Date
July 12, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.557960] ================================================================== [ 16.558021] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.558074] Write of size 1 at addr fff00000c47860eb by task kunit_try_catch/156 [ 16.558125] [ 16.558156] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.558250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.559482] Hardware name: linux,dummy-virt (DT) [ 16.559531] Call trace: [ 16.559710] show_stack+0x20/0x38 (C) [ 16.559844] dump_stack_lvl+0x8c/0xd0 [ 16.559892] print_report+0x118/0x5d0 [ 16.560737] kasan_report+0xdc/0x128 [ 16.561076] __asan_report_store1_noabort+0x20/0x30 [ 16.561344] krealloc_more_oob_helper+0x60c/0x678 [ 16.561520] krealloc_more_oob+0x20/0x38 [ 16.561565] kunit_try_run_case+0x170/0x3f0 [ 16.561611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.561662] kthread+0x328/0x630 [ 16.561707] ret_from_fork+0x10/0x20 [ 16.562587] [ 16.562611] Allocated by task 156: [ 16.562902] kasan_save_stack+0x3c/0x68 [ 16.563076] kasan_save_track+0x20/0x40 [ 16.563196] kasan_save_alloc_info+0x40/0x58 [ 16.563279] __kasan_krealloc+0x118/0x178 [ 16.563320] krealloc_noprof+0x128/0x360 [ 16.563357] krealloc_more_oob_helper+0x168/0x678 [ 16.563398] krealloc_more_oob+0x20/0x38 [ 16.563433] kunit_try_run_case+0x170/0x3f0 [ 16.563470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.563512] kthread+0x328/0x630 [ 16.563543] ret_from_fork+0x10/0x20 [ 16.564240] [ 16.564267] The buggy address belongs to the object at fff00000c4786000 [ 16.564267] which belongs to the cache kmalloc-256 of size 256 [ 16.564395] The buggy address is located 0 bytes to the right of [ 16.564395] allocated 235-byte region [fff00000c4786000, fff00000c47860eb) [ 16.564644] [ 16.564702] The buggy address belongs to the physical page: [ 16.564740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104786 [ 16.564959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.565186] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.565662] page_type: f5(slab) [ 16.565716] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.566088] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.566429] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.566614] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.566753] head: 0bfffe0000000001 ffffc1ffc311e181 00000000ffffffff 00000000ffffffff [ 16.566801] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.567246] page dumped because: kasan: bad access detected [ 16.567382] [ 16.567400] Memory state around the buggy address: [ 16.567434] fff00000c4785f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.567477] fff00000c4786000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.568242] >fff00000c4786080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.568460] ^ [ 16.568577] fff00000c4786100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.568633] fff00000c4786180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.568671] ================================================================== [ 16.573585] ================================================================== [ 16.573639] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.575257] Write of size 1 at addr fff00000c47860f0 by task kunit_try_catch/156 [ 16.575645] [ 16.575679] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.575827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.575855] Hardware name: linux,dummy-virt (DT) [ 16.575886] Call trace: [ 16.575909] show_stack+0x20/0x38 (C) [ 16.575959] dump_stack_lvl+0x8c/0xd0 [ 16.576004] print_report+0x118/0x5d0 [ 16.576049] kasan_report+0xdc/0x128 [ 16.576093] __asan_report_store1_noabort+0x20/0x30 [ 16.576143] krealloc_more_oob_helper+0x5c0/0x678 [ 16.576204] krealloc_more_oob+0x20/0x38 [ 16.576291] kunit_try_run_case+0x170/0x3f0 [ 16.576393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.576516] kthread+0x328/0x630 [ 16.576616] ret_from_fork+0x10/0x20 [ 16.576753] [ 16.576804] Allocated by task 156: [ 16.576920] kasan_save_stack+0x3c/0x68 [ 16.576984] kasan_save_track+0x20/0x40 [ 16.577020] kasan_save_alloc_info+0x40/0x58 [ 16.577059] __kasan_krealloc+0x118/0x178 [ 16.577095] krealloc_noprof+0x128/0x360 [ 16.577131] krealloc_more_oob_helper+0x168/0x678 [ 16.577413] krealloc_more_oob+0x20/0x38 [ 16.577517] kunit_try_run_case+0x170/0x3f0 [ 16.577596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.577691] kthread+0x328/0x630 [ 16.577761] ret_from_fork+0x10/0x20 [ 16.577825] [ 16.577924] The buggy address belongs to the object at fff00000c4786000 [ 16.577924] which belongs to the cache kmalloc-256 of size 256 [ 16.578039] The buggy address is located 5 bytes to the right of [ 16.578039] allocated 235-byte region [fff00000c4786000, fff00000c47860eb) [ 16.578473] [ 16.578506] The buggy address belongs to the physical page: [ 16.578537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104786 [ 16.578603] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.578653] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.578711] page_type: f5(slab) [ 16.578760] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.578811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.578869] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.578933] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.578991] head: 0bfffe0000000001 ffffc1ffc311e181 00000000ffffffff 00000000ffffffff [ 16.579039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.579078] page dumped because: kasan: bad access detected [ 16.579109] [ 16.579126] Memory state around the buggy address: [ 16.579165] fff00000c4785f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.579257] fff00000c4786000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.579300] >fff00000c4786080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.579337] ^ [ 16.579375] fff00000c4786100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.579416] fff00000c4786180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.579453] ================================================================== [ 16.634643] ================================================================== [ 16.634698] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.634743] Write of size 1 at addr fff00000c665e0f0 by task kunit_try_catch/160 [ 16.634792] [ 16.634819] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.635075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.635123] Hardware name: linux,dummy-virt (DT) [ 16.635153] Call trace: [ 16.635334] show_stack+0x20/0x38 (C) [ 16.635498] dump_stack_lvl+0x8c/0xd0 [ 16.635546] print_report+0x118/0x5d0 [ 16.635592] kasan_report+0xdc/0x128 [ 16.635887] __asan_report_store1_noabort+0x20/0x30 [ 16.636055] krealloc_more_oob_helper+0x5c0/0x678 [ 16.636223] krealloc_large_more_oob+0x20/0x38 [ 16.636322] kunit_try_run_case+0x170/0x3f0 [ 16.636404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.636550] kthread+0x328/0x630 [ 16.636618] ret_from_fork+0x10/0x20 [ 16.636734] [ 16.636753] The buggy address belongs to the physical page: [ 16.636801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c [ 16.637007] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.637252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.637422] page_type: f8(unknown) [ 16.637595] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.637766] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.637856] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.638095] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.638264] head: 0bfffe0000000002 ffffc1ffc3199701 00000000ffffffff 00000000ffffffff [ 16.638441] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.638536] page dumped because: kasan: bad access detected [ 16.638646] [ 16.638844] Memory state around the buggy address: [ 16.638922] fff00000c665df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.638972] fff00000c665e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.639015] >fff00000c665e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.639250] ^ [ 16.639300] fff00000c665e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.639417] fff00000c665e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.639496] ================================================================== [ 16.629809] ================================================================== [ 16.629909] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.630043] Write of size 1 at addr fff00000c665e0eb by task kunit_try_catch/160 [ 16.630095] [ 16.630126] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.630344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.630372] Hardware name: linux,dummy-virt (DT) [ 16.630401] Call trace: [ 16.630574] show_stack+0x20/0x38 (C) [ 16.630666] dump_stack_lvl+0x8c/0xd0 [ 16.630721] print_report+0x118/0x5d0 [ 16.630766] kasan_report+0xdc/0x128 [ 16.630895] __asan_report_store1_noabort+0x20/0x30 [ 16.630981] krealloc_more_oob_helper+0x60c/0x678 [ 16.631109] krealloc_large_more_oob+0x20/0x38 [ 16.631183] kunit_try_run_case+0x170/0x3f0 [ 16.631288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.631425] kthread+0x328/0x630 [ 16.631471] ret_from_fork+0x10/0x20 [ 16.631628] [ 16.631651] The buggy address belongs to the physical page: [ 16.631682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c [ 16.631815] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.631885] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.632034] page_type: f8(unknown) [ 16.632106] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.632284] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.632373] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.632497] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.632576] head: 0bfffe0000000002 ffffc1ffc3199701 00000000ffffffff 00000000ffffffff [ 16.632642] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.632834] page dumped because: kasan: bad access detected [ 16.632995] [ 16.633076] Memory state around the buggy address: [ 16.633145] fff00000c665df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.633277] fff00000c665e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.633356] >fff00000c665e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.633473] ^ [ 16.633588] fff00000c665e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.633657] fff00000c665e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.633695] ==================================================================
[ 12.509317] ================================================================== [ 12.509935] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.511122] Write of size 1 at addr ffff8881003484eb by task kunit_try_catch/173 [ 12.511428] [ 12.511519] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.511562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.511574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.511596] Call Trace: [ 12.511608] <TASK> [ 12.511623] dump_stack_lvl+0x73/0xb0 [ 12.511654] print_report+0xd1/0x610 [ 12.511677] ? __virt_addr_valid+0x1db/0x2d0 [ 12.511701] ? krealloc_more_oob_helper+0x821/0x930 [ 12.511726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.511750] ? krealloc_more_oob_helper+0x821/0x930 [ 12.511775] kasan_report+0x141/0x180 [ 12.511797] ? krealloc_more_oob_helper+0x821/0x930 [ 12.511827] __asan_report_store1_noabort+0x1b/0x30 [ 12.511852] krealloc_more_oob_helper+0x821/0x930 [ 12.511877] ? __schedule+0x10cc/0x2b60 [ 12.511900] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.511925] ? finish_task_switch.isra.0+0x153/0x700 [ 12.511950] ? __switch_to+0x47/0xf50 [ 12.511984] ? __schedule+0x10cc/0x2b60 [ 12.512006] ? __pfx_read_tsc+0x10/0x10 [ 12.512030] krealloc_more_oob+0x1c/0x30 [ 12.512052] kunit_try_run_case+0x1a5/0x480 [ 12.512077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.512101] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.512124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.512149] ? __kthread_parkme+0x82/0x180 [ 12.512174] ? preempt_count_sub+0x50/0x80 [ 12.512198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.512223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.512248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.512538] kthread+0x337/0x6f0 [ 12.512579] ? trace_preempt_on+0x20/0xc0 [ 12.512605] ? __pfx_kthread+0x10/0x10 [ 12.512661] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.512684] ? calculate_sigpending+0x7b/0xa0 [ 12.512709] ? __pfx_kthread+0x10/0x10 [ 12.512731] ret_from_fork+0x116/0x1d0 [ 12.512750] ? __pfx_kthread+0x10/0x10 [ 12.512771] ret_from_fork_asm+0x1a/0x30 [ 12.512802] </TASK> [ 12.512813] [ 12.530538] Allocated by task 173: [ 12.530955] kasan_save_stack+0x45/0x70 [ 12.531154] kasan_save_track+0x18/0x40 [ 12.531435] kasan_save_alloc_info+0x3b/0x50 [ 12.531971] __kasan_krealloc+0x190/0x1f0 [ 12.532514] krealloc_noprof+0xf3/0x340 [ 12.532793] krealloc_more_oob_helper+0x1a9/0x930 [ 12.533259] krealloc_more_oob+0x1c/0x30 [ 12.533430] kunit_try_run_case+0x1a5/0x480 [ 12.533797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.534357] kthread+0x337/0x6f0 [ 12.534485] ret_from_fork+0x116/0x1d0 [ 12.534619] ret_from_fork_asm+0x1a/0x30 [ 12.534767] [ 12.534843] The buggy address belongs to the object at ffff888100348400 [ 12.534843] which belongs to the cache kmalloc-256 of size 256 [ 12.535348] The buggy address is located 0 bytes to the right of [ 12.535348] allocated 235-byte region [ffff888100348400, ffff8881003484eb) [ 12.535918] [ 12.536111] The buggy address belongs to the physical page: [ 12.536693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 12.537511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.537925] flags: 0x200000000000040(head|node=0|zone=2) [ 12.538514] page_type: f5(slab) [ 12.538903] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.539699] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.540331] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.540797] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.541365] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 12.541600] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.541829] page dumped because: kasan: bad access detected [ 12.542073] [ 12.542236] Memory state around the buggy address: [ 12.542811] ffff888100348380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.543689] ffff888100348400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.544453] >ffff888100348480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.545199] ^ [ 12.545866] ffff888100348500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.546710] ffff888100348580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.547578] ================================================================== [ 12.722714] ================================================================== [ 12.723569] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.724239] Write of size 1 at addr ffff888102bea0eb by task kunit_try_catch/177 [ 12.724482] [ 12.724576] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.724623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.724633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.724655] Call Trace: [ 12.724667] <TASK> [ 12.724683] dump_stack_lvl+0x73/0xb0 [ 12.724714] print_report+0xd1/0x610 [ 12.724736] ? __virt_addr_valid+0x1db/0x2d0 [ 12.724760] ? krealloc_more_oob_helper+0x821/0x930 [ 12.724784] ? kasan_addr_to_slab+0x11/0xa0 [ 12.724804] ? krealloc_more_oob_helper+0x821/0x930 [ 12.724828] kasan_report+0x141/0x180 [ 12.724849] ? krealloc_more_oob_helper+0x821/0x930 [ 12.724878] __asan_report_store1_noabort+0x1b/0x30 [ 12.724903] krealloc_more_oob_helper+0x821/0x930 [ 12.724925] ? __schedule+0x10cc/0x2b60 [ 12.724948] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.724973] ? finish_task_switch.isra.0+0x153/0x700 [ 12.724997] ? __switch_to+0x47/0xf50 [ 12.725022] ? __schedule+0x10cc/0x2b60 [ 12.725042] ? __pfx_read_tsc+0x10/0x10 [ 12.725066] krealloc_large_more_oob+0x1c/0x30 [ 12.725089] kunit_try_run_case+0x1a5/0x480 [ 12.725114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.725136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.725160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.725184] ? __kthread_parkme+0x82/0x180 [ 12.725205] ? preempt_count_sub+0x50/0x80 [ 12.725228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.725252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.725286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.725311] kthread+0x337/0x6f0 [ 12.725329] ? trace_preempt_on+0x20/0xc0 [ 12.725353] ? __pfx_kthread+0x10/0x10 [ 12.725502] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.725524] ? calculate_sigpending+0x7b/0xa0 [ 12.725549] ? __pfx_kthread+0x10/0x10 [ 12.725570] ret_from_fork+0x116/0x1d0 [ 12.725589] ? __pfx_kthread+0x10/0x10 [ 12.725609] ret_from_fork_asm+0x1a/0x30 [ 12.725640] </TASK> [ 12.725652] [ 12.736026] The buggy address belongs to the physical page: [ 12.736315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8 [ 12.736635] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.736934] flags: 0x200000000000040(head|node=0|zone=2) [ 12.737162] page_type: f8(unknown) [ 12.737338] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.737674] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.737995] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.738819] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.739208] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff [ 12.739629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.740052] page dumped because: kasan: bad access detected [ 12.740384] [ 12.740590] Memory state around the buggy address: [ 12.740866] ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.741228] ffff888102bea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.741569] >ffff888102bea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.741868] ^ [ 12.742144] ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.742445] ffff888102bea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.742749] ================================================================== [ 12.548512] ================================================================== [ 12.549325] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.550109] Write of size 1 at addr ffff8881003484f0 by task kunit_try_catch/173 [ 12.550527] [ 12.550625] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.550952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.550978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.551000] Call Trace: [ 12.551039] <TASK> [ 12.551058] dump_stack_lvl+0x73/0xb0 [ 12.551091] print_report+0xd1/0x610 [ 12.551114] ? __virt_addr_valid+0x1db/0x2d0 [ 12.551138] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.551163] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.551187] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.551211] kasan_report+0x141/0x180 [ 12.551233] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.551276] __asan_report_store1_noabort+0x1b/0x30 [ 12.551304] krealloc_more_oob_helper+0x7eb/0x930 [ 12.551327] ? __schedule+0x10cc/0x2b60 [ 12.551350] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.551375] ? finish_task_switch.isra.0+0x153/0x700 [ 12.551399] ? __switch_to+0x47/0xf50 [ 12.551425] ? __schedule+0x10cc/0x2b60 [ 12.551446] ? __pfx_read_tsc+0x10/0x10 [ 12.551470] krealloc_more_oob+0x1c/0x30 [ 12.551492] kunit_try_run_case+0x1a5/0x480 [ 12.551517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.551540] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.551565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.551589] ? __kthread_parkme+0x82/0x180 [ 12.551610] ? preempt_count_sub+0x50/0x80 [ 12.551633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.551657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.551682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.551707] kthread+0x337/0x6f0 [ 12.551726] ? trace_preempt_on+0x20/0xc0 [ 12.551750] ? __pfx_kthread+0x10/0x10 [ 12.551771] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.551792] ? calculate_sigpending+0x7b/0xa0 [ 12.551817] ? __pfx_kthread+0x10/0x10 [ 12.551838] ret_from_fork+0x116/0x1d0 [ 12.551856] ? __pfx_kthread+0x10/0x10 [ 12.551877] ret_from_fork_asm+0x1a/0x30 [ 12.551908] </TASK> [ 12.551919] [ 12.565887] Allocated by task 173: [ 12.566076] kasan_save_stack+0x45/0x70 [ 12.566441] kasan_save_track+0x18/0x40 [ 12.566883] kasan_save_alloc_info+0x3b/0x50 [ 12.567417] __kasan_krealloc+0x190/0x1f0 [ 12.567859] krealloc_noprof+0xf3/0x340 [ 12.568286] krealloc_more_oob_helper+0x1a9/0x930 [ 12.568728] krealloc_more_oob+0x1c/0x30 [ 12.569185] kunit_try_run_case+0x1a5/0x480 [ 12.569597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.570253] kthread+0x337/0x6f0 [ 12.570609] ret_from_fork+0x116/0x1d0 [ 12.570836] ret_from_fork_asm+0x1a/0x30 [ 12.571119] [ 12.571357] The buggy address belongs to the object at ffff888100348400 [ 12.571357] which belongs to the cache kmalloc-256 of size 256 [ 12.572404] The buggy address is located 5 bytes to the right of [ 12.572404] allocated 235-byte region [ffff888100348400, ffff8881003484eb) [ 12.573147] [ 12.573323] The buggy address belongs to the physical page: [ 12.573779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 12.574209] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.574862] flags: 0x200000000000040(head|node=0|zone=2) [ 12.575056] page_type: f5(slab) [ 12.575498] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.576132] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.576564] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.576798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.577049] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 12.577424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.577916] page dumped because: kasan: bad access detected [ 12.578549] [ 12.578862] Memory state around the buggy address: [ 12.579337] ffff888100348380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.579562] ffff888100348400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.579779] >ffff888100348480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.579990] ^ [ 12.580196] ffff888100348500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.580422] ffff888100348580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.580636] ================================================================== [ 12.744018] ================================================================== [ 12.744391] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.744827] Write of size 1 at addr ffff888102bea0f0 by task kunit_try_catch/177 [ 12.745348] [ 12.745456] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.745499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.745511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.745532] Call Trace: [ 12.745543] <TASK> [ 12.745557] dump_stack_lvl+0x73/0xb0 [ 12.745586] print_report+0xd1/0x610 [ 12.745608] ? __virt_addr_valid+0x1db/0x2d0 [ 12.745632] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.745656] ? kasan_addr_to_slab+0x11/0xa0 [ 12.745676] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.745890] kasan_report+0x141/0x180 [ 12.745913] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.745943] __asan_report_store1_noabort+0x1b/0x30 [ 12.745968] krealloc_more_oob_helper+0x7eb/0x930 [ 12.745991] ? __schedule+0x10cc/0x2b60 [ 12.746014] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.746039] ? finish_task_switch.isra.0+0x153/0x700 [ 12.746063] ? __switch_to+0x47/0xf50 [ 12.746089] ? __schedule+0x10cc/0x2b60 [ 12.746109] ? __pfx_read_tsc+0x10/0x10 [ 12.746133] krealloc_large_more_oob+0x1c/0x30 [ 12.746156] kunit_try_run_case+0x1a5/0x480 [ 12.746182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.746204] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.746228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.746252] ? __kthread_parkme+0x82/0x180 [ 12.746286] ? preempt_count_sub+0x50/0x80 [ 12.746309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.746333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.746359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.746384] kthread+0x337/0x6f0 [ 12.746403] ? trace_preempt_on+0x20/0xc0 [ 12.746426] ? __pfx_kthread+0x10/0x10 [ 12.746447] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.746468] ? calculate_sigpending+0x7b/0xa0 [ 12.746493] ? __pfx_kthread+0x10/0x10 [ 12.746514] ret_from_fork+0x116/0x1d0 [ 12.746532] ? __pfx_kthread+0x10/0x10 [ 12.746552] ret_from_fork_asm+0x1a/0x30 [ 12.746583] </TASK> [ 12.746593] [ 12.756198] The buggy address belongs to the physical page: [ 12.756475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8 [ 12.756821] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.757143] flags: 0x200000000000040(head|node=0|zone=2) [ 12.757389] page_type: f8(unknown) [ 12.757557] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.758437] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.759180] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.759935] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.760672] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff [ 12.761392] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.762097] page dumped because: kasan: bad access detected [ 12.762644] [ 12.762806] Memory state around the buggy address: [ 12.763336] ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.763815] ffff888102bea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.764042] >ffff888102bea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.764259] ^ [ 12.764993] ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.765654] ffff888102bea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.766315] ==================================================================