Hay
Date
Dec. 4, 2024, 3:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.480477] ==================================================================
[   31.481260] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   31.483537] Write of size 1 at addr fff00000c5de20f0 by task kunit_try_catch/148
[   31.484528] 
[   31.484902] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.486765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.487802] Hardware name: linux,dummy-virt (DT)
[   31.488941] Call trace:
[   31.489495]  show_stack+0x20/0x38 (C)
[   31.489979]  dump_stack_lvl+0x8c/0xd0
[   31.491376]  print_report+0x118/0x5e0
[   31.492067]  kasan_report+0xc8/0x118
[   31.492671]  __asan_report_store1_noabort+0x20/0x30
[   31.493236]  krealloc_more_oob_helper+0x5c8/0x680
[   31.494251]  krealloc_large_more_oob+0x20/0x38
[   31.495420]  kunit_try_run_case+0x14c/0x3d0
[   31.495901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.496802]  kthread+0x24c/0x2d0
[   31.497312]  ret_from_fork+0x10/0x20
[   31.497963] 
[   31.498399] The buggy address belongs to the physical page:
[   31.499064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105de0
[   31.500513] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.501176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.503049] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.504137] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.505095] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.505975] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.507849] head: 0bfffe0000000002 ffffc1ffc3177801 ffffffffffffffff 0000000000000000
[   31.509856] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.511232] page dumped because: kasan: bad access detected
[   31.511917] 
[   31.512277] Memory state around the buggy address:
[   31.512907]  fff00000c5de1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.514172]  fff00000c5de2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.514961] >fff00000c5de2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.516691]                                                              ^
[   31.517406]  fff00000c5de2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.518878]  fff00000c5de2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.519920] ==================================================================
[   31.122019] ==================================================================
[   31.123553] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   31.125049] Write of size 1 at addr fff00000c0972ef0 by task kunit_try_catch/144
[   31.126773] 
[   31.127560] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.129146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.129764] Hardware name: linux,dummy-virt (DT)
[   31.130731] Call trace:
[   31.131324]  show_stack+0x20/0x38 (C)
[   31.131881]  dump_stack_lvl+0x8c/0xd0
[   31.132190]  print_report+0x118/0x5e0
[   31.132478]  kasan_report+0xc8/0x118
[   31.132875]  __asan_report_store1_noabort+0x20/0x30
[   31.133400]  krealloc_more_oob_helper+0x5c8/0x680
[   31.134016]  krealloc_more_oob+0x20/0x38
[   31.135009]  kunit_try_run_case+0x14c/0x3d0
[   31.135689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.136512]  kthread+0x24c/0x2d0
[   31.137068]  ret_from_fork+0x10/0x20
[   31.137592] 
[   31.138055] Allocated by task 144:
[   31.139066]  kasan_save_stack+0x3c/0x68
[   31.139617]  kasan_save_track+0x20/0x40
[   31.140263]  kasan_save_alloc_info+0x40/0x58
[   31.140881]  __kasan_krealloc+0x118/0x178
[   31.141437]  krealloc_noprof+0x128/0x360
[   31.142954]  krealloc_more_oob_helper+0x168/0x680
[   31.143549]  krealloc_more_oob+0x20/0x38
[   31.143928]  kunit_try_run_case+0x14c/0x3d0
[   31.144234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.144582]  kthread+0x24c/0x2d0
[   31.145227]  ret_from_fork+0x10/0x20
[   31.146340] 
[   31.146764] The buggy address belongs to the object at fff00000c0972e00
[   31.146764]  which belongs to the cache kmalloc-256 of size 256
[   31.148329] The buggy address is located 5 bytes to the right of
[   31.148329]  allocated 235-byte region [fff00000c0972e00, fff00000c0972eeb)
[   31.150386] 
[   31.150816] The buggy address belongs to the physical page:
[   31.151457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.152681] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.153755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.154592] page_type: f5(slab)
[   31.155091] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.156793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.157256] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.157813] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.159653] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.160709] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.161573] page dumped because: kasan: bad access detected
[   31.163287] 
[   31.163769] Memory state around the buggy address:
[   31.164605]  fff00000c0972d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.165457]  fff00000c0972e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.166505] >fff00000c0972e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.167500]                                                              ^
[   31.168671]  fff00000c0972f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.169962]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.171244] ==================================================================
[   31.439095] ==================================================================
[   31.440486] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   31.441498] Write of size 1 at addr fff00000c5de20eb by task kunit_try_catch/148
[   31.442715] 
[   31.443424] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.444778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.445379] Hardware name: linux,dummy-virt (DT)
[   31.446520] Call trace:
[   31.446987]  show_stack+0x20/0x38 (C)
[   31.448050]  dump_stack_lvl+0x8c/0xd0
[   31.448512]  print_report+0x118/0x5e0
[   31.449606]  kasan_report+0xc8/0x118
[   31.450561]  __asan_report_store1_noabort+0x20/0x30
[   31.452356]  krealloc_more_oob_helper+0x614/0x680
[   31.453009]  krealloc_large_more_oob+0x20/0x38
[   31.453761]  kunit_try_run_case+0x14c/0x3d0
[   31.454854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.455691]  kthread+0x24c/0x2d0
[   31.456407]  ret_from_fork+0x10/0x20
[   31.457071] 
[   31.457476] The buggy address belongs to the physical page:
[   31.458428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105de0
[   31.459416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.460439] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.461744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.463659] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.464602] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.465820] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.467531] head: 0bfffe0000000002 ffffc1ffc3177801 ffffffffffffffff 0000000000000000
[   31.468281] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.469145] page dumped because: kasan: bad access detected
[   31.470369] 
[   31.470868] Memory state around the buggy address:
[   31.471591]  fff00000c5de1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.472670]  fff00000c5de2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.473475] >fff00000c5de2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.474613]                                                           ^
[   31.476530]  fff00000c5de2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.477605]  fff00000c5de2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.478697] ==================================================================
[   31.071601] ==================================================================
[   31.072861] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   31.073468] Write of size 1 at addr fff00000c0972eeb by task kunit_try_catch/144
[   31.074568] 
[   31.074939] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.076928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.077521] Hardware name: linux,dummy-virt (DT)
[   31.078563] Call trace:
[   31.078981]  show_stack+0x20/0x38 (C)
[   31.079654]  dump_stack_lvl+0x8c/0xd0
[   31.080256]  print_report+0x118/0x5e0
[   31.080825]  kasan_report+0xc8/0x118
[   31.081435]  __asan_report_store1_noabort+0x20/0x30
[   31.082565]  krealloc_more_oob_helper+0x614/0x680
[   31.083246]  krealloc_more_oob+0x20/0x38
[   31.083916]  kunit_try_run_case+0x14c/0x3d0
[   31.084665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.085388]  kthread+0x24c/0x2d0
[   31.086336]  ret_from_fork+0x10/0x20
[   31.086928] 
[   31.087313] Allocated by task 144:
[   31.087948]  kasan_save_stack+0x3c/0x68
[   31.088649]  kasan_save_track+0x20/0x40
[   31.089122]  kasan_save_alloc_info+0x40/0x58
[   31.090175]  __kasan_krealloc+0x118/0x178
[   31.090653]  krealloc_noprof+0x128/0x360
[   31.091300]  krealloc_more_oob_helper+0x168/0x680
[   31.091961]  krealloc_more_oob+0x20/0x38
[   31.092494]  kunit_try_run_case+0x14c/0x3d0
[   31.093287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.094541]  kthread+0x24c/0x2d0
[   31.095187]  ret_from_fork+0x10/0x20
[   31.095658] 
[   31.096487] The buggy address belongs to the object at fff00000c0972e00
[   31.096487]  which belongs to the cache kmalloc-256 of size 256
[   31.098544] The buggy address is located 0 bytes to the right of
[   31.098544]  allocated 235-byte region [fff00000c0972e00, fff00000c0972eeb)
[   31.100047] 
[   31.100366] The buggy address belongs to the physical page:
[   31.101264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.102607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.103564] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.104450] page_type: f5(slab)
[   31.104900] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.106250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.107107] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.108245] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.109382] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.110780] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.111729] page dumped because: kasan: bad access detected
[   31.112378] 
[   31.112735] Memory state around the buggy address:
[   31.113299]  fff00000c0972d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.114482]  fff00000c0972e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.115860] >fff00000c0972e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.116767]                                                           ^
[   31.118020]  fff00000c0972f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.119680]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.120372] ==================================================================

[   21.852456] ==================================================================
[   21.854533] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   21.855539] Write of size 1 at addr ffff8881009a84f0 by task kunit_try_catch/164
[   21.856826] 
[   21.857000] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   21.858738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.859096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.860057] Call Trace:
[   21.860757]  <TASK>
[   21.860986]  dump_stack_lvl+0x73/0xb0
[   21.861876]  print_report+0xd1/0x640
[   21.862158]  ? __virt_addr_valid+0x1db/0x2d0
[   21.863044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.863726]  kasan_report+0x102/0x140
[   21.864110]  ? krealloc_more_oob_helper+0x7ed/0x930
[   21.864586]  ? krealloc_more_oob_helper+0x7ed/0x930
[   21.865679]  __asan_report_store1_noabort+0x1b/0x30
[   21.866465]  krealloc_more_oob_helper+0x7ed/0x930
[   21.867192]  ? __schedule+0xc3e/0x2790
[   21.867765]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.868246]  ? finish_task_switch.isra.0+0x153/0x700
[   21.869633]  ? __switch_to+0x5d9/0xf60
[   21.870079]  ? __schedule+0xc3e/0x2790
[   21.870495]  ? __pfx_read_tsc+0x10/0x10
[   21.871130]  krealloc_more_oob+0x1c/0x30
[   21.872046]  kunit_try_run_case+0x1b3/0x490
[   21.872833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.873562]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.874213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.875198]  ? __kthread_parkme+0x82/0x160
[   21.875451]  ? preempt_count_sub+0x50/0x80
[   21.875647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.875924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.876992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.877645]  kthread+0x257/0x310
[   21.877910]  ? __pfx_kthread+0x10/0x10
[   21.878247]  ret_from_fork+0x41/0x80
[   21.878962]  ? __pfx_kthread+0x10/0x10
[   21.880055]  ret_from_fork_asm+0x1a/0x30
[   21.880868]  </TASK>
[   21.881309] 
[   21.881448] Allocated by task 164:
[   21.881660]  kasan_save_stack+0x3d/0x60
[   21.882018]  kasan_save_track+0x18/0x40
[   21.883003]  kasan_save_alloc_info+0x3b/0x50
[   21.884035]  __kasan_krealloc+0x190/0x1f0
[   21.884580]  krealloc_noprof+0xf3/0x340
[   21.885024]  krealloc_more_oob_helper+0x1aa/0x930
[   21.885481]  krealloc_more_oob+0x1c/0x30
[   21.885917]  kunit_try_run_case+0x1b3/0x490
[   21.887211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.887809]  kthread+0x257/0x310
[   21.888436]  ret_from_fork+0x41/0x80
[   21.888695]  ret_from_fork_asm+0x1a/0x30
[   21.889754] 
[   21.890131] The buggy address belongs to the object at ffff8881009a8400
[   21.890131]  which belongs to the cache kmalloc-256 of size 256
[   21.891713] The buggy address is located 5 bytes to the right of
[   21.891713]  allocated 235-byte region [ffff8881009a8400, ffff8881009a84eb)
[   21.894150] 
[   21.894611] The buggy address belongs to the physical page:
[   21.895169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8
[   21.896675] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.897871] flags: 0x200000000000040(head|node=0|zone=2)
[   21.899007] page_type: f5(slab)
[   21.899703] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.900670] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.901659] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.902288] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.903648] head: 0200000000000001 ffffea0004026a01 ffffffffffffffff 0000000000000000
[   21.904880] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   21.905462] page dumped because: kasan: bad access detected
[   21.906024] 
[   21.906217] Memory state around the buggy address:
[   21.906659]  ffff8881009a8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.907917]  ffff8881009a8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.908906] >ffff8881009a8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.909733]                                                              ^
[   21.910605]  ffff8881009a8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.911453]  ffff8881009a8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.911969] ==================================================================
[   21.790052] ==================================================================
[   21.791919] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   21.792658] Write of size 1 at addr ffff8881009a84eb by task kunit_try_catch/164
[   21.794462] 
[   21.794747] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   21.795985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.796601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.797909] Call Trace:
[   21.798135]  <TASK>
[   21.798682]  dump_stack_lvl+0x73/0xb0
[   21.799614]  print_report+0xd1/0x640
[   21.800161]  ? __virt_addr_valid+0x1db/0x2d0
[   21.801142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.802192]  kasan_report+0x102/0x140
[   21.803111]  ? krealloc_more_oob_helper+0x823/0x930
[   21.804376]  ? krealloc_more_oob_helper+0x823/0x930
[   21.805431]  __asan_report_store1_noabort+0x1b/0x30
[   21.805735]  krealloc_more_oob_helper+0x823/0x930
[   21.806235]  ? __schedule+0xc3e/0x2790
[   21.806616]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.807154]  ? finish_task_switch.isra.0+0x153/0x700
[   21.807692]  ? __switch_to+0x5d9/0xf60
[   21.808890]  ? __schedule+0xc3e/0x2790
[   21.810063]  ? __pfx_read_tsc+0x10/0x10
[   21.810556]  krealloc_more_oob+0x1c/0x30
[   21.810757]  kunit_try_run_case+0x1b3/0x490
[   21.811595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.812069]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.813050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.814009]  ? __kthread_parkme+0x82/0x160
[   21.814760]  ? preempt_count_sub+0x50/0x80
[   21.815044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.815927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.817168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.818021]  kthread+0x257/0x310
[   21.818283]  ? __pfx_kthread+0x10/0x10
[   21.819285]  ret_from_fork+0x41/0x80
[   21.820297]  ? __pfx_kthread+0x10/0x10
[   21.820718]  ret_from_fork_asm+0x1a/0x30
[   21.821135]  </TASK>
[   21.822150] 
[   21.822410] Allocated by task 164:
[   21.822671]  kasan_save_stack+0x3d/0x60
[   21.823461]  kasan_save_track+0x18/0x40
[   21.823912]  kasan_save_alloc_info+0x3b/0x50
[   21.824207]  __kasan_krealloc+0x190/0x1f0
[   21.825264]  krealloc_noprof+0xf3/0x340
[   21.825871]  krealloc_more_oob_helper+0x1aa/0x930
[   21.826867]  krealloc_more_oob+0x1c/0x30
[   21.827392]  kunit_try_run_case+0x1b3/0x490
[   21.827938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.828450]  kthread+0x257/0x310
[   21.828882]  ret_from_fork+0x41/0x80
[   21.829485]  ret_from_fork_asm+0x1a/0x30
[   21.830382] 
[   21.830665] The buggy address belongs to the object at ffff8881009a8400
[   21.830665]  which belongs to the cache kmalloc-256 of size 256
[   21.832630] The buggy address is located 0 bytes to the right of
[   21.832630]  allocated 235-byte region [ffff8881009a8400, ffff8881009a84eb)
[   21.834315] 
[   21.834668] The buggy address belongs to the physical page:
[   21.835208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8
[   21.836179] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.837210] flags: 0x200000000000040(head|node=0|zone=2)
[   21.838050] page_type: f5(slab)
[   21.838752] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.840175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.842099] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.842822] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.843452] head: 0200000000000001 ffffea0004026a01 ffffffffffffffff 0000000000000000
[   21.844338] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   21.844926] page dumped because: kasan: bad access detected
[   21.845310] 
[   21.845657] Memory state around the buggy address:
[   21.846087]  ffff8881009a8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.846708]  ffff8881009a8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.847397] >ffff8881009a8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.848618]                                                           ^
[   21.849085]  ffff8881009a8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.849918]  ffff8881009a8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.850748] ==================================================================
[   22.263515] ==================================================================
[   22.264116] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   22.265880] Write of size 1 at addr ffff888102b2e0f0 by task kunit_try_catch/168
[   22.266647] 
[   22.266859] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.267483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.267967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.268885] Call Trace:
[   22.269240]  <TASK>
[   22.269596]  dump_stack_lvl+0x73/0xb0
[   22.269979]  print_report+0xd1/0x640
[   22.270476]  ? __virt_addr_valid+0x1db/0x2d0
[   22.270908]  ? kasan_addr_to_slab+0x11/0xa0
[   22.271447]  kasan_report+0x102/0x140
[   22.271804]  ? krealloc_more_oob_helper+0x7ed/0x930
[   22.272380]  ? krealloc_more_oob_helper+0x7ed/0x930
[   22.273044]  __asan_report_store1_noabort+0x1b/0x30
[   22.274804]  krealloc_more_oob_helper+0x7ed/0x930
[   22.275311]  ? __schedule+0xc3e/0x2790
[   22.275661]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.276170]  ? finish_task_switch.isra.0+0x153/0x700
[   22.276784]  ? __switch_to+0x5d9/0xf60
[   22.277187]  ? __schedule+0xc3e/0x2790
[   22.277513]  ? __pfx_read_tsc+0x10/0x10
[   22.278044]  krealloc_large_more_oob+0x1c/0x30
[   22.278503]  kunit_try_run_case+0x1b3/0x490
[   22.279031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.279568]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.280040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.280463]  ? __kthread_parkme+0x82/0x160
[   22.281012]  ? preempt_count_sub+0x50/0x80
[   22.281430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.282011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.282693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.283195]  kthread+0x257/0x310
[   22.283567]  ? __pfx_kthread+0x10/0x10
[   22.284011]  ret_from_fork+0x41/0x80
[   22.284516]  ? __pfx_kthread+0x10/0x10
[   22.284895]  ret_from_fork_asm+0x1a/0x30
[   22.285332]  </TASK>
[   22.285639] 
[   22.285920] The buggy address belongs to the physical page:
[   22.286565] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2c
[   22.287069] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.287909] flags: 0x200000000000040(head|node=0|zone=2)
[   22.288470] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.289198] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.289994] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.290705] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.291493] head: 0200000000000002 ffffea00040acb01 ffffffffffffffff 0000000000000000
[   22.292216] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.292918] page dumped because: kasan: bad access detected
[   22.293404] 
[   22.293633] Memory state around the buggy address:
[   22.294107]  ffff888102b2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.294848]  ffff888102b2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.295360] >ffff888102b2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.296168]                                                              ^
[   22.296735]  ffff888102b2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.297516]  ffff888102b2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.298294] ==================================================================
[   22.220548] ==================================================================
[   22.221625] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   22.222600] Write of size 1 at addr ffff888102b2e0eb by task kunit_try_catch/168
[   22.223893] 
[   22.224107] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.225935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.226315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.227282] Call Trace:
[   22.227585]  <TASK>
[   22.227875]  dump_stack_lvl+0x73/0xb0
[   22.228190]  print_report+0xd1/0x640
[   22.229610]  ? __virt_addr_valid+0x1db/0x2d0
[   22.230277]  ? kasan_addr_to_slab+0x11/0xa0
[   22.231102]  kasan_report+0x102/0x140
[   22.231635]  ? krealloc_more_oob_helper+0x823/0x930
[   22.232065]  ? krealloc_more_oob_helper+0x823/0x930
[   22.232472]  __asan_report_store1_noabort+0x1b/0x30
[   22.233006]  krealloc_more_oob_helper+0x823/0x930
[   22.233591]  ? __schedule+0xc3e/0x2790
[   22.234157]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.234908]  ? finish_task_switch.isra.0+0x153/0x700
[   22.235740]  ? __switch_to+0x5d9/0xf60
[   22.236412]  ? __schedule+0xc3e/0x2790
[   22.236893]  ? __pfx_read_tsc+0x10/0x10
[   22.237249]  krealloc_large_more_oob+0x1c/0x30
[   22.237976]  kunit_try_run_case+0x1b3/0x490
[   22.238644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.239095]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.240138]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.241037]  ? __kthread_parkme+0x82/0x160
[   22.241758]  ? preempt_count_sub+0x50/0x80
[   22.242181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.242918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.243554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.244292]  kthread+0x257/0x310
[   22.245006]  ? __pfx_kthread+0x10/0x10
[   22.245356]  ret_from_fork+0x41/0x80
[   22.245711]  ? __pfx_kthread+0x10/0x10
[   22.246580]  ret_from_fork_asm+0x1a/0x30
[   22.247095]  </TASK>
[   22.247374] 
[   22.247539] The buggy address belongs to the physical page:
[   22.248112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2c
[   22.248807] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.250188] flags: 0x200000000000040(head|node=0|zone=2)
[   22.250944] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.251938] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.252977] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.253602] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.254255] head: 0200000000000002 ffffea00040acb01 ffffffffffffffff 0000000000000000
[   22.255008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.255924] page dumped because: kasan: bad access detected
[   22.256554] 
[   22.256908] Memory state around the buggy address:
[   22.257524]  ffff888102b2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.258244]  ffff888102b2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.259097] >ffff888102b2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.259885]                                                           ^
[   22.260689]  ffff888102b2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.261368]  ffff888102b2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.262054] ==================================================================