Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-arm64

[  177.859251] ==================================================================
[  177.861292] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[  177.863291] Write of size 1 at addr ffff0000c0b822eb by task kunit_try_catch/134
[  177.865041] 
[  177.866055] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  177.867890] Hardware name: linux,dummy-virt (DT)
[  177.869034] Call trace:
[  177.869786]  dump_backtrace+0x9c/0x128
[  177.870983]  show_stack+0x20/0x38
[  177.871945]  dump_stack_lvl+0x60/0xb0
[  177.873133]  print_report+0xf8/0x5d8
[  177.874436]  kasan_report+0xc8/0x118
[  177.875607]  __asan_store1+0x60/0x70
[  177.876751]  krealloc_more_oob_helper+0x138/0x380
[  177.878109]  krealloc_more_oob+0x20/0x38
[  177.879210]  kunit_try_run_case+0xf8/0x260
[  177.880364]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.882951]  kthread+0x18c/0x1a8
[  177.884183]  ret_from_fork+0x10/0x20
[  177.885481] 
[  177.886232] Allocated by task 134:
[  177.887167]  kasan_save_stack+0x3c/0x68
[  177.888362]  kasan_set_track+0x2c/0x40
[  177.889667]  kasan_save_alloc_info+0x24/0x38
[  177.890982]  __kasan_krealloc+0x10c/0x140
[  177.892142]  krealloc+0x10c/0x1a0
[  177.893369]  krealloc_more_oob_helper+0xd4/0x380
[  177.894812]  krealloc_more_oob+0x20/0x38
[  177.896038]  kunit_try_run_case+0xf8/0x260
[  177.897967]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.899902]  kthread+0x18c/0x1a8
[  177.900953]  ret_from_fork+0x10/0x20
[  177.902053] 
[  177.902978] The buggy address belongs to the object at ffff0000c0b82200
[  177.902978]  which belongs to the cache kmalloc-256 of size 256
[  177.905603] The buggy address is located 0 bytes to the right of
[  177.905603]  allocated 235-byte region [ffff0000c0b82200, ffff0000c0b822eb)
[  177.908389] 
[  177.908957] The buggy address belongs to the physical page:
[  177.910511] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82
[  177.912622] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  177.914536] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  177.916289] page_type: 0xffffffff()
[  177.917719] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  177.919511] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  177.921626] page dumped because: kasan: bad access detected
[  177.922736] 
[  177.923293] Memory state around the buggy address:
[  177.924541]  ffff0000c0b82180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.926595]  ffff0000c0b82200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  177.928257] >ffff0000c0b82280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  177.929944]                                                           ^
[  177.931445]  ffff0000c0b82300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.933100]  ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  177.934982] ==================================================================
[  178.500220] ==================================================================
[  178.501858] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[  178.503153] Write of size 1 at addr ffff0000c5f9e0f0 by task kunit_try_catch/138
[  178.505562] 
[  178.506250] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  178.508008] Hardware name: linux,dummy-virt (DT)
[  178.509311] Call trace:
[  178.510273]  dump_backtrace+0x9c/0x128
[  178.511333]  show_stack+0x20/0x38
[  178.512264]  dump_stack_lvl+0x60/0xb0
[  178.513468]  print_report+0xf8/0x5d8
[  178.514733]  kasan_report+0xc8/0x118
[  178.515906]  __asan_store1+0x60/0x70
[  178.517037]  krealloc_more_oob_helper+0x168/0x380
[  178.518659]  krealloc_pagealloc_more_oob+0x20/0x38
[  178.520066]  kunit_try_run_case+0xf8/0x260
[  178.521637]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  178.523168]  kthread+0x18c/0x1a8
[  178.524258]  ret_from_fork+0x10/0x20
[  178.525660] 
[  178.526169] The buggy address belongs to the physical page:
[  178.527614] page:00000000875d9a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9c
[  178.529528] head:00000000875d9a5f order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  178.531421] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  178.533026] page_type: 0xffffffff()
[  178.534107] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  178.535866] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  178.537932] page dumped because: kasan: bad access detected
[  178.538562] 
[  178.538877] Memory state around the buggy address:
[  178.539461]  ffff0000c5f9df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  178.541647]  ffff0000c5f9e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  178.544075] >ffff0000c5f9e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  178.546761]                                                              ^
[  178.548269]  ffff0000c5f9e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  178.549909]  ffff0000c5f9e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  178.551371] ==================================================================
[  177.937927] ==================================================================
[  177.939762] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[  177.942067] Write of size 1 at addr ffff0000c0b822f0 by task kunit_try_catch/134
[  177.943640] 
[  177.944307] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  177.946104] Hardware name: linux,dummy-virt (DT)
[  177.946776] Call trace:
[  177.947625]  dump_backtrace+0x9c/0x128
[  177.948788]  show_stack+0x20/0x38
[  177.949787]  dump_stack_lvl+0x60/0xb0
[  177.950969]  print_report+0xf8/0x5d8
[  177.952102]  kasan_report+0xc8/0x118
[  177.953319]  __asan_store1+0x60/0x70
[  177.954491]  krealloc_more_oob_helper+0x168/0x380
[  177.955757]  krealloc_more_oob+0x20/0x38
[  177.957047]  kunit_try_run_case+0xf8/0x260
[  177.958660]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.960141]  kthread+0x18c/0x1a8
[  177.961904]  ret_from_fork+0x10/0x20
[  177.963040] 
[  177.963521] Allocated by task 134:
[  177.964531]  kasan_save_stack+0x3c/0x68
[  177.965903]  kasan_set_track+0x2c/0x40
[  177.966988]  kasan_save_alloc_info+0x24/0x38
[  177.968293]  __kasan_krealloc+0x10c/0x140
[  177.969681]  krealloc+0x10c/0x1a0
[  177.970710]  krealloc_more_oob_helper+0xd4/0x380
[  177.972021]  krealloc_more_oob+0x20/0x38
[  177.973523]  kunit_try_run_case+0xf8/0x260
[  177.974814]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  177.976402]  kthread+0x18c/0x1a8
[  177.977773]  ret_from_fork+0x10/0x20
[  177.979402] 
[  177.980323] The buggy address belongs to the object at ffff0000c0b82200
[  177.980323]  which belongs to the cache kmalloc-256 of size 256
[  177.983022] The buggy address is located 5 bytes to the right of
[  177.983022]  allocated 235-byte region [ffff0000c0b82200, ffff0000c0b822eb)
[  177.985392] 
[  177.986029] The buggy address belongs to the physical page:
[  177.987341] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82
[  177.989465] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  177.991167] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  177.992749] page_type: 0xffffffff()
[  177.993826] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  177.995620] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  177.997247] page dumped because: kasan: bad access detected
[  177.998627] 
[  177.999105] Memory state around the buggy address:
[  178.000237]  ffff0000c0b82180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  178.001730]  ffff0000c0b82200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  178.003873] >ffff0000c0b82280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  178.005496]                                                              ^
[  178.007305]  ffff0000c0b82300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  178.008973]  ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  178.010592] ==================================================================
[  178.444835] ==================================================================
[  178.447085] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[  178.448720] Write of size 1 at addr ffff0000c5f9e0eb by task kunit_try_catch/138
[  178.450727] 
[  178.451302] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  178.453525] Hardware name: linux,dummy-virt (DT)
[  178.454652] Call trace:
[  178.455318]  dump_backtrace+0x9c/0x128
[  178.456390]  show_stack+0x20/0x38
[  178.457393]  dump_stack_lvl+0x60/0xb0
[  178.458899]  print_report+0xf8/0x5d8
[  178.460010]  kasan_report+0xc8/0x118
[  178.461978]  __asan_store1+0x60/0x70
[  178.462998]  krealloc_more_oob_helper+0x138/0x380
[  178.464360]  krealloc_pagealloc_more_oob+0x20/0x38
[  178.465974]  kunit_try_run_case+0xf8/0x260
[  178.467197]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  178.468674]  kthread+0x18c/0x1a8
[  178.469942]  ret_from_fork+0x10/0x20
[  178.471046] 
[  178.471555] The buggy address belongs to the physical page:
[  178.472862] page:00000000875d9a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9c
[  178.474734] head:00000000875d9a5f order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  178.476699] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  178.478376] page_type: 0xffffffff()
[  178.479403] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  178.481209] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  178.482484] page dumped because: kasan: bad access detected
[  178.484390] 
[  178.485290] Memory state around the buggy address:
[  178.486458]  ffff0000c5f9df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  178.488045]  ffff0000c5f9e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  178.489968] >ffff0000c5f9e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  178.491336]                                                           ^
[  178.493286]  ffff0000c5f9e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  178.494859]  ffff0000c5f9e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  178.496386] ==================================================================