Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 91.824619] ================================================================== [ 91.825935] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380 [ 91.827441] Write of size 1 at addr ffff0000c0b916eb by task kunit_try_catch/135 [ 91.828392] [ 91.828936] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 91.830168] Hardware name: linux,dummy-virt (DT) [ 91.831007] Call trace: [ 91.831522] dump_backtrace+0x9c/0x128 [ 91.832453] show_stack+0x20/0x38 [ 91.833233] dump_stack_lvl+0x60/0xb0 [ 91.834064] print_report+0xf8/0x5e8 [ 91.834754] kasan_report+0xdc/0x128 [ 91.835590] __asan_store1+0x60/0x70 [ 91.836468] krealloc_more_oob_helper+0x138/0x380 [ 91.837446] krealloc_more_oob+0x20/0x38 [ 91.838237] kunit_try_run_case+0x114/0x298 [ 91.839161] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.840214] kthread+0x18c/0x1a8 [ 91.840961] ret_from_fork+0x10/0x20 [ 91.841768] [ 91.842188] Allocated by task 135: [ 91.842837] kasan_save_stack+0x3c/0x68 [ 91.843639] kasan_set_track+0x2c/0x40 [ 91.844490] kasan_save_alloc_info+0x24/0x38 [ 91.845306] __kasan_krealloc+0x10c/0x140 [ 91.846132] krealloc+0x10c/0x1a0 [ 91.846830] krealloc_more_oob_helper+0xd4/0x380 [ 91.847671] krealloc_more_oob+0x20/0x38 [ 91.848517] kunit_try_run_case+0x114/0x298 [ 91.849379] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.850250] kthread+0x18c/0x1a8 [ 91.850790] ret_from_fork+0x10/0x20 [ 91.851544] [ 91.851998] The buggy address belongs to the object at ffff0000c0b91600 [ 91.851998] which belongs to the cache kmalloc-256 of size 256 [ 91.853623] The buggy address is located 0 bytes to the right of [ 91.853623] allocated 235-byte region [ffff0000c0b91600, ffff0000c0b916eb) [ 91.855235] [ 91.855717] The buggy address belongs to the physical page: [ 91.856631] page:00000000c3af2b0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b90 [ 91.857911] head:00000000c3af2b0d order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 91.859017] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 91.860161] page_type: 0xffffffff() [ 91.860981] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 91.862036] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 91.863033] page dumped because: kasan: bad access detected [ 91.863895] [ 91.864288] Memory state around the buggy address: [ 91.865164] ffff0000c0b91580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.866217] ffff0000c0b91600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 91.867254] >ffff0000c0b91680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 91.868253] ^ [ 91.869334] ffff0000c0b91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.870358] ffff0000c0b91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.871316] ================================================================== [ 91.874377] ================================================================== [ 91.875610] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380 [ 91.877092] Write of size 1 at addr ffff0000c0b916f0 by task kunit_try_catch/135 [ 91.878293] [ 91.878777] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 91.879944] Hardware name: linux,dummy-virt (DT) [ 91.880700] Call trace: [ 91.881262] dump_backtrace+0x9c/0x128 [ 91.882024] show_stack+0x20/0x38 [ 91.882691] dump_stack_lvl+0x60/0xb0 [ 91.883364] print_report+0xf8/0x5e8 [ 91.885179] kasan_report+0xdc/0x128 [ 91.886202] __asan_store1+0x60/0x70 [ 91.886999] krealloc_more_oob_helper+0x168/0x380 [ 91.887918] krealloc_more_oob+0x20/0x38 [ 91.888726] kunit_try_run_case+0x114/0x298 [ 91.889585] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.890572] kthread+0x18c/0x1a8 [ 91.891251] ret_from_fork+0x10/0x20 [ 91.891990] [ 91.892358] Allocated by task 135: [ 91.893048] kasan_save_stack+0x3c/0x68 [ 91.893850] kasan_set_track+0x2c/0x40 [ 91.894572] kasan_save_alloc_info+0x24/0x38 [ 91.895422] __kasan_krealloc+0x10c/0x140 [ 91.896286] krealloc+0x10c/0x1a0 [ 91.897020] krealloc_more_oob_helper+0xd4/0x380 [ 91.897847] krealloc_more_oob+0x20/0x38 [ 91.898578] kunit_try_run_case+0x114/0x298 [ 91.899369] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.900371] kthread+0x18c/0x1a8 [ 91.901049] ret_from_fork+0x10/0x20 [ 91.901805] [ 91.902149] The buggy address belongs to the object at ffff0000c0b91600 [ 91.902149] which belongs to the cache kmalloc-256 of size 256 [ 91.903727] The buggy address is located 5 bytes to the right of [ 91.903727] allocated 235-byte region [ffff0000c0b91600, ffff0000c0b916eb) [ 91.905398] [ 91.905807] The buggy address belongs to the physical page: [ 91.906692] page:00000000c3af2b0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b90 [ 91.908032] head:00000000c3af2b0d order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 91.909280] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 91.910198] page_type: 0xffffffff() [ 91.910956] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 91.911892] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 91.912735] page dumped because: kasan: bad access detected [ 91.913386] [ 91.913762] Memory state around the buggy address: [ 91.914402] ffff0000c0b91580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.915619] ffff0000c0b91600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 91.916834] >ffff0000c0b91680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 91.917943] ^ [ 91.919034] ffff0000c0b91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.921894] ffff0000c0b91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.923091] ================================================================== [ 92.120882] ================================================================== [ 92.121666] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380 [ 92.122330] Write of size 1 at addr ffff0000c601a0eb by task kunit_try_catch/139 [ 92.123292] [ 92.123521] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 92.124040] Hardware name: linux,dummy-virt (DT) [ 92.124433] Call trace: [ 92.124696] dump_backtrace+0x9c/0x128 [ 92.125113] show_stack+0x20/0x38 [ 92.125841] dump_stack_lvl+0x60/0xb0 [ 92.126403] print_report+0xf8/0x5e8 [ 92.126953] kasan_report+0xdc/0x128 [ 92.127304] __asan_store1+0x60/0x70 [ 92.128190] krealloc_more_oob_helper+0x138/0x380 [ 92.128833] krealloc_pagealloc_more_oob+0x20/0x38 [ 92.129341] kunit_try_run_case+0x114/0x298 [ 92.129866] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 92.131659] kthread+0x18c/0x1a8 [ 92.132061] ret_from_fork+0x10/0x20 [ 92.132424] [ 92.132655] The buggy address belongs to the physical page: [ 92.133271] page:00000000f1dbd5c8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106018 [ 92.134168] head:00000000f1dbd5c8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.134939] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 92.135652] page_type: 0xffffffff() [ 92.136244] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 92.136879] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 92.137455] page dumped because: kasan: bad access detected [ 92.137910] [ 92.138115] Memory state around the buggy address: [ 92.138579] ffff0000c6019f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.139156] ffff0000c601a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.140281] >ffff0000c601a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 92.141007] ^ [ 92.142534] ffff0000c601a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.143240] ffff0000c601a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.144030] ================================================================== [ 92.145211] ================================================================== [ 92.145798] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380 [ 92.146508] Write of size 1 at addr ffff0000c601a0f0 by task kunit_try_catch/139 [ 92.147055] [ 92.147359] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 92.148506] Hardware name: linux,dummy-virt (DT) [ 92.148858] Call trace: [ 92.149105] dump_backtrace+0x9c/0x128 [ 92.149722] show_stack+0x20/0x38 [ 92.150172] dump_stack_lvl+0x60/0xb0 [ 92.150845] print_report+0xf8/0x5e8 [ 92.151452] kasan_report+0xdc/0x128 [ 92.152014] __asan_store1+0x60/0x70 [ 92.152519] krealloc_more_oob_helper+0x168/0x380 [ 92.153001] krealloc_pagealloc_more_oob+0x20/0x38 [ 92.154269] kunit_try_run_case+0x114/0x298 [ 92.155971] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 92.157251] kthread+0x18c/0x1a8 [ 92.158016] ret_from_fork+0x10/0x20 [ 92.159189] [ 92.159643] The buggy address belongs to the physical page: [ 92.160665] page:00000000f1dbd5c8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106018 [ 92.162444] head:00000000f1dbd5c8 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.164235] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 92.165583] page_type: 0xffffffff() [ 92.166427] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 92.167729] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 92.169235] page dumped because: kasan: bad access detected [ 92.170273] [ 92.170750] Memory state around the buggy address: [ 92.171681] ffff0000c6019f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.173951] ffff0000c601a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.175274] >ffff0000c601a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 92.176752] ^ [ 92.177716] ffff0000c601a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.180958] ffff0000c601a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.181892] ==================================================================
[ 33.618360] ================================================================== [ 33.619114] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.619748] Write of size 1 at addr ffff8881020720f0 by task kunit_try_catch/154 [ 33.620211] [ 33.620356] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 33.620924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.621655] Call Trace: [ 33.621908] <TASK> [ 33.622110] dump_stack_lvl+0x4e/0x90 [ 33.622486] print_report+0xd2/0x650 [ 33.622841] ? __virt_addr_valid+0x156/0x1e0 [ 33.623204] ? krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.624135] ? kasan_addr_to_slab+0x11/0xb0 [ 33.624584] ? krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.624988] kasan_report+0x147/0x180 [ 33.625317] ? krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.625743] __asan_store1+0x69/0x70 [ 33.626162] krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.626577] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 33.627127] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 33.627566] ? __schedule+0x715/0x11a0 [ 33.627955] ? ktime_get_ts64+0x118/0x140 [ 33.628282] krealloc_pagealloc_more_oob+0x1c/0x30 [ 33.628724] kunit_try_run_case+0x120/0x290 [ 33.629573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.629971] ? __kasan_check_write+0x18/0x20 [ 33.630257] ? trace_preempt_on+0x20/0xa0 [ 33.630638] ? __kthread_parkme+0x4f/0xd0 [ 33.631042] ? preempt_count_sub+0x50/0x80 [ 33.631321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.631750] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.632150] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.632634] kthread+0x19e/0x1e0 [ 33.632926] ? __pfx_kthread+0x10/0x10 [ 33.633217] ret_from_fork+0x41/0x70 [ 33.633913] ? __pfx_kthread+0x10/0x10 [ 33.634173] ret_from_fork_asm+0x1b/0x30 [ 33.634452] </TASK> [ 33.634632] [ 33.634804] The buggy address belongs to the physical page: [ 33.635130] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102070 [ 33.635629] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.636132] flags: 0x200000000000040(head|node=0|zone=2) [ 33.636457] page_type: 0xffffffff() [ 33.636685] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.637129] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.637565] page dumped because: kasan: bad access detected [ 33.637988] [ 33.638139] Memory state around the buggy address: [ 33.638531] ffff888102071f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.639065] ffff888102072000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.639545] >ffff888102072080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 33.640005] ^ [ 33.640351] ffff888102072100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.640850] ffff888102072180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.641244] ================================================================== [ 33.414453] ================================================================== [ 33.414934] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.415528] Write of size 1 at addr ffff8881003664f0 by task kunit_try_catch/150 [ 33.416004] [ 33.416122] CPU: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 33.416837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.417587] Call Trace: [ 33.417763] <TASK> [ 33.418073] dump_stack_lvl+0x4e/0x90 [ 33.418344] print_report+0xd2/0x650 [ 33.418595] ? __virt_addr_valid+0x156/0x1e0 [ 33.418964] ? krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.419232] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.419634] ? krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.420044] kasan_report+0x147/0x180 [ 33.420272] ? krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.420675] __asan_store1+0x69/0x70 [ 33.421099] krealloc_more_oob_helper+0x1bb/0x3b0 [ 33.421435] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 33.421795] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 33.422080] ? __schedule+0x715/0x11a0 [ 33.422379] ? ktime_get_ts64+0x118/0x140 [ 33.422686] krealloc_more_oob+0x1c/0x30 [ 33.423000] kunit_try_run_case+0x120/0x290 [ 33.423249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.423590] ? __kasan_check_write+0x18/0x20 [ 33.423880] ? trace_preempt_on+0x20/0xa0 [ 33.424173] ? __kthread_parkme+0x4f/0xd0 [ 33.424475] ? preempt_count_sub+0x50/0x80 [ 33.424762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.425088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.425444] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.425775] kthread+0x19e/0x1e0 [ 33.426023] ? __pfx_kthread+0x10/0x10 [ 33.426257] ret_from_fork+0x41/0x70 [ 33.426520] ? __pfx_kthread+0x10/0x10 [ 33.426764] ret_from_fork_asm+0x1b/0x30 [ 33.427172] </TASK> [ 33.427425] [ 33.427535] Allocated by task 150: [ 33.427776] kasan_save_stack+0x44/0x70 [ 33.428031] kasan_set_track+0x29/0x40 [ 33.428282] kasan_save_alloc_info+0x22/0x30 [ 33.428516] __kasan_krealloc+0x12f/0x180 [ 33.428742] krealloc+0xc1/0x140 [ 33.429037] krealloc_more_oob_helper+0xe2/0x3b0 [ 33.429390] krealloc_more_oob+0x1c/0x30 [ 33.429639] kunit_try_run_case+0x120/0x290 [ 33.430022] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.430353] kthread+0x19e/0x1e0 [ 33.430568] ret_from_fork+0x41/0x70 [ 33.430918] ret_from_fork_asm+0x1b/0x30 [ 33.431147] [ 33.431254] The buggy address belongs to the object at ffff888100366400 [ 33.431254] which belongs to the cache kmalloc-256 of size 256 [ 33.432025] The buggy address is located 5 bytes to the right of [ 33.432025] allocated 235-byte region [ffff888100366400, ffff8881003664eb) [ 33.432696] [ 33.432838] The buggy address belongs to the physical page: [ 33.433164] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100366 [ 33.433738] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.434198] flags: 0x200000000000840(slab|head|node=0|zone=2) [ 33.434549] page_type: 0xffffffff() [ 33.434807] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000 [ 33.435239] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 33.435671] page dumped because: kasan: bad access detected [ 33.435951] [ 33.436075] Memory state around the buggy address: [ 33.436379] ffff888100366380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.436741] ffff888100366400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.437137] >ffff888100366480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 33.437564] ^ [ 33.438000] ffff888100366500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.438362] ffff888100366580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.438761] ================================================================== [ 33.389319] ================================================================== [ 33.390317] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0 [ 33.390762] Write of size 1 at addr ffff8881003664eb by task kunit_try_catch/150 [ 33.391244] [ 33.391394] CPU: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 33.391840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.392463] Call Trace: [ 33.392623] <TASK> [ 33.392809] dump_stack_lvl+0x4e/0x90 [ 33.393064] print_report+0xd2/0x650 [ 33.393342] ? __virt_addr_valid+0x156/0x1e0 [ 33.393628] ? krealloc_more_oob_helper+0x179/0x3b0 [ 33.393943] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.394298] ? krealloc_more_oob_helper+0x179/0x3b0 [ 33.394612] kasan_report+0x147/0x180 [ 33.394925] ? krealloc_more_oob_helper+0x179/0x3b0 [ 33.395257] __asan_store1+0x69/0x70 [ 33.395517] krealloc_more_oob_helper+0x179/0x3b0 [ 33.395815] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 33.396215] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 33.396562] ? __schedule+0x715/0x11a0 [ 33.396784] ? ktime_get_ts64+0x118/0x140 [ 33.397099] krealloc_more_oob+0x1c/0x30 [ 33.397607] kunit_try_run_case+0x120/0x290 [ 33.397954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.398287] ? __kasan_check_write+0x18/0x20 [ 33.398562] ? trace_preempt_on+0x20/0xa0 [ 33.398936] ? __kthread_parkme+0x4f/0xd0 [ 33.399181] ? preempt_count_sub+0x50/0x80 [ 33.399494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.399768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.400205] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.400530] kthread+0x19e/0x1e0 [ 33.400765] ? __pfx_kthread+0x10/0x10 [ 33.401066] ret_from_fork+0x41/0x70 [ 33.401294] ? __pfx_kthread+0x10/0x10 [ 33.401571] ret_from_fork_asm+0x1b/0x30 [ 33.401825] </TASK> [ 33.402019] [ 33.402147] Allocated by task 150: [ 33.402328] kasan_save_stack+0x44/0x70 [ 33.402626] kasan_set_track+0x29/0x40 [ 33.402872] kasan_save_alloc_info+0x22/0x30 [ 33.403189] __kasan_krealloc+0x12f/0x180 [ 33.403488] krealloc+0xc1/0x140 [ 33.403732] krealloc_more_oob_helper+0xe2/0x3b0 [ 33.404039] krealloc_more_oob+0x1c/0x30 [ 33.404317] kunit_try_run_case+0x120/0x290 [ 33.404588] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.405017] kthread+0x19e/0x1e0 [ 33.405271] ret_from_fork+0x41/0x70 [ 33.405504] ret_from_fork_asm+0x1b/0x30 [ 33.405799] [ 33.405941] The buggy address belongs to the object at ffff888100366400 [ 33.405941] which belongs to the cache kmalloc-256 of size 256 [ 33.406563] The buggy address is located 0 bytes to the right of [ 33.406563] allocated 235-byte region [ffff888100366400, ffff8881003664eb) [ 33.407343] [ 33.407449] The buggy address belongs to the physical page: [ 33.407856] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100366 [ 33.408351] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.408845] flags: 0x200000000000840(slab|head|node=0|zone=2) [ 33.409220] page_type: 0xffffffff() [ 33.409477] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000 [ 33.409937] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 33.410384] page dumped because: kasan: bad access detected [ 33.410665] [ 33.410856] Memory state around the buggy address: [ 33.411122] ffff888100366380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.411559] ffff888100366400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.411987] >ffff888100366480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 33.412415] ^ [ 33.412796] ffff888100366500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.413200] ffff888100366580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.413606] ================================================================== [ 33.590285] ================================================================== [ 33.591549] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0 [ 33.592355] Write of size 1 at addr ffff8881020720eb by task kunit_try_catch/154 [ 33.593459] [ 33.593612] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 33.594259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.594823] Call Trace: [ 33.595009] <TASK> [ 33.595157] dump_stack_lvl+0x4e/0x90 [ 33.595831] print_report+0xd2/0x650 [ 33.596144] ? __virt_addr_valid+0x156/0x1e0 [ 33.596653] ? krealloc_more_oob_helper+0x179/0x3b0 [ 33.597102] ? kasan_addr_to_slab+0x11/0xb0 [ 33.597514] ? krealloc_more_oob_helper+0x179/0x3b0 [ 33.598031] kasan_report+0x147/0x180 [ 33.598441] ? krealloc_more_oob_helper+0x179/0x3b0 [ 33.598929] __asan_store1+0x69/0x70 [ 33.599322] krealloc_more_oob_helper+0x179/0x3b0 [ 33.599709] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 33.600050] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 33.600947] ? __schedule+0x715/0x11a0 [ 33.601221] ? ktime_get_ts64+0x118/0x140 [ 33.601609] krealloc_pagealloc_more_oob+0x1c/0x30 [ 33.602133] kunit_try_run_case+0x120/0x290 [ 33.602670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.603133] ? __kasan_check_write+0x18/0x20 [ 33.603556] ? trace_preempt_on+0x20/0xa0 [ 33.603983] ? __kthread_parkme+0x4f/0xd0 [ 33.604368] ? preempt_count_sub+0x50/0x80 [ 33.604741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.605103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.605741] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.606301] kthread+0x19e/0x1e0 [ 33.606728] ? __pfx_kthread+0x10/0x10 [ 33.607097] ret_from_fork+0x41/0x70 [ 33.607370] ? __pfx_kthread+0x10/0x10 [ 33.607807] ret_from_fork_asm+0x1b/0x30 [ 33.608249] </TASK> [ 33.608509] [ 33.608631] The buggy address belongs to the physical page: [ 33.609191] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102070 [ 33.609787] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.610248] flags: 0x200000000000040(head|node=0|zone=2) [ 33.610917] page_type: 0xffffffff() [ 33.611370] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.612007] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.612550] page dumped because: kasan: bad access detected [ 33.613082] [ 33.613302] Memory state around the buggy address: [ 33.613647] ffff888102071f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.614203] ffff888102072000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.614831] >ffff888102072080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 33.615476] ^ [ 33.615909] ffff888102072100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.616422] ffff888102072180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.617047] ==================================================================