315]  kasan_report+0xc8/0x118
[   30.106096]  __asan_report_store1_noabort+0x20/0x30
[   30.106759]  krealloc_more_oob_helper+0x614/0x680
[   30.107374]  krealloc_large_more_oob+0x20/0x38
[   30.107938]  kunit_try_run_case+0x14c/0x3d0
[   30.108454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.109276]  kthread+0x24c/0x2d0
[   30.110524]  ret_from_fork+0x10/0x20
[   30.111232] 
[   30.111618] The buggy address belongs to the physical page:
[   30.112324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524
[   30.113153] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.114354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.115219] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.116053] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.117263] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.117947] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.118753] head: 0bfffe0000000002 ffffc1ffc3194901 ffffffffffffffff 0000000000000000
[   30.119511] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.120813] page dumped because: kasan: bad access detected
[   30.121905] 
[   30.122279] Memory state around the buggy address:
[   30.122993]  fff00000c6525f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.123646]  fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.124000] >fff00000c6526080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.124608]                                                           ^
[   30.125509]  fff00000c6526100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.126197]  fff00000c6526180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.127689] ==================================================================
[   30.130476] ==================================================================
[   30.131051] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.131922] Write of size 1 at addr fff00000c65260f0 by task kunit_try_catch/148
[   30.132830] 
[   30.133902] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.136032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.136597] Hardware name: linux,dummy-virt (DT)
[   30.137574] Call trace:
[   30.138017]  show_stack+0x20/0x38 (C)
[   30.138615]  dump_stack_lvl+0x8c/0xd0
[   30.139475]  print_report+0x118/0x5e0
[   30.140352]  kasan_report+0xc8/0x118
[   30.140846]  __asan_report_store1_noabort+0x20/0x30
[   30.141551]  krealloc_more_oob_helper+0x5c8/0x680
[   30.142551]  krealloc_large_more_oob+0x20/0x38
[   30.143199]  kunit_try_run_case+0x14c/0x3d0
[   30.143814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.144550]  kthread+0x24c/0x2d0
[   30.145157]  ret_from_fork+0x10/0x20
[   30.146453] 
[   30.146842] The buggy address belongs to the physical page:
[   30.147453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524
[   30.148424] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.149625] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.150546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.151284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.152006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.153625] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.154863] head: 0bfffe0000000002 ffffc1ffc3194901 ffffffffffffffff 0000000000000000
[   30.155832] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.156738] page dumped because: kasan: bad access detected
[   30.157819] 
[   30.158152] Memory state around the buggy address:
[   30.158792]  fff00000c6525f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.159410]  fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.160244] >fff00000c6526080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.161193]                                                              ^
[   30.162224]  fff00000c6526100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.163354]  fff00000c6526180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.164224] ==================================================================

[   20.946302] ==================================================================
[   20.947115] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   20.948028] Write of size 1 at addr ffff888102bba0f0 by task kunit_try_catch/168
[   20.949798] 
[   20.950071] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   20.951863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.952815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.954380] Call Trace:
[   20.954834]  <TASK>
[   20.955286]  dump_stack_lvl+0x73/0xb0
[   20.956042]  print_report+0xd1/0x640
[   20.956841]  ? __virt_addr_valid+0x1db/0x2d0
[   20.957438]  ? kasan_addr_to_slab+0x11/0xa0
[   20.957896]  kasan_report+0x102/0x140
[   20.958430]  ? krealloc_more_oob_helper+0x7ed/0x930
[   20.959009]  ? krealloc_more_oob_helper+0x7ed/0x930
[   20.959985]  __asan_report_store1_noabort+0x1b/0x30
[   20.960369]  krealloc_more_oob_helper+0x7ed/0x930
[   20.960862]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   20.961638]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.962576]  ? ktime_get_ts64+0xbf/0x230
[   20.963029]  ? __pfx_read_tsc+0x10/0x10
[   20.963507]  krealloc_large_more_oob+0x1c/0x30
[   20.963788]  kunit_try_run_case+0x1b3/0x490
[   20.964587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.965586]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.966276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.966699]  ? __kthread_parkme+0x82/0x160
[   20.967792]  ? preempt_count_sub+0x50/0x80
[   20.968665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.969202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.969693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.970308]  kthread+0x257/0x310
[   20.971051]  ? __pfx_kthread+0x10/0x10
[   20.971987]  ret_from_fork+0x41/0x80
[   20.972885]  ? __pfx_kthread+0x10/0x10
[   20.973367]  ret_from_fork_asm+0x1a/0x30
[   20.974095]  </TASK>
[   20.974444] 
[   20.975021] The buggy address belongs to the physical page:
[   20.975627] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   20.976421] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.977558] flags: 0x200000000000040(head|node=0|zone=2)
[   20.978227] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.978944] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.979843] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.981059] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.981874] head: 0200000000000002 ffffea00040aee01 ffffffffffffffff 0000000000000000
[   20.982787] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.983676] page dumped because: kasan: bad access detected
[   20.984410] 
[   20.984627] Memory state around the buggy address:
[   20.985766]  ffff888102bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.986516]  ffff888102bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.987528] >ffff888102bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.988162]                                                              ^
[   20.989632]  ffff888102bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.990275]  ffff888102bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.991329] ==================================================================
[   20.899755] ==================================================================
[   20.900996] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   20.901656] Write of size 1 at addr ffff888102bba0eb by task kunit_try_catch/168
[   20.902309] 
[   20.902867] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   20.904464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.904886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.905620] Call Trace:
[   20.905853]  <TASK>
[   20.906148]  dump_stack_lvl+0x73/0xb0
[   20.906989]  print_report+0xd1/0x640
[   20.907768]  ? __virt_addr_valid+0x1db/0x2d0
[   20.908433]  ? kasan_addr_to_slab+0x11/0xa0
[   20.909085]  kasan_report+0x102/0x140
[   20.909620]  ? krealloc_more_oob_helper+0x823/0x930
[   20.910077]  ? krealloc_more_oob_helper+0x823/0x930
[   20.910814]  __asan_report_store1_noabort+0x1b/0x30
[   20.911553]  krealloc_more_oob_helper+0x823/0x930
[   20.911954]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   20.912740]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.913444]  ? ktime_get_ts64+0xbf/0x230
[   20.913895]  ? __pfx_read_tsc+0x10/0x10
[   20.914369]  krealloc_large_more_oob+0x1c/0x30
[   20.914826]  kunit_try_run_case+0x1b3/0x490
[   20.915277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.916004]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.916935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.918009]  ? __kthread_parkme+0x82/0x160
[   20.918743]  ? preempt_count_sub+0x50/0x80
[   20.919229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.919840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.920325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.921252]  kthread+0x257/0x310
[   20.921716]  ? __pfx_kthread+0x10/0x10
[   20.922058]  ret_from_fork+0x41/0x80
[   20.922642]  ? __pfx_kthread+0x10/0x10
[   20.923035]  ret_from_fork_asm+0x1a/0x30
[   20.923783]  </TASK>
[   20.923982] 
[   20.924139] The buggy address belongs to the physical page:
[   20.924700] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   20.925764] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.926632] flags: 0x200000000000040(head|node=0|zone=2)
[   20.927902] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.929210] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.930602] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.932038] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.932727] head: 0200000000000002 ffffea00040aee01 ffffffffffffffff 0000000000000000
[   20.934029] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.934956] page dumped because: kasan: bad access detected
[   20.935629] 
[   20.935832] Memory state around the buggy address:
[   20.936397]  ffff888102bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.938120]  ffff888102bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.939144] >ffff888102bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.940011]                                                           ^
[   20.940884]  ffff888102bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.942481]  ffff888102bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.943895] ==================================================================
[   20.570027] ==================================================================
[   20.570677] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   20.571808] Write of size 1 at addr ffff8881003a1ef0 by task kunit_try_catch/164
[   20.572581] 
[   20.572880] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   20.574375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.574840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.575939] Call Trace:
[   20.576427]  <TASK>
[   20.576912]  dump_stack_lvl+0x73/0xb0
[   20.577746]  print_report+0xd1/0x640
[   20.578326]  ? __virt_addr_valid+0x1db/0x2d0
[   20.579089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.580126]  kasan_report+0x102/0x140
[   20.580489]  ? krealloc_more_oob_helper+0x7ed/0x930
[   20.581063]  ? krealloc_more_oob_helper+0x7ed/0x930
[   20.581915]  __asan_report_store1_noabort+0x1b/0x30
[   20.582382]  krealloc_more_oob_helper+0x7ed/0x930
[   20.583363]  ? __schedule+0xc3e/0x2790
[   20.584036]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.584963]  ? finish_task_switch.isra.0+0x153/0x700
[   20.585732]  ? __switch_to+0x5d9/0xf60
[   20.586604]  ? __schedule+0xc3e/0x2790
[   20.586920]  ? __pfx_read_tsc+0x10/0x10
[   20.587250]  krealloc_more_oob+0x1c/0x30
[   20.587711]  kunit_try_run_case+0x1b3/0x490
[   20.588155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.588685]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.589060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.589625]  ? __kthread_parkme+0x82/0x160
[   20.590038]  ? preempt_count_sub+0x50/0x80
[   20.590478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.591028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.592141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.592939]  kthread+0x257/0x310
[   20.593555]  ? __pfx_kthread+0x10/0x10
[   20.593905]  ret_from_fork+0x41/0x80
[   20.594388]  ? __pfx_kthread+0x10/0x10
[   20.594844]  ret_from_fork_asm+0x1a/0x30
[   20.595770]  </TASK>
[   20.596139] 
[   20.596498] Allocated by task 164:
[   20.596770]  kasan_save_stack+0x3d/0x60
[   20.597156]  kasan_save_track+0x18/0x40
[   20.597663]  kasan_save_alloc_info+0x3b/0x50
[   20.598101]  __kasan_krealloc+0x190/0x1f0
[   20.598422]  krealloc_noprof+0xf3/0x340
[   20.598876]  krealloc_more_oob_helper+0x1aa/0x930
[   20.599712]  krealloc_more_oob+0x1c/0x30
[   20.600029]  kunit_try_run_case+0x1b3/0x490
[   20.600632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.601385]  kthread+0x257/0x310
[   20.601787]  ret_from_fork+0x41/0x80
[   20.602302]  ret_from_fork_asm+0x1a/0x30
[   20.602770] 
[   20.602999] The buggy address belongs to the object at ffff8881003a1e00
[   20.602999]  which belongs to the cache kmalloc-256 of size 256
[   20.604280] The buggy address is located 5 bytes to the right of
[   20.604280]  allocated 235-byte region [ffff8881003a1e00, ffff8881003a1eeb)
[   20.605672] 
[   20.605831] The buggy address belongs to the physical page:
[   20.606303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   20.607123] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.608149] flags: 0x200000000000040(head|node=0|zone=2)
[   20.608820] page_type: f5(slab)
[   20.609379] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.610050] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.610694] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.611276] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.611932] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   20.612810] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.613613] page dumped because: kasan: bad access detected
[   20.614275] 
[   20.614510] Memory state around the buggy address:
[   20.614889]  ffff8881003a1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.615726]  ffff8881003a1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.616773] >ffff8881003a1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.617574]                                                              ^
[   20.618222]  ffff8881003a1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.618878]  ffff8881003a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.619436] ==================================================================
[   20.519776] ==================================================================
[   20.521476] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   20.522251] Write of size 1 at addr ffff8881003a1eeb by task kunit_try_catch/164
[   20.523756] 
[   20.524330] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   20.525293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.525846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.526652] Call Trace:
[   20.526915]  <TASK>
[   20.527214]  dump_stack_lvl+0x73/0xb0
[   20.528154]  print_report+0xd1/0x640
[   20.528606]  ? __virt_addr_valid+0x1db/0x2d0
[   20.529010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.529802]  kasan_report+0x102/0x140
[   20.530016]  ? krealloc_more_oob_helper+0x823/0x930
[   20.530735]  ? krealloc_more_oob_helper+0x823/0x930
[   20.531860]  __asan_report_store1_noabort+0x1b/0x30
[   20.532236]  krealloc_more_oob_helper+0x823/0x930
[   20.532692]  ? __schedule+0xc3e/0x2790
[   20.533072]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.534224]  ? finish_task_switch.isra.0+0x153/0x700
[   20.534709]  ? __switch_to+0x5d9/0xf60
[   20.535157]  ? __schedule+0xc3e/0x2790
[   20.535661]  ? __pfx_read_tsc+0x10/0x10
[   20.536033]  krealloc_more_oob+0x1c/0x30
[   20.536756]  kunit_try_run_case+0x1b3/0x490
[   20.537690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.538395]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.538960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.539515]  ? __kthread_parkme+0x82/0x160
[   20.539988]  ? preempt_count_sub+0x50/0x80
[   20.540579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.540983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.541796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.542335]  kthread+0x257/0x310
[   20.542758]  ? __pfx_kthread+0x10/0x10
[   20.543058]  ret_from_fork+0x41/0x80
[   20.543530]  ? __pfx_kthread+0x10/0x10
[   20.543980]  ret_from_fork_asm+0x1a/0x30
[   20.544516]  </TASK>
[   20.544829] 
[   20.545062] Allocated by task 164:
[   20.545914]  kasan_save_stack+0x3d/0x60
[   20.546524]  kasan_save_track+0x18/0x40
[   20.546981]  kasan_save_alloc_info+0x3b/0x50
[   20.547755]  __kasan_krealloc+0x190/0x1f0
[   20.548200]  krealloc_noprof+0xf3/0x340
[   20.548728]  krealloc_more_oob_helper+0x1aa/0x930
[   20.549286]  krealloc_more_oob+0x1c/0x30
[   20.549659]  kunit_try_run_case+0x1b3/0x490
[   20.550129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.550679]  kthread+0x257/0x310
[   20.551023]  ret_from_fork+0x41/0x80
[   20.551793]  ret_from_fork_asm+0x1a/0x30
[   20.552279] 
[   20.552565] The buggy address belongs to the object at ffff8881003a1e00
[   20.552565]  which belongs to the cache kmalloc-256 of size 256
[   20.553715] The buggy address is located 0 bytes to the right of
[   20.553715]  allocated 235-byte region [ffff8881003a1e00, ffff8881003a1eeb)
[   20.554668] 
[   20.554866] The buggy address belongs to the physical page:
[   20.555458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   20.556003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.557026] flags: 0x200000000000040(head|node=0|zone=2)
[   20.557714] page_type: f5(slab)
[   20.558001] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.558906] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.559687] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.560724] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.561319] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   20.562002] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.562569] page dumped because: kasan: bad access detected
[   20.563139] 
[   20.563475] Memory state around the buggy address:
[   20.563908]  ffff8881003a1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.564864]  ffff8881003a1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.565709] >ffff8881003a1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.566396]                                                           ^
[   20.566966]  ffff8881003a1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.567617]  ffff8881003a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.568180] ==================================================================