Date
July 1, 2025, 3:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.807351] ================================================================== [ 16.807507] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.807925] Write of size 1 at addr fff00000c0b9bceb by task kunit_try_catch/157 [ 16.808254] [ 16.808607] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.808832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.808860] Hardware name: linux,dummy-virt (DT) [ 16.809224] Call trace: [ 16.809363] show_stack+0x20/0x38 (C) [ 16.809419] dump_stack_lvl+0x8c/0xd0 [ 16.809618] print_report+0x118/0x608 [ 16.809709] kasan_report+0xdc/0x128 [ 16.809754] __asan_report_store1_noabort+0x20/0x30 [ 16.809801] krealloc_more_oob_helper+0x60c/0x678 [ 16.810000] krealloc_more_oob+0x20/0x38 [ 16.810049] kunit_try_run_case+0x170/0x3f0 [ 16.810099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.810152] kthread+0x328/0x630 [ 16.810194] ret_from_fork+0x10/0x20 [ 16.810243] [ 16.810563] Allocated by task 157: [ 16.810695] kasan_save_stack+0x3c/0x68 [ 16.810789] kasan_save_track+0x20/0x40 [ 16.810826] kasan_save_alloc_info+0x40/0x58 [ 16.810886] __kasan_krealloc+0x118/0x178 [ 16.810922] krealloc_noprof+0x128/0x360 [ 16.811296] krealloc_more_oob_helper+0x168/0x678 [ 16.811341] krealloc_more_oob+0x20/0x38 [ 16.811376] kunit_try_run_case+0x170/0x3f0 [ 16.811423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.811476] kthread+0x328/0x630 [ 16.811507] ret_from_fork+0x10/0x20 [ 16.811928] [ 16.811953] The buggy address belongs to the object at fff00000c0b9bc00 [ 16.811953] which belongs to the cache kmalloc-256 of size 256 [ 16.812175] The buggy address is located 0 bytes to the right of [ 16.812175] allocated 235-byte region [fff00000c0b9bc00, fff00000c0b9bceb) [ 16.812249] [ 16.812269] The buggy address belongs to the physical page: [ 16.812306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a [ 16.812825] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.813063] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.813177] page_type: f5(slab) [ 16.813219] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.813274] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.813352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.813401] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.813692] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff [ 16.813834] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.813877] page dumped because: kasan: bad access detected [ 16.813908] [ 16.814063] Memory state around the buggy address: [ 16.814099] fff00000c0b9bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.814183] fff00000c0b9bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.814327] >fff00000c0b9bc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.814365] ^ [ 16.814466] fff00000c0b9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.814514] fff00000c0b9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.814626] ================================================================== [ 16.886885] ================================================================== [ 16.886972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.887187] Write of size 1 at addr fff00000c69320f0 by task kunit_try_catch/161 [ 16.887419] [ 16.887451] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.887532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.887560] Hardware name: linux,dummy-virt (DT) [ 16.887602] Call trace: [ 16.887622] show_stack+0x20/0x38 (C) [ 16.887668] dump_stack_lvl+0x8c/0xd0 [ 16.887981] print_report+0x118/0x608 [ 16.888303] kasan_report+0xdc/0x128 [ 16.888641] __asan_report_store1_noabort+0x20/0x30 [ 16.888794] krealloc_more_oob_helper+0x5c0/0x678 [ 16.888916] krealloc_large_more_oob+0x20/0x38 [ 16.888983] kunit_try_run_case+0x170/0x3f0 [ 16.889029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.889340] kthread+0x328/0x630 [ 16.889424] ret_from_fork+0x10/0x20 [ 16.889472] [ 16.889492] The buggy address belongs to the physical page: [ 16.889523] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106930 [ 16.889614] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.889868] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.889929] page_type: f8(unknown) [ 16.890000] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.890149] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.890243] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.890292] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.890628] head: 0bfffe0000000002 ffffc1ffc31a4c01 00000000ffffffff 00000000ffffffff [ 16.890698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.890787] page dumped because: kasan: bad access detected [ 16.890894] [ 16.890912] Memory state around the buggy address: [ 16.890944] fff00000c6931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.890987] fff00000c6932000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.891029] >fff00000c6932080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.891269] ^ [ 16.891361] fff00000c6932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.891447] fff00000c6932180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.891485] ================================================================== [ 16.879884] ================================================================== [ 16.879957] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.880020] Write of size 1 at addr fff00000c69320eb by task kunit_try_catch/161 [ 16.880518] [ 16.880620] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.880933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.880970] Hardware name: linux,dummy-virt (DT) [ 16.881070] Call trace: [ 16.881094] show_stack+0x20/0x38 (C) [ 16.881148] dump_stack_lvl+0x8c/0xd0 [ 16.881638] print_report+0x118/0x608 [ 16.881741] kasan_report+0xdc/0x128 [ 16.881792] __asan_report_store1_noabort+0x20/0x30 [ 16.881839] krealloc_more_oob_helper+0x60c/0x678 [ 16.881887] krealloc_large_more_oob+0x20/0x38 [ 16.881933] kunit_try_run_case+0x170/0x3f0 [ 16.882038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.882092] kthread+0x328/0x630 [ 16.882133] ret_from_fork+0x10/0x20 [ 16.882397] [ 16.882480] The buggy address belongs to the physical page: [ 16.882514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106930 [ 16.882613] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.882662] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.882717] page_type: f8(unknown) [ 16.882760] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.882810] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.882869] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.882917] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.883159] head: 0bfffe0000000002 ffffc1ffc31a4c01 00000000ffffffff 00000000ffffffff [ 16.883289] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.883452] page dumped because: kasan: bad access detected [ 16.883488] [ 16.883757] Memory state around the buggy address: [ 16.883904] fff00000c6931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.884020] fff00000c6932000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.884273] >fff00000c6932080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.884505] ^ [ 16.884575] fff00000c6932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.884619] fff00000c6932180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.884658] ================================================================== [ 16.815917] ================================================================== [ 16.816347] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.816451] Write of size 1 at addr fff00000c0b9bcf0 by task kunit_try_catch/157 [ 16.816507] [ 16.816540] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.816839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.816870] Hardware name: linux,dummy-virt (DT) [ 16.816900] Call trace: [ 16.816920] show_stack+0x20/0x38 (C) [ 16.816968] dump_stack_lvl+0x8c/0xd0 [ 16.817015] print_report+0x118/0x608 [ 16.817060] kasan_report+0xdc/0x128 [ 16.817130] __asan_report_store1_noabort+0x20/0x30 [ 16.817435] krealloc_more_oob_helper+0x5c0/0x678 [ 16.817746] krealloc_more_oob+0x20/0x38 [ 16.817912] kunit_try_run_case+0x170/0x3f0 [ 16.818073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.818225] kthread+0x328/0x630 [ 16.818266] ret_from_fork+0x10/0x20 [ 16.818315] [ 16.818333] Allocated by task 157: [ 16.818466] kasan_save_stack+0x3c/0x68 [ 16.818512] kasan_save_track+0x20/0x40 [ 16.818549] kasan_save_alloc_info+0x40/0x58 [ 16.818598] __kasan_krealloc+0x118/0x178 [ 16.818911] krealloc_noprof+0x128/0x360 [ 16.819034] krealloc_more_oob_helper+0x168/0x678 [ 16.819175] krealloc_more_oob+0x20/0x38 [ 16.819214] kunit_try_run_case+0x170/0x3f0 [ 16.819252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.819605] kthread+0x328/0x630 [ 16.819665] ret_from_fork+0x10/0x20 [ 16.819798] [ 16.819817] The buggy address belongs to the object at fff00000c0b9bc00 [ 16.819817] which belongs to the cache kmalloc-256 of size 256 [ 16.819888] The buggy address is located 5 bytes to the right of [ 16.819888] allocated 235-byte region [fff00000c0b9bc00, fff00000c0b9bceb) [ 16.819973] [ 16.820057] The buggy address belongs to the physical page: [ 16.820118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a [ 16.820265] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.820313] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.820409] page_type: f5(slab) [ 16.820771] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.821043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.821272] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.821421] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.821471] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff [ 16.821557] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.821681] page dumped because: kasan: bad access detected [ 16.821723] [ 16.821745] Memory state around the buggy address: [ 16.821800] fff00000c0b9bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.821842] fff00000c0b9bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.821883] >fff00000c0b9bc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.821921] ^ [ 16.821993] fff00000c0b9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.822145] fff00000c0b9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.822265] ==================================================================
[ 11.365142] ================================================================== [ 11.365524] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.366202] Write of size 1 at addr ffff888102a6e0f0 by task kunit_try_catch/177 [ 11.366554] [ 11.366677] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.366719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.366730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.366759] Call Trace: [ 11.366770] <TASK> [ 11.366785] dump_stack_lvl+0x73/0xb0 [ 11.366813] print_report+0xd1/0x650 [ 11.366848] ? __virt_addr_valid+0x1db/0x2d0 [ 11.366870] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.366892] ? kasan_addr_to_slab+0x11/0xa0 [ 11.366911] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.366933] kasan_report+0x141/0x180 [ 11.366954] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.366980] __asan_report_store1_noabort+0x1b/0x30 [ 11.367000] krealloc_more_oob_helper+0x7eb/0x930 [ 11.367030] ? __schedule+0x10cc/0x2b60 [ 11.367052] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.367074] ? finish_task_switch.isra.0+0x153/0x700 [ 11.367095] ? __switch_to+0x47/0xf50 [ 11.367121] ? __schedule+0x10cc/0x2b60 [ 11.367140] ? __pfx_read_tsc+0x10/0x10 [ 11.367163] krealloc_large_more_oob+0x1c/0x30 [ 11.367185] kunit_try_run_case+0x1a5/0x480 [ 11.367217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.367237] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.367259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.367291] ? __kthread_parkme+0x82/0x180 [ 11.367311] ? preempt_count_sub+0x50/0x80 [ 11.367332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.367354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.367385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.367406] kthread+0x337/0x6f0 [ 11.367424] ? trace_preempt_on+0x20/0xc0 [ 11.367457] ? __pfx_kthread+0x10/0x10 [ 11.367476] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.367495] ? calculate_sigpending+0x7b/0xa0 [ 11.367518] ? __pfx_kthread+0x10/0x10 [ 11.367546] ret_from_fork+0x116/0x1d0 [ 11.367564] ? __pfx_kthread+0x10/0x10 [ 11.367583] ret_from_fork_asm+0x1a/0x30 [ 11.367623] </TASK> [ 11.367633] [ 11.375257] The buggy address belongs to the physical page: [ 11.375513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c [ 11.375981] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.376310] flags: 0x200000000000040(head|node=0|zone=2) [ 11.376579] page_type: f8(unknown) [ 11.376835] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.377166] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.377499] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.377862] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.378194] head: 0200000000000002 ffffea00040a9b01 00000000ffffffff 00000000ffffffff [ 11.378483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.378890] page dumped because: kasan: bad access detected [ 11.379073] [ 11.379142] Memory state around the buggy address: [ 11.379300] ffff888102a6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.379513] ffff888102a6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.379818] >ffff888102a6e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.380137] ^ [ 11.380437] ffff888102a6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.380750] ffff888102a6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.381169] ================================================================== [ 11.347971] ================================================================== [ 11.348454] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.349190] Write of size 1 at addr ffff888102a6e0eb by task kunit_try_catch/177 [ 11.349480] [ 11.349621] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.349670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.349682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.349704] Call Trace: [ 11.349716] <TASK> [ 11.349735] dump_stack_lvl+0x73/0xb0 [ 11.349767] print_report+0xd1/0x650 [ 11.349802] ? __virt_addr_valid+0x1db/0x2d0 [ 11.349827] ? krealloc_more_oob_helper+0x821/0x930 [ 11.349849] ? kasan_addr_to_slab+0x11/0xa0 [ 11.349880] ? krealloc_more_oob_helper+0x821/0x930 [ 11.349903] kasan_report+0x141/0x180 [ 11.349923] ? krealloc_more_oob_helper+0x821/0x930 [ 11.349950] __asan_report_store1_noabort+0x1b/0x30 [ 11.349969] krealloc_more_oob_helper+0x821/0x930 [ 11.349990] ? __schedule+0x10cc/0x2b60 [ 11.350011] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.350043] ? finish_task_switch.isra.0+0x153/0x700 [ 11.350065] ? __switch_to+0x47/0xf50 [ 11.350091] ? __schedule+0x10cc/0x2b60 [ 11.350112] ? __pfx_read_tsc+0x10/0x10 [ 11.350145] krealloc_large_more_oob+0x1c/0x30 [ 11.350167] kunit_try_run_case+0x1a5/0x480 [ 11.350192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.350224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.350247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.350268] ? __kthread_parkme+0x82/0x180 [ 11.350288] ? preempt_count_sub+0x50/0x80 [ 11.350310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.350332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.350353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.350384] kthread+0x337/0x6f0 [ 11.350403] ? trace_preempt_on+0x20/0xc0 [ 11.350426] ? __pfx_kthread+0x10/0x10 [ 11.350445] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.350475] ? calculate_sigpending+0x7b/0xa0 [ 11.350500] ? __pfx_kthread+0x10/0x10 [ 11.350519] ret_from_fork+0x116/0x1d0 [ 11.350537] ? __pfx_kthread+0x10/0x10 [ 11.350557] ret_from_fork_asm+0x1a/0x30 [ 11.350586] </TASK> [ 11.350598] [ 11.358529] The buggy address belongs to the physical page: [ 11.358791] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c [ 11.359160] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.359494] flags: 0x200000000000040(head|node=0|zone=2) [ 11.359762] page_type: f8(unknown) [ 11.359946] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.360227] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.360514] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.360862] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.361177] head: 0200000000000002 ffffea00040a9b01 00000000ffffffff 00000000ffffffff [ 11.361403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.361851] page dumped because: kasan: bad access detected [ 11.362085] [ 11.362204] Memory state around the buggy address: [ 11.362364] ffff888102a6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.362577] ffff888102a6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.362789] >ffff888102a6e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.363162] ^ [ 11.363453] ffff888102a6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.363762] ffff888102a6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.364083] ================================================================== [ 11.107898] ================================================================== [ 11.108391] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.108717] Write of size 1 at addr ffff88810033f0eb by task kunit_try_catch/173 [ 11.109565] [ 11.109845] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.109893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.109904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.109926] Call Trace: [ 11.109937] <TASK> [ 11.109954] dump_stack_lvl+0x73/0xb0 [ 11.109983] print_report+0xd1/0x650 [ 11.110007] ? __virt_addr_valid+0x1db/0x2d0 [ 11.110041] ? krealloc_more_oob_helper+0x821/0x930 [ 11.110127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.110150] ? krealloc_more_oob_helper+0x821/0x930 [ 11.110185] kasan_report+0x141/0x180 [ 11.110206] ? krealloc_more_oob_helper+0x821/0x930 [ 11.110233] __asan_report_store1_noabort+0x1b/0x30 [ 11.110252] krealloc_more_oob_helper+0x821/0x930 [ 11.110272] ? __schedule+0x10cc/0x2b60 [ 11.110295] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.110318] ? finish_task_switch.isra.0+0x153/0x700 [ 11.110339] ? __switch_to+0x47/0xf50 [ 11.110365] ? __schedule+0x10cc/0x2b60 [ 11.110384] ? __pfx_read_tsc+0x10/0x10 [ 11.110408] krealloc_more_oob+0x1c/0x30 [ 11.110429] kunit_try_run_case+0x1a5/0x480 [ 11.110453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.110473] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.110496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.110516] ? __kthread_parkme+0x82/0x180 [ 11.110536] ? preempt_count_sub+0x50/0x80 [ 11.110557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.110579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.110600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.110621] kthread+0x337/0x6f0 [ 11.110660] ? trace_preempt_on+0x20/0xc0 [ 11.110694] ? __pfx_kthread+0x10/0x10 [ 11.110713] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.110733] ? calculate_sigpending+0x7b/0xa0 [ 11.110755] ? __pfx_kthread+0x10/0x10 [ 11.110775] ret_from_fork+0x116/0x1d0 [ 11.110793] ? __pfx_kthread+0x10/0x10 [ 11.110812] ret_from_fork_asm+0x1a/0x30 [ 11.110841] </TASK> [ 11.110853] [ 11.124259] Allocated by task 173: [ 11.124618] kasan_save_stack+0x45/0x70 [ 11.125057] kasan_save_track+0x18/0x40 [ 11.125477] kasan_save_alloc_info+0x3b/0x50 [ 11.125784] __kasan_krealloc+0x190/0x1f0 [ 11.125925] krealloc_noprof+0xf3/0x340 [ 11.126073] krealloc_more_oob_helper+0x1a9/0x930 [ 11.126584] krealloc_more_oob+0x1c/0x30 [ 11.127044] kunit_try_run_case+0x1a5/0x480 [ 11.127444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.127975] kthread+0x337/0x6f0 [ 11.128306] ret_from_fork+0x116/0x1d0 [ 11.128674] ret_from_fork_asm+0x1a/0x30 [ 11.129038] [ 11.129146] The buggy address belongs to the object at ffff88810033f000 [ 11.129146] which belongs to the cache kmalloc-256 of size 256 [ 11.129504] The buggy address is located 0 bytes to the right of [ 11.129504] allocated 235-byte region [ffff88810033f000, ffff88810033f0eb) [ 11.130508] [ 11.130726] The buggy address belongs to the physical page: [ 11.131264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e [ 11.132028] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.132710] flags: 0x200000000000040(head|node=0|zone=2) [ 11.133326] page_type: f5(slab) [ 11.133633] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.134096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.134329] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.134559] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.134832] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff [ 11.135346] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.135634] page dumped because: kasan: bad access detected [ 11.135822] [ 11.135901] Memory state around the buggy address: [ 11.136264] ffff88810033ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.136759] ffff88810033f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.137495] >ffff88810033f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.138445] ^ [ 11.139096] ffff88810033f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.139885] ffff88810033f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.140610] ================================================================== [ 11.141496] ================================================================== [ 11.142327] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.142573] Write of size 1 at addr ffff88810033f0f0 by task kunit_try_catch/173 [ 11.142859] [ 11.142978] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.143099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.143112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.143133] Call Trace: [ 11.143151] <TASK> [ 11.143169] dump_stack_lvl+0x73/0xb0 [ 11.143197] print_report+0xd1/0x650 [ 11.143219] ? __virt_addr_valid+0x1db/0x2d0 [ 11.143242] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.143264] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.143284] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.143307] kasan_report+0x141/0x180 [ 11.143327] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.143353] __asan_report_store1_noabort+0x1b/0x30 [ 11.143374] krealloc_more_oob_helper+0x7eb/0x930 [ 11.143395] ? __schedule+0x10cc/0x2b60 [ 11.143416] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.143440] ? finish_task_switch.isra.0+0x153/0x700 [ 11.143461] ? __switch_to+0x47/0xf50 [ 11.143485] ? __schedule+0x10cc/0x2b60 [ 11.143504] ? __pfx_read_tsc+0x10/0x10 [ 11.143527] krealloc_more_oob+0x1c/0x30 [ 11.143547] kunit_try_run_case+0x1a5/0x480 [ 11.143570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.143591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.143613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.143634] ? __kthread_parkme+0x82/0x180 [ 11.143653] ? preempt_count_sub+0x50/0x80 [ 11.143674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.143696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.143737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.143759] kthread+0x337/0x6f0 [ 11.143778] ? trace_preempt_on+0x20/0xc0 [ 11.143801] ? __pfx_kthread+0x10/0x10 [ 11.143820] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.143839] ? calculate_sigpending+0x7b/0xa0 [ 11.143862] ? __pfx_kthread+0x10/0x10 [ 11.143882] ret_from_fork+0x116/0x1d0 [ 11.143899] ? __pfx_kthread+0x10/0x10 [ 11.143918] ret_from_fork_asm+0x1a/0x30 [ 11.143948] </TASK> [ 11.143959] [ 11.155128] Allocated by task 173: [ 11.155302] kasan_save_stack+0x45/0x70 [ 11.155485] kasan_save_track+0x18/0x40 [ 11.155919] kasan_save_alloc_info+0x3b/0x50 [ 11.156219] __kasan_krealloc+0x190/0x1f0 [ 11.156443] krealloc_noprof+0xf3/0x340 [ 11.156621] krealloc_more_oob_helper+0x1a9/0x930 [ 11.157080] krealloc_more_oob+0x1c/0x30 [ 11.157252] kunit_try_run_case+0x1a5/0x480 [ 11.157433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.157931] kthread+0x337/0x6f0 [ 11.158187] ret_from_fork+0x116/0x1d0 [ 11.158521] ret_from_fork_asm+0x1a/0x30 [ 11.158942] [ 11.159171] The buggy address belongs to the object at ffff88810033f000 [ 11.159171] which belongs to the cache kmalloc-256 of size 256 [ 11.160078] The buggy address is located 5 bytes to the right of [ 11.160078] allocated 235-byte region [ffff88810033f000, ffff88810033f0eb) [ 11.160932] [ 11.161051] The buggy address belongs to the physical page: [ 11.161288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e [ 11.161609] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.162610] flags: 0x200000000000040(head|node=0|zone=2) [ 11.163203] page_type: f5(slab) [ 11.163369] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.163943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.164331] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.164857] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.165344] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff [ 11.166043] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.166452] page dumped because: kasan: bad access detected [ 11.166965] [ 11.167166] Memory state around the buggy address: [ 11.167519] ffff88810033ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.168159] ffff88810033f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.168586] >ffff88810033f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.169057] ^ [ 11.169345] ffff88810033f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.169631] ffff88810033f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.170182] ==================================================================