Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.447090] ================================================================== [ 16.447173] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.447236] Write of size 1 at addr fff00000c0b97ef0 by task kunit_try_catch/156 [ 16.447283] [ 16.447319] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.447398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.447440] Hardware name: linux,dummy-virt (DT) [ 16.447471] Call trace: [ 16.447498] show_stack+0x20/0x38 (C) [ 16.447546] dump_stack_lvl+0x8c/0xd0 [ 16.447592] print_report+0x118/0x5d0 [ 16.447636] kasan_report+0xdc/0x128 [ 16.447679] __asan_report_store1_noabort+0x20/0x30 [ 16.447746] krealloc_more_oob_helper+0x5c0/0x678 [ 16.448285] krealloc_more_oob+0x20/0x38 [ 16.448469] kunit_try_run_case+0x170/0x3f0 [ 16.448624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.448677] kthread+0x328/0x630 [ 16.448877] ret_from_fork+0x10/0x20 [ 16.449165] [ 16.449285] Allocated by task 156: [ 16.449500] kasan_save_stack+0x3c/0x68 [ 16.449655] kasan_save_track+0x20/0x40 [ 16.449754] kasan_save_alloc_info+0x40/0x58 [ 16.449922] __kasan_krealloc+0x118/0x178 [ 16.449983] krealloc_noprof+0x128/0x360 [ 16.450304] krealloc_more_oob_helper+0x168/0x678 [ 16.450438] krealloc_more_oob+0x20/0x38 [ 16.450557] kunit_try_run_case+0x170/0x3f0 [ 16.450702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.450800] kthread+0x328/0x630 [ 16.450925] ret_from_fork+0x10/0x20 [ 16.451000] [ 16.451066] The buggy address belongs to the object at fff00000c0b97e00 [ 16.451066] which belongs to the cache kmalloc-256 of size 256 [ 16.451400] The buggy address is located 5 bytes to the right of [ 16.451400] allocated 235-byte region [fff00000c0b97e00, fff00000c0b97eeb) [ 16.451701] [ 16.451877] The buggy address belongs to the physical page: [ 16.451944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b96 [ 16.452053] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.452149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.452348] page_type: f5(slab) [ 16.452432] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.452601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.452651] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.452704] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.453114] head: 0bfffe0000000001 ffffc1ffc302e581 00000000ffffffff 00000000ffffffff [ 16.453166] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.453205] page dumped because: kasan: bad access detected [ 16.453241] [ 16.453259] Memory state around the buggy address: [ 16.453288] fff00000c0b97d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.453329] fff00000c0b97e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.453368] >fff00000c0b97e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.453403] ^ [ 16.453440] fff00000c0b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.453481] fff00000c0b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.453516] ================================================================== [ 16.437842] ================================================================== [ 16.438027] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.438093] Write of size 1 at addr fff00000c0b97eeb by task kunit_try_catch/156 [ 16.438397] [ 16.438454] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.438561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.438588] Hardware name: linux,dummy-virt (DT) [ 16.438651] Call trace: [ 16.438677] show_stack+0x20/0x38 (C) [ 16.438730] dump_stack_lvl+0x8c/0xd0 [ 16.439031] print_report+0x118/0x5d0 [ 16.439122] kasan_report+0xdc/0x128 [ 16.439194] __asan_report_store1_noabort+0x20/0x30 [ 16.439252] krealloc_more_oob_helper+0x60c/0x678 [ 16.439300] krealloc_more_oob+0x20/0x38 [ 16.439344] kunit_try_run_case+0x170/0x3f0 [ 16.439393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.439607] kthread+0x328/0x630 [ 16.439857] ret_from_fork+0x10/0x20 [ 16.440078] [ 16.440098] Allocated by task 156: [ 16.440128] kasan_save_stack+0x3c/0x68 [ 16.440544] kasan_save_track+0x20/0x40 [ 16.440693] kasan_save_alloc_info+0x40/0x58 [ 16.440772] __kasan_krealloc+0x118/0x178 [ 16.440909] krealloc_noprof+0x128/0x360 [ 16.440997] krealloc_more_oob_helper+0x168/0x678 [ 16.441272] krealloc_more_oob+0x20/0x38 [ 16.441416] kunit_try_run_case+0x170/0x3f0 [ 16.441588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.441732] kthread+0x328/0x630 [ 16.441918] ret_from_fork+0x10/0x20 [ 16.441977] [ 16.442155] The buggy address belongs to the object at fff00000c0b97e00 [ 16.442155] which belongs to the cache kmalloc-256 of size 256 [ 16.442353] The buggy address is located 0 bytes to the right of [ 16.442353] allocated 235-byte region [fff00000c0b97e00, fff00000c0b97eeb) [ 16.442468] [ 16.442534] The buggy address belongs to the physical page: [ 16.442770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b96 [ 16.442946] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.443117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.443268] page_type: f5(slab) [ 16.443466] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.443727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.443832] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.443991] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.444187] head: 0bfffe0000000001 ffffc1ffc302e581 00000000ffffffff 00000000ffffffff [ 16.444396] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.444470] page dumped because: kasan: bad access detected [ 16.444622] [ 16.444711] Memory state around the buggy address: [ 16.444818] fff00000c0b97d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.444885] fff00000c0b97e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.444960] >fff00000c0b97e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.445230] ^ [ 16.445440] fff00000c0b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.445605] fff00000c0b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.445687] ================================================================== [ 16.503665] ================================================================== [ 16.503725] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.503783] Write of size 1 at addr fff00000c78a20eb by task kunit_try_catch/160 [ 16.503831] [ 16.503879] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.503957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.503982] Hardware name: linux,dummy-virt (DT) [ 16.504028] Call trace: [ 16.504050] show_stack+0x20/0x38 (C) [ 16.504099] dump_stack_lvl+0x8c/0xd0 [ 16.504146] print_report+0x118/0x5d0 [ 16.504191] kasan_report+0xdc/0x128 [ 16.504234] __asan_report_store1_noabort+0x20/0x30 [ 16.504284] krealloc_more_oob_helper+0x60c/0x678 [ 16.504330] krealloc_large_more_oob+0x20/0x38 [ 16.504375] kunit_try_run_case+0x170/0x3f0 [ 16.504422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.504472] kthread+0x328/0x630 [ 16.504512] ret_from_fork+0x10/0x20 [ 16.504558] [ 16.504578] The buggy address belongs to the physical page: [ 16.504609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a0 [ 16.504661] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.504705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.504757] page_type: f8(unknown) [ 16.504794] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.504893] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.505003] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.505147] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.505320] head: 0bfffe0000000002 ffffc1ffc31e2801 00000000ffffffff 00000000ffffffff [ 16.505448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.505508] page dumped because: kasan: bad access detected [ 16.505586] [ 16.505639] Memory state around the buggy address: [ 16.505678] fff00000c78a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.505718] fff00000c78a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.505757] >fff00000c78a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.505793] ^ [ 16.505830] fff00000c78a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.505879] fff00000c78a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.505915] ================================================================== [ 16.506651] ================================================================== [ 16.506697] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.506947] Write of size 1 at addr fff00000c78a20f0 by task kunit_try_catch/160 [ 16.507008] [ 16.507067] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.507354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.507495] Hardware name: linux,dummy-virt (DT) [ 16.507543] Call trace: [ 16.507612] show_stack+0x20/0x38 (C) [ 16.507663] dump_stack_lvl+0x8c/0xd0 [ 16.507709] print_report+0x118/0x5d0 [ 16.507855] kasan_report+0xdc/0x128 [ 16.508083] __asan_report_store1_noabort+0x20/0x30 [ 16.508208] krealloc_more_oob_helper+0x5c0/0x678 [ 16.508304] krealloc_large_more_oob+0x20/0x38 [ 16.508526] kunit_try_run_case+0x170/0x3f0 [ 16.508606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.508698] kthread+0x328/0x630 [ 16.508791] ret_from_fork+0x10/0x20 [ 16.509007] [ 16.509046] The buggy address belongs to the physical page: [ 16.509076] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a0 [ 16.509254] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.509299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.509347] page_type: f8(unknown) [ 16.509383] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.509430] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.509561] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.509661] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.509775] head: 0bfffe0000000002 ffffc1ffc31e2801 00000000ffffffff 00000000ffffffff [ 16.509821] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.509878] page dumped because: kasan: bad access detected [ 16.509907] [ 16.509924] Memory state around the buggy address: [ 16.509953] fff00000c78a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.509993] fff00000c78a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.510137] >fff00000c78a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.510294] ^ [ 16.510375] fff00000c78a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.510431] fff00000c78a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.510534] ==================================================================
[ 11.865622] ================================================================== [ 11.865962] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.866280] Write of size 1 at addr ffff888100351ef0 by task kunit_try_catch/173 [ 11.866585] [ 11.866702] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.866745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.866756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.866778] Call Trace: [ 11.866797] <TASK> [ 11.866815] dump_stack_lvl+0x73/0xb0 [ 11.866864] print_report+0xd1/0x610 [ 11.866887] ? __virt_addr_valid+0x1db/0x2d0 [ 11.866910] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.866933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.866955] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.866979] kasan_report+0x141/0x180 [ 11.867000] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.867028] __asan_report_store1_noabort+0x1b/0x30 [ 11.867061] krealloc_more_oob_helper+0x7eb/0x930 [ 11.867083] ? __schedule+0x10cc/0x2b60 [ 11.867105] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.867129] ? finish_task_switch.isra.0+0x153/0x700 [ 11.867151] ? __switch_to+0x47/0xf50 [ 11.867178] ? __schedule+0x10cc/0x2b60 [ 11.867200] ? __pfx_read_tsc+0x10/0x10 [ 11.867225] krealloc_more_oob+0x1c/0x30 [ 11.867245] kunit_try_run_case+0x1a5/0x480 [ 11.867270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.867291] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.867315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.867338] ? __kthread_parkme+0x82/0x180 [ 11.867358] ? preempt_count_sub+0x50/0x80 [ 11.867380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.867404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.867427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.867450] kthread+0x337/0x6f0 [ 11.867469] ? trace_preempt_on+0x20/0xc0 [ 11.867492] ? __pfx_kthread+0x10/0x10 [ 11.867511] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.867532] ? calculate_sigpending+0x7b/0xa0 [ 11.867555] ? __pfx_kthread+0x10/0x10 [ 11.867593] ret_from_fork+0x116/0x1d0 [ 11.867611] ? __pfx_kthread+0x10/0x10 [ 11.867630] ret_from_fork_asm+0x1a/0x30 [ 11.867662] </TASK> [ 11.867672] [ 11.879150] Allocated by task 173: [ 11.879314] kasan_save_stack+0x45/0x70 [ 11.879540] kasan_save_track+0x18/0x40 [ 11.879781] kasan_save_alloc_info+0x3b/0x50 [ 11.879938] __kasan_krealloc+0x190/0x1f0 [ 11.880152] krealloc_noprof+0xf3/0x340 [ 11.880453] krealloc_more_oob_helper+0x1a9/0x930 [ 11.880844] krealloc_more_oob+0x1c/0x30 [ 11.881021] kunit_try_run_case+0x1a5/0x480 [ 11.881223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.881441] kthread+0x337/0x6f0 [ 11.881610] ret_from_fork+0x116/0x1d0 [ 11.881810] ret_from_fork_asm+0x1a/0x30 [ 11.881949] [ 11.882151] The buggy address belongs to the object at ffff888100351e00 [ 11.882151] which belongs to the cache kmalloc-256 of size 256 [ 11.882568] The buggy address is located 5 bytes to the right of [ 11.882568] allocated 235-byte region [ffff888100351e00, ffff888100351eeb) [ 11.883272] [ 11.883349] The buggy address belongs to the physical page: [ 11.883586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.884159] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.884503] flags: 0x200000000000040(head|node=0|zone=2) [ 11.884758] page_type: f5(slab) [ 11.884954] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.885271] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.885580] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.885948] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.886359] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.886685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.886919] page dumped because: kasan: bad access detected [ 11.887301] [ 11.887403] Memory state around the buggy address: [ 11.887613] ffff888100351d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.888150] ffff888100351e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.888441] >ffff888100351e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.888723] ^ [ 11.889080] ffff888100351f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.889374] ffff888100351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.889679] ================================================================== [ 12.042040] ================================================================== [ 12.042936] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.044357] Write of size 1 at addr ffff888102b320f0 by task kunit_try_catch/177 [ 12.045042] [ 12.045339] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.045386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.045397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.045418] Call Trace: [ 12.045431] <TASK> [ 12.045448] dump_stack_lvl+0x73/0xb0 [ 12.045478] print_report+0xd1/0x610 [ 12.045500] ? __virt_addr_valid+0x1db/0x2d0 [ 12.045523] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.045545] ? kasan_addr_to_slab+0x11/0xa0 [ 12.045565] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.045589] kasan_report+0x141/0x180 [ 12.045610] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.045638] __asan_report_store1_noabort+0x1b/0x30 [ 12.045663] krealloc_more_oob_helper+0x7eb/0x930 [ 12.045684] ? __schedule+0x10cc/0x2b60 [ 12.045707] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.045731] ? finish_task_switch.isra.0+0x153/0x700 [ 12.045753] ? __switch_to+0x47/0xf50 [ 12.045779] ? __schedule+0x10cc/0x2b60 [ 12.045800] ? __pfx_read_tsc+0x10/0x10 [ 12.045825] krealloc_large_more_oob+0x1c/0x30 [ 12.045855] kunit_try_run_case+0x1a5/0x480 [ 12.045880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.045901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.045924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.045947] ? __kthread_parkme+0x82/0x180 [ 12.045967] ? preempt_count_sub+0x50/0x80 [ 12.045990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.046013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.046035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.046070] kthread+0x337/0x6f0 [ 12.046088] ? trace_preempt_on+0x20/0xc0 [ 12.046112] ? __pfx_kthread+0x10/0x10 [ 12.046131] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.046152] ? calculate_sigpending+0x7b/0xa0 [ 12.046175] ? __pfx_kthread+0x10/0x10 [ 12.046196] ret_from_fork+0x116/0x1d0 [ 12.046218] ? __pfx_kthread+0x10/0x10 [ 12.046238] ret_from_fork_asm+0x1a/0x30 [ 12.046270] </TASK> [ 12.046279] [ 12.060755] The buggy address belongs to the physical page: [ 12.061477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30 [ 12.062190] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.062431] flags: 0x200000000000040(head|node=0|zone=2) [ 12.062715] page_type: f8(unknown) [ 12.063112] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.063838] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.064498] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.065335] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.065781] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff [ 12.066485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.067099] page dumped because: kasan: bad access detected [ 12.067273] [ 12.067342] Memory state around the buggy address: [ 12.067497] ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.068004] ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.068709] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.069402] ^ [ 12.070095] ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.070944] ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.071538] ================================================================== [ 11.834575] ================================================================== [ 11.835369] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.836087] Write of size 1 at addr ffff888100351eeb by task kunit_try_catch/173 [ 11.836403] [ 11.836613] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.836660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.836671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.836693] Call Trace: [ 11.836705] <TASK> [ 11.836723] dump_stack_lvl+0x73/0xb0 [ 11.836756] print_report+0xd1/0x610 [ 11.836779] ? __virt_addr_valid+0x1db/0x2d0 [ 11.836804] ? krealloc_more_oob_helper+0x821/0x930 [ 11.836840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.836862] ? krealloc_more_oob_helper+0x821/0x930 [ 11.836886] kasan_report+0x141/0x180 [ 11.836907] ? krealloc_more_oob_helper+0x821/0x930 [ 11.836946] __asan_report_store1_noabort+0x1b/0x30 [ 11.836970] krealloc_more_oob_helper+0x821/0x930 [ 11.836991] ? __schedule+0x10cc/0x2b60 [ 11.837026] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.837059] ? finish_task_switch.isra.0+0x153/0x700 [ 11.837083] ? __switch_to+0x47/0xf50 [ 11.837110] ? __schedule+0x10cc/0x2b60 [ 11.837131] ? __pfx_read_tsc+0x10/0x10 [ 11.837156] krealloc_more_oob+0x1c/0x30 [ 11.837177] kunit_try_run_case+0x1a5/0x480 [ 11.837203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.837224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.837249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.837272] ? __kthread_parkme+0x82/0x180 [ 11.837293] ? preempt_count_sub+0x50/0x80 [ 11.837315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.837338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.837361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.837384] kthread+0x337/0x6f0 [ 11.837402] ? trace_preempt_on+0x20/0xc0 [ 11.837426] ? __pfx_kthread+0x10/0x10 [ 11.837446] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.837466] ? calculate_sigpending+0x7b/0xa0 [ 11.837491] ? __pfx_kthread+0x10/0x10 [ 11.837511] ret_from_fork+0x116/0x1d0 [ 11.837529] ? __pfx_kthread+0x10/0x10 [ 11.837548] ret_from_fork_asm+0x1a/0x30 [ 11.837581] </TASK> [ 11.837592] [ 11.851116] Allocated by task 173: [ 11.852010] kasan_save_stack+0x45/0x70 [ 11.852763] kasan_save_track+0x18/0x40 [ 11.853905] kasan_save_alloc_info+0x3b/0x50 [ 11.854238] __kasan_krealloc+0x190/0x1f0 [ 11.854406] krealloc_noprof+0xf3/0x340 [ 11.854789] krealloc_more_oob_helper+0x1a9/0x930 [ 11.855150] krealloc_more_oob+0x1c/0x30 [ 11.855353] kunit_try_run_case+0x1a5/0x480 [ 11.855562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.855948] kthread+0x337/0x6f0 [ 11.856102] ret_from_fork+0x116/0x1d0 [ 11.856328] ret_from_fork_asm+0x1a/0x30 [ 11.856552] [ 11.856697] The buggy address belongs to the object at ffff888100351e00 [ 11.856697] which belongs to the cache kmalloc-256 of size 256 [ 11.857360] The buggy address is located 0 bytes to the right of [ 11.857360] allocated 235-byte region [ffff888100351e00, ffff888100351eeb) [ 11.858166] [ 11.858280] The buggy address belongs to the physical page: [ 11.858536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.858925] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.859318] flags: 0x200000000000040(head|node=0|zone=2) [ 11.859558] page_type: f5(slab) [ 11.859769] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.860169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.860508] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.860936] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.861292] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.861620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.862034] page dumped because: kasan: bad access detected [ 11.862299] [ 11.862374] Memory state around the buggy address: [ 11.862640] ffff888100351d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.863228] ffff888100351e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.863555] >ffff888100351e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.863951] ^ [ 11.864286] ffff888100351f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.864603] ffff888100351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.864983] ================================================================== [ 12.014461] ================================================================== [ 12.015555] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.015883] Write of size 1 at addr ffff888102b320eb by task kunit_try_catch/177 [ 12.016640] [ 12.016953] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.017003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.017015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.017037] Call Trace: [ 12.017062] <TASK> [ 12.017080] dump_stack_lvl+0x73/0xb0 [ 12.017112] print_report+0xd1/0x610 [ 12.017134] ? __virt_addr_valid+0x1db/0x2d0 [ 12.017156] ? krealloc_more_oob_helper+0x821/0x930 [ 12.017179] ? kasan_addr_to_slab+0x11/0xa0 [ 12.017198] ? krealloc_more_oob_helper+0x821/0x930 [ 12.017221] kasan_report+0x141/0x180 [ 12.017243] ? krealloc_more_oob_helper+0x821/0x930 [ 12.017271] __asan_report_store1_noabort+0x1b/0x30 [ 12.017295] krealloc_more_oob_helper+0x821/0x930 [ 12.017318] ? __schedule+0x10cc/0x2b60 [ 12.017340] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.017364] ? finish_task_switch.isra.0+0x153/0x700 [ 12.017386] ? __switch_to+0x47/0xf50 [ 12.017412] ? __schedule+0x10cc/0x2b60 [ 12.017433] ? __pfx_read_tsc+0x10/0x10 [ 12.017457] krealloc_large_more_oob+0x1c/0x30 [ 12.017479] kunit_try_run_case+0x1a5/0x480 [ 12.017505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.017526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.017550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.017573] ? __kthread_parkme+0x82/0x180 [ 12.017594] ? preempt_count_sub+0x50/0x80 [ 12.017617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.017652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.017675] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.017699] kthread+0x337/0x6f0 [ 12.017728] ? trace_preempt_on+0x20/0xc0 [ 12.017751] ? __pfx_kthread+0x10/0x10 [ 12.017771] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.017791] ? calculate_sigpending+0x7b/0xa0 [ 12.017832] ? __pfx_kthread+0x10/0x10 [ 12.017852] ret_from_fork+0x116/0x1d0 [ 12.017870] ? __pfx_kthread+0x10/0x10 [ 12.017889] ret_from_fork_asm+0x1a/0x30 [ 12.017922] </TASK> [ 12.017933] [ 12.031513] The buggy address belongs to the physical page: [ 12.031956] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30 [ 12.032832] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.033540] flags: 0x200000000000040(head|node=0|zone=2) [ 12.034125] page_type: f8(unknown) [ 12.034451] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.034900] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.035151] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.035387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.035641] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff [ 12.036121] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.036851] page dumped because: kasan: bad access detected [ 12.037338] [ 12.037493] Memory state around the buggy address: [ 12.037975] ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.038729] ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.039398] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.040048] ^ [ 12.040759] ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.041329] ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.041549] ==================================================================