Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.185676] ================================================================== [ 15.185725] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 15.185774] Write of size 1 at addr fff00000c17354f0 by task kunit_try_catch/156 [ 15.186124] [ 15.186478] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.187170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.187268] Hardware name: linux,dummy-virt (DT) [ 15.187390] Call trace: [ 15.187485] show_stack+0x20/0x38 (C) [ 15.187865] dump_stack_lvl+0x8c/0xd0 [ 15.188017] print_report+0x118/0x5d0 [ 15.188132] kasan_report+0xdc/0x128 [ 15.188458] __asan_report_store1_noabort+0x20/0x30 [ 15.188580] krealloc_more_oob_helper+0x5c0/0x678 [ 15.188851] krealloc_more_oob+0x20/0x38 [ 15.189022] kunit_try_run_case+0x170/0x3f0 [ 15.189204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.189287] kthread+0x328/0x630 [ 15.189537] ret_from_fork+0x10/0x20 [ 15.189703] [ 15.189727] Allocated by task 156: [ 15.189755] kasan_save_stack+0x3c/0x68 [ 15.189821] kasan_save_track+0x20/0x40 [ 15.190042] kasan_save_alloc_info+0x40/0x58 [ 15.190095] __kasan_krealloc+0x118/0x178 [ 15.190133] krealloc_noprof+0x128/0x360 [ 15.190169] krealloc_more_oob_helper+0x168/0x678 [ 15.190351] krealloc_more_oob+0x20/0x38 [ 15.190432] kunit_try_run_case+0x170/0x3f0 [ 15.190484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.190526] kthread+0x328/0x630 [ 15.190570] ret_from_fork+0x10/0x20 [ 15.190607] [ 15.190626] The buggy address belongs to the object at fff00000c1735400 [ 15.190626] which belongs to the cache kmalloc-256 of size 256 [ 15.190699] The buggy address is located 5 bytes to the right of [ 15.190699] allocated 235-byte region [fff00000c1735400, fff00000c17354eb) [ 15.190766] [ 15.190785] The buggy address belongs to the physical page: [ 15.190816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734 [ 15.190883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.190928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.190977] page_type: f5(slab) [ 15.191015] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.191072] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.191130] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.191186] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.191247] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff [ 15.191303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.191351] page dumped because: kasan: bad access detected [ 15.191414] [ 15.191662] Memory state around the buggy address: [ 15.192413] fff00000c1735380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.192533] fff00000c1735400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.192596] >fff00000c1735480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 15.192833] ^ [ 15.193356] fff00000c1735500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.193435] fff00000c1735580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.193558] ================================================================== [ 15.271806] ================================================================== [ 15.272041] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 15.272132] Write of size 1 at addr fff00000c77560f0 by task kunit_try_catch/160 [ 15.272398] [ 15.272453] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.272540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.272700] Hardware name: linux,dummy-virt (DT) [ 15.272917] Call trace: [ 15.272952] show_stack+0x20/0x38 (C) [ 15.273006] dump_stack_lvl+0x8c/0xd0 [ 15.273192] print_report+0x118/0x5d0 [ 15.273275] kasan_report+0xdc/0x128 [ 15.273363] __asan_report_store1_noabort+0x20/0x30 [ 15.273416] krealloc_more_oob_helper+0x5c0/0x678 [ 15.273662] krealloc_large_more_oob+0x20/0x38 [ 15.273816] kunit_try_run_case+0x170/0x3f0 [ 15.273941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.274014] kthread+0x328/0x630 [ 15.274406] ret_from_fork+0x10/0x20 [ 15.274510] [ 15.274588] The buggy address belongs to the physical page: [ 15.274665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 15.274783] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.274925] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.275013] page_type: f8(unknown) [ 15.275517] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.275649] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.275774] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.275824] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.276046] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 15.276423] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.276513] page dumped because: kasan: bad access detected [ 15.276622] [ 15.276661] Memory state around the buggy address: [ 15.276693] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.277352] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.277425] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 15.277532] ^ [ 15.277729] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.277816] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.277985] ================================================================== [ 15.176273] ================================================================== [ 15.176351] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 15.176613] Write of size 1 at addr fff00000c17354eb by task kunit_try_catch/156 [ 15.176831] [ 15.176874] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.176959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.176993] Hardware name: linux,dummy-virt (DT) [ 15.177137] Call trace: [ 15.177163] show_stack+0x20/0x38 (C) [ 15.177217] dump_stack_lvl+0x8c/0xd0 [ 15.177271] print_report+0x118/0x5d0 [ 15.177322] kasan_report+0xdc/0x128 [ 15.177376] __asan_report_store1_noabort+0x20/0x30 [ 15.177428] krealloc_more_oob_helper+0x60c/0x678 [ 15.177831] krealloc_more_oob+0x20/0x38 [ 15.177992] kunit_try_run_case+0x170/0x3f0 [ 15.178045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.178484] kthread+0x328/0x630 [ 15.178624] ret_from_fork+0x10/0x20 [ 15.178805] [ 15.178858] Allocated by task 156: [ 15.178991] kasan_save_stack+0x3c/0x68 [ 15.179094] kasan_save_track+0x20/0x40 [ 15.179133] kasan_save_alloc_info+0x40/0x58 [ 15.179477] __kasan_krealloc+0x118/0x178 [ 15.179849] krealloc_noprof+0x128/0x360 [ 15.180121] krealloc_more_oob_helper+0x168/0x678 [ 15.180230] krealloc_more_oob+0x20/0x38 [ 15.180317] kunit_try_run_case+0x170/0x3f0 [ 15.180478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.180702] kthread+0x328/0x630 [ 15.180817] ret_from_fork+0x10/0x20 [ 15.180987] [ 15.181043] The buggy address belongs to the object at fff00000c1735400 [ 15.181043] which belongs to the cache kmalloc-256 of size 256 [ 15.181153] The buggy address is located 0 bytes to the right of [ 15.181153] allocated 235-byte region [fff00000c1735400, fff00000c17354eb) [ 15.181218] [ 15.181247] The buggy address belongs to the physical page: [ 15.181279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734 [ 15.182025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.182119] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.182177] page_type: f5(slab) [ 15.182917] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.183122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.183249] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.183403] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.183545] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff [ 15.183608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.183690] page dumped because: kasan: bad access detected [ 15.183721] [ 15.183739] Memory state around the buggy address: [ 15.183784] fff00000c1735380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.183827] fff00000c1735400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.183868] >fff00000c1735480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 15.183905] ^ [ 15.183943] fff00000c1735500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.183983] fff00000c1735580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184021] ================================================================== [ 15.263584] ================================================================== [ 15.263791] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 15.263859] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/160 [ 15.264234] [ 15.264287] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.264388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.264416] Hardware name: linux,dummy-virt (DT) [ 15.264763] Call trace: [ 15.264804] show_stack+0x20/0x38 (C) [ 15.264978] dump_stack_lvl+0x8c/0xd0 [ 15.265070] print_report+0x118/0x5d0 [ 15.265260] kasan_report+0xdc/0x128 [ 15.265401] __asan_report_store1_noabort+0x20/0x30 [ 15.265790] krealloc_more_oob_helper+0x60c/0x678 [ 15.265990] krealloc_large_more_oob+0x20/0x38 [ 15.266150] kunit_try_run_case+0x170/0x3f0 [ 15.266246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.266601] kthread+0x328/0x630 [ 15.266807] ret_from_fork+0x10/0x20 [ 15.267049] [ 15.267129] The buggy address belongs to the physical page: [ 15.267283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 15.267456] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.267616] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.267832] page_type: f8(unknown) [ 15.267916] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.267974] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.268419] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.268526] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.268710] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 15.269090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.269255] page dumped because: kasan: bad access detected [ 15.269419] [ 15.269451] Memory state around the buggy address: [ 15.269621] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.269683] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.269940] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 15.270009] ^ [ 15.270480] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.270640] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.270695] ==================================================================
[ 11.735979] ================================================================== [ 11.736754] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.737013] Write of size 1 at addr ffff888100343ef0 by task kunit_try_catch/175 [ 11.737239] [ 11.737337] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.737378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.737389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.737408] Call Trace: [ 11.737419] <TASK> [ 11.737432] dump_stack_lvl+0x73/0xb0 [ 11.737524] print_report+0xd1/0x610 [ 11.737546] ? __virt_addr_valid+0x1db/0x2d0 [ 11.737593] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.737617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.737638] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.737676] kasan_report+0x141/0x180 [ 11.737697] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.737813] __asan_report_store1_noabort+0x1b/0x30 [ 11.737842] krealloc_more_oob_helper+0x7eb/0x930 [ 11.737864] ? __schedule+0x10cc/0x2b60 [ 11.737885] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.737909] ? finish_task_switch.isra.0+0x153/0x700 [ 11.737931] ? __switch_to+0x47/0xf50 [ 11.737955] ? __schedule+0x10cc/0x2b60 [ 11.737984] ? __pfx_read_tsc+0x10/0x10 [ 11.738007] krealloc_more_oob+0x1c/0x30 [ 11.738398] kunit_try_run_case+0x1a5/0x480 [ 11.738424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.738461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.738488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.738512] ? __kthread_parkme+0x82/0x180 [ 11.738532] ? preempt_count_sub+0x50/0x80 [ 11.738554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.738577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.738601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.738624] kthread+0x337/0x6f0 [ 11.738643] ? trace_preempt_on+0x20/0xc0 [ 11.738664] ? __pfx_kthread+0x10/0x10 [ 11.738684] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.738704] ? calculate_sigpending+0x7b/0xa0 [ 11.738727] ? __pfx_kthread+0x10/0x10 [ 11.738747] ret_from_fork+0x116/0x1d0 [ 11.738765] ? __pfx_kthread+0x10/0x10 [ 11.738784] ret_from_fork_asm+0x1a/0x30 [ 11.738814] </TASK> [ 11.738823] [ 11.756711] Allocated by task 175: [ 11.757241] kasan_save_stack+0x45/0x70 [ 11.757569] kasan_save_track+0x18/0x40 [ 11.757711] kasan_save_alloc_info+0x3b/0x50 [ 11.757859] __kasan_krealloc+0x190/0x1f0 [ 11.757995] krealloc_noprof+0xf3/0x340 [ 11.758696] krealloc_more_oob_helper+0x1a9/0x930 [ 11.759525] krealloc_more_oob+0x1c/0x30 [ 11.760029] kunit_try_run_case+0x1a5/0x480 [ 11.760640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.761248] kthread+0x337/0x6f0 [ 11.761567] ret_from_fork+0x116/0x1d0 [ 11.761711] ret_from_fork_asm+0x1a/0x30 [ 11.761853] [ 11.761927] The buggy address belongs to the object at ffff888100343e00 [ 11.761927] which belongs to the cache kmalloc-256 of size 256 [ 11.763089] The buggy address is located 5 bytes to the right of [ 11.763089] allocated 235-byte region [ffff888100343e00, ffff888100343eeb) [ 11.764753] [ 11.765070] The buggy address belongs to the physical page: [ 11.765713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 11.766197] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.766998] flags: 0x200000000000040(head|node=0|zone=2) [ 11.767487] page_type: f5(slab) [ 11.767925] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.768756] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.769017] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.770054] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.770797] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 11.771211] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.771934] page dumped because: kasan: bad access detected [ 11.772530] [ 11.772681] Memory state around the buggy address: [ 11.773042] ffff888100343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.773529] ffff888100343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.774283] >ffff888100343e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.774653] ^ [ 11.775323] ffff888100343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.775828] ffff888100343f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.776090] ================================================================== [ 11.924547] ================================================================== [ 11.925643] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.926355] Write of size 1 at addr ffff8881028aa0eb by task kunit_try_catch/179 [ 11.926680] [ 11.926775] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.926821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.926832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.926853] Call Trace: [ 11.926866] <TASK> [ 11.926882] dump_stack_lvl+0x73/0xb0 [ 11.926911] print_report+0xd1/0x610 [ 11.926933] ? __virt_addr_valid+0x1db/0x2d0 [ 11.926958] ? krealloc_more_oob_helper+0x821/0x930 [ 11.926981] ? kasan_addr_to_slab+0x11/0xa0 [ 11.927001] ? krealloc_more_oob_helper+0x821/0x930 [ 11.927026] kasan_report+0x141/0x180 [ 11.927046] ? krealloc_more_oob_helper+0x821/0x930 [ 11.927074] __asan_report_store1_noabort+0x1b/0x30 [ 11.927099] krealloc_more_oob_helper+0x821/0x930 [ 11.927122] ? __schedule+0x10cc/0x2b60 [ 11.927146] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.927171] ? finish_task_switch.isra.0+0x153/0x700 [ 11.927194] ? __switch_to+0x47/0xf50 [ 11.927219] ? __schedule+0x10cc/0x2b60 [ 11.927239] ? __pfx_read_tsc+0x10/0x10 [ 11.927263] krealloc_large_more_oob+0x1c/0x30 [ 11.927297] kunit_try_run_case+0x1a5/0x480 [ 11.927321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.927344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.927368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.927391] ? __kthread_parkme+0x82/0x180 [ 11.927411] ? preempt_count_sub+0x50/0x80 [ 11.927433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.927464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.927487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.927512] kthread+0x337/0x6f0 [ 11.927532] ? trace_preempt_on+0x20/0xc0 [ 11.927556] ? __pfx_kthread+0x10/0x10 [ 11.927576] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.927623] ? calculate_sigpending+0x7b/0xa0 [ 11.927648] ? __pfx_kthread+0x10/0x10 [ 11.927669] ret_from_fork+0x116/0x1d0 [ 11.927687] ? __pfx_kthread+0x10/0x10 [ 11.927706] ret_from_fork_asm+0x1a/0x30 [ 11.927736] </TASK> [ 11.927746] [ 11.938120] The buggy address belongs to the physical page: [ 11.938619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a8 [ 11.939031] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.939413] flags: 0x200000000000040(head|node=0|zone=2) [ 11.939949] page_type: f8(unknown) [ 11.940081] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.940480] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.940822] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.941079] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.941511] head: 0200000000000002 ffffea00040a2a01 00000000ffffffff 00000000ffffffff [ 11.942157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.942952] page dumped because: kasan: bad access detected [ 11.943501] [ 11.943657] Memory state around the buggy address: [ 11.944115] ffff8881028a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.944544] ffff8881028aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.944772] >ffff8881028aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.944988] ^ [ 11.945281] ffff8881028aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.945593] ffff8881028aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.945883] ================================================================== [ 11.701794] ================================================================== [ 11.702291] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.702813] Write of size 1 at addr ffff888100343eeb by task kunit_try_catch/175 [ 11.703425] [ 11.703566] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.703610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.703621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.703642] Call Trace: [ 11.703654] <TASK> [ 11.703669] dump_stack_lvl+0x73/0xb0 [ 11.703698] print_report+0xd1/0x610 [ 11.703719] ? __virt_addr_valid+0x1db/0x2d0 [ 11.703742] ? krealloc_more_oob_helper+0x821/0x930 [ 11.703765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.703787] ? krealloc_more_oob_helper+0x821/0x930 [ 11.703811] kasan_report+0x141/0x180 [ 11.703924] ? krealloc_more_oob_helper+0x821/0x930 [ 11.703957] __asan_report_store1_noabort+0x1b/0x30 [ 11.703981] krealloc_more_oob_helper+0x821/0x930 [ 11.704003] ? __schedule+0x10cc/0x2b60 [ 11.704097] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.704122] ? finish_task_switch.isra.0+0x153/0x700 [ 11.704145] ? __switch_to+0x47/0xf50 [ 11.704170] ? __schedule+0x10cc/0x2b60 [ 11.704191] ? __pfx_read_tsc+0x10/0x10 [ 11.704214] krealloc_more_oob+0x1c/0x30 [ 11.704235] kunit_try_run_case+0x1a5/0x480 [ 11.704259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.704294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.704317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.704339] ? __kthread_parkme+0x82/0x180 [ 11.704359] ? preempt_count_sub+0x50/0x80 [ 11.704381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.704403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.704426] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.704449] kthread+0x337/0x6f0 [ 11.704467] ? trace_preempt_on+0x20/0xc0 [ 11.704489] ? __pfx_kthread+0x10/0x10 [ 11.704508] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.704529] ? calculate_sigpending+0x7b/0xa0 [ 11.704551] ? __pfx_kthread+0x10/0x10 [ 11.704572] ret_from_fork+0x116/0x1d0 [ 11.704589] ? __pfx_kthread+0x10/0x10 [ 11.704608] ret_from_fork_asm+0x1a/0x30 [ 11.704638] </TASK> [ 11.704648] [ 11.717025] Allocated by task 175: [ 11.717537] kasan_save_stack+0x45/0x70 [ 11.717741] kasan_save_track+0x18/0x40 [ 11.717928] kasan_save_alloc_info+0x3b/0x50 [ 11.718394] __kasan_krealloc+0x190/0x1f0 [ 11.718756] krealloc_noprof+0xf3/0x340 [ 11.718973] krealloc_more_oob_helper+0x1a9/0x930 [ 11.719418] krealloc_more_oob+0x1c/0x30 [ 11.719708] kunit_try_run_case+0x1a5/0x480 [ 11.719918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.720387] kthread+0x337/0x6f0 [ 11.720740] ret_from_fork+0x116/0x1d0 [ 11.721116] ret_from_fork_asm+0x1a/0x30 [ 11.721439] [ 11.721717] The buggy address belongs to the object at ffff888100343e00 [ 11.721717] which belongs to the cache kmalloc-256 of size 256 [ 11.722883] The buggy address is located 0 bytes to the right of [ 11.722883] allocated 235-byte region [ffff888100343e00, ffff888100343eeb) [ 11.723958] [ 11.724242] The buggy address belongs to the physical page: [ 11.724844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 11.725471] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.726234] flags: 0x200000000000040(head|node=0|zone=2) [ 11.726675] page_type: f5(slab) [ 11.727007] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.727496] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.728237] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.728721] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.729328] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 11.729791] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.730218] page dumped because: kasan: bad access detected [ 11.730686] [ 11.730758] Memory state around the buggy address: [ 11.730915] ffff888100343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.731472] ffff888100343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.732153] >ffff888100343e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.733178] ^ [ 11.733429] ffff888100343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.734462] ffff888100343f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.734920] ================================================================== [ 11.946287] ================================================================== [ 11.946621] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.946933] Write of size 1 at addr ffff8881028aa0f0 by task kunit_try_catch/179 [ 11.947286] [ 11.947421] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.947461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.947472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.947489] Call Trace: [ 11.947503] <TASK> [ 11.947515] dump_stack_lvl+0x73/0xb0 [ 11.947540] print_report+0xd1/0x610 [ 11.947560] ? __virt_addr_valid+0x1db/0x2d0 [ 11.947581] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.947604] ? kasan_addr_to_slab+0x11/0xa0 [ 11.947623] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.947647] kasan_report+0x141/0x180 [ 11.947667] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.947695] __asan_report_store1_noabort+0x1b/0x30 [ 11.947718] krealloc_more_oob_helper+0x7eb/0x930 [ 11.947740] ? __schedule+0x10cc/0x2b60 [ 11.947761] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.947784] ? finish_task_switch.isra.0+0x153/0x700 [ 11.947806] ? __switch_to+0x47/0xf50 [ 11.947829] ? __schedule+0x10cc/0x2b60 [ 11.947850] ? __pfx_read_tsc+0x10/0x10 [ 11.947872] krealloc_large_more_oob+0x1c/0x30 [ 11.947894] kunit_try_run_case+0x1a5/0x480 [ 11.947917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.947939] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.947961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.947984] ? __kthread_parkme+0x82/0x180 [ 11.948002] ? preempt_count_sub+0x50/0x80 [ 11.948036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.948059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.948082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.948105] kthread+0x337/0x6f0 [ 11.948124] ? trace_preempt_on+0x20/0xc0 [ 11.948145] ? __pfx_kthread+0x10/0x10 [ 11.948164] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.948184] ? calculate_sigpending+0x7b/0xa0 [ 11.948207] ? __pfx_kthread+0x10/0x10 [ 11.948227] ret_from_fork+0x116/0x1d0 [ 11.948244] ? __pfx_kthread+0x10/0x10 [ 11.948263] ret_from_fork_asm+0x1a/0x30 [ 11.948302] </TASK> [ 11.948310] [ 11.956828] The buggy address belongs to the physical page: [ 11.957254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a8 [ 11.958096] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.958355] flags: 0x200000000000040(head|node=0|zone=2) [ 11.958987] page_type: f8(unknown) [ 11.959595] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.960330] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.960802] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.961409] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.961763] head: 0200000000000002 ffffea00040a2a01 00000000ffffffff 00000000ffffffff [ 11.962303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.962940] page dumped because: kasan: bad access detected [ 11.963421] [ 11.963671] Memory state around the buggy address: [ 11.963887] ffff8881028a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.964508] ffff8881028aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.964844] >ffff8881028aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.965416] ^ [ 11.965877] ffff8881028aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.966504] ffff8881028aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.966941] ==================================================================