Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 177.859251] ================================================================== [ 177.861292] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380 [ 177.863291] Write of size 1 at addr ffff0000c0b822eb by task kunit_try_catch/134 [ 177.865041] [ 177.866055] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 177.867890] Hardware name: linux,dummy-virt (DT) [ 177.869034] Call trace: [ 177.869786] dump_backtrace+0x9c/0x128 [ 177.870983] show_stack+0x20/0x38 [ 177.871945] dump_stack_lvl+0x60/0xb0 [ 177.873133] print_report+0xf8/0x5d8 [ 177.874436] kasan_report+0xc8/0x118 [ 177.875607] __asan_store1+0x60/0x70 [ 177.876751] krealloc_more_oob_helper+0x138/0x380 [ 177.878109] krealloc_more_oob+0x20/0x38 [ 177.879210] kunit_try_run_case+0xf8/0x260 [ 177.880364] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 177.882951] kthread+0x18c/0x1a8 [ 177.884183] ret_from_fork+0x10/0x20 [ 177.885481] [ 177.886232] Allocated by task 134: [ 177.887167] kasan_save_stack+0x3c/0x68 [ 177.888362] kasan_set_track+0x2c/0x40 [ 177.889667] kasan_save_alloc_info+0x24/0x38 [ 177.890982] __kasan_krealloc+0x10c/0x140 [ 177.892142] krealloc+0x10c/0x1a0 [ 177.893369] krealloc_more_oob_helper+0xd4/0x380 [ 177.894812] krealloc_more_oob+0x20/0x38 [ 177.896038] kunit_try_run_case+0xf8/0x260 [ 177.897967] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 177.899902] kthread+0x18c/0x1a8 [ 177.900953] ret_from_fork+0x10/0x20 [ 177.902053] [ 177.902978] The buggy address belongs to the object at ffff0000c0b82200 [ 177.902978] which belongs to the cache kmalloc-256 of size 256 [ 177.905603] The buggy address is located 0 bytes to the right of [ 177.905603] allocated 235-byte region [ffff0000c0b82200, ffff0000c0b822eb) [ 177.908389] [ 177.908957] The buggy address belongs to the physical page: [ 177.910511] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82 [ 177.912622] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 177.914536] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 177.916289] page_type: 0xffffffff() [ 177.917719] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 177.919511] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 177.921626] page dumped because: kasan: bad access detected [ 177.922736] [ 177.923293] Memory state around the buggy address: [ 177.924541] ffff0000c0b82180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 177.926595] ffff0000c0b82200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 177.928257] >ffff0000c0b82280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 177.929944] ^ [ 177.931445] ffff0000c0b82300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 177.933100] ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 177.934982] ================================================================== [ 178.500220] ================================================================== [ 178.501858] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380 [ 178.503153] Write of size 1 at addr ffff0000c5f9e0f0 by task kunit_try_catch/138 [ 178.505562] [ 178.506250] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.508008] Hardware name: linux,dummy-virt (DT) [ 178.509311] Call trace: [ 178.510273] dump_backtrace+0x9c/0x128 [ 178.511333] show_stack+0x20/0x38 [ 178.512264] dump_stack_lvl+0x60/0xb0 [ 178.513468] print_report+0xf8/0x5d8 [ 178.514733] kasan_report+0xc8/0x118 [ 178.515906] __asan_store1+0x60/0x70 [ 178.517037] krealloc_more_oob_helper+0x168/0x380 [ 178.518659] krealloc_pagealloc_more_oob+0x20/0x38 [ 178.520066] kunit_try_run_case+0xf8/0x260 [ 178.521637] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.523168] kthread+0x18c/0x1a8 [ 178.524258] ret_from_fork+0x10/0x20 [ 178.525660] [ 178.526169] The buggy address belongs to the physical page: [ 178.527614] page:00000000875d9a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9c [ 178.529528] head:00000000875d9a5f order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.531421] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 178.533026] page_type: 0xffffffff() [ 178.534107] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 178.535866] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 178.537932] page dumped because: kasan: bad access detected [ 178.538562] [ 178.538877] Memory state around the buggy address: [ 178.539461] ffff0000c5f9df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.541647] ffff0000c5f9e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.544075] >ffff0000c5f9e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 178.546761] ^ [ 178.548269] ffff0000c5f9e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.549909] ffff0000c5f9e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.551371] ================================================================== [ 177.937927] ================================================================== [ 177.939762] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380 [ 177.942067] Write of size 1 at addr ffff0000c0b822f0 by task kunit_try_catch/134 [ 177.943640] [ 177.944307] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 177.946104] Hardware name: linux,dummy-virt (DT) [ 177.946776] Call trace: [ 177.947625] dump_backtrace+0x9c/0x128 [ 177.948788] show_stack+0x20/0x38 [ 177.949787] dump_stack_lvl+0x60/0xb0 [ 177.950969] print_report+0xf8/0x5d8 [ 177.952102] kasan_report+0xc8/0x118 [ 177.953319] __asan_store1+0x60/0x70 [ 177.954491] krealloc_more_oob_helper+0x168/0x380 [ 177.955757] krealloc_more_oob+0x20/0x38 [ 177.957047] kunit_try_run_case+0xf8/0x260 [ 177.958660] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 177.960141] kthread+0x18c/0x1a8 [ 177.961904] ret_from_fork+0x10/0x20 [ 177.963040] [ 177.963521] Allocated by task 134: [ 177.964531] kasan_save_stack+0x3c/0x68 [ 177.965903] kasan_set_track+0x2c/0x40 [ 177.966988] kasan_save_alloc_info+0x24/0x38 [ 177.968293] __kasan_krealloc+0x10c/0x140 [ 177.969681] krealloc+0x10c/0x1a0 [ 177.970710] krealloc_more_oob_helper+0xd4/0x380 [ 177.972021] krealloc_more_oob+0x20/0x38 [ 177.973523] kunit_try_run_case+0xf8/0x260 [ 177.974814] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 177.976402] kthread+0x18c/0x1a8 [ 177.977773] ret_from_fork+0x10/0x20 [ 177.979402] [ 177.980323] The buggy address belongs to the object at ffff0000c0b82200 [ 177.980323] which belongs to the cache kmalloc-256 of size 256 [ 177.983022] The buggy address is located 5 bytes to the right of [ 177.983022] allocated 235-byte region [ffff0000c0b82200, ffff0000c0b822eb) [ 177.985392] [ 177.986029] The buggy address belongs to the physical page: [ 177.987341] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82 [ 177.989465] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 177.991167] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 177.992749] page_type: 0xffffffff() [ 177.993826] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 177.995620] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 177.997247] page dumped because: kasan: bad access detected [ 177.998627] [ 177.999105] Memory state around the buggy address: [ 178.000237] ffff0000c0b82180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.001730] ffff0000c0b82200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.003873] >ffff0000c0b82280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 178.005496] ^ [ 178.007305] ffff0000c0b82300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.008973] ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.010592] ================================================================== [ 178.444835] ================================================================== [ 178.447085] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380 [ 178.448720] Write of size 1 at addr ffff0000c5f9e0eb by task kunit_try_catch/138 [ 178.450727] [ 178.451302] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.453525] Hardware name: linux,dummy-virt (DT) [ 178.454652] Call trace: [ 178.455318] dump_backtrace+0x9c/0x128 [ 178.456390] show_stack+0x20/0x38 [ 178.457393] dump_stack_lvl+0x60/0xb0 [ 178.458899] print_report+0xf8/0x5d8 [ 178.460010] kasan_report+0xc8/0x118 [ 178.461978] __asan_store1+0x60/0x70 [ 178.462998] krealloc_more_oob_helper+0x138/0x380 [ 178.464360] krealloc_pagealloc_more_oob+0x20/0x38 [ 178.465974] kunit_try_run_case+0xf8/0x260 [ 178.467197] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.468674] kthread+0x18c/0x1a8 [ 178.469942] ret_from_fork+0x10/0x20 [ 178.471046] [ 178.471555] The buggy address belongs to the physical page: [ 178.472862] page:00000000875d9a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9c [ 178.474734] head:00000000875d9a5f order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.476699] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 178.478376] page_type: 0xffffffff() [ 178.479403] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 178.481209] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 178.482484] page dumped because: kasan: bad access detected [ 178.484390] [ 178.485290] Memory state around the buggy address: [ 178.486458] ffff0000c5f9df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.488045] ffff0000c5f9e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.489968] >ffff0000c5f9e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 178.491336] ^ [ 178.493286] ffff0000c5f9e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.494859] ffff0000c5f9e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.496386] ==================================================================