Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.349892] ================================================================== [ 15.349977] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 15.350029] Write of size 1 at addr fff00000c4600ceb by task kunit_try_catch/159 [ 15.350251] [ 15.350358] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.350467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.350494] Hardware name: linux,dummy-virt (DT) [ 15.350524] Call trace: [ 15.350547] show_stack+0x20/0x38 (C) [ 15.350597] dump_stack_lvl+0x8c/0xd0 [ 15.350644] print_report+0x118/0x608 [ 15.350688] kasan_report+0xdc/0x128 [ 15.351020] __asan_report_store1_noabort+0x20/0x30 [ 15.351246] krealloc_more_oob_helper+0x60c/0x678 [ 15.351546] krealloc_more_oob+0x20/0x38 [ 15.351603] kunit_try_run_case+0x170/0x3f0 [ 15.351879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.352027] kthread+0x328/0x630 [ 15.352236] ret_from_fork+0x10/0x20 [ 15.352371] [ 15.352483] Allocated by task 159: [ 15.352517] kasan_save_stack+0x3c/0x68 [ 15.352958] kasan_save_track+0x20/0x40 [ 15.353286] kasan_save_alloc_info+0x40/0x58 [ 15.353405] __kasan_krealloc+0x118/0x178 [ 15.353444] krealloc_noprof+0x128/0x360 [ 15.353683] krealloc_more_oob_helper+0x168/0x678 [ 15.353750] krealloc_more_oob+0x20/0x38 [ 15.354115] kunit_try_run_case+0x170/0x3f0 [ 15.354375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.354427] kthread+0x328/0x630 [ 15.354463] ret_from_fork+0x10/0x20 [ 15.354497] [ 15.354519] The buggy address belongs to the object at fff00000c4600c00 [ 15.354519] which belongs to the cache kmalloc-256 of size 256 [ 15.354876] The buggy address is located 0 bytes to the right of [ 15.354876] allocated 235-byte region [fff00000c4600c00, fff00000c4600ceb) [ 15.355060] [ 15.355186] The buggy address belongs to the physical page: [ 15.355303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.355620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.355827] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.356593] page_type: f5(slab) [ 15.356652] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.356722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.357141] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.357268] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.357873] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.358122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.358293] page dumped because: kasan: bad access detected [ 15.358462] [ 15.358590] Memory state around the buggy address: [ 15.358625] fff00000c4600b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359038] fff00000c4600c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.359238] >fff00000c4600c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 15.359356] ^ [ 15.359445] fff00000c4600d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359549] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359776] ================================================================== [ 15.444869] ================================================================== [ 15.444913] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 15.444969] Write of size 1 at addr fff00000c786a0f0 by task kunit_try_catch/163 [ 15.445419] [ 15.445466] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.445672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.445893] Hardware name: linux,dummy-virt (DT) [ 15.445930] Call trace: [ 15.446118] show_stack+0x20/0x38 (C) [ 15.446230] dump_stack_lvl+0x8c/0xd0 [ 15.446411] print_report+0x118/0x608 [ 15.446730] kasan_report+0xdc/0x128 [ 15.446986] __asan_report_store1_noabort+0x20/0x30 [ 15.447107] krealloc_more_oob_helper+0x5c0/0x678 [ 15.447278] krealloc_large_more_oob+0x20/0x38 [ 15.447545] kunit_try_run_case+0x170/0x3f0 [ 15.447654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.447890] kthread+0x328/0x630 [ 15.448082] ret_from_fork+0x10/0x20 [ 15.448297] [ 15.448418] The buggy address belongs to the physical page: [ 15.448455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 15.448528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.448909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.449042] page_type: f8(unknown) [ 15.449144] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.449573] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.449909] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.450175] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.450406] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff [ 15.450572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.450923] page dumped because: kasan: bad access detected [ 15.451247] [ 15.451374] Memory state around the buggy address: [ 15.451407] fff00000c7869f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.451514] fff00000c786a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.451836] >fff00000c786a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 15.452036] ^ [ 15.452190] fff00000c786a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.452304] fff00000c786a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.452566] ================================================================== [ 15.440970] ================================================================== [ 15.441029] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 15.441463] Write of size 1 at addr fff00000c786a0eb by task kunit_try_catch/163 [ 15.441587] [ 15.441688] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.441778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.441864] Hardware name: linux,dummy-virt (DT) [ 15.441897] Call trace: [ 15.441918] show_stack+0x20/0x38 (C) [ 15.441980] dump_stack_lvl+0x8c/0xd0 [ 15.442029] print_report+0x118/0x608 [ 15.442468] kasan_report+0xdc/0x128 [ 15.442635] __asan_report_store1_noabort+0x20/0x30 [ 15.442816] krealloc_more_oob_helper+0x60c/0x678 [ 15.442867] krealloc_large_more_oob+0x20/0x38 [ 15.442914] kunit_try_run_case+0x170/0x3f0 [ 15.442981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.443149] kthread+0x328/0x630 [ 15.443233] ret_from_fork+0x10/0x20 [ 15.443296] [ 15.443322] The buggy address belongs to the physical page: [ 15.443359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 15.443431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.443478] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.443530] page_type: f8(unknown) [ 15.443569] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.443642] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.443690] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.443736] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.443798] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff [ 15.443844] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.443882] page dumped because: kasan: bad access detected [ 15.443928] [ 15.443957] Memory state around the buggy address: [ 15.443996] fff00000c7869f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.444048] fff00000c786a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.444088] >fff00000c786a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 15.444132] ^ [ 15.444169] fff00000c786a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.444209] fff00000c786a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.444245] ================================================================== [ 15.361840] ================================================================== [ 15.361899] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 15.362128] Write of size 1 at addr fff00000c4600cf0 by task kunit_try_catch/159 [ 15.362228] [ 15.362262] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.362349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.362375] Hardware name: linux,dummy-virt (DT) [ 15.362404] Call trace: [ 15.362841] show_stack+0x20/0x38 (C) [ 15.362909] dump_stack_lvl+0x8c/0xd0 [ 15.363218] print_report+0x118/0x608 [ 15.363354] kasan_report+0xdc/0x128 [ 15.363445] __asan_report_store1_noabort+0x20/0x30 [ 15.363699] krealloc_more_oob_helper+0x5c0/0x678 [ 15.363925] krealloc_more_oob+0x20/0x38 [ 15.364455] kunit_try_run_case+0x170/0x3f0 [ 15.364596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.364822] kthread+0x328/0x630 [ 15.364900] ret_from_fork+0x10/0x20 [ 15.365242] [ 15.365285] Allocated by task 159: [ 15.365318] kasan_save_stack+0x3c/0x68 [ 15.365514] kasan_save_track+0x20/0x40 [ 15.365651] kasan_save_alloc_info+0x40/0x58 [ 15.365872] __kasan_krealloc+0x118/0x178 [ 15.366131] krealloc_noprof+0x128/0x360 [ 15.366342] krealloc_more_oob_helper+0x168/0x678 [ 15.366713] krealloc_more_oob+0x20/0x38 [ 15.366967] kunit_try_run_case+0x170/0x3f0 [ 15.367051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.367234] kthread+0x328/0x630 [ 15.367273] ret_from_fork+0x10/0x20 [ 15.367487] [ 15.367663] The buggy address belongs to the object at fff00000c4600c00 [ 15.367663] which belongs to the cache kmalloc-256 of size 256 [ 15.367731] The buggy address is located 5 bytes to the right of [ 15.367731] allocated 235-byte region [fff00000c4600c00, fff00000c4600ceb) [ 15.368001] [ 15.368027] The buggy address belongs to the physical page: [ 15.368271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.368427] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.368830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.369088] page_type: f5(slab) [ 15.369450] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.369725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.369910] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.369980] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.370028] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.370092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.370133] page dumped because: kasan: bad access detected [ 15.370324] [ 15.370357] Memory state around the buggy address: [ 15.370402] fff00000c4600b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370450] fff00000c4600c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.370702] >fff00000c4600c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 15.370972] ^ [ 15.371109] fff00000c4600d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.371183] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.371247] ==================================================================
[ 10.787427] ================================================================== [ 10.787804] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 10.788050] Write of size 1 at addr ffff888100348aeb by task kunit_try_catch/175 [ 10.788291] [ 10.788377] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.788420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.788431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.788451] Call Trace: [ 10.788462] <TASK> [ 10.788476] dump_stack_lvl+0x73/0xb0 [ 10.788499] print_report+0xd1/0x650 [ 10.788522] ? __virt_addr_valid+0x1db/0x2d0 [ 10.788543] ? krealloc_more_oob_helper+0x821/0x930 [ 10.788563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.788585] ? krealloc_more_oob_helper+0x821/0x930 [ 10.788605] kasan_report+0x141/0x180 [ 10.788626] ? krealloc_more_oob_helper+0x821/0x930 [ 10.788651] __asan_report_store1_noabort+0x1b/0x30 [ 10.788671] krealloc_more_oob_helper+0x821/0x930 [ 10.788690] ? __schedule+0x10cc/0x2b60 [ 10.788712] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.788732] ? finish_task_switch.isra.0+0x153/0x700 [ 10.788754] ? __switch_to+0x5d9/0xf60 [ 10.788776] ? dequeue_task_fair+0x166/0x4e0 [ 10.788799] ? __schedule+0x10cc/0x2b60 [ 10.788821] ? __pfx_read_tsc+0x10/0x10 [ 10.788843] krealloc_more_oob+0x1c/0x30 [ 10.788861] kunit_try_run_case+0x1a5/0x480 [ 10.788884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.788905] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.788929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.788951] ? __kthread_parkme+0x82/0x180 [ 10.788972] ? preempt_count_sub+0x50/0x80 [ 10.788995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.789018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.789040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.789062] kthread+0x337/0x6f0 [ 10.789078] ? trace_preempt_on+0x20/0xc0 [ 10.789100] ? __pfx_kthread+0x10/0x10 [ 10.789117] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.789138] ? calculate_sigpending+0x7b/0xa0 [ 10.789159] ? __pfx_kthread+0x10/0x10 [ 10.789176] ret_from_fork+0x41/0x80 [ 10.789196] ? __pfx_kthread+0x10/0x10 [ 10.789213] ret_from_fork_asm+0x1a/0x30 [ 10.789601] </TASK> [ 10.789620] [ 10.806322] Allocated by task 175: [ 10.806857] kasan_save_stack+0x45/0x70 [ 10.807180] kasan_save_track+0x18/0x40 [ 10.807339] kasan_save_alloc_info+0x3b/0x50 [ 10.807487] __kasan_krealloc+0x190/0x1f0 [ 10.807733] krealloc_noprof+0xf3/0x340 [ 10.808417] krealloc_more_oob_helper+0x1a9/0x930 [ 10.808854] krealloc_more_oob+0x1c/0x30 [ 10.809347] kunit_try_run_case+0x1a5/0x480 [ 10.809792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.810357] kthread+0x337/0x6f0 [ 10.810771] ret_from_fork+0x41/0x80 [ 10.811076] ret_from_fork_asm+0x1a/0x30 [ 10.811212] [ 10.811317] The buggy address belongs to the object at ffff888100348a00 [ 10.811317] which belongs to the cache kmalloc-256 of size 256 [ 10.812249] The buggy address is located 0 bytes to the right of [ 10.812249] allocated 235-byte region [ffff888100348a00, ffff888100348aeb) [ 10.812984] [ 10.813080] The buggy address belongs to the physical page: [ 10.813721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 10.814367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.814598] flags: 0x200000000000040(head|node=0|zone=2) [ 10.814874] page_type: f5(slab) [ 10.815174] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.815918] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.816720] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.817316] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.817917] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 10.818531] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.819316] page dumped because: kasan: bad access detected [ 10.819812] [ 10.819968] Memory state around the buggy address: [ 10.820258] ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.820570] ffff888100348a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.820841] >ffff888100348a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 10.821701] ^ [ 10.822313] ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.823069] ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.823554] ================================================================== [ 10.991329] ================================================================== [ 10.991658] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 10.991932] Write of size 1 at addr ffff8881039120f0 by task kunit_try_catch/179 [ 10.992181] [ 10.992356] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.992400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.992411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.992443] Call Trace: [ 10.992463] <TASK> [ 10.992476] dump_stack_lvl+0x73/0xb0 [ 10.992500] print_report+0xd1/0x650 [ 10.992534] ? __virt_addr_valid+0x1db/0x2d0 [ 10.992555] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.992575] ? kasan_addr_to_slab+0x11/0xa0 [ 10.992596] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.992616] kasan_report+0x141/0x180 [ 10.992638] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.992673] __asan_report_store1_noabort+0x1b/0x30 [ 10.992694] krealloc_more_oob_helper+0x7eb/0x930 [ 10.992713] ? __schedule+0x10cc/0x2b60 [ 10.992735] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.992765] ? finish_task_switch.isra.0+0x153/0x700 [ 10.992787] ? __switch_to+0x5d9/0xf60 [ 10.992807] ? dequeue_task_fair+0x166/0x4e0 [ 10.992840] ? __schedule+0x10cc/0x2b60 [ 10.992862] ? __pfx_read_tsc+0x10/0x10 [ 10.992885] krealloc_large_more_oob+0x1c/0x30 [ 10.992904] kunit_try_run_case+0x1a5/0x480 [ 10.992928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.992949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.992972] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.992995] ? __kthread_parkme+0x82/0x180 [ 10.993016] ? preempt_count_sub+0x50/0x80 [ 10.993040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.993064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.993086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.993109] kthread+0x337/0x6f0 [ 10.993125] ? trace_preempt_on+0x20/0xc0 [ 10.993148] ? __pfx_kthread+0x10/0x10 [ 10.993165] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.993187] ? calculate_sigpending+0x7b/0xa0 [ 10.993208] ? __pfx_kthread+0x10/0x10 [ 10.993226] ret_from_fork+0x41/0x80 [ 10.993273] ? __pfx_kthread+0x10/0x10 [ 10.993291] ret_from_fork_asm+0x1a/0x30 [ 10.993407] </TASK> [ 10.993421] [ 11.002890] The buggy address belongs to the physical page: [ 11.003159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103910 [ 11.003455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.003898] flags: 0x200000000000040(head|node=0|zone=2) [ 11.004134] page_type: f8(unknown) [ 11.004556] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.004938] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.005261] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.005660] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.006005] head: 0200000000000002 ffffea00040e4401 00000000ffffffff 00000000ffffffff [ 11.006352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.006716] page dumped because: kasan: bad access detected [ 11.006969] [ 11.007073] Memory state around the buggy address: [ 11.007224] ffff888103911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.007450] ffff888103912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.007911] >ffff888103912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.008223] ^ [ 11.008831] ffff888103912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.009152] ffff888103912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.009581] ================================================================== [ 10.824174] ================================================================== [ 10.824936] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 10.825576] Write of size 1 at addr ffff888100348af0 by task kunit_try_catch/175 [ 10.825841] [ 10.826095] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.826140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.826151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.826171] Call Trace: [ 10.826186] <TASK> [ 10.826201] dump_stack_lvl+0x73/0xb0 [ 10.826225] print_report+0xd1/0x650 [ 10.826257] ? __virt_addr_valid+0x1db/0x2d0 [ 10.826278] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.826297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.826330] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.826350] kasan_report+0x141/0x180 [ 10.826373] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.826408] __asan_report_store1_noabort+0x1b/0x30 [ 10.826430] krealloc_more_oob_helper+0x7eb/0x930 [ 10.826495] ? __schedule+0x10cc/0x2b60 [ 10.826521] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.826542] ? finish_task_switch.isra.0+0x153/0x700 [ 10.826571] ? __switch_to+0x5d9/0xf60 [ 10.826591] ? dequeue_task_fair+0x166/0x4e0 [ 10.826614] ? __schedule+0x10cc/0x2b60 [ 10.826636] ? __pfx_read_tsc+0x10/0x10 [ 10.826820] krealloc_more_oob+0x1c/0x30 [ 10.826843] kunit_try_run_case+0x1a5/0x480 [ 10.826867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.826888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.826912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.826935] ? __kthread_parkme+0x82/0x180 [ 10.826956] ? preempt_count_sub+0x50/0x80 [ 10.826980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.827003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.827025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.827048] kthread+0x337/0x6f0 [ 10.827064] ? trace_preempt_on+0x20/0xc0 [ 10.827087] ? __pfx_kthread+0x10/0x10 [ 10.827105] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.827126] ? calculate_sigpending+0x7b/0xa0 [ 10.827147] ? __pfx_kthread+0x10/0x10 [ 10.827165] ret_from_fork+0x41/0x80 [ 10.827185] ? __pfx_kthread+0x10/0x10 [ 10.827203] ret_from_fork_asm+0x1a/0x30 [ 10.827232] </TASK> [ 10.827255] [ 10.842486] Allocated by task 175: [ 10.842926] kasan_save_stack+0x45/0x70 [ 10.843303] kasan_save_track+0x18/0x40 [ 10.843777] kasan_save_alloc_info+0x3b/0x50 [ 10.844216] __kasan_krealloc+0x190/0x1f0 [ 10.844399] krealloc_noprof+0xf3/0x340 [ 10.844844] krealloc_more_oob_helper+0x1a9/0x930 [ 10.845381] krealloc_more_oob+0x1c/0x30 [ 10.845876] kunit_try_run_case+0x1a5/0x480 [ 10.846035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.846212] kthread+0x337/0x6f0 [ 10.846377] ret_from_fork+0x41/0x80 [ 10.846545] ret_from_fork_asm+0x1a/0x30 [ 10.846715] [ 10.846789] The buggy address belongs to the object at ffff888100348a00 [ 10.846789] which belongs to the cache kmalloc-256 of size 256 [ 10.847292] The buggy address is located 5 bytes to the right of [ 10.847292] allocated 235-byte region [ffff888100348a00, ffff888100348aeb) [ 10.848195] [ 10.848285] The buggy address belongs to the physical page: [ 10.848682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 10.849142] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.849744] flags: 0x200000000000040(head|node=0|zone=2) [ 10.850066] page_type: f5(slab) [ 10.850270] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.850677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.850977] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.851441] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.851867] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 10.852192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.852576] page dumped because: kasan: bad access detected [ 10.852888] [ 10.852979] Memory state around the buggy address: [ 10.853232] ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.853755] ffff888100348a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.854376] >ffff888100348a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 10.854723] ^ [ 10.854980] ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.855339] ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.855667] ================================================================== [ 10.972445] ================================================================== [ 10.972983] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 10.973350] Write of size 1 at addr ffff8881039120eb by task kunit_try_catch/179 [ 10.973740] [ 10.973925] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.973973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.973984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.974006] Call Trace: [ 10.974020] <TASK> [ 10.974036] dump_stack_lvl+0x73/0xb0 [ 10.974063] print_report+0xd1/0x650 [ 10.974085] ? __virt_addr_valid+0x1db/0x2d0 [ 10.974108] ? krealloc_more_oob_helper+0x821/0x930 [ 10.974127] ? kasan_addr_to_slab+0x11/0xa0 [ 10.974148] ? krealloc_more_oob_helper+0x821/0x930 [ 10.974184] kasan_report+0x141/0x180 [ 10.974207] ? krealloc_more_oob_helper+0x821/0x930 [ 10.974232] __asan_report_store1_noabort+0x1b/0x30 [ 10.974264] krealloc_more_oob_helper+0x821/0x930 [ 10.974283] ? __schedule+0x10cc/0x2b60 [ 10.974306] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.974327] ? finish_task_switch.isra.0+0x153/0x700 [ 10.974350] ? __switch_to+0x5d9/0xf60 [ 10.974371] ? dequeue_task_fair+0x166/0x4e0 [ 10.974396] ? __schedule+0x10cc/0x2b60 [ 10.974418] ? __pfx_read_tsc+0x10/0x10 [ 10.974451] krealloc_large_more_oob+0x1c/0x30 [ 10.974470] kunit_try_run_case+0x1a5/0x480 [ 10.974495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.974527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.974551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.974574] ? __kthread_parkme+0x82/0x180 [ 10.974596] ? preempt_count_sub+0x50/0x80 [ 10.974620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.974643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.974666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.974688] kthread+0x337/0x6f0 [ 10.974705] ? trace_preempt_on+0x20/0xc0 [ 10.974728] ? __pfx_kthread+0x10/0x10 [ 10.974746] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.974767] ? calculate_sigpending+0x7b/0xa0 [ 10.974789] ? __pfx_kthread+0x10/0x10 [ 10.974807] ret_from_fork+0x41/0x80 [ 10.974826] ? __pfx_kthread+0x10/0x10 [ 10.974844] ret_from_fork_asm+0x1a/0x30 [ 10.974874] </TASK> [ 10.974894] [ 10.984128] The buggy address belongs to the physical page: [ 10.984473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103910 [ 10.984752] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.985062] flags: 0x200000000000040(head|node=0|zone=2) [ 10.985340] page_type: f8(unknown) [ 10.985778] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.986125] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.986593] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.987034] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.987383] head: 0200000000000002 ffffea00040e4401 00000000ffffffff 00000000ffffffff [ 10.987807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.988147] page dumped because: kasan: bad access detected [ 10.988513] [ 10.988610] Memory state around the buggy address: [ 10.988857] ffff888103911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.989071] ffff888103912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.989453] >ffff888103912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 10.989956] ^ [ 10.990263] ffff888103912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.990633] ffff888103912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.990903] ==================================================================