Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.313080] ================================================================== [ 29.314262] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 29.315141] Write of size 1 at addr fff00000c09760f0 by task kunit_try_catch/145 [ 29.316547] [ 29.316978] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.318215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.318831] Hardware name: linux,dummy-virt (DT) [ 29.320309] Call trace: [ 29.320717] show_stack+0x20/0x38 (C) [ 29.321479] dump_stack_lvl+0x8c/0xd0 [ 29.322012] print_report+0x118/0x5e0 [ 29.322608] kasan_report+0xc8/0x118 [ 29.323158] __asan_report_store1_noabort+0x20/0x30 [ 29.324120] krealloc_more_oob_helper+0x5c8/0x680 [ 29.325163] krealloc_more_oob+0x20/0x38 [ 29.325783] kunit_try_run_case+0x14c/0x3d0 [ 29.326535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.327338] kthread+0x24c/0x2d0 [ 29.327805] ret_from_fork+0x10/0x20 [ 29.328415] [ 29.328777] Allocated by task 145: [ 29.329718] kasan_save_stack+0x3c/0x68 [ 29.330311] kasan_save_track+0x20/0x40 [ 29.331055] kasan_save_alloc_info+0x40/0x58 [ 29.331976] __kasan_krealloc+0x118/0x178 [ 29.332543] krealloc_noprof+0x128/0x360 [ 29.333241] krealloc_more_oob_helper+0x168/0x680 [ 29.333896] krealloc_more_oob+0x20/0x38 [ 29.334455] kunit_try_run_case+0x14c/0x3d0 [ 29.335051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.336528] kthread+0x24c/0x2d0 [ 29.337084] ret_from_fork+0x10/0x20 [ 29.337666] [ 29.338070] The buggy address belongs to the object at fff00000c0976000 [ 29.338070] which belongs to the cache kmalloc-256 of size 256 [ 29.339271] The buggy address is located 5 bytes to the right of [ 29.339271] allocated 235-byte region [fff00000c0976000, fff00000c09760eb) [ 29.341278] [ 29.341626] The buggy address belongs to the physical page: [ 29.342492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.344004] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.344776] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.345758] page_type: f5(slab) [ 29.346324] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.347227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.348124] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.349056] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.350188] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.351223] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.352761] page dumped because: kasan: bad access detected [ 29.353479] [ 29.353765] Memory state around the buggy address: [ 29.354407] fff00000c0975f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.355119] fff00000c0976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.356433] >fff00000c0976080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.357314] ^ [ 29.358147] fff00000c0976100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.359132] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.360909] ================================================================== [ 29.636408] ================================================================== [ 29.637191] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 29.637978] Write of size 1 at addr fff00000c64920f0 by task kunit_try_catch/149 [ 29.638852] [ 29.639208] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.640577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.641264] Hardware name: linux,dummy-virt (DT) [ 29.641869] Call trace: [ 29.642302] show_stack+0x20/0x38 (C) [ 29.642774] dump_stack_lvl+0x8c/0xd0 [ 29.643465] print_report+0x118/0x5e0 [ 29.644026] kasan_report+0xc8/0x118 [ 29.644712] __asan_report_store1_noabort+0x20/0x30 [ 29.645408] krealloc_more_oob_helper+0x5c8/0x680 [ 29.645974] krealloc_large_more_oob+0x20/0x38 [ 29.646695] kunit_try_run_case+0x14c/0x3d0 [ 29.647391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.648103] kthread+0x24c/0x2d0 [ 29.648698] ret_from_fork+0x10/0x20 [ 29.649262] [ 29.649617] The buggy address belongs to the physical page: [ 29.650395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490 [ 29.651292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.652156] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.653074] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.654088] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.655015] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.655986] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.657075] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000 [ 29.657967] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.658829] page dumped because: kasan: bad access detected [ 29.659495] [ 29.659797] Memory state around the buggy address: [ 29.660407] fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.661294] fff00000c6492000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.662261] >fff00000c6492080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.663301] ^ [ 29.664121] fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.665043] fff00000c6492180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.665866] ================================================================== [ 29.260824] ================================================================== [ 29.262074] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 29.262988] Write of size 1 at addr fff00000c09760eb by task kunit_try_catch/145 [ 29.263800] [ 29.264277] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.266255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.267032] Hardware name: linux,dummy-virt (DT) [ 29.268075] Call trace: [ 29.268571] show_stack+0x20/0x38 (C) [ 29.269196] dump_stack_lvl+0x8c/0xd0 [ 29.269770] print_report+0x118/0x5e0 [ 29.270382] kasan_report+0xc8/0x118 [ 29.271101] __asan_report_store1_noabort+0x20/0x30 [ 29.272023] krealloc_more_oob_helper+0x614/0x680 [ 29.272815] krealloc_more_oob+0x20/0x38 [ 29.273360] kunit_try_run_case+0x14c/0x3d0 [ 29.274508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.275313] kthread+0x24c/0x2d0 [ 29.276110] ret_from_fork+0x10/0x20 [ 29.276958] [ 29.277330] Allocated by task 145: [ 29.277838] kasan_save_stack+0x3c/0x68 [ 29.278350] kasan_save_track+0x20/0x40 [ 29.279071] kasan_save_alloc_info+0x40/0x58 [ 29.280125] __kasan_krealloc+0x118/0x178 [ 29.281016] krealloc_noprof+0x128/0x360 [ 29.281610] krealloc_more_oob_helper+0x168/0x680 [ 29.282262] krealloc_more_oob+0x20/0x38 [ 29.283033] kunit_try_run_case+0x14c/0x3d0 [ 29.283652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.284665] kthread+0x24c/0x2d0 [ 29.285394] ret_from_fork+0x10/0x20 [ 29.285982] [ 29.286312] The buggy address belongs to the object at fff00000c0976000 [ 29.286312] which belongs to the cache kmalloc-256 of size 256 [ 29.288742] The buggy address is located 0 bytes to the right of [ 29.288742] allocated 235-byte region [fff00000c0976000, fff00000c09760eb) [ 29.290120] [ 29.290491] The buggy address belongs to the physical page: [ 29.291225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.292631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.293505] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.294331] page_type: f5(slab) [ 29.294856] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.295997] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.297226] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.298094] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.299098] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.300475] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.301361] page dumped because: kasan: bad access detected [ 29.302211] [ 29.302706] Memory state around the buggy address: [ 29.303483] fff00000c0975f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.304568] fff00000c0976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.305810] >fff00000c0976080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.306892] ^ [ 29.308258] fff00000c0976100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.309352] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.310186] ================================================================== [ 29.601786] ================================================================== [ 29.602974] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 29.603845] Write of size 1 at addr fff00000c64920eb by task kunit_try_catch/149 [ 29.604687] [ 29.605146] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.606476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.606935] Hardware name: linux,dummy-virt (DT) [ 29.608532] Call trace: [ 29.608905] show_stack+0x20/0x38 (C) [ 29.609611] dump_stack_lvl+0x8c/0xd0 [ 29.610104] print_report+0x118/0x5e0 [ 29.610733] kasan_report+0xc8/0x118 [ 29.611598] __asan_report_store1_noabort+0x20/0x30 [ 29.612270] krealloc_more_oob_helper+0x614/0x680 [ 29.613006] krealloc_large_more_oob+0x20/0x38 [ 29.613745] kunit_try_run_case+0x14c/0x3d0 [ 29.614344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.615178] kthread+0x24c/0x2d0 [ 29.615788] ret_from_fork+0x10/0x20 [ 29.616345] [ 29.616766] The buggy address belongs to the physical page: [ 29.617312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490 [ 29.618504] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.619477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.620393] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.621432] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.622332] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.623267] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.624190] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000 [ 29.625058] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.625964] page dumped because: kasan: bad access detected [ 29.626665] [ 29.627079] Memory state around the buggy address: [ 29.627671] fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.628630] fff00000c6492000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.629575] >fff00000c6492080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.630409] ^ [ 29.631213] fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.632095] fff00000c6492180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.633140] ==================================================================
[ 27.269954] ================================================================== [ 27.271083] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 27.271816] Write of size 1 at addr ffff88810226e0eb by task kunit_try_catch/167 [ 27.272470] [ 27.272655] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 27.274124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.274401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.275865] Call Trace: [ 27.276496] <TASK> [ 27.277057] dump_stack_lvl+0x73/0xb0 [ 27.277432] print_report+0xd1/0x640 [ 27.277806] ? __virt_addr_valid+0x1db/0x2d0 [ 27.278327] ? kasan_addr_to_slab+0x11/0xa0 [ 27.278754] kasan_report+0x102/0x140 [ 27.279375] ? krealloc_more_oob_helper+0x823/0x930 [ 27.280750] ? krealloc_more_oob_helper+0x823/0x930 [ 27.281652] __asan_report_store1_noabort+0x1b/0x30 [ 27.282192] krealloc_more_oob_helper+0x823/0x930 [ 27.283061] ? __schedule+0xc70/0x27e0 [ 27.283940] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 27.285269] ? finish_task_switch.isra.0+0x153/0x700 [ 27.286095] ? __switch_to+0x5d9/0xf60 [ 27.286632] ? __schedule+0xc70/0x27e0 [ 27.287056] ? __pfx_read_tsc+0x10/0x10 [ 27.288103] krealloc_large_more_oob+0x1c/0x30 [ 27.288595] kunit_try_run_case+0x1b3/0x490 [ 27.289563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.290326] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.291140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.291633] ? __kthread_parkme+0x82/0x160 [ 27.292540] ? preempt_count_sub+0x50/0x80 [ 27.293345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.293706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.294967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.295623] kthread+0x257/0x310 [ 27.296481] ? __pfx_kthread+0x10/0x10 [ 27.296872] ret_from_fork+0x41/0x80 [ 27.297485] ? __pfx_kthread+0x10/0x10 [ 27.298116] ret_from_fork_asm+0x1a/0x30 [ 27.298579] </TASK> [ 27.298939] [ 27.299340] The buggy address belongs to the physical page: [ 27.300314] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 27.301027] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.301972] flags: 0x200000000000040(head|node=0|zone=2) [ 27.302674] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.303524] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.304641] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.305358] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.306044] head: 0200000000000002 ffffea0004089b01 ffffffffffffffff 0000000000000000 [ 27.306928] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.307808] page dumped because: kasan: bad access detected [ 27.308602] [ 27.308926] Memory state around the buggy address: [ 27.309611] ffff88810226df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.310475] ffff88810226e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.311196] >ffff88810226e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 27.312341] ^ [ 27.313150] ffff88810226e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.313909] ffff88810226e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.314636] ================================================================== [ 27.317404] ================================================================== [ 27.318155] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 27.318849] Write of size 1 at addr ffff88810226e0f0 by task kunit_try_catch/167 [ 27.319727] [ 27.320175] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 27.321402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.321895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.322760] Call Trace: [ 27.323785] <TASK> [ 27.324033] dump_stack_lvl+0x73/0xb0 [ 27.324420] print_report+0xd1/0x640 [ 27.324800] ? __virt_addr_valid+0x1db/0x2d0 [ 27.325245] ? kasan_addr_to_slab+0x11/0xa0 [ 27.325715] kasan_report+0x102/0x140 [ 27.326011] ? krealloc_more_oob_helper+0x7ed/0x930 [ 27.326746] ? krealloc_more_oob_helper+0x7ed/0x930 [ 27.327645] __asan_report_store1_noabort+0x1b/0x30 [ 27.329382] krealloc_more_oob_helper+0x7ed/0x930 [ 27.330062] ? __schedule+0xc70/0x27e0 [ 27.330470] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 27.331525] ? finish_task_switch.isra.0+0x153/0x700 [ 27.332557] ? __switch_to+0x5d9/0xf60 [ 27.333043] ? __schedule+0xc70/0x27e0 [ 27.333634] ? __pfx_read_tsc+0x10/0x10 [ 27.334167] krealloc_large_more_oob+0x1c/0x30 [ 27.334776] kunit_try_run_case+0x1b3/0x490 [ 27.335590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.336472] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.337121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.337892] ? __kthread_parkme+0x82/0x160 [ 27.338352] ? preempt_count_sub+0x50/0x80 [ 27.338883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.339747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.340505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.341262] kthread+0x257/0x310 [ 27.341668] ? __pfx_kthread+0x10/0x10 [ 27.342269] ret_from_fork+0x41/0x80 [ 27.342616] ? __pfx_kthread+0x10/0x10 [ 27.343599] ret_from_fork_asm+0x1a/0x30 [ 27.344311] </TASK> [ 27.344636] [ 27.344981] The buggy address belongs to the physical page: [ 27.345651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 27.346782] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.347432] flags: 0x200000000000040(head|node=0|zone=2) [ 27.348117] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.348653] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.349634] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.350558] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.351674] head: 0200000000000002 ffffea0004089b01 ffffffffffffffff 0000000000000000 [ 27.352600] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.353550] page dumped because: kasan: bad access detected [ 27.354016] [ 27.354256] Memory state around the buggy address: [ 27.355061] ffff88810226df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.355716] ffff88810226e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.356582] >ffff88810226e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 27.357535] ^ [ 27.358194] ffff88810226e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.358978] ffff88810226e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.359765] ================================================================== [ 26.837623] ================================================================== [ 26.838770] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930 [ 26.839838] Write of size 1 at addr ffff8881009aaeeb by task kunit_try_catch/163 [ 26.841203] [ 26.841549] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 26.842601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.843097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.844244] Call Trace: [ 26.844815] <TASK> [ 26.845307] dump_stack_lvl+0x73/0xb0 [ 26.845695] print_report+0xd1/0x640 [ 26.846436] ? __virt_addr_valid+0x1db/0x2d0 [ 26.847177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.847465] kasan_report+0x102/0x140 [ 26.847649] ? krealloc_more_oob_helper+0x823/0x930 [ 26.848020] ? krealloc_more_oob_helper+0x823/0x930 [ 26.849332] __asan_report_store1_noabort+0x1b/0x30 [ 26.850059] krealloc_more_oob_helper+0x823/0x930 [ 26.850641] ? trace_hardirqs_on+0x37/0xe0 [ 26.851385] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.851940] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.852618] ? __pfx_krealloc_more_oob+0x10/0x10 [ 26.853155] krealloc_more_oob+0x1c/0x30 [ 26.853877] kunit_try_run_case+0x1b3/0x490 [ 26.854719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.855805] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.856506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.857109] ? __kthread_parkme+0x82/0x160 [ 26.858488] ? preempt_count_sub+0x50/0x80 [ 26.859044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.859665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.860882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.861526] kthread+0x257/0x310 [ 26.862110] ? __pfx_kthread+0x10/0x10 [ 26.863025] ret_from_fork+0x41/0x80 [ 26.863574] ? __pfx_kthread+0x10/0x10 [ 26.864260] ret_from_fork_asm+0x1a/0x30 [ 26.864653] </TASK> [ 26.864923] [ 26.865597] Allocated by task 163: [ 26.866314] kasan_save_stack+0x3d/0x60 [ 26.866743] kasan_save_track+0x18/0x40 [ 26.867852] kasan_save_alloc_info+0x3b/0x50 [ 26.868424] __kasan_krealloc+0x190/0x1f0 [ 26.868920] krealloc_noprof+0xf3/0x340 [ 26.869311] krealloc_more_oob_helper+0x1aa/0x930 [ 26.869978] krealloc_more_oob+0x1c/0x30 [ 26.870438] kunit_try_run_case+0x1b3/0x490 [ 26.871344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.872252] kthread+0x257/0x310 [ 26.872476] ret_from_fork+0x41/0x80 [ 26.872656] ret_from_fork_asm+0x1a/0x30 [ 26.873177] [ 26.873573] The buggy address belongs to the object at ffff8881009aae00 [ 26.873573] which belongs to the cache kmalloc-256 of size 256 [ 26.874315] The buggy address is located 0 bytes to the right of [ 26.874315] allocated 235-byte region [ffff8881009aae00, ffff8881009aaeeb) [ 26.876122] [ 26.876610] The buggy address belongs to the physical page: [ 26.877267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009aa [ 26.878109] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.879370] flags: 0x200000000000040(head|node=0|zone=2) [ 26.879896] page_type: f5(slab) [ 26.880580] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.881486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.882512] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.883190] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.884283] head: 0200000000000001 ffffea0004026a81 ffffffffffffffff 0000000000000000 [ 26.885268] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 26.886078] page dumped because: kasan: bad access detected [ 26.886582] [ 26.886943] Memory state around the buggy address: [ 26.887513] ffff8881009aad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.888229] ffff8881009aae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.889207] >ffff8881009aae80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.889729] ^ [ 26.890339] ffff8881009aaf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.891251] ffff8881009aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.892163] ================================================================== [ 26.894393] ================================================================== [ 26.895080] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930 [ 26.896493] Write of size 1 at addr ffff8881009aaef0 by task kunit_try_catch/163 [ 26.897229] [ 26.897559] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 26.898409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.899095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.899880] Call Trace: [ 26.900186] <TASK> [ 26.900601] dump_stack_lvl+0x73/0xb0 [ 26.901195] print_report+0xd1/0x640 [ 26.901527] ? __virt_addr_valid+0x1db/0x2d0 [ 26.902212] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.903129] kasan_report+0x102/0x140 [ 26.903632] ? krealloc_more_oob_helper+0x7ed/0x930 [ 26.904289] ? krealloc_more_oob_helper+0x7ed/0x930 [ 26.904783] __asan_report_store1_noabort+0x1b/0x30 [ 26.905445] krealloc_more_oob_helper+0x7ed/0x930 [ 26.905933] ? trace_hardirqs_on+0x37/0xe0 [ 26.906234] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.907402] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.907989] ? __pfx_krealloc_more_oob+0x10/0x10 [ 26.908744] krealloc_more_oob+0x1c/0x30 [ 26.909102] kunit_try_run_case+0x1b3/0x490 [ 26.909419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.910024] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.910996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.911419] ? __kthread_parkme+0x82/0x160 [ 26.911862] ? preempt_count_sub+0x50/0x80 [ 26.912488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.913252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.914542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.915280] kthread+0x257/0x310 [ 26.916294] ? __pfx_kthread+0x10/0x10 [ 26.916750] ret_from_fork+0x41/0x80 [ 26.917509] ? __pfx_kthread+0x10/0x10 [ 26.918798] ret_from_fork_asm+0x1a/0x30 [ 26.919275] </TASK> [ 26.919456] [ 26.919717] Allocated by task 163: [ 26.920077] kasan_save_stack+0x3d/0x60 [ 26.920512] kasan_save_track+0x18/0x40 [ 26.921225] kasan_save_alloc_info+0x3b/0x50 [ 26.921614] __kasan_krealloc+0x190/0x1f0 [ 26.922209] krealloc_noprof+0xf3/0x340 [ 26.922747] krealloc_more_oob_helper+0x1aa/0x930 [ 26.923526] krealloc_more_oob+0x1c/0x30 [ 26.924325] kunit_try_run_case+0x1b3/0x490 [ 26.924777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.925351] kthread+0x257/0x310 [ 26.925793] ret_from_fork+0x41/0x80 [ 26.926407] ret_from_fork_asm+0x1a/0x30 [ 26.926813] [ 26.927285] The buggy address belongs to the object at ffff8881009aae00 [ 26.927285] which belongs to the cache kmalloc-256 of size 256 [ 26.928350] The buggy address is located 5 bytes to the right of [ 26.928350] allocated 235-byte region [ffff8881009aae00, ffff8881009aaeeb) [ 26.930429] [ 26.930862] The buggy address belongs to the physical page: [ 26.931577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009aa [ 26.932474] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.933075] flags: 0x200000000000040(head|node=0|zone=2) [ 26.933761] page_type: f5(slab) [ 26.934462] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.935135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.935858] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.937123] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.937823] head: 0200000000000001 ffffea0004026a81 ffffffffffffffff 0000000000000000 [ 26.938627] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 26.939563] page dumped because: kasan: bad access detected [ 26.939998] [ 26.940332] Memory state around the buggy address: [ 26.940884] ffff8881009aad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.941696] ffff8881009aae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.942596] >ffff8881009aae80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.943300] ^ [ 26.944019] ffff8881009aaf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.945052] ffff8881009aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.945849] ==================================================================