Date
July 2, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.017899] ================================================================== [ 18.017973] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 18.018026] Write of size 1 at addr fff00000c17aa4f0 by task kunit_try_catch/156 [ 18.018100] [ 18.018129] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.018502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.018558] Hardware name: linux,dummy-virt (DT) [ 18.018611] Call trace: [ 18.018639] show_stack+0x20/0x38 (C) [ 18.018715] dump_stack_lvl+0x8c/0xd0 [ 18.018787] print_report+0x118/0x608 [ 18.018855] kasan_report+0xdc/0x128 [ 18.018965] __asan_report_store1_noabort+0x20/0x30 [ 18.019020] krealloc_more_oob_helper+0x5c0/0x678 [ 18.019068] krealloc_more_oob+0x20/0x38 [ 18.019113] kunit_try_run_case+0x170/0x3f0 [ 18.019158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.019362] kthread+0x328/0x630 [ 18.019446] ret_from_fork+0x10/0x20 [ 18.019493] [ 18.019511] Allocated by task 156: [ 18.019537] kasan_save_stack+0x3c/0x68 [ 18.019588] kasan_save_track+0x20/0x40 [ 18.019625] kasan_save_alloc_info+0x40/0x58 [ 18.019662] __kasan_krealloc+0x118/0x178 [ 18.019698] krealloc_noprof+0x128/0x360 [ 18.019733] krealloc_more_oob_helper+0x168/0x678 [ 18.019770] krealloc_more_oob+0x20/0x38 [ 18.019805] kunit_try_run_case+0x170/0x3f0 [ 18.019841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.019883] kthread+0x328/0x630 [ 18.020038] ret_from_fork+0x10/0x20 [ 18.020120] [ 18.020152] The buggy address belongs to the object at fff00000c17aa400 [ 18.020152] which belongs to the cache kmalloc-256 of size 256 [ 18.020224] The buggy address is located 5 bytes to the right of [ 18.020224] allocated 235-byte region [fff00000c17aa400, fff00000c17aa4eb) [ 18.020286] [ 18.020304] The buggy address belongs to the physical page: [ 18.020538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017aa [ 18.020612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.020656] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.020734] page_type: f5(slab) [ 18.020772] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.020974] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.021070] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.021159] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.021274] head: 0bfffe0000000001 ffffc1ffc305ea81 00000000ffffffff 00000000ffffffff [ 18.021390] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.021503] page dumped because: kasan: bad access detected [ 18.021541] [ 18.021558] Memory state around the buggy address: [ 18.021599] fff00000c17aa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.021640] fff00000c17aa400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.021723] >fff00000c17aa480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.021761] ^ [ 18.021909] fff00000c17aa500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.021973] fff00000c17aa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.022096] ================================================================== [ 18.013253] ================================================================== [ 18.013427] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 18.013500] Write of size 1 at addr fff00000c17aa4eb by task kunit_try_catch/156 [ 18.013550] [ 18.013612] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.013691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.013717] Hardware name: linux,dummy-virt (DT) [ 18.013747] Call trace: [ 18.013767] show_stack+0x20/0x38 (C) [ 18.013986] dump_stack_lvl+0x8c/0xd0 [ 18.014073] print_report+0x118/0x608 [ 18.014135] kasan_report+0xdc/0x128 [ 18.014181] __asan_report_store1_noabort+0x20/0x30 [ 18.014245] krealloc_more_oob_helper+0x60c/0x678 [ 18.014305] krealloc_more_oob+0x20/0x38 [ 18.014357] kunit_try_run_case+0x170/0x3f0 [ 18.014404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.014644] kthread+0x328/0x630 [ 18.014699] ret_from_fork+0x10/0x20 [ 18.014809] [ 18.014896] Allocated by task 156: [ 18.014963] kasan_save_stack+0x3c/0x68 [ 18.015006] kasan_save_track+0x20/0x40 [ 18.015042] kasan_save_alloc_info+0x40/0x58 [ 18.015080] __kasan_krealloc+0x118/0x178 [ 18.015115] krealloc_noprof+0x128/0x360 [ 18.015152] krealloc_more_oob_helper+0x168/0x678 [ 18.015324] krealloc_more_oob+0x20/0x38 [ 18.015402] kunit_try_run_case+0x170/0x3f0 [ 18.015481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.015525] kthread+0x328/0x630 [ 18.015612] ret_from_fork+0x10/0x20 [ 18.015648] [ 18.015685] The buggy address belongs to the object at fff00000c17aa400 [ 18.015685] which belongs to the cache kmalloc-256 of size 256 [ 18.015748] The buggy address is located 0 bytes to the right of [ 18.015748] allocated 235-byte region [fff00000c17aa400, fff00000c17aa4eb) [ 18.015809] [ 18.015828] The buggy address belongs to the physical page: [ 18.015973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017aa [ 18.016028] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.016073] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.016126] page_type: f5(slab) [ 18.016221] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.016318] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.016368] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.016414] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.016476] head: 0bfffe0000000001 ffffc1ffc305ea81 00000000ffffffff 00000000ffffffff [ 18.016523] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.016561] page dumped because: kasan: bad access detected [ 18.016601] [ 18.016640] Memory state around the buggy address: [ 18.016670] fff00000c17aa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.016874] fff00000c17aa400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.016948] >fff00000c17aa480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.017010] ^ [ 18.017092] fff00000c17aa500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.017138] fff00000c17aa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.017203] ================================================================== [ 18.059966] ================================================================== [ 18.060016] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 18.060063] Write of size 1 at addr fff00000c65a20eb by task kunit_try_catch/160 [ 18.060110] [ 18.060139] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.060216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.060242] Hardware name: linux,dummy-virt (DT) [ 18.060271] Call trace: [ 18.060309] show_stack+0x20/0x38 (C) [ 18.060385] dump_stack_lvl+0x8c/0xd0 [ 18.060469] print_report+0x118/0x608 [ 18.060569] kasan_report+0xdc/0x128 [ 18.060627] __asan_report_store1_noabort+0x20/0x30 [ 18.060680] krealloc_more_oob_helper+0x60c/0x678 [ 18.060973] krealloc_large_more_oob+0x20/0x38 [ 18.061057] kunit_try_run_case+0x170/0x3f0 [ 18.061115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.061249] kthread+0x328/0x630 [ 18.061375] ret_from_fork+0x10/0x20 [ 18.061485] [ 18.061505] The buggy address belongs to the physical page: [ 18.061536] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a0 [ 18.061594] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.061640] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.061689] page_type: f8(unknown) [ 18.061867] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.061956] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.062067] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.062208] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.062273] head: 0bfffe0000000002 ffffc1ffc3196801 00000000ffffffff 00000000ffffffff [ 18.062680] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.062849] page dumped because: kasan: bad access detected [ 18.063005] [ 18.063073] Memory state around the buggy address: [ 18.063138] fff00000c65a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.063233] fff00000c65a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.063305] >fff00000c65a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.063361] ^ [ 18.063474] fff00000c65a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.063563] fff00000c65a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.063738] ================================================================== [ 18.065080] ================================================================== [ 18.065124] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 18.065168] Write of size 1 at addr fff00000c65a20f0 by task kunit_try_catch/160 [ 18.065215] [ 18.065244] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.065320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.065346] Hardware name: linux,dummy-virt (DT) [ 18.065374] Call trace: [ 18.065395] show_stack+0x20/0x38 (C) [ 18.065441] dump_stack_lvl+0x8c/0xd0 [ 18.065485] print_report+0x118/0x608 [ 18.065530] kasan_report+0xdc/0x128 [ 18.065590] __asan_report_store1_noabort+0x20/0x30 [ 18.065687] krealloc_more_oob_helper+0x5c0/0x678 [ 18.065742] krealloc_large_more_oob+0x20/0x38 [ 18.065789] kunit_try_run_case+0x170/0x3f0 [ 18.065851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.065901] kthread+0x328/0x630 [ 18.065959] ret_from_fork+0x10/0x20 [ 18.066021] [ 18.066183] The buggy address belongs to the physical page: [ 18.066213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a0 [ 18.066262] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.066343] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.066435] page_type: f8(unknown) [ 18.066471] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.066557] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.066658] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.066743] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.066825] head: 0bfffe0000000002 ffffc1ffc3196801 00000000ffffffff 00000000ffffffff [ 18.066913] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.066997] page dumped because: kasan: bad access detected [ 18.067033] [ 18.067050] Memory state around the buggy address: [ 18.067079] fff00000c65a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.067118] fff00000c65a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.067159] >fff00000c65a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.067194] ^ [ 18.067230] fff00000c65a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.067269] fff00000c65a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.067304] ==================================================================
[ 11.196193] ================================================================== [ 11.196663] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.197151] Write of size 1 at addr ffff8881028ce0eb by task kunit_try_catch/179 [ 11.197464] [ 11.197577] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.197620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.197632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.197652] Call Trace: [ 11.197665] <TASK> [ 11.197681] dump_stack_lvl+0x73/0xb0 [ 11.197712] print_report+0xd1/0x650 [ 11.197734] ? __virt_addr_valid+0x1db/0x2d0 [ 11.197755] ? krealloc_more_oob_helper+0x821/0x930 [ 11.197840] ? kasan_addr_to_slab+0x11/0xa0 [ 11.197863] ? krealloc_more_oob_helper+0x821/0x930 [ 11.197886] kasan_report+0x141/0x180 [ 11.197907] ? krealloc_more_oob_helper+0x821/0x930 [ 11.197933] __asan_report_store1_noabort+0x1b/0x30 [ 11.197953] krealloc_more_oob_helper+0x821/0x930 [ 11.197974] ? __schedule+0x10cc/0x2b60 [ 11.197995] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.198017] ? finish_task_switch.isra.0+0x153/0x700 [ 11.198039] ? __switch_to+0x47/0xf50 [ 11.198065] ? __schedule+0x10cc/0x2b60 [ 11.198084] ? __pfx_read_tsc+0x10/0x10 [ 11.198108] krealloc_large_more_oob+0x1c/0x30 [ 11.198129] kunit_try_run_case+0x1a5/0x480 [ 11.198152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.198173] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.198195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.198216] ? __kthread_parkme+0x82/0x180 [ 11.198235] ? preempt_count_sub+0x50/0x80 [ 11.198257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.198279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.198301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.198323] kthread+0x337/0x6f0 [ 11.198341] ? trace_preempt_on+0x20/0xc0 [ 11.198364] ? __pfx_kthread+0x10/0x10 [ 11.198395] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.198414] ? calculate_sigpending+0x7b/0xa0 [ 11.198437] ? __pfx_kthread+0x10/0x10 [ 11.198457] ret_from_fork+0x116/0x1d0 [ 11.198475] ? __pfx_kthread+0x10/0x10 [ 11.198494] ret_from_fork_asm+0x1a/0x30 [ 11.198523] </TASK> [ 11.198534] [ 11.206757] The buggy address belongs to the physical page: [ 11.207009] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 11.207307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.207644] flags: 0x200000000000040(head|node=0|zone=2) [ 11.207834] page_type: f8(unknown) [ 11.208032] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.208297] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.209026] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.209290] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.209535] head: 0200000000000002 ffffea00040a3301 00000000ffffffff 00000000ffffffff [ 11.209884] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.210373] page dumped because: kasan: bad access detected [ 11.210562] [ 11.210633] Memory state around the buggy address: [ 11.210834] ffff8881028cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.211159] ffff8881028ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.211490] >ffff8881028ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.211815] ^ [ 11.212144] ffff8881028ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.212516] ffff8881028ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.212822] ================================================================== [ 11.213300] ================================================================== [ 11.213802] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.214163] Write of size 1 at addr ffff8881028ce0f0 by task kunit_try_catch/179 [ 11.214425] [ 11.214511] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.214550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.214561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.214631] Call Trace: [ 11.214645] <TASK> [ 11.214661] dump_stack_lvl+0x73/0xb0 [ 11.214687] print_report+0xd1/0x650 [ 11.214709] ? __virt_addr_valid+0x1db/0x2d0 [ 11.214730] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.214752] ? kasan_addr_to_slab+0x11/0xa0 [ 11.214771] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.214794] kasan_report+0x141/0x180 [ 11.214815] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.214842] __asan_report_store1_noabort+0x1b/0x30 [ 11.214862] krealloc_more_oob_helper+0x7eb/0x930 [ 11.214882] ? __schedule+0x10cc/0x2b60 [ 11.214903] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.214925] ? finish_task_switch.isra.0+0x153/0x700 [ 11.214947] ? __switch_to+0x47/0xf50 [ 11.214971] ? __schedule+0x10cc/0x2b60 [ 11.214991] ? __pfx_read_tsc+0x10/0x10 [ 11.215013] krealloc_large_more_oob+0x1c/0x30 [ 11.215034] kunit_try_run_case+0x1a5/0x480 [ 11.215057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.215078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.215101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.215123] ? __kthread_parkme+0x82/0x180 [ 11.215146] ? preempt_count_sub+0x50/0x80 [ 11.215169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.215192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.215213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.215236] kthread+0x337/0x6f0 [ 11.215254] ? trace_preempt_on+0x20/0xc0 [ 11.215278] ? __pfx_kthread+0x10/0x10 [ 11.215298] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.215317] ? calculate_sigpending+0x7b/0xa0 [ 11.215340] ? __pfx_kthread+0x10/0x10 [ 11.215360] ret_from_fork+0x116/0x1d0 [ 11.215388] ? __pfx_kthread+0x10/0x10 [ 11.215408] ret_from_fork_asm+0x1a/0x30 [ 11.215437] </TASK> [ 11.215447] [ 11.225168] The buggy address belongs to the physical page: [ 11.225430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 11.226187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.226979] flags: 0x200000000000040(head|node=0|zone=2) [ 11.227236] page_type: f8(unknown) [ 11.227415] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.227732] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.228498] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.229021] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.229550] head: 0200000000000002 ffffea00040a3301 00000000ffffffff 00000000ffffffff [ 11.230179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.230500] page dumped because: kasan: bad access detected [ 11.231117] [ 11.231227] Memory state around the buggy address: [ 11.231446] ffff8881028cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.232065] ffff8881028ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.232337] >ffff8881028ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.232753] ^ [ 11.233044] ffff8881028ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.233340] ffff8881028ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.234074] ================================================================== [ 11.040084] ================================================================== [ 11.040490] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.040992] Write of size 1 at addr ffff888100a21cf0 by task kunit_try_catch/175 [ 11.041385] [ 11.041501] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.041673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.041688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.041708] Call Trace: [ 11.041721] <TASK> [ 11.041738] dump_stack_lvl+0x73/0xb0 [ 11.041829] print_report+0xd1/0x650 [ 11.041852] ? __virt_addr_valid+0x1db/0x2d0 [ 11.041885] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.041907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.041927] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.041950] kasan_report+0x141/0x180 [ 11.041970] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.041999] __asan_report_store1_noabort+0x1b/0x30 [ 11.042018] krealloc_more_oob_helper+0x7eb/0x930 [ 11.042040] ? __schedule+0x10cc/0x2b60 [ 11.042061] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.042084] ? finish_task_switch.isra.0+0x153/0x700 [ 11.042105] ? __switch_to+0x47/0xf50 [ 11.042130] ? __schedule+0x10cc/0x2b60 [ 11.042149] ? __pfx_read_tsc+0x10/0x10 [ 11.042172] krealloc_more_oob+0x1c/0x30 [ 11.042192] kunit_try_run_case+0x1a5/0x480 [ 11.042215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.042236] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.042258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.042279] ? __kthread_parkme+0x82/0x180 [ 11.042299] ? preempt_count_sub+0x50/0x80 [ 11.042320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.042342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.042363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.042393] kthread+0x337/0x6f0 [ 11.042412] ? trace_preempt_on+0x20/0xc0 [ 11.042437] ? __pfx_kthread+0x10/0x10 [ 11.042457] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.042479] ? calculate_sigpending+0x7b/0xa0 [ 11.042504] ? __pfx_kthread+0x10/0x10 [ 11.042524] ret_from_fork+0x116/0x1d0 [ 11.042541] ? __pfx_kthread+0x10/0x10 [ 11.042627] ret_from_fork_asm+0x1a/0x30 [ 11.042660] </TASK> [ 11.042670] [ 11.052146] Allocated by task 175: [ 11.052420] kasan_save_stack+0x45/0x70 [ 11.052707] kasan_save_track+0x18/0x40 [ 11.052961] kasan_save_alloc_info+0x3b/0x50 [ 11.053263] __kasan_krealloc+0x190/0x1f0 [ 11.053462] krealloc_noprof+0xf3/0x340 [ 11.053659] krealloc_more_oob_helper+0x1a9/0x930 [ 11.053887] krealloc_more_oob+0x1c/0x30 [ 11.054059] kunit_try_run_case+0x1a5/0x480 [ 11.054264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.054517] kthread+0x337/0x6f0 [ 11.054690] ret_from_fork+0x116/0x1d0 [ 11.054865] ret_from_fork_asm+0x1a/0x30 [ 11.055054] [ 11.055132] The buggy address belongs to the object at ffff888100a21c00 [ 11.055132] which belongs to the cache kmalloc-256 of size 256 [ 11.055825] The buggy address is located 5 bytes to the right of [ 11.055825] allocated 235-byte region [ffff888100a21c00, ffff888100a21ceb) [ 11.056244] [ 11.056447] The buggy address belongs to the physical page: [ 11.057058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a20 [ 11.057490] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.057958] flags: 0x200000000000040(head|node=0|zone=2) [ 11.058234] page_type: f5(slab) [ 11.058410] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.058916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.059261] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.059684] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.060058] head: 0200000000000001 ffffea0004028801 00000000ffffffff 00000000ffffffff [ 11.060385] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.060889] page dumped because: kasan: bad access detected [ 11.061192] [ 11.061271] Memory state around the buggy address: [ 11.061512] ffff888100a21b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.062216] ffff888100a21c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.062588] >ffff888100a21c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.062972] ^ [ 11.063326] ffff888100a21d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.063683] ffff888100a21d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.064043] ================================================================== [ 11.009260] ================================================================== [ 11.009779] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.010142] Write of size 1 at addr ffff888100a21ceb by task kunit_try_catch/175 [ 11.010469] [ 11.010573] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.010619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.010630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.010650] Call Trace: [ 11.010662] <TASK> [ 11.010680] dump_stack_lvl+0x73/0xb0 [ 11.010708] print_report+0xd1/0x650 [ 11.010731] ? __virt_addr_valid+0x1db/0x2d0 [ 11.010753] ? krealloc_more_oob_helper+0x821/0x930 [ 11.010775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.010796] ? krealloc_more_oob_helper+0x821/0x930 [ 11.010818] kasan_report+0x141/0x180 [ 11.010838] ? krealloc_more_oob_helper+0x821/0x930 [ 11.010866] __asan_report_store1_noabort+0x1b/0x30 [ 11.010887] krealloc_more_oob_helper+0x821/0x930 [ 11.010908] ? __schedule+0x10cc/0x2b60 [ 11.010930] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.010954] ? finish_task_switch.isra.0+0x153/0x700 [ 11.010976] ? __switch_to+0x47/0xf50 [ 11.011001] ? __schedule+0x10cc/0x2b60 [ 11.011021] ? __pfx_read_tsc+0x10/0x10 [ 11.011045] krealloc_more_oob+0x1c/0x30 [ 11.011065] kunit_try_run_case+0x1a5/0x480 [ 11.011090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.011111] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.011134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.011155] ? __kthread_parkme+0x82/0x180 [ 11.011176] ? preempt_count_sub+0x50/0x80 [ 11.011198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.011220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.011241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.011262] kthread+0x337/0x6f0 [ 11.011280] ? trace_preempt_on+0x20/0xc0 [ 11.011303] ? __pfx_kthread+0x10/0x10 [ 11.011323] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.011342] ? calculate_sigpending+0x7b/0xa0 [ 11.011364] ? __pfx_kthread+0x10/0x10 [ 11.011876] ret_from_fork+0x116/0x1d0 [ 11.011903] ? __pfx_kthread+0x10/0x10 [ 11.011939] ret_from_fork_asm+0x1a/0x30 [ 11.011970] </TASK> [ 11.011982] [ 11.027402] Allocated by task 175: [ 11.027737] kasan_save_stack+0x45/0x70 [ 11.028008] kasan_save_track+0x18/0x40 [ 11.028263] kasan_save_alloc_info+0x3b/0x50 [ 11.028506] __kasan_krealloc+0x190/0x1f0 [ 11.028837] krealloc_noprof+0xf3/0x340 [ 11.029045] krealloc_more_oob_helper+0x1a9/0x930 [ 11.029363] krealloc_more_oob+0x1c/0x30 [ 11.029625] kunit_try_run_case+0x1a5/0x480 [ 11.029861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.030153] kthread+0x337/0x6f0 [ 11.030333] ret_from_fork+0x116/0x1d0 [ 11.030521] ret_from_fork_asm+0x1a/0x30 [ 11.030723] [ 11.030814] The buggy address belongs to the object at ffff888100a21c00 [ 11.030814] which belongs to the cache kmalloc-256 of size 256 [ 11.031300] The buggy address is located 0 bytes to the right of [ 11.031300] allocated 235-byte region [ffff888100a21c00, ffff888100a21ceb) [ 11.031804] [ 11.031896] The buggy address belongs to the physical page: [ 11.032129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a20 [ 11.032822] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.033096] flags: 0x200000000000040(head|node=0|zone=2) [ 11.033358] page_type: f5(slab) [ 11.033726] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.034151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.034534] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.034978] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.035362] head: 0200000000000001 ffffea0004028801 00000000ffffffff 00000000ffffffff [ 11.035833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.036188] page dumped because: kasan: bad access detected [ 11.036491] [ 11.036819] Memory state around the buggy address: [ 11.037084] ffff888100a21b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.037399] ffff888100a21c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.037879] >ffff888100a21c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.038167] ^ [ 11.038497] ffff888100a21d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.038953] ffff888100a21d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.039326] ==================================================================