Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.394501] ================================================================== [ 24.394694] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.394855] Write of size 1 at addr fff00000c772e0f0 by task kunit_try_catch/162 [ 24.395065] [ 24.395152] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 24.395422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.395501] Hardware name: linux,dummy-virt (DT) [ 24.395584] Call trace: [ 24.395645] show_stack+0x20/0x38 (C) [ 24.395768] dump_stack_lvl+0x8c/0xd0 [ 24.395933] print_report+0x118/0x608 [ 24.396223] kasan_report+0xdc/0x128 [ 24.396700] __asan_report_store1_noabort+0x20/0x30 [ 24.397647] krealloc_more_oob_helper+0x5c0/0x678 [ 24.397996] krealloc_large_more_oob+0x20/0x38 [ 24.398470] kunit_try_run_case+0x170/0x3f0 [ 24.398960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.399843] kthread+0x328/0x630 [ 24.399984] ret_from_fork+0x10/0x20 [ 24.400143] [ 24.400196] The buggy address belongs to the physical page: [ 24.400297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10772c [ 24.400448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.400758] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.401038] page_type: f8(unknown) [ 24.401197] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.401406] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.401699] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.401842] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.401974] head: 0bfffe0000000002 ffffc1ffc31dcb01 00000000ffffffff 00000000ffffffff [ 24.402090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.402180] page dumped because: kasan: bad access detected [ 24.402249] [ 24.402322] Memory state around the buggy address: [ 24.402463] fff00000c772df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.402676] fff00000c772e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.402841] >fff00000c772e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.402937] ^ [ 24.403050] fff00000c772e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.403198] fff00000c772e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.403287] ================================================================== [ 24.385328] ================================================================== [ 24.385509] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.385645] Write of size 1 at addr fff00000c772e0eb by task kunit_try_catch/162 [ 24.385766] [ 24.385897] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 24.386189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.386264] Hardware name: linux,dummy-virt (DT) [ 24.386383] Call trace: [ 24.386463] show_stack+0x20/0x38 (C) [ 24.386619] dump_stack_lvl+0x8c/0xd0 [ 24.386756] print_report+0x118/0x608 [ 24.386886] kasan_report+0xdc/0x128 [ 24.387014] __asan_report_store1_noabort+0x20/0x30 [ 24.387303] krealloc_more_oob_helper+0x60c/0x678 [ 24.387478] krealloc_large_more_oob+0x20/0x38 [ 24.387821] kunit_try_run_case+0x170/0x3f0 [ 24.387944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.388072] kthread+0x328/0x630 [ 24.388223] ret_from_fork+0x10/0x20 [ 24.388481] [ 24.388533] The buggy address belongs to the physical page: [ 24.388677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10772c [ 24.389027] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.389141] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.389277] page_type: f8(unknown) [ 24.389372] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.389526] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.389946] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.390088] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.390453] head: 0bfffe0000000002 ffffc1ffc31dcb01 00000000ffffffff 00000000ffffffff [ 24.390701] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.390872] page dumped because: kasan: bad access detected [ 24.391028] [ 24.391410] Memory state around the buggy address: [ 24.391515] fff00000c772df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.391977] fff00000c772e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.392278] >fff00000c772e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.392902] ^ [ 24.393041] fff00000c772e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.393159] fff00000c772e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.393444] ================================================================== [ 24.272526] ================================================================== [ 24.272788] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.273070] Write of size 1 at addr fff00000c44aaaf0 by task kunit_try_catch/158 [ 24.273405] [ 24.273486] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 24.273723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.273973] Hardware name: linux,dummy-virt (DT) [ 24.274275] Call trace: [ 24.274336] show_stack+0x20/0x38 (C) [ 24.274526] dump_stack_lvl+0x8c/0xd0 [ 24.275020] print_report+0x118/0x608 [ 24.275161] kasan_report+0xdc/0x128 [ 24.275321] __asan_report_store1_noabort+0x20/0x30 [ 24.275467] krealloc_more_oob_helper+0x5c0/0x678 [ 24.275590] krealloc_more_oob+0x20/0x38 [ 24.275884] kunit_try_run_case+0x170/0x3f0 [ 24.276003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.276513] kthread+0x328/0x630 [ 24.276655] ret_from_fork+0x10/0x20 [ 24.276790] [ 24.276946] Allocated by task 158: [ 24.277052] kasan_save_stack+0x3c/0x68 [ 24.277497] kasan_save_track+0x20/0x40 [ 24.277740] kasan_save_alloc_info+0x40/0x58 [ 24.278187] __kasan_krealloc+0x118/0x178 [ 24.278561] krealloc_noprof+0x128/0x360 [ 24.278774] krealloc_more_oob_helper+0x168/0x678 [ 24.278960] krealloc_more_oob+0x20/0x38 [ 24.279081] kunit_try_run_case+0x170/0x3f0 [ 24.279182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.279328] kthread+0x328/0x630 [ 24.279442] ret_from_fork+0x10/0x20 [ 24.279547] [ 24.279777] The buggy address belongs to the object at fff00000c44aaa00 [ 24.279777] which belongs to the cache kmalloc-256 of size 256 [ 24.279925] The buggy address is located 5 bytes to the right of [ 24.279925] allocated 235-byte region [fff00000c44aaa00, fff00000c44aaaeb) [ 24.280083] [ 24.280140] The buggy address belongs to the physical page: [ 24.280221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044aa [ 24.280358] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.280505] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.280852] page_type: f5(slab) [ 24.281026] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.281294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.281501] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.281840] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.281994] head: 0bfffe0000000001 ffffc1ffc3112a81 00000000ffffffff 00000000ffffffff [ 24.282276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.282405] page dumped because: kasan: bad access detected [ 24.282490] [ 24.282541] Memory state around the buggy address: [ 24.282668] fff00000c44aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.282782] fff00000c44aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.282895] >fff00000c44aaa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.282995] ^ [ 24.283268] fff00000c44aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.283409] fff00000c44aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.283544] ================================================================== [ 24.256636] ================================================================== [ 24.256879] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.257112] Write of size 1 at addr fff00000c44aaaeb by task kunit_try_catch/158 [ 24.257553] [ 24.257800] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 24.258012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.258077] Hardware name: linux,dummy-virt (DT) [ 24.258152] Call trace: [ 24.258212] show_stack+0x20/0x38 (C) [ 24.258454] dump_stack_lvl+0x8c/0xd0 [ 24.258688] print_report+0x118/0x608 [ 24.258814] kasan_report+0xdc/0x128 [ 24.259330] __asan_report_store1_noabort+0x20/0x30 [ 24.259725] krealloc_more_oob_helper+0x60c/0x678 [ 24.259903] krealloc_more_oob+0x20/0x38 [ 24.260131] kunit_try_run_case+0x170/0x3f0 [ 24.260354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.260514] kthread+0x328/0x630 [ 24.260636] ret_from_fork+0x10/0x20 [ 24.260775] [ 24.260829] Allocated by task 158: [ 24.260907] kasan_save_stack+0x3c/0x68 [ 24.261526] kasan_save_track+0x20/0x40 [ 24.261939] kasan_save_alloc_info+0x40/0x58 [ 24.262629] __kasan_krealloc+0x118/0x178 [ 24.263045] krealloc_noprof+0x128/0x360 [ 24.263300] krealloc_more_oob_helper+0x168/0x678 [ 24.263411] krealloc_more_oob+0x20/0x38 [ 24.263499] kunit_try_run_case+0x170/0x3f0 [ 24.263618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.263727] kthread+0x328/0x630 [ 24.263828] ret_from_fork+0x10/0x20 [ 24.263922] [ 24.264040] The buggy address belongs to the object at fff00000c44aaa00 [ 24.264040] which belongs to the cache kmalloc-256 of size 256 [ 24.264214] The buggy address is located 0 bytes to the right of [ 24.264214] allocated 235-byte region [fff00000c44aaa00, fff00000c44aaaeb) [ 24.264629] [ 24.264742] The buggy address belongs to the physical page: [ 24.264820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044aa [ 24.264944] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.265069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.265419] page_type: f5(slab) [ 24.265807] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.265998] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.266125] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.266263] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.266423] head: 0bfffe0000000001 ffffc1ffc3112a81 00000000ffffffff 00000000ffffffff [ 24.266541] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.266882] page dumped because: kasan: bad access detected [ 24.267028] [ 24.267074] Memory state around the buggy address: [ 24.267151] fff00000c44aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.267270] fff00000c44aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.267452] >fff00000c44aaa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.267598] ^ [ 24.268030] fff00000c44aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.268158] fff00000c44aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.268252] ==================================================================
[ 16.701907] ================================================================== [ 16.702799] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 16.703641] Write of size 1 at addr ffff888102bee0eb by task kunit_try_catch/181 [ 16.704780] [ 16.705629] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 16.705772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.705809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.705866] Call Trace: [ 16.705908] <TASK> [ 16.705956] dump_stack_lvl+0x73/0xb0 [ 16.706036] print_report+0xd1/0x650 [ 16.706114] ? __virt_addr_valid+0x1db/0x2d0 [ 16.706151] ? krealloc_more_oob_helper+0x821/0x930 [ 16.706182] ? kasan_addr_to_slab+0x11/0xa0 [ 16.706218] ? krealloc_more_oob_helper+0x821/0x930 [ 16.706275] kasan_report+0x141/0x180 [ 16.706311] ? krealloc_more_oob_helper+0x821/0x930 [ 16.706347] __asan_report_store1_noabort+0x1b/0x30 [ 16.706379] krealloc_more_oob_helper+0x821/0x930 [ 16.706406] ? __schedule+0x10cc/0x2b60 [ 16.706441] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 16.706471] ? finish_task_switch.isra.0+0x153/0x700 [ 16.706506] ? __switch_to+0x5d9/0xf60 [ 16.706535] ? dequeue_task_fair+0x166/0x4e0 [ 16.706569] ? __schedule+0x10cc/0x2b60 [ 16.706621] ? __pfx_read_tsc+0x10/0x10 [ 16.706704] krealloc_large_more_oob+0x1c/0x30 [ 16.706755] kunit_try_run_case+0x1a5/0x480 [ 16.706794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.706828] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.706862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.706896] ? __kthread_parkme+0x82/0x180 [ 16.706928] ? preempt_count_sub+0x50/0x80 [ 16.706963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.706998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.707030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.707064] kthread+0x337/0x6f0 [ 16.707087] ? trace_preempt_on+0x20/0xc0 [ 16.707121] ? __pfx_kthread+0x10/0x10 [ 16.707146] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.707177] ? calculate_sigpending+0x7b/0xa0 [ 16.707209] ? __pfx_kthread+0x10/0x10 [ 16.707263] ret_from_fork+0x41/0x80 [ 16.707297] ? __pfx_kthread+0x10/0x10 [ 16.707322] ret_from_fork_asm+0x1a/0x30 [ 16.707365] </TASK> [ 16.707381] [ 16.726561] The buggy address belongs to the physical page: [ 16.727301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bec [ 16.728172] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.728971] flags: 0x200000000000040(head|node=0|zone=2) [ 16.729404] page_type: f8(unknown) [ 16.730134] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.731005] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.731947] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.732665] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.733585] head: 0200000000000002 ffffea00040afb01 00000000ffffffff 00000000ffffffff [ 16.734211] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.735191] page dumped because: kasan: bad access detected [ 16.735863] [ 16.736076] Memory state around the buggy address: [ 16.737011] ffff888102bedf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.737810] ffff888102bee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.738379] >ffff888102bee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.739173] ^ [ 16.739924] ffff888102bee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.740557] ffff888102bee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.741122] ================================================================== [ 16.353168] ================================================================== [ 16.354344] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 16.355196] Write of size 1 at addr ffff888100a0feeb by task kunit_try_catch/177 [ 16.356037] [ 16.356380] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 16.356536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.356993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.357055] Call Trace: [ 16.357092] <TASK> [ 16.357134] dump_stack_lvl+0x73/0xb0 [ 16.357245] print_report+0xd1/0x650 [ 16.357327] ? __virt_addr_valid+0x1db/0x2d0 [ 16.357397] ? krealloc_more_oob_helper+0x821/0x930 [ 16.357429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.357462] ? krealloc_more_oob_helper+0x821/0x930 [ 16.357491] kasan_report+0x141/0x180 [ 16.357525] ? krealloc_more_oob_helper+0x821/0x930 [ 16.357561] __asan_report_store1_noabort+0x1b/0x30 [ 16.357590] krealloc_more_oob_helper+0x821/0x930 [ 16.357696] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 16.357775] ? irqentry_exit+0x2a/0x60 [ 16.357808] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.357852] ? __pfx_krealloc_more_oob+0x10/0x10 [ 16.357883] krealloc_more_oob+0x1c/0x30 [ 16.357909] kunit_try_run_case+0x1a5/0x480 [ 16.357945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.357978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.358012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.358044] ? __kthread_parkme+0x82/0x180 [ 16.358074] ? preempt_count_sub+0x50/0x80 [ 16.358109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.358142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.358175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.358208] kthread+0x337/0x6f0 [ 16.358261] ? trace_preempt_on+0x20/0xc0 [ 16.358298] ? __pfx_kthread+0x10/0x10 [ 16.358322] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.358353] ? calculate_sigpending+0x7b/0xa0 [ 16.358382] ? __pfx_kthread+0x10/0x10 [ 16.358405] ret_from_fork+0x41/0x80 [ 16.358435] ? __pfx_kthread+0x10/0x10 [ 16.358459] ret_from_fork_asm+0x1a/0x30 [ 16.358501] </TASK> [ 16.358515] [ 16.378437] Allocated by task 177: [ 16.378798] kasan_save_stack+0x45/0x70 [ 16.379345] kasan_save_track+0x18/0x40 [ 16.379757] kasan_save_alloc_info+0x3b/0x50 [ 16.380557] __kasan_krealloc+0x190/0x1f0 [ 16.380902] krealloc_noprof+0xf3/0x340 [ 16.381789] krealloc_more_oob_helper+0x1a9/0x930 [ 16.382226] krealloc_more_oob+0x1c/0x30 [ 16.382569] kunit_try_run_case+0x1a5/0x480 [ 16.383046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.383533] kthread+0x337/0x6f0 [ 16.383946] ret_from_fork+0x41/0x80 [ 16.384519] ret_from_fork_asm+0x1a/0x30 [ 16.385353] [ 16.385572] The buggy address belongs to the object at ffff888100a0fe00 [ 16.385572] which belongs to the cache kmalloc-256 of size 256 [ 16.387007] The buggy address is located 0 bytes to the right of [ 16.387007] allocated 235-byte region [ffff888100a0fe00, ffff888100a0feeb) [ 16.388245] [ 16.388512] The buggy address belongs to the physical page: [ 16.389337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a0e [ 16.390548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.391223] flags: 0x200000000000040(head|node=0|zone=2) [ 16.391728] page_type: f5(slab) [ 16.392060] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.393306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.394029] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.395185] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.395907] head: 0200000000000001 ffffea0004028381 00000000ffffffff 00000000ffffffff [ 16.396779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.397391] page dumped because: kasan: bad access detected [ 16.398266] [ 16.398431] Memory state around the buggy address: [ 16.399247] ffff888100a0fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.400450] ffff888100a0fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.401161] >ffff888100a0fe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.401839] ^ [ 16.402885] ffff888100a0ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.403505] ffff888100a0ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.404335] ================================================================== [ 16.742085] ================================================================== [ 16.743074] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 16.743850] Write of size 1 at addr ffff888102bee0f0 by task kunit_try_catch/181 [ 16.744471] [ 16.744916] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 16.745034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.745069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.745125] Call Trace: [ 16.745175] <TASK> [ 16.745285] dump_stack_lvl+0x73/0xb0 [ 16.745364] print_report+0xd1/0x650 [ 16.745437] ? __virt_addr_valid+0x1db/0x2d0 [ 16.745509] ? krealloc_more_oob_helper+0x7eb/0x930 [ 16.745577] ? kasan_addr_to_slab+0x11/0xa0 [ 16.745803] ? krealloc_more_oob_helper+0x7eb/0x930 [ 16.745872] kasan_report+0x141/0x180 [ 16.745977] ? krealloc_more_oob_helper+0x7eb/0x930 [ 16.746064] __asan_report_store1_noabort+0x1b/0x30 [ 16.746133] krealloc_more_oob_helper+0x7eb/0x930 [ 16.746194] ? __schedule+0x10cc/0x2b60 [ 16.746265] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 16.746315] ? finish_task_switch.isra.0+0x153/0x700 [ 16.746354] ? __switch_to+0x5d9/0xf60 [ 16.746382] ? dequeue_task_fair+0x166/0x4e0 [ 16.746415] ? __schedule+0x10cc/0x2b60 [ 16.746446] ? __pfx_read_tsc+0x10/0x10 [ 16.746478] krealloc_large_more_oob+0x1c/0x30 [ 16.746506] kunit_try_run_case+0x1a5/0x480 [ 16.746542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.746574] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.746671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.746758] ? __kthread_parkme+0x82/0x180 [ 16.746836] ? preempt_count_sub+0x50/0x80 [ 16.746976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.747049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.747087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.747121] kthread+0x337/0x6f0 [ 16.747144] ? trace_preempt_on+0x20/0xc0 [ 16.747180] ? __pfx_kthread+0x10/0x10 [ 16.747204] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.747273] ? calculate_sigpending+0x7b/0xa0 [ 16.747307] ? __pfx_kthread+0x10/0x10 [ 16.747333] ret_from_fork+0x41/0x80 [ 16.747364] ? __pfx_kthread+0x10/0x10 [ 16.747389] ret_from_fork_asm+0x1a/0x30 [ 16.747431] </TASK> [ 16.747444] [ 16.766921] The buggy address belongs to the physical page: [ 16.767934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bec [ 16.768767] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.769505] flags: 0x200000000000040(head|node=0|zone=2) [ 16.770145] page_type: f8(unknown) [ 16.770546] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.771353] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.772001] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.772920] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.773803] head: 0200000000000002 ffffea00040afb01 00000000ffffffff 00000000ffffffff [ 16.774450] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.775324] page dumped because: kasan: bad access detected [ 16.775904] [ 16.776083] Memory state around the buggy address: [ 16.776551] ffff888102bedf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.777342] ffff888102bee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.778045] >ffff888102bee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.778558] ^ [ 16.779103] ffff888102bee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.779726] ffff888102bee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.780797] ================================================================== [ 16.406626] ================================================================== [ 16.407187] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 16.408059] Write of size 1 at addr ffff888100a0fef0 by task kunit_try_catch/177 [ 16.409438] [ 16.409992] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 16.410076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.410106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.410139] Call Trace: [ 16.410157] <TASK> [ 16.410176] dump_stack_lvl+0x73/0xb0 [ 16.410212] print_report+0xd1/0x650 [ 16.410244] ? __virt_addr_valid+0x1db/0x2d0 [ 16.410274] ? krealloc_more_oob_helper+0x7eb/0x930 [ 16.410302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.410333] ? krealloc_more_oob_helper+0x7eb/0x930 [ 16.410360] kasan_report+0x141/0x180 [ 16.410390] ? krealloc_more_oob_helper+0x7eb/0x930 [ 16.410424] __asan_report_store1_noabort+0x1b/0x30 [ 16.410452] krealloc_more_oob_helper+0x7eb/0x930 [ 16.410482] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 16.410509] ? irqentry_exit+0x2a/0x60 [ 16.410533] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.410576] ? __pfx_krealloc_more_oob+0x10/0x10 [ 16.410666] krealloc_more_oob+0x1c/0x30 [ 16.410737] kunit_try_run_case+0x1a5/0x480 [ 16.410823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.410937] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.411020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.411112] ? __kthread_parkme+0x82/0x180 [ 16.411184] ? preempt_count_sub+0x50/0x80 [ 16.411271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.411313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.411348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.411384] kthread+0x337/0x6f0 [ 16.411407] ? trace_preempt_on+0x20/0xc0 [ 16.411442] ? __pfx_kthread+0x10/0x10 [ 16.411466] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.411497] ? calculate_sigpending+0x7b/0xa0 [ 16.411529] ? __pfx_kthread+0x10/0x10 [ 16.411556] ret_from_fork+0x41/0x80 [ 16.411587] ? __pfx_kthread+0x10/0x10 [ 16.411678] ret_from_fork_asm+0x1a/0x30 [ 16.411782] </TASK> [ 16.411799] [ 16.431978] Allocated by task 177: [ 16.432448] kasan_save_stack+0x45/0x70 [ 16.433088] kasan_save_track+0x18/0x40 [ 16.434014] kasan_save_alloc_info+0x3b/0x50 [ 16.434679] __kasan_krealloc+0x190/0x1f0 [ 16.435083] krealloc_noprof+0xf3/0x340 [ 16.435508] krealloc_more_oob_helper+0x1a9/0x930 [ 16.435964] krealloc_more_oob+0x1c/0x30 [ 16.436594] kunit_try_run_case+0x1a5/0x480 [ 16.437185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.438105] kthread+0x337/0x6f0 [ 16.438559] ret_from_fork+0x41/0x80 [ 16.439157] ret_from_fork_asm+0x1a/0x30 [ 16.439799] [ 16.440073] The buggy address belongs to the object at ffff888100a0fe00 [ 16.440073] which belongs to the cache kmalloc-256 of size 256 [ 16.441204] The buggy address is located 5 bytes to the right of [ 16.441204] allocated 235-byte region [ffff888100a0fe00, ffff888100a0feeb) [ 16.442828] [ 16.443108] The buggy address belongs to the physical page: [ 16.443587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a0e [ 16.444489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.445288] flags: 0x200000000000040(head|node=0|zone=2) [ 16.446136] page_type: f5(slab) [ 16.446548] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.447372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.448231] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.448973] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.449714] head: 0200000000000001 ffffea0004028381 00000000ffffffff 00000000ffffffff [ 16.451030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.451498] page dumped because: kasan: bad access detected [ 16.452273] [ 16.452644] Memory state around the buggy address: [ 16.453161] ffff888100a0fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.454254] ffff888100a0fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.454956] >ffff888100a0fe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.455558] ^ [ 16.456342] ffff888100a0ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.457132] ffff888100a0ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.458139] ==================================================================