Date
July 9, 2025, 12:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.408001] ================================================================== [ 19.408070] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.408125] Write of size 1 at addr fff00000c46e00f0 by task kunit_try_catch/157 [ 19.408174] [ 19.408813] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.409293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.409322] Hardware name: linux,dummy-virt (DT) [ 19.409352] Call trace: [ 19.409375] show_stack+0x20/0x38 (C) [ 19.409445] dump_stack_lvl+0x8c/0xd0 [ 19.409491] print_report+0x118/0x608 [ 19.409539] kasan_report+0xdc/0x128 [ 19.409585] __asan_report_store1_noabort+0x20/0x30 [ 19.409636] krealloc_more_oob_helper+0x5c0/0x678 [ 19.409688] krealloc_more_oob+0x20/0x38 [ 19.409736] kunit_try_run_case+0x170/0x3f0 [ 19.409784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.409836] kthread+0x328/0x630 [ 19.409879] ret_from_fork+0x10/0x20 [ 19.409927] [ 19.409947] Allocated by task 157: [ 19.409975] kasan_save_stack+0x3c/0x68 [ 19.410015] kasan_save_track+0x20/0x40 [ 19.410052] kasan_save_alloc_info+0x40/0x58 [ 19.410091] __kasan_krealloc+0x118/0x178 [ 19.410129] krealloc_noprof+0x128/0x360 [ 19.410165] krealloc_more_oob_helper+0x168/0x678 [ 19.410203] krealloc_more_oob+0x20/0x38 [ 19.410239] kunit_try_run_case+0x170/0x3f0 [ 19.410275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.410318] kthread+0x328/0x630 [ 19.410352] ret_from_fork+0x10/0x20 [ 19.410388] [ 19.410415] The buggy address belongs to the object at fff00000c46e0000 [ 19.410415] which belongs to the cache kmalloc-256 of size 256 [ 19.410471] The buggy address is located 5 bytes to the right of [ 19.410471] allocated 235-byte region [fff00000c46e0000, fff00000c46e00eb) [ 19.410534] [ 19.410554] The buggy address belongs to the physical page: [ 19.410584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046e0 [ 19.410636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.410684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.412191] page_type: f5(slab) [ 19.412239] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.412289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.412345] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.412394] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.412454] head: 0bfffe0000000001 ffffc1ffc311b801 00000000ffffffff 00000000ffffffff [ 19.412503] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.412543] page dumped because: kasan: bad access detected [ 19.412573] [ 19.412590] Memory state around the buggy address: [ 19.412622] fff00000c46dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.412664] fff00000c46e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.412705] >fff00000c46e0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.412742] ^ [ 19.412784] fff00000c46e0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.412826] fff00000c46e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.412863] ================================================================== [ 19.399646] ================================================================== [ 19.399921] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.400108] Write of size 1 at addr fff00000c46e00eb by task kunit_try_catch/157 [ 19.400158] [ 19.400186] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.400265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.400291] Hardware name: linux,dummy-virt (DT) [ 19.400320] Call trace: [ 19.400340] show_stack+0x20/0x38 (C) [ 19.400388] dump_stack_lvl+0x8c/0xd0 [ 19.400445] print_report+0x118/0x608 [ 19.400491] kasan_report+0xdc/0x128 [ 19.400537] __asan_report_store1_noabort+0x20/0x30 [ 19.400588] krealloc_more_oob_helper+0x60c/0x678 [ 19.400636] krealloc_more_oob+0x20/0x38 [ 19.400681] kunit_try_run_case+0x170/0x3f0 [ 19.400729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.400781] kthread+0x328/0x630 [ 19.400824] ret_from_fork+0x10/0x20 [ 19.400870] [ 19.400888] Allocated by task 157: [ 19.400916] kasan_save_stack+0x3c/0x68 [ 19.400956] kasan_save_track+0x20/0x40 [ 19.400993] kasan_save_alloc_info+0x40/0x58 [ 19.401032] __kasan_krealloc+0x118/0x178 [ 19.401077] krealloc_noprof+0x128/0x360 [ 19.401114] krealloc_more_oob_helper+0x168/0x678 [ 19.401152] krealloc_more_oob+0x20/0x38 [ 19.401188] kunit_try_run_case+0x170/0x3f0 [ 19.401268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.401313] kthread+0x328/0x630 [ 19.401347] ret_from_fork+0x10/0x20 [ 19.401383] [ 19.401411] The buggy address belongs to the object at fff00000c46e0000 [ 19.401411] which belongs to the cache kmalloc-256 of size 256 [ 19.401492] The buggy address is located 0 bytes to the right of [ 19.401492] allocated 235-byte region [fff00000c46e0000, fff00000c46e00eb) [ 19.401557] [ 19.401576] The buggy address belongs to the physical page: [ 19.401606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046e0 [ 19.401658] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.401903] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.402023] page_type: f5(slab) [ 19.402174] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.402284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.402421] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.402516] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.402577] head: 0bfffe0000000001 ffffc1ffc311b801 00000000ffffffff 00000000ffffffff [ 19.402658] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.402700] page dumped because: kasan: bad access detected [ 19.402730] [ 19.402747] Memory state around the buggy address: [ 19.402778] fff00000c46dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.402858] fff00000c46e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.403041] >fff00000c46e0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.403090] ^ [ 19.403139] fff00000c46e0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.403189] fff00000c46e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.403367] ================================================================== [ 19.483319] ================================================================== [ 19.483390] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.484297] Write of size 1 at addr fff00000c76ba0eb by task kunit_try_catch/161 [ 19.484507] [ 19.484821] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.485170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.485207] Hardware name: linux,dummy-virt (DT) [ 19.485511] Call trace: [ 19.485537] show_stack+0x20/0x38 (C) [ 19.485730] dump_stack_lvl+0x8c/0xd0 [ 19.485779] print_report+0x118/0x608 [ 19.485825] kasan_report+0xdc/0x128 [ 19.485871] __asan_report_store1_noabort+0x20/0x30 [ 19.485922] krealloc_more_oob_helper+0x60c/0x678 [ 19.485972] krealloc_large_more_oob+0x20/0x38 [ 19.486892] kunit_try_run_case+0x170/0x3f0 [ 19.486954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487221] kthread+0x328/0x630 [ 19.487589] ret_from_fork+0x10/0x20 [ 19.487850] [ 19.488254] The buggy address belongs to the physical page: [ 19.488287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076b8 [ 19.488619] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.488852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.489344] page_type: f8(unknown) [ 19.489438] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.489927] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.490225] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.490294] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.490879] head: 0bfffe0000000002 ffffc1ffc31dae01 00000000ffffffff 00000000ffffffff [ 19.491130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.491392] page dumped because: kasan: bad access detected [ 19.491475] [ 19.491493] Memory state around the buggy address: [ 19.491528] fff00000c76b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.491935] fff00000c76ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.492111] >fff00000c76ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.492158] ^ [ 19.492197] fff00000c76ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.492857] fff00000c76ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.492902] ================================================================== [ 19.494360] ================================================================== [ 19.494424] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.494482] Write of size 1 at addr fff00000c76ba0f0 by task kunit_try_catch/161 [ 19.494530] [ 19.494562] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.494643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.494670] Hardware name: linux,dummy-virt (DT) [ 19.494700] Call trace: [ 19.494722] show_stack+0x20/0x38 (C) [ 19.494770] dump_stack_lvl+0x8c/0xd0 [ 19.494817] print_report+0x118/0x608 [ 19.494864] kasan_report+0xdc/0x128 [ 19.496094] __asan_report_store1_noabort+0x20/0x30 [ 19.496215] krealloc_more_oob_helper+0x5c0/0x678 [ 19.496266] krealloc_large_more_oob+0x20/0x38 [ 19.496357] kunit_try_run_case+0x170/0x3f0 [ 19.496527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.496830] kthread+0x328/0x630 [ 19.497267] ret_from_fork+0x10/0x20 [ 19.497353] [ 19.497840] The buggy address belongs to the physical page: [ 19.498080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076b8 [ 19.498281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.498733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.499105] page_type: f8(unknown) [ 19.499187] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.500456] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.500764] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.501336] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.501455] head: 0bfffe0000000002 ffffc1ffc31dae01 00000000ffffffff 00000000ffffffff [ 19.502040] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.502208] page dumped because: kasan: bad access detected [ 19.502240] [ 19.502258] Memory state around the buggy address: [ 19.502289] fff00000c76b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.502332] fff00000c76ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.502373] >fff00000c76ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.502588] ^ [ 19.502663] fff00000c76ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.502705] fff00000c76ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.502742] ==================================================================
[ 12.397714] ================================================================== [ 12.398276] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.398910] Write of size 1 at addr ffff88810a6120f0 by task kunit_try_catch/177 [ 12.399633] [ 12.399814] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.399858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.399869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.399889] Call Trace: [ 12.399907] <TASK> [ 12.399941] dump_stack_lvl+0x73/0xb0 [ 12.399972] print_report+0xd1/0x650 [ 12.399995] ? __virt_addr_valid+0x1db/0x2d0 [ 12.400409] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.400444] ? kasan_addr_to_slab+0x11/0xa0 [ 12.400465] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.400490] kasan_report+0x141/0x180 [ 12.400511] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.400539] __asan_report_store1_noabort+0x1b/0x30 [ 12.400564] krealloc_more_oob_helper+0x7eb/0x930 [ 12.400587] ? __schedule+0x10cc/0x2b60 [ 12.400609] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.400634] ? finish_task_switch.isra.0+0x153/0x700 [ 12.400657] ? __switch_to+0x47/0xf50 [ 12.400682] ? __schedule+0x10cc/0x2b60 [ 12.400703] ? __pfx_read_tsc+0x10/0x10 [ 12.400727] krealloc_large_more_oob+0x1c/0x30 [ 12.400751] kunit_try_run_case+0x1a5/0x480 [ 12.400776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.400799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.400822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.400845] ? __kthread_parkme+0x82/0x180 [ 12.400866] ? preempt_count_sub+0x50/0x80 [ 12.400888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.400912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.400952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.400978] kthread+0x337/0x6f0 [ 12.400996] ? trace_preempt_on+0x20/0xc0 [ 12.401019] ? __pfx_kthread+0x10/0x10 [ 12.401039] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.401061] ? calculate_sigpending+0x7b/0xa0 [ 12.401085] ? __pfx_kthread+0x10/0x10 [ 12.401105] ret_from_fork+0x116/0x1d0 [ 12.401123] ? __pfx_kthread+0x10/0x10 [ 12.401143] ret_from_fork_asm+0x1a/0x30 [ 12.401174] </TASK> [ 12.401184] [ 12.415945] The buggy address belongs to the physical page: [ 12.416213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a610 [ 12.416915] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.417222] flags: 0x200000000000040(head|node=0|zone=2) [ 12.417638] page_type: f8(unknown) [ 12.417796] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.418046] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.418384] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.418903] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.419155] head: 0200000000000002 ffffea0004298401 00000000ffffffff 00000000ffffffff [ 12.419730] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.420025] page dumped because: kasan: bad access detected [ 12.420196] [ 12.420291] Memory state around the buggy address: [ 12.420656] ffff88810a611f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.420993] ffff88810a612000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.421307] >ffff88810a612080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.421515] ^ [ 12.422103] ffff88810a612100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.422456] ffff88810a612180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.422805] ================================================================== [ 12.367155] ================================================================== [ 12.368380] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.368852] Write of size 1 at addr ffff88810a6120eb by task kunit_try_catch/177 [ 12.369315] [ 12.369753] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.369804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.369816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.369838] Call Trace: [ 12.369851] <TASK> [ 12.369870] dump_stack_lvl+0x73/0xb0 [ 12.369902] print_report+0xd1/0x650 [ 12.369935] ? __virt_addr_valid+0x1db/0x2d0 [ 12.370076] ? krealloc_more_oob_helper+0x821/0x930 [ 12.370102] ? kasan_addr_to_slab+0x11/0xa0 [ 12.370124] ? krealloc_more_oob_helper+0x821/0x930 [ 12.370147] kasan_report+0x141/0x180 [ 12.370169] ? krealloc_more_oob_helper+0x821/0x930 [ 12.370205] __asan_report_store1_noabort+0x1b/0x30 [ 12.370230] krealloc_more_oob_helper+0x821/0x930 [ 12.370253] ? __schedule+0x10cc/0x2b60 [ 12.370275] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.370300] ? finish_task_switch.isra.0+0x153/0x700 [ 12.370325] ? __switch_to+0x47/0xf50 [ 12.370353] ? __schedule+0x10cc/0x2b60 [ 12.370373] ? __pfx_read_tsc+0x10/0x10 [ 12.370397] krealloc_large_more_oob+0x1c/0x30 [ 12.370420] kunit_try_run_case+0x1a5/0x480 [ 12.370445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.370467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.370491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.370515] ? __kthread_parkme+0x82/0x180 [ 12.370535] ? preempt_count_sub+0x50/0x80 [ 12.370557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.370581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.370605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.370629] kthread+0x337/0x6f0 [ 12.370647] ? trace_preempt_on+0x20/0xc0 [ 12.370671] ? __pfx_kthread+0x10/0x10 [ 12.370691] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.370718] ? calculate_sigpending+0x7b/0xa0 [ 12.370742] ? __pfx_kthread+0x10/0x10 [ 12.370762] ret_from_fork+0x116/0x1d0 [ 12.370780] ? __pfx_kthread+0x10/0x10 [ 12.370800] ret_from_fork_asm+0x1a/0x30 [ 12.370831] </TASK> [ 12.370841] [ 12.387659] The buggy address belongs to the physical page: [ 12.387860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a610 [ 12.388656] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.389465] flags: 0x200000000000040(head|node=0|zone=2) [ 12.390008] page_type: f8(unknown) [ 12.390379] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.391062] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.391416] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.392335] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.393121] head: 0200000000000002 ffffea0004298401 00000000ffffffff 00000000ffffffff [ 12.393556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.394195] page dumped because: kasan: bad access detected [ 12.394398] [ 12.394472] Memory state around the buggy address: [ 12.394629] ffff88810a611f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.394853] ffff88810a612000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.395350] >ffff88810a612080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.396123] ^ [ 12.396517] ffff88810a612100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.396738] ffff88810a612180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.396971] ================================================================== [ 12.232379] ================================================================== [ 12.232817] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.233526] Write of size 1 at addr ffff888100a17af0 by task kunit_try_catch/173 [ 12.233792] [ 12.233940] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.233986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.233997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.234061] Call Trace: [ 12.234075] <TASK> [ 12.234093] dump_stack_lvl+0x73/0xb0 [ 12.234126] print_report+0xd1/0x650 [ 12.234149] ? __virt_addr_valid+0x1db/0x2d0 [ 12.234172] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.234195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.234218] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.234243] kasan_report+0x141/0x180 [ 12.234264] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.234292] __asan_report_store1_noabort+0x1b/0x30 [ 12.234317] krealloc_more_oob_helper+0x7eb/0x930 [ 12.234341] ? __schedule+0x10cc/0x2b60 [ 12.234363] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.234390] ? __kasan_check_write+0x18/0x20 [ 12.234409] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.234447] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 12.234472] ? __pfx_read_tsc+0x10/0x10 [ 12.234498] krealloc_more_oob+0x1c/0x30 [ 12.234532] kunit_try_run_case+0x1a5/0x480 [ 12.234558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.234581] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 12.234603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.234626] ? __kthread_parkme+0x82/0x180 [ 12.234647] ? preempt_count_sub+0x50/0x80 [ 12.234672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.234696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.234726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.234751] kthread+0x337/0x6f0 [ 12.234769] ? trace_preempt_on+0x20/0xc0 [ 12.234793] ? __pfx_kthread+0x10/0x10 [ 12.234822] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.234843] ? calculate_sigpending+0x7b/0xa0 [ 12.234867] ? __pfx_kthread+0x10/0x10 [ 12.234888] ret_from_fork+0x116/0x1d0 [ 12.234907] ? __pfx_kthread+0x10/0x10 [ 12.234938] ret_from_fork_asm+0x1a/0x30 [ 12.235049] </TASK> [ 12.235060] [ 12.244012] Allocated by task 173: [ 12.244342] kasan_save_stack+0x45/0x70 [ 12.244579] kasan_save_track+0x18/0x40 [ 12.244727] kasan_save_alloc_info+0x3b/0x50 [ 12.245026] __kasan_krealloc+0x190/0x1f0 [ 12.245212] krealloc_noprof+0xf3/0x340 [ 12.245447] krealloc_more_oob_helper+0x1a9/0x930 [ 12.245673] krealloc_more_oob+0x1c/0x30 [ 12.245869] kunit_try_run_case+0x1a5/0x480 [ 12.246150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.246324] kthread+0x337/0x6f0 [ 12.246441] ret_from_fork+0x116/0x1d0 [ 12.246571] ret_from_fork_asm+0x1a/0x30 [ 12.246860] [ 12.247065] The buggy address belongs to the object at ffff888100a17a00 [ 12.247065] which belongs to the cache kmalloc-256 of size 256 [ 12.247579] The buggy address is located 5 bytes to the right of [ 12.247579] allocated 235-byte region [ffff888100a17a00, ffff888100a17aeb) [ 12.248150] [ 12.248302] The buggy address belongs to the physical page: [ 12.248604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16 [ 12.249103] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.249534] flags: 0x200000000000040(head|node=0|zone=2) [ 12.249785] page_type: f5(slab) [ 12.249938] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.250257] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.250606] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.250874] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.251336] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff [ 12.251843] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.252548] page dumped because: kasan: bad access detected [ 12.252729] [ 12.252799] Memory state around the buggy address: [ 12.253043] ffff888100a17980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.253582] ffff888100a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.253938] >ffff888100a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.254286] ^ [ 12.254655] ffff888100a17b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.255090] ffff888100a17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.255396] ================================================================== [ 12.208560] ================================================================== [ 12.209048] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.209550] Write of size 1 at addr ffff888100a17aeb by task kunit_try_catch/173 [ 12.209876] [ 12.210040] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.210102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.210113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.210134] Call Trace: [ 12.210146] <TASK> [ 12.210163] dump_stack_lvl+0x73/0xb0 [ 12.210195] print_report+0xd1/0x650 [ 12.210218] ? __virt_addr_valid+0x1db/0x2d0 [ 12.210241] ? krealloc_more_oob_helper+0x821/0x930 [ 12.210288] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.210311] ? krealloc_more_oob_helper+0x821/0x930 [ 12.210346] kasan_report+0x141/0x180 [ 12.210367] ? krealloc_more_oob_helper+0x821/0x930 [ 12.210396] __asan_report_store1_noabort+0x1b/0x30 [ 12.210420] krealloc_more_oob_helper+0x821/0x930 [ 12.210443] ? __schedule+0x10cc/0x2b60 [ 12.210465] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.210491] ? __kasan_check_write+0x18/0x20 [ 12.210510] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.210546] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 12.210571] ? __pfx_read_tsc+0x10/0x10 [ 12.210596] krealloc_more_oob+0x1c/0x30 [ 12.210628] kunit_try_run_case+0x1a5/0x480 [ 12.210653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.210675] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 12.210714] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.210737] ? __kthread_parkme+0x82/0x180 [ 12.210759] ? preempt_count_sub+0x50/0x80 [ 12.210784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.210807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.210831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.210856] kthread+0x337/0x6f0 [ 12.210874] ? trace_preempt_on+0x20/0xc0 [ 12.210898] ? __pfx_kthread+0x10/0x10 [ 12.210918] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.211092] ? calculate_sigpending+0x7b/0xa0 [ 12.211124] ? __pfx_kthread+0x10/0x10 [ 12.211146] ret_from_fork+0x116/0x1d0 [ 12.211166] ? __pfx_kthread+0x10/0x10 [ 12.211186] ret_from_fork_asm+0x1a/0x30 [ 12.211217] </TASK> [ 12.211228] [ 12.220349] Allocated by task 173: [ 12.220544] kasan_save_stack+0x45/0x70 [ 12.220791] kasan_save_track+0x18/0x40 [ 12.221111] kasan_save_alloc_info+0x3b/0x50 [ 12.221365] __kasan_krealloc+0x190/0x1f0 [ 12.221574] krealloc_noprof+0xf3/0x340 [ 12.221714] krealloc_more_oob_helper+0x1a9/0x930 [ 12.221993] krealloc_more_oob+0x1c/0x30 [ 12.222242] kunit_try_run_case+0x1a5/0x480 [ 12.222465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.222683] kthread+0x337/0x6f0 [ 12.222811] ret_from_fork+0x116/0x1d0 [ 12.222978] ret_from_fork_asm+0x1a/0x30 [ 12.223189] [ 12.223302] The buggy address belongs to the object at ffff888100a17a00 [ 12.223302] which belongs to the cache kmalloc-256 of size 256 [ 12.223723] The buggy address is located 0 bytes to the right of [ 12.223723] allocated 235-byte region [ffff888100a17a00, ffff888100a17aeb) [ 12.224696] [ 12.224777] The buggy address belongs to the physical page: [ 12.225059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16 [ 12.225668] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.225891] flags: 0x200000000000040(head|node=0|zone=2) [ 12.226330] page_type: f5(slab) [ 12.226601] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.226878] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.227250] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.227611] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.227944] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff [ 12.228445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.228727] page dumped because: kasan: bad access detected [ 12.228976] [ 12.229069] Memory state around the buggy address: [ 12.229250] ffff888100a17980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.229834] ffff888100a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.230209] >ffff888100a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.230574] ^ [ 12.230849] ffff888100a17b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.231327] ffff888100a17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.231617] ==================================================================