Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.962994] ================================================================== [ 17.963028] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.963068] Write of size 1 at addr fff00000c78320f0 by task kunit_try_catch/160 [ 17.963123] [ 17.963495] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.964014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.964057] Hardware name: linux,dummy-virt (DT) [ 17.964173] Call trace: [ 17.964287] show_stack+0x20/0x38 (C) [ 17.964421] dump_stack_lvl+0x8c/0xd0 [ 17.964466] print_report+0x118/0x608 [ 17.964533] kasan_report+0xdc/0x128 [ 17.964579] __asan_report_store1_noabort+0x20/0x30 [ 17.964812] krealloc_more_oob_helper+0x5c0/0x678 [ 17.964986] krealloc_large_more_oob+0x20/0x38 [ 17.965122] kunit_try_run_case+0x170/0x3f0 [ 17.965244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.965296] kthread+0x328/0x630 [ 17.965532] ret_from_fork+0x10/0x20 [ 17.965659] [ 17.965679] The buggy address belongs to the physical page: [ 17.965727] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107830 [ 17.965786] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.965830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.966093] page_type: f8(unknown) [ 17.966174] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.966289] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.966356] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.966402] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.966630] head: 0bfffe0000000002 ffffc1ffc31e0c01 00000000ffffffff 00000000ffffffff [ 17.966716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.966832] page dumped because: kasan: bad access detected [ 17.966958] [ 17.967047] Memory state around the buggy address: [ 17.967077] fff00000c7831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.967368] fff00000c7832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.967490] >fff00000c7832080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.967548] ^ [ 17.967665] fff00000c7832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.967752] fff00000c7832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.967788] ================================================================== [ 17.922359] ================================================================== [ 17.922417] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.922493] Write of size 1 at addr fff00000c44ec8f0 by task kunit_try_catch/156 [ 17.922541] [ 17.922585] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.922661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.922686] Hardware name: linux,dummy-virt (DT) [ 17.922760] Call trace: [ 17.922782] show_stack+0x20/0x38 (C) [ 17.922919] dump_stack_lvl+0x8c/0xd0 [ 17.923006] print_report+0x118/0x608 [ 17.923071] kasan_report+0xdc/0x128 [ 17.923116] __asan_report_store1_noabort+0x20/0x30 [ 17.923217] krealloc_more_oob_helper+0x5c0/0x678 [ 17.923283] krealloc_more_oob+0x20/0x38 [ 17.923336] kunit_try_run_case+0x170/0x3f0 [ 17.923382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.923520] kthread+0x328/0x630 [ 17.923590] ret_from_fork+0x10/0x20 [ 17.923639] [ 17.923657] Allocated by task 156: [ 17.923771] kasan_save_stack+0x3c/0x68 [ 17.923818] kasan_save_track+0x20/0x40 [ 17.923887] kasan_save_alloc_info+0x40/0x58 [ 17.924074] __kasan_krealloc+0x118/0x178 [ 17.924171] krealloc_noprof+0x128/0x360 [ 17.924207] krealloc_more_oob_helper+0x168/0x678 [ 17.924244] krealloc_more_oob+0x20/0x38 [ 17.924301] kunit_try_run_case+0x170/0x3f0 [ 17.924336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.924378] kthread+0x328/0x630 [ 17.924409] ret_from_fork+0x10/0x20 [ 17.924443] [ 17.924607] The buggy address belongs to the object at fff00000c44ec800 [ 17.924607] which belongs to the cache kmalloc-256 of size 256 [ 17.924762] The buggy address is located 5 bytes to the right of [ 17.924762] allocated 235-byte region [fff00000c44ec800, fff00000c44ec8eb) [ 17.924914] [ 17.925027] The buggy address belongs to the physical page: [ 17.925056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ec [ 17.925348] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.925474] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.925623] page_type: f5(slab) [ 17.925709] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.925784] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.925937] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.926056] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.926190] head: 0bfffe0000000001 ffffc1ffc3113b01 00000000ffffffff 00000000ffffffff [ 17.926330] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.926444] page dumped because: kasan: bad access detected [ 17.926474] [ 17.926491] Memory state around the buggy address: [ 17.926724] fff00000c44ec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.926838] fff00000c44ec800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.927005] >fff00000c44ec880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.927146] ^ [ 17.927196] fff00000c44ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927451] fff00000c44ec980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927538] ================================================================== [ 17.915901] ================================================================== [ 17.916003] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.916055] Write of size 1 at addr fff00000c44ec8eb by task kunit_try_catch/156 [ 17.916123] [ 17.916165] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.916508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.916688] Hardware name: linux,dummy-virt (DT) [ 17.916720] Call trace: [ 17.916779] show_stack+0x20/0x38 (C) [ 17.916950] dump_stack_lvl+0x8c/0xd0 [ 17.917069] print_report+0x118/0x608 [ 17.917145] kasan_report+0xdc/0x128 [ 17.917203] __asan_report_store1_noabort+0x20/0x30 [ 17.917426] krealloc_more_oob_helper+0x60c/0x678 [ 17.917572] krealloc_more_oob+0x20/0x38 [ 17.917670] kunit_try_run_case+0x170/0x3f0 [ 17.917844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.917947] kthread+0x328/0x630 [ 17.917988] ret_from_fork+0x10/0x20 [ 17.918174] [ 17.918194] Allocated by task 156: [ 17.918264] kasan_save_stack+0x3c/0x68 [ 17.918421] kasan_save_track+0x20/0x40 [ 17.918520] kasan_save_alloc_info+0x40/0x58 [ 17.918668] __kasan_krealloc+0x118/0x178 [ 17.918724] krealloc_noprof+0x128/0x360 [ 17.918762] krealloc_more_oob_helper+0x168/0x678 [ 17.918800] krealloc_more_oob+0x20/0x38 [ 17.918834] kunit_try_run_case+0x170/0x3f0 [ 17.918870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.919132] kthread+0x328/0x630 [ 17.919272] ret_from_fork+0x10/0x20 [ 17.919350] [ 17.919426] The buggy address belongs to the object at fff00000c44ec800 [ 17.919426] which belongs to the cache kmalloc-256 of size 256 [ 17.919550] The buggy address is located 0 bytes to the right of [ 17.919550] allocated 235-byte region [fff00000c44ec800, fff00000c44ec8eb) [ 17.919641] [ 17.919693] The buggy address belongs to the physical page: [ 17.919725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ec [ 17.919799] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.919925] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.920090] page_type: f5(slab) [ 17.920280] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.920397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.920445] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.920491] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.920537] head: 0bfffe0000000001 ffffc1ffc3113b01 00000000ffffffff 00000000ffffffff [ 17.920611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.920650] page dumped because: kasan: bad access detected [ 17.920680] [ 17.920699] Memory state around the buggy address: [ 17.920728] fff00000c44ec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.920769] fff00000c44ec800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.920938] >fff00000c44ec880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.921096] ^ [ 17.921185] fff00000c44ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.921313] fff00000c44ec980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.921402] ================================================================== [ 17.961177] ================================================================== [ 17.961234] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.961283] Write of size 1 at addr fff00000c78320eb by task kunit_try_catch/160 [ 17.961337] [ 17.961368] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.961459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.961485] Hardware name: linux,dummy-virt (DT) [ 17.961514] Call trace: [ 17.961535] show_stack+0x20/0x38 (C) [ 17.961581] dump_stack_lvl+0x8c/0xd0 [ 17.961627] print_report+0x118/0x608 [ 17.961673] kasan_report+0xdc/0x128 [ 17.961719] __asan_report_store1_noabort+0x20/0x30 [ 17.961765] krealloc_more_oob_helper+0x60c/0x678 [ 17.961812] krealloc_large_more_oob+0x20/0x38 [ 17.961867] kunit_try_run_case+0x170/0x3f0 [ 17.961912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.961963] kthread+0x328/0x630 [ 17.962003] ret_from_fork+0x10/0x20 [ 17.962064] [ 17.962094] The buggy address belongs to the physical page: [ 17.962130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107830 [ 17.962191] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.962245] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.962294] page_type: f8(unknown) [ 17.962331] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.962387] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.962434] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.962480] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.962527] head: 0bfffe0000000002 ffffc1ffc31e0c01 00000000ffffffff 00000000ffffffff [ 17.962572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.962611] page dumped because: kasan: bad access detected [ 17.962640] [ 17.962666] Memory state around the buggy address: [ 17.962696] fff00000c7831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.962736] fff00000c7832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.962785] >fff00000c7832080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.962822] ^ [ 17.962859] fff00000c7832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.962901] fff00000c7832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.962940] ==================================================================
[ 13.296647] ================================================================== [ 13.297191] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 13.297632] Write of size 1 at addr ffff888102afe0eb by task kunit_try_catch/178 [ 13.298209] [ 13.298355] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.298423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.298436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.298475] Call Trace: [ 13.298490] <TASK> [ 13.298511] dump_stack_lvl+0x73/0xb0 [ 13.298560] print_report+0xd1/0x650 [ 13.298586] ? __virt_addr_valid+0x1db/0x2d0 [ 13.298613] ? krealloc_more_oob_helper+0x821/0x930 [ 13.298652] ? kasan_addr_to_slab+0x11/0xa0 [ 13.298674] ? krealloc_more_oob_helper+0x821/0x930 [ 13.298702] kasan_report+0x141/0x180 [ 13.298727] ? krealloc_more_oob_helper+0x821/0x930 [ 13.298758] __asan_report_store1_noabort+0x1b/0x30 [ 13.298781] krealloc_more_oob_helper+0x821/0x930 [ 13.298816] ? __schedule+0x10cc/0x2b60 [ 13.298842] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.298869] ? finish_task_switch.isra.0+0x153/0x700 [ 13.298906] ? __switch_to+0x47/0xf50 [ 13.298936] ? __schedule+0x10cc/0x2b60 [ 13.298960] ? __pfx_read_tsc+0x10/0x10 [ 13.299001] krealloc_large_more_oob+0x1c/0x30 [ 13.299026] kunit_try_run_case+0x1a5/0x480 [ 13.299068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.299092] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.299119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.299173] ? __kthread_parkme+0x82/0x180 [ 13.299197] ? preempt_count_sub+0x50/0x80 [ 13.299234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.299259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.299284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.299309] kthread+0x337/0x6f0 [ 13.299331] ? trace_preempt_on+0x20/0xc0 [ 13.299358] ? __pfx_kthread+0x10/0x10 [ 13.299380] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.299405] ? calculate_sigpending+0x7b/0xa0 [ 13.299432] ? __pfx_kthread+0x10/0x10 [ 13.299456] ret_from_fork+0x116/0x1d0 [ 13.299477] ? __pfx_kthread+0x10/0x10 [ 13.299499] ret_from_fork_asm+0x1a/0x30 [ 13.299534] </TASK> [ 13.299548] [ 13.311706] The buggy address belongs to the physical page: [ 13.312172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 13.312713] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.313222] flags: 0x200000000000040(head|node=0|zone=2) [ 13.313636] page_type: f8(unknown) [ 13.313959] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.314543] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.314950] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.315491] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.315971] head: 0200000000000002 ffffea00040abf01 00000000ffffffff 00000000ffffffff [ 13.316475] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.316971] page dumped because: kasan: bad access detected [ 13.317402] [ 13.317520] Memory state around the buggy address: [ 13.317955] ffff888102afdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.318422] ffff888102afe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.318851] >ffff888102afe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 13.319324] ^ [ 13.319724] ffff888102afe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.320107] ffff888102afe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.320672] ================================================================== [ 13.058947] ================================================================== [ 13.060398] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 13.061339] Write of size 1 at addr ffff888100ab80eb by task kunit_try_catch/174 [ 13.062492] [ 13.062633] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.062689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.062704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.062729] Call Trace: [ 13.062744] <TASK> [ 13.062765] dump_stack_lvl+0x73/0xb0 [ 13.062820] print_report+0xd1/0x650 [ 13.062847] ? __virt_addr_valid+0x1db/0x2d0 [ 13.062874] ? krealloc_more_oob_helper+0x821/0x930 [ 13.062900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.062925] ? krealloc_more_oob_helper+0x821/0x930 [ 13.062951] kasan_report+0x141/0x180 [ 13.062975] ? krealloc_more_oob_helper+0x821/0x930 [ 13.063006] __asan_report_store1_noabort+0x1b/0x30 [ 13.063028] krealloc_more_oob_helper+0x821/0x930 [ 13.063052] ? __schedule+0x10cc/0x2b60 [ 13.063079] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.063106] ? finish_task_switch.isra.0+0x153/0x700 [ 13.063131] ? __switch_to+0x47/0xf50 [ 13.063160] ? __schedule+0x10cc/0x2b60 [ 13.063183] ? __pfx_read_tsc+0x10/0x10 [ 13.063211] krealloc_more_oob+0x1c/0x30 [ 13.063300] kunit_try_run_case+0x1a5/0x480 [ 13.063349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.063374] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.063412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.063438] ? __kthread_parkme+0x82/0x180 [ 13.063462] ? preempt_count_sub+0x50/0x80 [ 13.063488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.063513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.063538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.063563] kthread+0x337/0x6f0 [ 13.063584] ? trace_preempt_on+0x20/0xc0 [ 13.063611] ? __pfx_kthread+0x10/0x10 [ 13.063635] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.063659] ? calculate_sigpending+0x7b/0xa0 [ 13.063686] ? __pfx_kthread+0x10/0x10 [ 13.063710] ret_from_fork+0x116/0x1d0 [ 13.063732] ? __pfx_kthread+0x10/0x10 [ 13.063754] ret_from_fork_asm+0x1a/0x30 [ 13.063800] </TASK> [ 13.063813] [ 13.074466] Allocated by task 174: [ 13.075032] kasan_save_stack+0x45/0x70 [ 13.075551] kasan_save_track+0x18/0x40 [ 13.075721] kasan_save_alloc_info+0x3b/0x50 [ 13.075921] __kasan_krealloc+0x190/0x1f0 [ 13.076532] krealloc_noprof+0xf3/0x340 [ 13.077808] krealloc_more_oob_helper+0x1a9/0x930 [ 13.078819] krealloc_more_oob+0x1c/0x30 [ 13.079669] kunit_try_run_case+0x1a5/0x480 [ 13.080133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.080371] kthread+0x337/0x6f0 [ 13.080514] ret_from_fork+0x116/0x1d0 [ 13.080669] ret_from_fork_asm+0x1a/0x30 [ 13.080843] [ 13.080928] The buggy address belongs to the object at ffff888100ab8000 [ 13.080928] which belongs to the cache kmalloc-256 of size 256 [ 13.081496] The buggy address is located 0 bytes to the right of [ 13.081496] allocated 235-byte region [ffff888100ab8000, ffff888100ab80eb) [ 13.082036] [ 13.082348] The buggy address belongs to the physical page: [ 13.082575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8 [ 13.082877] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.083215] flags: 0x200000000000040(head|node=0|zone=2) [ 13.083818] page_type: f5(slab) [ 13.084186] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.085098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.086045] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.087472] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.088090] head: 0200000000000001 ffffea000402ae01 00000000ffffffff 00000000ffffffff [ 13.089536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.090205] page dumped because: kasan: bad access detected [ 13.090408] [ 13.090490] Memory state around the buggy address: [ 13.090666] ffff888100ab7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.090920] ffff888100ab8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.091159] >ffff888100ab8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 13.091390] ^ [ 13.091613] ffff888100ab8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.092151] ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.093706] ================================================================== [ 13.321542] ================================================================== [ 13.321942] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 13.322994] Write of size 1 at addr ffff888102afe0f0 by task kunit_try_catch/178 [ 13.323337] [ 13.323478] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.323532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.323547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.323572] Call Trace: [ 13.323596] <TASK> [ 13.323618] dump_stack_lvl+0x73/0xb0 [ 13.323657] print_report+0xd1/0x650 [ 13.323684] ? __virt_addr_valid+0x1db/0x2d0 [ 13.323710] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.323737] ? kasan_addr_to_slab+0x11/0xa0 [ 13.323760] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.323802] kasan_report+0x141/0x180 [ 13.323827] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.323858] __asan_report_store1_noabort+0x1b/0x30 [ 13.323881] krealloc_more_oob_helper+0x7eb/0x930 [ 13.323906] ? __schedule+0x10cc/0x2b60 [ 13.323931] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.323958] ? finish_task_switch.isra.0+0x153/0x700 [ 13.323983] ? __switch_to+0x47/0xf50 [ 13.324012] ? __schedule+0x10cc/0x2b60 [ 13.324036] ? __pfx_read_tsc+0x10/0x10 [ 13.324063] krealloc_large_more_oob+0x1c/0x30 [ 13.324088] kunit_try_run_case+0x1a5/0x480 [ 13.324115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.324139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.324165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.324190] ? __kthread_parkme+0x82/0x180 [ 13.324214] ? preempt_count_sub+0x50/0x80 [ 13.324239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.324265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.324289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.324314] kthread+0x337/0x6f0 [ 13.324335] ? trace_preempt_on+0x20/0xc0 [ 13.324362] ? __pfx_kthread+0x10/0x10 [ 13.324384] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.324408] ? calculate_sigpending+0x7b/0xa0 [ 13.324434] ? __pfx_kthread+0x10/0x10 [ 13.324457] ret_from_fork+0x116/0x1d0 [ 13.324478] ? __pfx_kthread+0x10/0x10 [ 13.324501] ret_from_fork_asm+0x1a/0x30 [ 13.324535] </TASK> [ 13.324548] [ 13.332640] The buggy address belongs to the physical page: [ 13.333125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 13.333545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.333860] flags: 0x200000000000040(head|node=0|zone=2) [ 13.334067] page_type: f8(unknown) [ 13.334239] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.334725] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.335268] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.335570] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.335861] head: 0200000000000002 ffffea00040abf01 00000000ffffffff 00000000ffffffff [ 13.336144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.336539] page dumped because: kasan: bad access detected [ 13.336844] [ 13.336981] Memory state around the buggy address: [ 13.337241] ffff888102afdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.337620] ffff888102afe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.337982] >ffff888102afe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 13.338354] ^ [ 13.338620] ffff888102afe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.338920] ffff888102afe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.339287] ================================================================== [ 13.095274] ================================================================== [ 13.095662] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 13.095973] Write of size 1 at addr ffff888100ab80f0 by task kunit_try_catch/174 [ 13.096351] [ 13.096721] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.096779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.096808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.096833] Call Trace: [ 13.096849] <TASK> [ 13.096871] dump_stack_lvl+0x73/0xb0 [ 13.096909] print_report+0xd1/0x650 [ 13.097194] ? __virt_addr_valid+0x1db/0x2d0 [ 13.097224] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.097266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.097343] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.097371] kasan_report+0x141/0x180 [ 13.097409] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.097441] __asan_report_store1_noabort+0x1b/0x30 [ 13.097466] krealloc_more_oob_helper+0x7eb/0x930 [ 13.097491] ? __schedule+0x10cc/0x2b60 [ 13.097517] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.097545] ? finish_task_switch.isra.0+0x153/0x700 [ 13.097571] ? __switch_to+0x47/0xf50 [ 13.097600] ? __schedule+0x10cc/0x2b60 [ 13.097624] ? __pfx_read_tsc+0x10/0x10 [ 13.097652] krealloc_more_oob+0x1c/0x30 [ 13.097677] kunit_try_run_case+0x1a5/0x480 [ 13.097705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.097729] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.097756] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.097782] ? __kthread_parkme+0x82/0x180 [ 13.097829] ? preempt_count_sub+0x50/0x80 [ 13.097854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.097881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.097906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.097932] kthread+0x337/0x6f0 [ 13.097954] ? trace_preempt_on+0x20/0xc0 [ 13.097981] ? __pfx_kthread+0x10/0x10 [ 13.098005] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.098029] ? calculate_sigpending+0x7b/0xa0 [ 13.098056] ? __pfx_kthread+0x10/0x10 [ 13.098080] ret_from_fork+0x116/0x1d0 [ 13.098101] ? __pfx_kthread+0x10/0x10 [ 13.098124] ret_from_fork_asm+0x1a/0x30 [ 13.098159] </TASK> [ 13.098173] [ 13.110662] Allocated by task 174: [ 13.110857] kasan_save_stack+0x45/0x70 [ 13.111033] kasan_save_track+0x18/0x40 [ 13.111222] kasan_save_alloc_info+0x3b/0x50 [ 13.111591] __kasan_krealloc+0x190/0x1f0 [ 13.111810] krealloc_noprof+0xf3/0x340 [ 13.112088] krealloc_more_oob_helper+0x1a9/0x930 [ 13.112591] krealloc_more_oob+0x1c/0x30 [ 13.112871] kunit_try_run_case+0x1a5/0x480 [ 13.113089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.113524] kthread+0x337/0x6f0 [ 13.113859] ret_from_fork+0x116/0x1d0 [ 13.114153] ret_from_fork_asm+0x1a/0x30 [ 13.114318] [ 13.114400] The buggy address belongs to the object at ffff888100ab8000 [ 13.114400] which belongs to the cache kmalloc-256 of size 256 [ 13.115256] The buggy address is located 5 bytes to the right of [ 13.115256] allocated 235-byte region [ffff888100ab8000, ffff888100ab80eb) [ 13.116052] [ 13.116399] The buggy address belongs to the physical page: [ 13.116685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8 [ 13.117053] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.117766] flags: 0x200000000000040(head|node=0|zone=2) [ 13.118079] page_type: f5(slab) [ 13.118244] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.118808] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.119375] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.119775] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.120186] head: 0200000000000001 ffffea000402ae01 00000000ffffffff 00000000ffffffff [ 13.120738] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.121159] page dumped because: kasan: bad access detected [ 13.121566] [ 13.121682] Memory state around the buggy address: [ 13.121925] ffff888100ab7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.122494] ffff888100ab8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.122910] >ffff888100ab8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 13.123355] ^ [ 13.123780] ffff888100ab8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.124124] ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.124734] ==================================================================