Date
July 16, 2025, 3:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.490256] ================================================================== [ 16.490316] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.490371] Write of size 1 at addr fff00000c638a0eb by task kunit_try_catch/156 [ 16.490420] [ 16.490451] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.490539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.490641] Hardware name: linux,dummy-virt (DT) [ 16.490672] Call trace: [ 16.490774] show_stack+0x20/0x38 (C) [ 16.490972] dump_stack_lvl+0x8c/0xd0 [ 16.491079] print_report+0x118/0x5d0 [ 16.491304] kasan_report+0xdc/0x128 [ 16.491351] __asan_report_store1_noabort+0x20/0x30 [ 16.491402] krealloc_more_oob_helper+0x60c/0x678 [ 16.491450] krealloc_more_oob+0x20/0x38 [ 16.491650] kunit_try_run_case+0x170/0x3f0 [ 16.491706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.491768] kthread+0x328/0x630 [ 16.492217] ret_from_fork+0x10/0x20 [ 16.492415] [ 16.492617] Allocated by task 156: [ 16.492984] kasan_save_stack+0x3c/0x68 [ 16.493263] kasan_save_track+0x20/0x40 [ 16.493396] kasan_save_alloc_info+0x40/0x58 [ 16.493455] __kasan_krealloc+0x118/0x178 [ 16.493492] krealloc_noprof+0x128/0x360 [ 16.493586] krealloc_more_oob_helper+0x168/0x678 [ 16.493625] krealloc_more_oob+0x20/0x38 [ 16.493660] kunit_try_run_case+0x170/0x3f0 [ 16.493921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.494084] kthread+0x328/0x630 [ 16.494120] ret_from_fork+0x10/0x20 [ 16.494169] [ 16.494188] The buggy address belongs to the object at fff00000c638a000 [ 16.494188] which belongs to the cache kmalloc-256 of size 256 [ 16.494247] The buggy address is located 0 bytes to the right of [ 16.494247] allocated 235-byte region [fff00000c638a000, fff00000c638a0eb) [ 16.494311] [ 16.494653] The buggy address belongs to the physical page: [ 16.494899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a [ 16.494962] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.495015] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.495342] page_type: f5(slab) [ 16.495389] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.495897] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.495952] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.496001] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.496075] head: 0bfffe0000000001 ffffc1ffc318e281 00000000ffffffff 00000000ffffffff [ 16.496231] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.496308] page dumped because: kasan: bad access detected [ 16.496593] [ 16.496612] Memory state around the buggy address: [ 16.496719] fff00000c6389f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.496835] fff00000c638a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.496891] >fff00000c638a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.497007] ^ [ 16.497047] fff00000c638a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.497088] fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.497212] ================================================================== [ 16.498659] ================================================================== [ 16.498757] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.498812] Write of size 1 at addr fff00000c638a0f0 by task kunit_try_catch/156 [ 16.498884] [ 16.499039] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.499196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.499264] Hardware name: linux,dummy-virt (DT) [ 16.499295] Call trace: [ 16.499315] show_stack+0x20/0x38 (C) [ 16.499670] dump_stack_lvl+0x8c/0xd0 [ 16.499848] print_report+0x118/0x5d0 [ 16.499988] kasan_report+0xdc/0x128 [ 16.500203] __asan_report_store1_noabort+0x20/0x30 [ 16.500326] krealloc_more_oob_helper+0x5c0/0x678 [ 16.500417] krealloc_more_oob+0x20/0x38 [ 16.500468] kunit_try_run_case+0x170/0x3f0 [ 16.500521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.500942] kthread+0x328/0x630 [ 16.501197] ret_from_fork+0x10/0x20 [ 16.501339] [ 16.501357] Allocated by task 156: [ 16.501481] kasan_save_stack+0x3c/0x68 [ 16.501522] kasan_save_track+0x20/0x40 [ 16.501559] kasan_save_alloc_info+0x40/0x58 [ 16.501618] __kasan_krealloc+0x118/0x178 [ 16.501968] krealloc_noprof+0x128/0x360 [ 16.502189] krealloc_more_oob_helper+0x168/0x678 [ 16.502270] krealloc_more_oob+0x20/0x38 [ 16.502306] kunit_try_run_case+0x170/0x3f0 [ 16.502381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.502455] kthread+0x328/0x630 [ 16.502489] ret_from_fork+0x10/0x20 [ 16.502523] [ 16.502542] The buggy address belongs to the object at fff00000c638a000 [ 16.502542] which belongs to the cache kmalloc-256 of size 256 [ 16.502600] The buggy address is located 5 bytes to the right of [ 16.502600] allocated 235-byte region [fff00000c638a000, fff00000c638a0eb) [ 16.502664] [ 16.502684] The buggy address belongs to the physical page: [ 16.502725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a [ 16.503050] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.503108] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.503348] page_type: f5(slab) [ 16.503764] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.503901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.503951] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.504217] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.504367] head: 0bfffe0000000001 ffffc1ffc318e281 00000000ffffffff 00000000ffffffff [ 16.504429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.504514] page dumped because: kasan: bad access detected [ 16.504675] [ 16.504699] Memory state around the buggy address: [ 16.504740] fff00000c6389f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.504841] fff00000c638a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.504882] >fff00000c638a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.504923] ^ [ 16.505024] fff00000c638a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.505226] fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.505264] ================================================================== [ 16.576766] ================================================================== [ 16.576833] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.576890] Write of size 1 at addr fff00000c78960f0 by task kunit_try_catch/160 [ 16.577013] [ 16.577097] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.577208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.577263] Hardware name: linux,dummy-virt (DT) [ 16.577311] Call trace: [ 16.577356] show_stack+0x20/0x38 (C) [ 16.577407] dump_stack_lvl+0x8c/0xd0 [ 16.577474] print_report+0x118/0x5d0 [ 16.577589] kasan_report+0xdc/0x128 [ 16.577654] __asan_report_store1_noabort+0x20/0x30 [ 16.577705] krealloc_more_oob_helper+0x5c0/0x678 [ 16.577956] krealloc_large_more_oob+0x20/0x38 [ 16.578069] kunit_try_run_case+0x170/0x3f0 [ 16.578137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.578190] kthread+0x328/0x630 [ 16.578245] ret_from_fork+0x10/0x20 [ 16.578311] [ 16.578336] The buggy address belongs to the physical page: [ 16.578385] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 16.578493] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.578557] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.578648] page_type: f8(unknown) [ 16.578761] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.578812] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.578896] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.578951] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.579017] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff [ 16.579066] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.579113] page dumped because: kasan: bad access detected [ 16.579143] [ 16.579187] Memory state around the buggy address: [ 16.579522] fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.579620] fff00000c7896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.579701] >fff00000c7896080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.579842] ^ [ 16.579884] fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.579961] fff00000c7896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.580047] ================================================================== [ 16.561684] ================================================================== [ 16.561811] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.561883] Write of size 1 at addr fff00000c78960eb by task kunit_try_catch/160 [ 16.561975] [ 16.562011] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.562093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.562119] Hardware name: linux,dummy-virt (DT) [ 16.562155] Call trace: [ 16.562329] show_stack+0x20/0x38 (C) [ 16.562457] dump_stack_lvl+0x8c/0xd0 [ 16.562526] print_report+0x118/0x5d0 [ 16.562615] kasan_report+0xdc/0x128 [ 16.562660] __asan_report_store1_noabort+0x20/0x30 [ 16.562731] krealloc_more_oob_helper+0x60c/0x678 [ 16.562887] krealloc_large_more_oob+0x20/0x38 [ 16.563013] kunit_try_run_case+0x170/0x3f0 [ 16.563139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.563317] kthread+0x328/0x630 [ 16.563399] ret_from_fork+0x10/0x20 [ 16.563454] [ 16.563474] The buggy address belongs to the physical page: [ 16.563506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 16.563765] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.564399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.565792] page_type: f8(unknown) [ 16.565858] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.566336] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.566634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.566686] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.568078] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff [ 16.568478] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.568536] page dumped because: kasan: bad access detected [ 16.568568] [ 16.568587] Memory state around the buggy address: [ 16.568619] fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.569307] fff00000c7896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.570396] >fff00000c7896080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.570774] ^ [ 16.570926] fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.571271] fff00000c7896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.571802] ==================================================================
[ 12.365269] ================================================================== [ 12.365532] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.365950] Write of size 1 at addr ffff88810278a0f0 by task kunit_try_catch/177 [ 12.366715] [ 12.366958] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.367111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.367123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.367141] Call Trace: [ 12.367155] <TASK> [ 12.367169] dump_stack_lvl+0x73/0xb0 [ 12.367208] print_report+0xd1/0x610 [ 12.367231] ? __virt_addr_valid+0x1db/0x2d0 [ 12.367254] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.367278] ? kasan_addr_to_slab+0x11/0xa0 [ 12.367299] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.367324] kasan_report+0x141/0x180 [ 12.367346] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.367376] __asan_report_store1_noabort+0x1b/0x30 [ 12.367401] krealloc_more_oob_helper+0x7eb/0x930 [ 12.367424] ? __schedule+0x10cc/0x2b60 [ 12.367446] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.367472] ? finish_task_switch.isra.0+0x153/0x700 [ 12.367495] ? __switch_to+0x47/0xf50 [ 12.367521] ? __schedule+0x10cc/0x2b60 [ 12.367543] ? __pfx_read_tsc+0x10/0x10 [ 12.367567] krealloc_large_more_oob+0x1c/0x30 [ 12.367591] kunit_try_run_case+0x1a5/0x480 [ 12.367616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.367639] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.367663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.367687] ? __kthread_parkme+0x82/0x180 [ 12.367708] ? preempt_count_sub+0x50/0x80 [ 12.367731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.367767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.367792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.367817] kthread+0x337/0x6f0 [ 12.367837] ? trace_preempt_on+0x20/0xc0 [ 12.367861] ? __pfx_kthread+0x10/0x10 [ 12.367882] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.367904] ? calculate_sigpending+0x7b/0xa0 [ 12.367929] ? __pfx_kthread+0x10/0x10 [ 12.367951] ret_from_fork+0x116/0x1d0 [ 12.367970] ? __pfx_kthread+0x10/0x10 [ 12.368138] ret_from_fork_asm+0x1a/0x30 [ 12.368171] </TASK> [ 12.368181] [ 12.376383] The buggy address belongs to the physical page: [ 12.376670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102788 [ 12.376934] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.377456] flags: 0x200000000000040(head|node=0|zone=2) [ 12.377725] page_type: f8(unknown) [ 12.377963] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.378259] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.378605] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.378861] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.379094] head: 0200000000000002 ffffea000409e201 00000000ffffffff 00000000ffffffff [ 12.379441] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.379810] page dumped because: kasan: bad access detected [ 12.380074] [ 12.380173] Memory state around the buggy address: [ 12.380408] ffff888102789f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.380924] ffff88810278a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.381289] >ffff88810278a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.381595] ^ [ 12.381869] ffff88810278a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.382115] ffff88810278a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.382435] ================================================================== [ 12.342148] ================================================================== [ 12.342791] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.343336] Write of size 1 at addr ffff88810278a0eb by task kunit_try_catch/177 [ 12.343882] [ 12.344359] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.344411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.344423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.344445] Call Trace: [ 12.344457] <TASK> [ 12.344474] dump_stack_lvl+0x73/0xb0 [ 12.344509] print_report+0xd1/0x610 [ 12.344532] ? __virt_addr_valid+0x1db/0x2d0 [ 12.344557] ? krealloc_more_oob_helper+0x821/0x930 [ 12.344581] ? kasan_addr_to_slab+0x11/0xa0 [ 12.344602] ? krealloc_more_oob_helper+0x821/0x930 [ 12.344627] kasan_report+0x141/0x180 [ 12.344649] ? krealloc_more_oob_helper+0x821/0x930 [ 12.344679] __asan_report_store1_noabort+0x1b/0x30 [ 12.344705] krealloc_more_oob_helper+0x821/0x930 [ 12.344728] ? __schedule+0x10cc/0x2b60 [ 12.344766] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.344792] ? finish_task_switch.isra.0+0x153/0x700 [ 12.344816] ? __switch_to+0x47/0xf50 [ 12.344843] ? __schedule+0x10cc/0x2b60 [ 12.344865] ? __pfx_read_tsc+0x10/0x10 [ 12.344890] krealloc_large_more_oob+0x1c/0x30 [ 12.344914] kunit_try_run_case+0x1a5/0x480 [ 12.344940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.344963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.345048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.345073] ? __kthread_parkme+0x82/0x180 [ 12.345095] ? preempt_count_sub+0x50/0x80 [ 12.345119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.345144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.345169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.345195] kthread+0x337/0x6f0 [ 12.345214] ? trace_preempt_on+0x20/0xc0 [ 12.345238] ? __pfx_kthread+0x10/0x10 [ 12.345259] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.345281] ? calculate_sigpending+0x7b/0xa0 [ 12.345306] ? __pfx_kthread+0x10/0x10 [ 12.345328] ret_from_fork+0x116/0x1d0 [ 12.345347] ? __pfx_kthread+0x10/0x10 [ 12.345368] ret_from_fork_asm+0x1a/0x30 [ 12.345400] </TASK> [ 12.345411] [ 12.356441] The buggy address belongs to the physical page: [ 12.357074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102788 [ 12.357578] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.358020] flags: 0x200000000000040(head|node=0|zone=2) [ 12.358415] page_type: f8(unknown) [ 12.358591] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.358916] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.359413] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.359907] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.360380] head: 0200000000000002 ffffea000409e201 00000000ffffffff 00000000ffffffff [ 12.361031] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.361426] page dumped because: kasan: bad access detected [ 12.361655] [ 12.361886] Memory state around the buggy address: [ 12.362151] ffff888102789f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.362636] ffff88810278a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.362929] >ffff88810278a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 12.363420] ^ [ 12.363816] ffff88810278a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.364247] ffff88810278a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.364782] ================================================================== [ 12.153403] ================================================================== [ 12.153857] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 12.154312] Write of size 1 at addr ffff888100a322eb by task kunit_try_catch/173 [ 12.154623] [ 12.154741] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.154797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.154809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.154830] Call Trace: [ 12.154841] <TASK> [ 12.154856] dump_stack_lvl+0x73/0xb0 [ 12.154883] print_report+0xd1/0x610 [ 12.154905] ? __virt_addr_valid+0x1db/0x2d0 [ 12.154929] ? krealloc_more_oob_helper+0x821/0x930 [ 12.154953] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.154977] ? krealloc_more_oob_helper+0x821/0x930 [ 12.155013] kasan_report+0x141/0x180 [ 12.155035] ? krealloc_more_oob_helper+0x821/0x930 [ 12.155064] __asan_report_store1_noabort+0x1b/0x30 [ 12.155089] krealloc_more_oob_helper+0x821/0x930 [ 12.155112] ? __schedule+0x10cc/0x2b60 [ 12.155134] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.155159] ? finish_task_switch.isra.0+0x153/0x700 [ 12.155186] ? __switch_to+0x47/0xf50 [ 12.155213] ? __schedule+0x10cc/0x2b60 [ 12.155234] ? __pfx_read_tsc+0x10/0x10 [ 12.155258] krealloc_more_oob+0x1c/0x30 [ 12.155280] kunit_try_run_case+0x1a5/0x480 [ 12.155304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.155327] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.155351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.155375] ? __kthread_parkme+0x82/0x180 [ 12.155395] ? preempt_count_sub+0x50/0x80 [ 12.155418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.155606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.155640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.155666] kthread+0x337/0x6f0 [ 12.155685] ? trace_preempt_on+0x20/0xc0 [ 12.155709] ? __pfx_kthread+0x10/0x10 [ 12.155730] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.155764] ? calculate_sigpending+0x7b/0xa0 [ 12.155789] ? __pfx_kthread+0x10/0x10 [ 12.155810] ret_from_fork+0x116/0x1d0 [ 12.155829] ? __pfx_kthread+0x10/0x10 [ 12.155849] ret_from_fork_asm+0x1a/0x30 [ 12.155880] </TASK> [ 12.155889] [ 12.164333] Allocated by task 173: [ 12.164514] kasan_save_stack+0x45/0x70 [ 12.164662] kasan_save_track+0x18/0x40 [ 12.164864] kasan_save_alloc_info+0x3b/0x50 [ 12.165251] __kasan_krealloc+0x190/0x1f0 [ 12.165449] krealloc_noprof+0xf3/0x340 [ 12.165646] krealloc_more_oob_helper+0x1a9/0x930 [ 12.165838] krealloc_more_oob+0x1c/0x30 [ 12.166085] kunit_try_run_case+0x1a5/0x480 [ 12.166298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.166544] kthread+0x337/0x6f0 [ 12.166686] ret_from_fork+0x116/0x1d0 [ 12.166830] ret_from_fork_asm+0x1a/0x30 [ 12.166971] [ 12.167043] The buggy address belongs to the object at ffff888100a32200 [ 12.167043] which belongs to the cache kmalloc-256 of size 256 [ 12.167517] The buggy address is located 0 bytes to the right of [ 12.167517] allocated 235-byte region [ffff888100a32200, ffff888100a322eb) [ 12.168093] [ 12.168190] The buggy address belongs to the physical page: [ 12.168595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a32 [ 12.168944] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.169327] flags: 0x200000000000040(head|node=0|zone=2) [ 12.169596] page_type: f5(slab) [ 12.169716] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.170043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.170388] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.170813] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.171236] head: 0200000000000001 ffffea0004028c81 00000000ffffffff 00000000ffffffff [ 12.171495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.171739] page dumped because: kasan: bad access detected [ 12.172008] [ 12.172103] Memory state around the buggy address: [ 12.172324] ffff888100a32180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.172783] ffff888100a32200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.172997] >ffff888100a32280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.173485] ^ [ 12.173807] ffff888100a32300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.174123] ffff888100a32380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.174337] ================================================================== [ 12.175149] ================================================================== [ 12.175443] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 12.175726] Write of size 1 at addr ffff888100a322f0 by task kunit_try_catch/173 [ 12.175964] [ 12.176072] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.176110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.176121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.176139] Call Trace: [ 12.176152] <TASK> [ 12.176164] dump_stack_lvl+0x73/0xb0 [ 12.176189] print_report+0xd1/0x610 [ 12.176209] ? __virt_addr_valid+0x1db/0x2d0 [ 12.176230] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.176496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.176528] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.176554] kasan_report+0x141/0x180 [ 12.176576] ? krealloc_more_oob_helper+0x7eb/0x930 [ 12.176606] __asan_report_store1_noabort+0x1b/0x30 [ 12.176631] krealloc_more_oob_helper+0x7eb/0x930 [ 12.176654] ? __schedule+0x10cc/0x2b60 [ 12.176676] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 12.176702] ? finish_task_switch.isra.0+0x153/0x700 [ 12.176725] ? __switch_to+0x47/0xf50 [ 12.176750] ? __schedule+0x10cc/0x2b60 [ 12.176785] ? __pfx_read_tsc+0x10/0x10 [ 12.176809] krealloc_more_oob+0x1c/0x30 [ 12.176831] kunit_try_run_case+0x1a5/0x480 [ 12.176855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.176878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.176901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.176925] ? __kthread_parkme+0x82/0x180 [ 12.176946] ? preempt_count_sub+0x50/0x80 [ 12.176969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.177136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.177163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.177188] kthread+0x337/0x6f0 [ 12.177207] ? trace_preempt_on+0x20/0xc0 [ 12.177231] ? __pfx_kthread+0x10/0x10 [ 12.177251] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.177273] ? calculate_sigpending+0x7b/0xa0 [ 12.177297] ? __pfx_kthread+0x10/0x10 [ 12.177318] ret_from_fork+0x116/0x1d0 [ 12.177337] ? __pfx_kthread+0x10/0x10 [ 12.177357] ret_from_fork_asm+0x1a/0x30 [ 12.177387] </TASK> [ 12.177397] [ 12.189799] Allocated by task 173: [ 12.190212] kasan_save_stack+0x45/0x70 [ 12.190463] kasan_save_track+0x18/0x40 [ 12.190832] kasan_save_alloc_info+0x3b/0x50 [ 12.191207] __kasan_krealloc+0x190/0x1f0 [ 12.191403] krealloc_noprof+0xf3/0x340 [ 12.191734] krealloc_more_oob_helper+0x1a9/0x930 [ 12.191958] krealloc_more_oob+0x1c/0x30 [ 12.192389] kunit_try_run_case+0x1a5/0x480 [ 12.192690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.192934] kthread+0x337/0x6f0 [ 12.193231] ret_from_fork+0x116/0x1d0 [ 12.193738] ret_from_fork_asm+0x1a/0x30 [ 12.193961] [ 12.194160] The buggy address belongs to the object at ffff888100a32200 [ 12.194160] which belongs to the cache kmalloc-256 of size 256 [ 12.194900] The buggy address is located 5 bytes to the right of [ 12.194900] allocated 235-byte region [ffff888100a32200, ffff888100a322eb) [ 12.195766] [ 12.195866] The buggy address belongs to the physical page: [ 12.196303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a32 [ 12.196818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.197256] flags: 0x200000000000040(head|node=0|zone=2) [ 12.197748] page_type: f5(slab) [ 12.197918] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.198547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.199080] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.199405] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.200060] head: 0200000000000001 ffffea0004028c81 00000000ffffffff 00000000ffffffff [ 12.200390] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.201245] page dumped because: kasan: bad access detected [ 12.201825] [ 12.201922] Memory state around the buggy address: [ 12.202617] ffff888100a32180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.203168] ffff888100a32200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.203839] >ffff888100a32280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 12.204459] ^ [ 12.204917] ffff888100a32300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.205242] ffff888100a32380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.205884] ==================================================================