Date
July 10, 2025, 6:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.787815] ================================================================== [ 16.787874] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.787970] Write of size 1 at addr fff00000c78aa0eb by task kunit_try_catch/160 [ 16.788019] [ 16.788076] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.788164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.788459] Hardware name: linux,dummy-virt (DT) [ 16.788560] Call trace: [ 16.788598] show_stack+0x20/0x38 (C) [ 16.788709] dump_stack_lvl+0x8c/0xd0 [ 16.788759] print_report+0x118/0x608 [ 16.788806] kasan_report+0xdc/0x128 [ 16.788851] __asan_report_store1_noabort+0x20/0x30 [ 16.789062] krealloc_more_oob_helper+0x60c/0x678 [ 16.789155] krealloc_large_more_oob+0x20/0x38 [ 16.789205] kunit_try_run_case+0x170/0x3f0 [ 16.789260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.789313] kthread+0x328/0x630 [ 16.789367] ret_from_fork+0x10/0x20 [ 16.789415] [ 16.789436] The buggy address belongs to the physical page: [ 16.789466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a8 [ 16.789647] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.789714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.789767] page_type: f8(unknown) [ 16.790005] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.790065] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.790114] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.790161] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.790498] head: 0bfffe0000000002 ffffc1ffc31e2a01 00000000ffffffff 00000000ffffffff [ 16.790654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.790751] page dumped because: kasan: bad access detected [ 16.790915] [ 16.790974] Memory state around the buggy address: [ 16.791007] fff00000c78a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.791330] fff00000c78aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.791444] >fff00000c78aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.791535] ^ [ 16.791680] fff00000c78aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.791780] fff00000c78aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.791817] ================================================================== [ 16.792908] ================================================================== [ 16.792953] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.793028] Write of size 1 at addr fff00000c78aa0f0 by task kunit_try_catch/160 [ 16.793112] [ 16.793159] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.793237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.793262] Hardware name: linux,dummy-virt (DT) [ 16.793500] Call trace: [ 16.793529] show_stack+0x20/0x38 (C) [ 16.793578] dump_stack_lvl+0x8c/0xd0 [ 16.793625] print_report+0x118/0x608 [ 16.793671] kasan_report+0xdc/0x128 [ 16.793716] __asan_report_store1_noabort+0x20/0x30 [ 16.793767] krealloc_more_oob_helper+0x5c0/0x678 [ 16.793815] krealloc_large_more_oob+0x20/0x38 [ 16.793863] kunit_try_run_case+0x170/0x3f0 [ 16.793918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.794063] kthread+0x328/0x630 [ 16.794115] ret_from_fork+0x10/0x20 [ 16.794164] [ 16.794183] The buggy address belongs to the physical page: [ 16.794475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a8 [ 16.794573] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.794663] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.794714] page_type: f8(unknown) [ 16.794750] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.794991] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.795091] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.795196] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.795243] head: 0bfffe0000000002 ffffc1ffc31e2a01 00000000ffffffff 00000000ffffffff [ 16.795571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.795735] page dumped because: kasan: bad access detected [ 16.795826] [ 16.795871] Memory state around the buggy address: [ 16.795902] fff00000c78a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.795980] fff00000c78aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.796320] >fff00000c78aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.796424] ^ [ 16.796512] fff00000c78aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.796578] fff00000c78aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.796871] ================================================================== [ 16.683465] ================================================================== [ 16.683529] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.683726] Write of size 1 at addr fff00000c1d24ceb by task kunit_try_catch/156 [ 16.683783] [ 16.683824] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.683906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.683932] Hardware name: linux,dummy-virt (DT) [ 16.683963] Call trace: [ 16.683986] show_stack+0x20/0x38 (C) [ 16.684037] dump_stack_lvl+0x8c/0xd0 [ 16.684087] print_report+0x118/0x608 [ 16.684133] kasan_report+0xdc/0x128 [ 16.684178] __asan_report_store1_noabort+0x20/0x30 [ 16.684368] krealloc_more_oob_helper+0x60c/0x678 [ 16.684689] krealloc_more_oob+0x20/0x38 [ 16.685067] kunit_try_run_case+0x170/0x3f0 [ 16.685118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.685948] kthread+0x328/0x630 [ 16.686062] ret_from_fork+0x10/0x20 [ 16.686199] [ 16.686284] Allocated by task 156: [ 16.686319] kasan_save_stack+0x3c/0x68 [ 16.687175] kasan_save_track+0x20/0x40 [ 16.687224] kasan_save_alloc_info+0x40/0x58 [ 16.687263] __kasan_krealloc+0x118/0x178 [ 16.687303] krealloc_noprof+0x128/0x360 [ 16.687361] krealloc_more_oob_helper+0x168/0x678 [ 16.687405] krealloc_more_oob+0x20/0x38 [ 16.687442] kunit_try_run_case+0x170/0x3f0 [ 16.687480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.687522] kthread+0x328/0x630 [ 16.687554] ret_from_fork+0x10/0x20 [ 16.687589] [ 16.687609] The buggy address belongs to the object at fff00000c1d24c00 [ 16.687609] which belongs to the cache kmalloc-256 of size 256 [ 16.687665] The buggy address is located 0 bytes to the right of [ 16.687665] allocated 235-byte region [fff00000c1d24c00, fff00000c1d24ceb) [ 16.687726] [ 16.688631] The buggy address belongs to the physical page: [ 16.688717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d24 [ 16.689471] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.689813] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.689874] page_type: f5(slab) [ 16.690537] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.690759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.691549] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.692038] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.692248] head: 0bfffe0000000001 ffffc1ffc3074901 00000000ffffffff 00000000ffffffff [ 16.692835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.693525] page dumped because: kasan: bad access detected [ 16.693918] [ 16.694174] Memory state around the buggy address: [ 16.694327] fff00000c1d24b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.694387] fff00000c1d24c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.694428] >fff00000c1d24c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.694464] ^ [ 16.695051] fff00000c1d24d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.695112] fff00000c1d24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.695934] ================================================================== [ 16.697376] ================================================================== [ 16.699207] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.699747] Write of size 1 at addr fff00000c1d24cf0 by task kunit_try_catch/156 [ 16.699865] [ 16.699900] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.700836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.700925] Hardware name: linux,dummy-virt (DT) [ 16.701799] Call trace: [ 16.702047] show_stack+0x20/0x38 (C) [ 16.702106] dump_stack_lvl+0x8c/0xd0 [ 16.702158] print_report+0x118/0x608 [ 16.702205] kasan_report+0xdc/0x128 [ 16.702251] __asan_report_store1_noabort+0x20/0x30 [ 16.702302] krealloc_more_oob_helper+0x5c0/0x678 [ 16.702362] krealloc_more_oob+0x20/0x38 [ 16.702408] kunit_try_run_case+0x170/0x3f0 [ 16.702457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.702510] kthread+0x328/0x630 [ 16.702552] ret_from_fork+0x10/0x20 [ 16.702599] [ 16.702617] Allocated by task 156: [ 16.704411] kasan_save_stack+0x3c/0x68 [ 16.705313] kasan_save_track+0x20/0x40 [ 16.706059] kasan_save_alloc_info+0x40/0x58 [ 16.706609] __kasan_krealloc+0x118/0x178 [ 16.706649] krealloc_noprof+0x128/0x360 [ 16.707362] krealloc_more_oob_helper+0x168/0x678 [ 16.707478] krealloc_more_oob+0x20/0x38 [ 16.707538] kunit_try_run_case+0x170/0x3f0 [ 16.707576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.707622] kthread+0x328/0x630 [ 16.707655] ret_from_fork+0x10/0x20 [ 16.707690] [ 16.707709] The buggy address belongs to the object at fff00000c1d24c00 [ 16.707709] which belongs to the cache kmalloc-256 of size 256 [ 16.707765] The buggy address is located 5 bytes to the right of [ 16.707765] allocated 235-byte region [fff00000c1d24c00, fff00000c1d24ceb) [ 16.708932] [ 16.709701] The buggy address belongs to the physical page: [ 16.710001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d24 [ 16.710257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.710325] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.710864] page_type: f5(slab) [ 16.710956] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.711017] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.711272] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.711324] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.711382] head: 0bfffe0000000001 ffffc1ffc3074901 00000000ffffffff 00000000ffffffff [ 16.711433] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.712293] page dumped because: kasan: bad access detected [ 16.712633] [ 16.712993] Memory state around the buggy address: [ 16.713716] fff00000c1d24b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.713814] fff00000c1d24c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.714286] >fff00000c1d24c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.714367] ^ [ 16.714409] fff00000c1d24d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.715351] fff00000c1d24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.715873] ==================================================================
[ 12.332334] ================================================================== [ 12.332804] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.333330] Write of size 1 at addr ffff888102ac20eb by task kunit_try_catch/177 [ 12.333614] [ 12.333791] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.334062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.334076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.334095] Call Trace: [ 12.334119] <TASK> [ 12.334134] dump_stack_lvl+0x73/0xb0 [ 12.334168] print_report+0xd1/0x650 [ 12.334190] ? __virt_addr_valid+0x1db/0x2d0 [ 12.334215] ? krealloc_more_oob_helper+0x821/0x930 [ 12.334241] ? kasan_addr_to_slab+0x11/0xa0 [ 12.334262] ? krealloc_more_oob_helper+0x821/0x930 [ 12.334288] kasan_report+0x141/0x180 [ 12.334309] ? krealloc_more_oob_helper+0x821/0x930 [ 12.334338] __asan_report_store1_noabort+0x1b/0x30 [ 12.334363] krealloc_more_oob_helper+0x821/0x930 [ 12.334385] ? __schedule+0x10cc/0x2b60 [ 12.334408] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.334434] ? finish_task_switch.isra.0+0x153/0x700 [ 12.334457] ? __switch_to+0x47/0xf50 [ 12.334482] ? __schedule+0x10cc/0x2b60 [ 12.334503] ? __pfx_read_tsc+0x10/0x10 [ 12.334527] krealloc_large_more_oob+0x1c/0x30 [ 12.334550] kunit_try_run_case+0x1a5/0x480 [ 12.334574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.334596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.334619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.334643] ? __kthread_parkme+0x82/0x180 [ 12.334663] ? preempt_count_sub+0x50/0x80 [ 12.334685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.334709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.334732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.334757] kthread+0x337/0x6f0 [ 12.334776] ? trace_preempt_on+0x20/0xc0 [ 12.334799] ? __pfx_kthread+0x10/0x10 [ 12.334868] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.334891] ? calculate_sigpending+0x7b/0xa0 [ 12.334915] ? __pfx_kthread+0x10/0x10 [ 12.334936] ret_from_fork+0x116/0x1d0 [ 12.334954] ? __pfx_kthread+0x10/0x10 [ 12.334974] ret_from_fork_asm+0x1a/0x30 [ 12.335005] </TASK> [ 12.335015] [ 12.344856] The buggy address belongs to the physical page: [ 12.345149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac0 [ 12.345522] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.345919] flags: 0x200000000000040(head|node=0|zone=2) [ 12.346215] page_type: f8(unknown) [ 12.346342] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.346609] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.346995] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.347479] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.347976] head: 0200000000000002 ffffea00040ab001 00000000ffffffff 00000000ffffffff [ 12.348293] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.348584] page dumped because: kasan: bad access detected [ 12.349082] [ 12.349188] Memory state around the buggy address: [ 12.349359] ffff888102ac1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.349670] ffff888102ac2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.350051] >ffff888102ac2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.350351] ^ [ 12.350604] ffff888102ac2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.350923] ffff888102ac2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.351282] ================================================================== [ 12.175176] ================================================================== [ 12.175568] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.176333] Write of size 1 at addr ffff8881039c00f0 by task kunit_try_catch/173 [ 12.176995] [ 12.177177] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.177219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.177230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.177249] Call Trace: [ 12.177278] <TASK> [ 12.177293] dump_stack_lvl+0x73/0xb0 [ 12.177323] print_report+0xd1/0x650 [ 12.177358] ? __virt_addr_valid+0x1db/0x2d0 [ 12.177382] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.177406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.177429] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.177453] kasan_report+0x141/0x180 [ 12.177483] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.177511] __asan_report_store1_noabort+0x1b/0x30 [ 12.177546] krealloc_more_oob_helper+0x7eb/0x930 [ 12.177569] ? __schedule+0x10cc/0x2b60 [ 12.177591] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.177616] ? finish_task_switch.isra.0+0x153/0x700 [ 12.177640] ? __switch_to+0x47/0xf50 [ 12.177665] ? __schedule+0x10cc/0x2b60 [ 12.177686] ? __pfx_read_tsc+0x10/0x10 [ 12.177710] krealloc_more_oob+0x1c/0x30 [ 12.177731] kunit_try_run_case+0x1a5/0x480 [ 12.177755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.177778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.177801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.177824] ? __kthread_parkme+0x82/0x180 [ 12.177844] ? preempt_count_sub+0x50/0x80 [ 12.177867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.177891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.177915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.177950] kthread+0x337/0x6f0 [ 12.177968] ? trace_preempt_on+0x20/0xc0 [ 12.177992] ? __pfx_kthread+0x10/0x10 [ 12.178024] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.178063] ? calculate_sigpending+0x7b/0xa0 [ 12.178096] ? __pfx_kthread+0x10/0x10 [ 12.178126] ret_from_fork+0x116/0x1d0 [ 12.178144] ? __pfx_kthread+0x10/0x10 [ 12.178164] ret_from_fork_asm+0x1a/0x30 [ 12.178194] </TASK> [ 12.178203] [ 12.187351] Allocated by task 173: [ 12.187483] kasan_save_stack+0x45/0x70 [ 12.187632] kasan_save_track+0x18/0x40 [ 12.187871] kasan_save_alloc_info+0x3b/0x50 [ 12.188146] __kasan_krealloc+0x190/0x1f0 [ 12.188351] krealloc_noprof+0xf3/0x340 [ 12.188566] krealloc_more_oob_helper+0x1a9/0x930 [ 12.188775] krealloc_more_oob+0x1c/0x30 [ 12.189056] kunit_try_run_case+0x1a5/0x480 [ 12.189210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.189389] kthread+0x337/0x6f0 [ 12.189578] ret_from_fork+0x116/0x1d0 [ 12.189763] ret_from_fork_asm+0x1a/0x30 [ 12.189956] [ 12.190057] The buggy address belongs to the object at ffff8881039c0000 [ 12.190057] which belongs to the cache kmalloc-256 of size 256 [ 12.190889] The buggy address is located 5 bytes to the right of [ 12.190889] allocated 235-byte region [ffff8881039c0000, ffff8881039c00eb) [ 12.191638] [ 12.191724] The buggy address belongs to the physical page: [ 12.192386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c0 [ 12.192745] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.193232] flags: 0x200000000000040(head|node=0|zone=2) [ 12.193491] page_type: f5(slab) [ 12.193668] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.193982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.194220] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.194662] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.195003] head: 0200000000000001 ffffea00040e7001 00000000ffffffff 00000000ffffffff [ 12.195476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.195700] page dumped because: kasan: bad access detected [ 12.196221] [ 12.196353] Memory state around the buggy address: [ 12.196582] ffff8881039bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.197022] ffff8881039c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.197278] >ffff8881039c0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.197596] ^ [ 12.198080] ffff8881039c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.198378] ffff8881039c0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.198666] ================================================================== [ 12.351699] ================================================================== [ 12.352105] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.352598] Write of size 1 at addr ffff888102ac20f0 by task kunit_try_catch/177 [ 12.352968] [ 12.353094] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.353135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.353146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.353165] Call Trace: [ 12.353177] <TASK> [ 12.353191] dump_stack_lvl+0x73/0xb0 [ 12.353219] print_report+0xd1/0x650 [ 12.353241] ? __virt_addr_valid+0x1db/0x2d0 [ 12.353263] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.353286] ? kasan_addr_to_slab+0x11/0xa0 [ 12.353306] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.353330] kasan_report+0x141/0x180 [ 12.353351] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.353379] __asan_report_store1_noabort+0x1b/0x30 [ 12.353404] krealloc_more_oob_helper+0x7eb/0x930 [ 12.353426] ? __schedule+0x10cc/0x2b60 [ 12.353447] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.353472] ? finish_task_switch.isra.0+0x153/0x700 [ 12.353494] ? __switch_to+0x47/0xf50 [ 12.353519] ? __schedule+0x10cc/0x2b60 [ 12.353540] ? __pfx_read_tsc+0x10/0x10 [ 12.353563] krealloc_large_more_oob+0x1c/0x30 [ 12.353586] kunit_try_run_case+0x1a5/0x480 [ 12.353609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.353632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.353655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.353679] ? __kthread_parkme+0x82/0x180 [ 12.353698] ? preempt_count_sub+0x50/0x80 [ 12.353721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.353745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.353768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.353793] kthread+0x337/0x6f0 [ 12.353811] ? trace_preempt_on+0x20/0xc0 [ 12.353834] ? __pfx_kthread+0x10/0x10 [ 12.353854] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.353876] ? calculate_sigpending+0x7b/0xa0 [ 12.353899] ? __pfx_kthread+0x10/0x10 [ 12.353920] ret_from_fork+0x116/0x1d0 [ 12.353938] ? __pfx_kthread+0x10/0x10 [ 12.353958] ret_from_fork_asm+0x1a/0x30 [ 12.353988] </TASK> [ 12.353997] [ 12.361666] The buggy address belongs to the physical page: [ 12.361972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac0 [ 12.362244] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.362579] flags: 0x200000000000040(head|node=0|zone=2) [ 12.362816] page_type: f8(unknown) [ 12.363170] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.363430] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.363767] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.364082] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.364347] head: 0200000000000002 ffffea00040ab001 00000000ffffffff 00000000ffffffff [ 12.364654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.364885] page dumped because: kasan: bad access detected [ 12.365221] [ 12.365322] Memory state around the buggy address: [ 12.365542] ffff888102ac1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.365936] ffff888102ac2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.366241] >ffff888102ac2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.366509] ^ [ 12.366782] ffff888102ac2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.367105] ffff888102ac2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.367372] ================================================================== [ 12.139126] ================================================================== [ 12.140382] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.141099] Write of size 1 at addr ffff8881039c00eb by task kunit_try_catch/173 [ 12.141729] [ 12.141818] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.141859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.141870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.141888] Call Trace: [ 12.141900] <TASK> [ 12.141913] dump_stack_lvl+0x73/0xb0 [ 12.141997] print_report+0xd1/0x650 [ 12.142065] ? __virt_addr_valid+0x1db/0x2d0 [ 12.142087] ? krealloc_more_oob_helper+0x821/0x930 [ 12.142110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.142144] ? krealloc_more_oob_helper+0x821/0x930 [ 12.142168] kasan_report+0x141/0x180 [ 12.142189] ? krealloc_more_oob_helper+0x821/0x930 [ 12.142243] __asan_report_store1_noabort+0x1b/0x30 [ 12.142268] krealloc_more_oob_helper+0x821/0x930 [ 12.142291] ? __schedule+0x10cc/0x2b60 [ 12.142324] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.142348] ? finish_task_switch.isra.0+0x153/0x700 [ 12.142371] ? __switch_to+0x47/0xf50 [ 12.142396] ? __schedule+0x10cc/0x2b60 [ 12.142417] ? __pfx_read_tsc+0x10/0x10 [ 12.142441] krealloc_more_oob+0x1c/0x30 [ 12.142462] kunit_try_run_case+0x1a5/0x480 [ 12.142487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.142510] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.142532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.142555] ? __kthread_parkme+0x82/0x180 [ 12.142576] ? preempt_count_sub+0x50/0x80 [ 12.142599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.142623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.142647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.142671] kthread+0x337/0x6f0 [ 12.142690] ? trace_preempt_on+0x20/0xc0 [ 12.142712] ? __pfx_kthread+0x10/0x10 [ 12.142732] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.142753] ? calculate_sigpending+0x7b/0xa0 [ 12.142776] ? __pfx_kthread+0x10/0x10 [ 12.142797] ret_from_fork+0x116/0x1d0 [ 12.142965] ? __pfx_kthread+0x10/0x10 [ 12.142991] ret_from_fork_asm+0x1a/0x30 [ 12.143022] </TASK> [ 12.143044] [ 12.156807] Allocated by task 173: [ 12.157072] kasan_save_stack+0x45/0x70 [ 12.157496] kasan_save_track+0x18/0x40 [ 12.157855] kasan_save_alloc_info+0x3b/0x50 [ 12.158368] __kasan_krealloc+0x190/0x1f0 [ 12.158657] krealloc_noprof+0xf3/0x340 [ 12.158983] krealloc_more_oob_helper+0x1a9/0x930 [ 12.159463] krealloc_more_oob+0x1c/0x30 [ 12.159613] kunit_try_run_case+0x1a5/0x480 [ 12.159761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.160314] kthread+0x337/0x6f0 [ 12.160650] ret_from_fork+0x116/0x1d0 [ 12.161022] ret_from_fork_asm+0x1a/0x30 [ 12.161501] [ 12.161682] The buggy address belongs to the object at ffff8881039c0000 [ 12.161682] which belongs to the cache kmalloc-256 of size 256 [ 12.162550] The buggy address is located 0 bytes to the right of [ 12.162550] allocated 235-byte region [ffff8881039c0000, ffff8881039c00eb) [ 12.163125] [ 12.163307] The buggy address belongs to the physical page: [ 12.163868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c0 [ 12.164685] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.165424] flags: 0x200000000000040(head|node=0|zone=2) [ 12.165970] page_type: f5(slab) [ 12.166293] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.166785] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.167386] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.167624] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.167996] head: 0200000000000001 ffffea00040e7001 00000000ffffffff 00000000ffffffff [ 12.168736] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.169533] page dumped because: kasan: bad access detected [ 12.170095] [ 12.170259] Memory state around the buggy address: [ 12.170703] ffff8881039bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.171352] ffff8881039c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.171793] >ffff8881039c0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.172461] ^ [ 12.172665] ffff8881039c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.173101] ffff8881039c0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.173848] ==================================================================