Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 24.388718] ================================================================== [ 24.395834] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.403382] Write of size 1 at addr ffff0008033820f0 by task kunit_try_catch/207 [ 24.410760] [ 24.412245] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.412301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.412316] Hardware name: WinLink E850-96 board (DT) [ 24.412337] Call trace: [ 24.412352] show_stack+0x20/0x38 (C) [ 24.412389] dump_stack_lvl+0x8c/0xd0 [ 24.412423] print_report+0x118/0x608 [ 24.412457] kasan_report+0xdc/0x128 [ 24.412492] __asan_report_store1_noabort+0x20/0x30 [ 24.412524] krealloc_more_oob_helper+0x5c0/0x678 [ 24.412556] krealloc_large_more_oob+0x20/0x38 [ 24.412588] kunit_try_run_case+0x170/0x3f0 [ 24.412624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.412658] kthread+0x328/0x630 [ 24.412686] ret_from_fork+0x10/0x20 [ 24.412720] [ 24.480118] The buggy address belongs to the physical page: [ 24.485676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883380 [ 24.493658] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.501299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.508242] page_type: f8(unknown) [ 24.511636] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.519359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.527085] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.534897] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.542710] head: 0bfffe0000000002 fffffdffe00ce001 00000000ffffffff 00000000ffffffff [ 24.550522] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.558327] page dumped because: kasan: bad access detected [ 24.563883] [ 24.565358] Memory state around the buggy address: [ 24.570139] ffff000803381f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.577341] ffff000803382000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.584546] >ffff000803382080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.591747] ^ [ 24.598608] ffff000803382100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.605813] ffff000803382180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.613014] ================================================================== [ 21.999689] ================================================================== [ 22.008891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.016440] Write of size 1 at addr ffff0008033508eb by task kunit_try_catch/203 [ 22.023818] [ 22.025304] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.025362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.025381] Hardware name: WinLink E850-96 board (DT) [ 22.025400] Call trace: [ 22.025415] show_stack+0x20/0x38 (C) [ 22.025452] dump_stack_lvl+0x8c/0xd0 [ 22.025487] print_report+0x118/0x608 [ 22.025525] kasan_report+0xdc/0x128 [ 22.025560] __asan_report_store1_noabort+0x20/0x30 [ 22.025594] krealloc_more_oob_helper+0x60c/0x678 [ 22.025628] krealloc_more_oob+0x20/0x38 [ 22.025657] kunit_try_run_case+0x170/0x3f0 [ 22.025695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.025733] kthread+0x328/0x630 [ 22.025761] ret_from_fork+0x10/0x20 [ 22.025798] [ 22.092654] Allocated by task 203: [ 22.096041] kasan_save_stack+0x3c/0x68 [ 22.099857] kasan_save_track+0x20/0x40 [ 22.103677] kasan_save_alloc_info+0x40/0x58 [ 22.107930] __kasan_krealloc+0x118/0x178 [ 22.111923] krealloc_noprof+0x128/0x360 [ 22.115829] krealloc_more_oob_helper+0x168/0x678 [ 22.120517] krealloc_more_oob+0x20/0x38 [ 22.124423] kunit_try_run_case+0x170/0x3f0 [ 22.128591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.134058] kthread+0x328/0x630 [ 22.137270] ret_from_fork+0x10/0x20 [ 22.140829] [ 22.142306] The buggy address belongs to the object at ffff000803350800 [ 22.142306] which belongs to the cache kmalloc-256 of size 256 [ 22.154807] The buggy address is located 0 bytes to the right of [ 22.154807] allocated 235-byte region [ffff000803350800, ffff0008033508eb) [ 22.167738] [ 22.169218] The buggy address belongs to the physical page: [ 22.174774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883350 [ 22.182757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.190396] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.197341] page_type: f5(slab) [ 22.200477] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.208196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.215924] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.223734] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.231546] head: 0bfffe0000000002 fffffdffe00cd401 00000000ffffffff 00000000ffffffff [ 22.239359] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.247165] page dumped because: kasan: bad access detected [ 22.252721] [ 22.254195] Memory state around the buggy address: [ 22.258976] ffff000803350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.266180] ffff000803350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.273382] >ffff000803350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.280584] ^ [ 22.287184] ffff000803350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.294389] ffff000803350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.301593] ================================================================== [ 24.155102] ================================================================== [ 24.164500] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.172050] Write of size 1 at addr ffff0008033820eb by task kunit_try_catch/207 [ 24.179427] [ 24.180911] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.180972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.180989] Hardware name: WinLink E850-96 board (DT) [ 24.181007] Call trace: [ 24.181021] show_stack+0x20/0x38 (C) [ 24.181055] dump_stack_lvl+0x8c/0xd0 [ 24.181091] print_report+0x118/0x608 [ 24.181128] kasan_report+0xdc/0x128 [ 24.181160] __asan_report_store1_noabort+0x20/0x30 [ 24.181194] krealloc_more_oob_helper+0x60c/0x678 [ 24.181232] krealloc_large_more_oob+0x20/0x38 [ 24.181264] kunit_try_run_case+0x170/0x3f0 [ 24.181299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181336] kthread+0x328/0x630 [ 24.181366] ret_from_fork+0x10/0x20 [ 24.181401] [ 24.248787] The buggy address belongs to the physical page: [ 24.254342] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883380 [ 24.262328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.269965] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.276909] page_type: f8(unknown) [ 24.280304] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.288026] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.295753] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.303564] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.311377] head: 0bfffe0000000002 fffffdffe00ce001 00000000ffffffff 00000000ffffffff [ 24.319189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.326994] page dumped because: kasan: bad access detected [ 24.332549] [ 24.334025] Memory state around the buggy address: [ 24.338809] ffff000803381f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.346008] ffff000803382000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.353213] >ffff000803382080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.360414] ^ [ 24.367014] ffff000803382100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.374219] ffff000803382180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.381422] ================================================================== [ 22.308913] ================================================================== [ 22.316004] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.323552] Write of size 1 at addr ffff0008033508f0 by task kunit_try_catch/203 [ 22.330930] [ 22.332415] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.332470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.332484] Hardware name: WinLink E850-96 board (DT) [ 22.332504] Call trace: [ 22.332518] show_stack+0x20/0x38 (C) [ 22.332552] dump_stack_lvl+0x8c/0xd0 [ 22.332587] print_report+0x118/0x608 [ 22.332623] kasan_report+0xdc/0x128 [ 22.332655] __asan_report_store1_noabort+0x20/0x30 [ 22.332689] krealloc_more_oob_helper+0x5c0/0x678 [ 22.332720] krealloc_more_oob+0x20/0x38 [ 22.332752] kunit_try_run_case+0x170/0x3f0 [ 22.332786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.332822] kthread+0x328/0x630 [ 22.332850] ret_from_fork+0x10/0x20 [ 22.332884] [ 22.399766] Allocated by task 203: [ 22.403153] kasan_save_stack+0x3c/0x68 [ 22.406971] kasan_save_track+0x20/0x40 [ 22.410790] kasan_save_alloc_info+0x40/0x58 [ 22.415043] __kasan_krealloc+0x118/0x178 [ 22.419036] krealloc_noprof+0x128/0x360 [ 22.422943] krealloc_more_oob_helper+0x168/0x678 [ 22.427630] krealloc_more_oob+0x20/0x38 [ 22.431536] kunit_try_run_case+0x170/0x3f0 [ 22.435704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.441172] kthread+0x328/0x630 [ 22.444383] ret_from_fork+0x10/0x20 [ 22.447942] [ 22.449419] The buggy address belongs to the object at ffff000803350800 [ 22.449419] which belongs to the cache kmalloc-256 of size 256 [ 22.461918] The buggy address is located 5 bytes to the right of [ 22.461918] allocated 235-byte region [ffff000803350800, ffff0008033508eb) [ 22.474852] [ 22.476329] The buggy address belongs to the physical page: [ 22.481888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883350 [ 22.489870] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.497509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.504452] page_type: f5(slab) [ 22.507588] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.515309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.523036] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.530847] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.538660] head: 0bfffe0000000002 fffffdffe00cd401 00000000ffffffff 00000000ffffffff [ 22.546472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.554278] page dumped because: kasan: bad access detected [ 22.559833] [ 22.561308] Memory state around the buggy address: [ 22.566087] ffff000803350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.573294] ffff000803350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.580496] >ffff000803350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.587697] ^ [ 22.594558] ffff000803350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.601763] ffff000803350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.608965] ==================================================================
[ 24.881699] ================================================================== [ 24.881928] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.882471] Write of size 1 at addr fff00000c178baf0 by task kunit_try_catch/156 [ 24.882878] [ 24.883161] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.883374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.883486] Hardware name: linux,dummy-virt (DT) [ 24.883565] Call trace: [ 24.883614] show_stack+0x20/0x38 (C) [ 24.883747] dump_stack_lvl+0x8c/0xd0 [ 24.883869] print_report+0x118/0x608 [ 24.884051] kasan_report+0xdc/0x128 [ 24.884189] __asan_report_store1_noabort+0x20/0x30 [ 24.884317] krealloc_more_oob_helper+0x5c0/0x678 [ 24.884500] krealloc_more_oob+0x20/0x38 [ 24.884632] kunit_try_run_case+0x170/0x3f0 [ 24.884797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.885265] kthread+0x328/0x630 [ 24.885756] ret_from_fork+0x10/0x20 [ 24.885876] [ 24.886406] Allocated by task 156: [ 24.886614] kasan_save_stack+0x3c/0x68 [ 24.887064] kasan_save_track+0x20/0x40 [ 24.887168] kasan_save_alloc_info+0x40/0x58 [ 24.887759] __kasan_krealloc+0x118/0x178 [ 24.887870] krealloc_noprof+0x128/0x360 [ 24.889227] krealloc_more_oob_helper+0x168/0x678 [ 24.889337] krealloc_more_oob+0x20/0x38 [ 24.889430] kunit_try_run_case+0x170/0x3f0 [ 24.889534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.889827] kthread+0x328/0x630 [ 24.890053] ret_from_fork+0x10/0x20 [ 24.890147] [ 24.890191] The buggy address belongs to the object at fff00000c178ba00 [ 24.890191] which belongs to the cache kmalloc-256 of size 256 [ 24.890328] The buggy address is located 5 bytes to the right of [ 24.890328] allocated 235-byte region [fff00000c178ba00, fff00000c178baeb) [ 24.890897] [ 24.890991] The buggy address belongs to the physical page: [ 24.891075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a [ 24.891376] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.891510] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.892325] page_type: f5(slab) [ 24.892465] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.892799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.893060] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.893188] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.893313] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff [ 24.893482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.893580] page dumped because: kasan: bad access detected [ 24.893689] [ 24.893797] Memory state around the buggy address: [ 24.893881] fff00000c178b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.894173] fff00000c178ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.894346] >fff00000c178ba80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.894436] ^ [ 24.894685] fff00000c178bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.894988] fff00000c178bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.895157] ================================================================== [ 25.020689] ================================================================== [ 25.020783] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 25.020925] Write of size 1 at addr fff00000c64be0f0 by task kunit_try_catch/160 [ 25.021066] [ 25.021288] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.021481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.021545] Hardware name: linux,dummy-virt (DT) [ 25.022050] Call trace: [ 25.022193] show_stack+0x20/0x38 (C) [ 25.022982] dump_stack_lvl+0x8c/0xd0 [ 25.023101] print_report+0x118/0x608 [ 25.023233] kasan_report+0xdc/0x128 [ 25.023348] __asan_report_store1_noabort+0x20/0x30 [ 25.023470] krealloc_more_oob_helper+0x5c0/0x678 [ 25.023588] krealloc_large_more_oob+0x20/0x38 [ 25.023704] kunit_try_run_case+0x170/0x3f0 [ 25.023821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.026270] kthread+0x328/0x630 [ 25.026412] ret_from_fork+0x10/0x20 [ 25.026544] [ 25.026636] The buggy address belongs to the physical page: [ 25.026720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064bc [ 25.026857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.026995] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.027990] page_type: f8(unknown) [ 25.028289] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.028549] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.028669] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.028785] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.028902] head: 0bfffe0000000002 ffffc1ffc3192f01 00000000ffffffff 00000000ffffffff [ 25.030167] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.031348] page dumped because: kasan: bad access detected [ 25.031540] [ 25.031613] Memory state around the buggy address: [ 25.031689] fff00000c64bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.031796] fff00000c64be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.032878] >fff00000c64be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 25.032988] ^ [ 25.033088] fff00000c64be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.033838] fff00000c64be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.034115] ================================================================== [ 24.867428] ================================================================== [ 24.867557] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.867671] Write of size 1 at addr fff00000c178baeb by task kunit_try_catch/156 [ 24.867784] [ 24.867849] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.868057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.868133] Hardware name: linux,dummy-virt (DT) [ 24.868218] Call trace: [ 24.868298] show_stack+0x20/0x38 (C) [ 24.868441] dump_stack_lvl+0x8c/0xd0 [ 24.868575] print_report+0x118/0x608 [ 24.868716] kasan_report+0xdc/0x128 [ 24.868884] __asan_report_store1_noabort+0x20/0x30 [ 24.869136] krealloc_more_oob_helper+0x60c/0x678 [ 24.870207] krealloc_more_oob+0x20/0x38 [ 24.870688] kunit_try_run_case+0x170/0x3f0 [ 24.870814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.873848] kthread+0x328/0x630 [ 24.874183] ret_from_fork+0x10/0x20 [ 24.874515] [ 24.874590] Allocated by task 156: [ 24.874663] kasan_save_stack+0x3c/0x68 [ 24.874818] kasan_save_track+0x20/0x40 [ 24.874948] kasan_save_alloc_info+0x40/0x58 [ 24.875200] __kasan_krealloc+0x118/0x178 [ 24.875311] krealloc_noprof+0x128/0x360 [ 24.875903] krealloc_more_oob_helper+0x168/0x678 [ 24.876029] krealloc_more_oob+0x20/0x38 [ 24.876134] kunit_try_run_case+0x170/0x3f0 [ 24.876332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.876459] kthread+0x328/0x630 [ 24.876582] ret_from_fork+0x10/0x20 [ 24.876679] [ 24.876733] The buggy address belongs to the object at fff00000c178ba00 [ 24.876733] which belongs to the cache kmalloc-256 of size 256 [ 24.877149] The buggy address is located 0 bytes to the right of [ 24.877149] allocated 235-byte region [fff00000c178ba00, fff00000c178baeb) [ 24.877232] [ 24.877258] The buggy address belongs to the physical page: [ 24.877298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a [ 24.877362] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.877420] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.877487] page_type: f5(slab) [ 24.877533] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.877595] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.877656] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.877714] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.877772] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff [ 24.877833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.877881] page dumped because: kasan: bad access detected [ 24.877918] [ 24.877972] Memory state around the buggy address: [ 24.878047] fff00000c178b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.878201] fff00000c178ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.878634] >fff00000c178ba80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.879178] ^ [ 24.879550] fff00000c178bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.879868] fff00000c178bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.880114] ================================================================== [ 25.013055] ================================================================== [ 25.013173] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 25.013330] Write of size 1 at addr fff00000c64be0eb by task kunit_try_catch/160 [ 25.013533] [ 25.013739] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.014159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.014354] Hardware name: linux,dummy-virt (DT) [ 25.014432] Call trace: [ 25.014484] show_stack+0x20/0x38 (C) [ 25.014605] dump_stack_lvl+0x8c/0xd0 [ 25.014734] print_report+0x118/0x608 [ 25.014894] kasan_report+0xdc/0x128 [ 25.015167] __asan_report_store1_noabort+0x20/0x30 [ 25.015318] krealloc_more_oob_helper+0x60c/0x678 [ 25.015458] krealloc_large_more_oob+0x20/0x38 [ 25.015599] kunit_try_run_case+0x170/0x3f0 [ 25.015746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.016056] kthread+0x328/0x630 [ 25.016224] ret_from_fork+0x10/0x20 [ 25.016444] [ 25.016602] The buggy address belongs to the physical page: [ 25.016709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064bc [ 25.016859] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.017039] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.017183] page_type: f8(unknown) [ 25.017304] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.017635] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.017958] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.018092] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.018230] head: 0bfffe0000000002 ffffc1ffc3192f01 00000000ffffffff 00000000ffffffff [ 25.018423] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.018541] page dumped because: kasan: bad access detected [ 25.018648] [ 25.018769] Memory state around the buggy address: [ 25.018959] fff00000c64bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.019067] fff00000c64be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.019235] >fff00000c64be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 25.019339] ^ [ 25.019444] fff00000c64be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.019562] fff00000c64be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.019722] ==================================================================
[ 25.249507] ================================================================== [ 25.249633] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 25.249756] Write of size 1 at addr fff00000c65020eb by task kunit_try_catch/160 [ 25.249900] [ 25.249981] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.250173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.250238] Hardware name: linux,dummy-virt (DT) [ 25.250313] Call trace: [ 25.250415] show_stack+0x20/0x38 (C) [ 25.250544] dump_stack_lvl+0x8c/0xd0 [ 25.250690] print_report+0x118/0x608 [ 25.251170] kasan_report+0xdc/0x128 [ 25.251665] __asan_report_store1_noabort+0x20/0x30 [ 25.251826] krealloc_more_oob_helper+0x60c/0x678 [ 25.251989] krealloc_large_more_oob+0x20/0x38 [ 25.252128] kunit_try_run_case+0x170/0x3f0 [ 25.252329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.252520] kthread+0x328/0x630 [ 25.252624] ret_from_fork+0x10/0x20 [ 25.253215] [ 25.253277] The buggy address belongs to the physical page: [ 25.253357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500 [ 25.253493] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.253614] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.253803] page_type: f8(unknown) [ 25.254205] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.254330] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.254450] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.255667] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.256150] head: 0bfffe0000000002 ffffc1ffc3194001 00000000ffffffff 00000000ffffffff [ 25.256273] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.256370] page dumped because: kasan: bad access detected [ 25.256442] [ 25.257016] Memory state around the buggy address: [ 25.257231] fff00000c6501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.257611] fff00000c6502000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.258042] >fff00000c6502080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 25.258205] ^ [ 25.258392] fff00000c6502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.258503] fff00000c6502180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.258863] ================================================================== [ 25.112160] ================================================================== [ 25.112253] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 25.112935] Write of size 1 at addr fff00000c17ed2f0 by task kunit_try_catch/156 [ 25.113070] [ 25.113252] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.113516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.114199] Hardware name: linux,dummy-virt (DT) [ 25.114381] Call trace: [ 25.114465] show_stack+0x20/0x38 (C) [ 25.114664] dump_stack_lvl+0x8c/0xd0 [ 25.114780] print_report+0x118/0x608 [ 25.114918] kasan_report+0xdc/0x128 [ 25.115086] __asan_report_store1_noabort+0x20/0x30 [ 25.115242] krealloc_more_oob_helper+0x5c0/0x678 [ 25.115362] krealloc_more_oob+0x20/0x38 [ 25.115478] kunit_try_run_case+0x170/0x3f0 [ 25.115595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.115722] kthread+0x328/0x630 [ 25.115865] ret_from_fork+0x10/0x20 [ 25.116006] [ 25.116059] Allocated by task 156: [ 25.116136] kasan_save_stack+0x3c/0x68 [ 25.116758] kasan_save_track+0x20/0x40 [ 25.117413] kasan_save_alloc_info+0x40/0x58 [ 25.117703] __kasan_krealloc+0x118/0x178 [ 25.118040] krealloc_noprof+0x128/0x360 [ 25.118231] krealloc_more_oob_helper+0x168/0x678 [ 25.118873] krealloc_more_oob+0x20/0x38 [ 25.118973] kunit_try_run_case+0x170/0x3f0 [ 25.119070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.119171] kthread+0x328/0x630 [ 25.119250] ret_from_fork+0x10/0x20 [ 25.119335] [ 25.119858] The buggy address belongs to the object at fff00000c17ed200 [ 25.119858] which belongs to the cache kmalloc-256 of size 256 [ 25.120175] The buggy address is located 5 bytes to the right of [ 25.120175] allocated 235-byte region [fff00000c17ed200, fff00000c17ed2eb) [ 25.120879] [ 25.120994] The buggy address belongs to the physical page: [ 25.121071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec [ 25.121554] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.122030] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.122389] page_type: f5(slab) [ 25.122587] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.122713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.122833] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.122969] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.123166] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff [ 25.123610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.123981] page dumped because: kasan: bad access detected [ 25.124311] [ 25.124447] Memory state around the buggy address: [ 25.124827] fff00000c17ed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.125064] fff00000c17ed200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.125184] >fff00000c17ed280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 25.125287] ^ [ 25.125769] fff00000c17ed300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.125902] fff00000c17ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.126218] ================================================================== [ 25.098483] ================================================================== [ 25.098616] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 25.098744] Write of size 1 at addr fff00000c17ed2eb by task kunit_try_catch/156 [ 25.099062] [ 25.099162] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.099640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.099722] Hardware name: linux,dummy-virt (DT) [ 25.099965] Call trace: [ 25.100031] show_stack+0x20/0x38 (C) [ 25.100225] dump_stack_lvl+0x8c/0xd0 [ 25.100354] print_report+0x118/0x608 [ 25.100525] kasan_report+0xdc/0x128 [ 25.100671] __asan_report_store1_noabort+0x20/0x30 [ 25.101007] krealloc_more_oob_helper+0x60c/0x678 [ 25.101243] krealloc_more_oob+0x20/0x38 [ 25.101419] kunit_try_run_case+0x170/0x3f0 [ 25.101622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.101857] kthread+0x328/0x630 [ 25.102173] ret_from_fork+0x10/0x20 [ 25.102493] [ 25.102755] Allocated by task 156: [ 25.103169] kasan_save_stack+0x3c/0x68 [ 25.103293] kasan_save_track+0x20/0x40 [ 25.103515] kasan_save_alloc_info+0x40/0x58 [ 25.103994] __kasan_krealloc+0x118/0x178 [ 25.104101] krealloc_noprof+0x128/0x360 [ 25.104212] krealloc_more_oob_helper+0x168/0x678 [ 25.104310] krealloc_more_oob+0x20/0x38 [ 25.104406] kunit_try_run_case+0x170/0x3f0 [ 25.104613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.104756] kthread+0x328/0x630 [ 25.105011] ret_from_fork+0x10/0x20 [ 25.105184] [ 25.105239] The buggy address belongs to the object at fff00000c17ed200 [ 25.105239] which belongs to the cache kmalloc-256 of size 256 [ 25.105946] The buggy address is located 0 bytes to the right of [ 25.105946] allocated 235-byte region [fff00000c17ed200, fff00000c17ed2eb) [ 25.106245] [ 25.106303] The buggy address belongs to the physical page: [ 25.106539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec [ 25.106720] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.106904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.107070] page_type: f5(slab) [ 25.107248] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.107466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.107628] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.107824] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.108353] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff [ 25.108560] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.108767] page dumped because: kasan: bad access detected [ 25.108859] [ 25.108967] Memory state around the buggy address: [ 25.109148] fff00000c17ed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.109398] fff00000c17ed200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.109861] >fff00000c17ed280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 25.110019] ^ [ 25.110129] fff00000c17ed300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.110245] fff00000c17ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.110516] ================================================================== [ 25.261051] ================================================================== [ 25.261142] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 25.261244] Write of size 1 at addr fff00000c65020f0 by task kunit_try_catch/160 [ 25.261360] [ 25.261424] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.261604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.261665] Hardware name: linux,dummy-virt (DT) [ 25.261734] Call trace: [ 25.261783] show_stack+0x20/0x38 (C) [ 25.264137] dump_stack_lvl+0x8c/0xd0 [ 25.264281] print_report+0x118/0x608 [ 25.264411] kasan_report+0xdc/0x128 [ 25.264538] __asan_report_store1_noabort+0x20/0x30 [ 25.264663] krealloc_more_oob_helper+0x5c0/0x678 [ 25.264826] krealloc_large_more_oob+0x20/0x38 [ 25.265033] kunit_try_run_case+0x170/0x3f0 [ 25.265355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.265828] kthread+0x328/0x630 [ 25.265973] ret_from_fork+0x10/0x20 [ 25.266103] [ 25.266151] The buggy address belongs to the physical page: [ 25.266659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500 [ 25.266962] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.267090] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.267273] page_type: f8(unknown) [ 25.267369] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.267485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.267631] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.267754] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.267907] head: 0bfffe0000000002 ffffc1ffc3194001 00000000ffffffff 00000000ffffffff [ 25.268027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.268179] page dumped because: kasan: bad access detected [ 25.268327] [ 25.268375] Memory state around the buggy address: [ 25.268577] fff00000c6501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.268700] fff00000c6502000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.268912] >fff00000c6502080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 25.269016] ^ [ 25.269165] fff00000c6502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.269716] fff00000c6502180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.269928] ==================================================================
[ 18.264034] ================================================================== [ 18.264988] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 18.265939] Write of size 1 at addr ffff88810261e0eb by task kunit_try_catch/178 [ 18.266462] [ 18.266857] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.266966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.266997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.267048] Call Trace: [ 18.267089] <TASK> [ 18.267132] dump_stack_lvl+0x73/0xb0 [ 18.267374] print_report+0xd1/0x650 [ 18.267457] ? __virt_addr_valid+0x1db/0x2d0 [ 18.267598] ? krealloc_more_oob_helper+0x821/0x930 [ 18.267681] ? kasan_addr_to_slab+0x11/0xa0 [ 18.267751] ? krealloc_more_oob_helper+0x821/0x930 [ 18.267828] kasan_report+0x141/0x180 [ 18.267900] ? krealloc_more_oob_helper+0x821/0x930 [ 18.267983] __asan_report_store1_noabort+0x1b/0x30 [ 18.268061] krealloc_more_oob_helper+0x821/0x930 [ 18.268128] ? __schedule+0x10cc/0x2b60 [ 18.268200] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 18.268404] ? finish_task_switch.isra.0+0x153/0x700 [ 18.268482] ? __switch_to+0x47/0xf50 [ 18.268627] ? __schedule+0x10cc/0x2b60 [ 18.268701] ? __pfx_read_tsc+0x10/0x10 [ 18.268778] krealloc_large_more_oob+0x1c/0x30 [ 18.268853] kunit_try_run_case+0x1a5/0x480 [ 18.268939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.269009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.269047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.269081] ? __kthread_parkme+0x82/0x180 [ 18.269111] ? preempt_count_sub+0x50/0x80 [ 18.269144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.269179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.269212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.269292] kthread+0x337/0x6f0 [ 18.269324] ? trace_preempt_on+0x20/0xc0 [ 18.269360] ? __pfx_kthread+0x10/0x10 [ 18.269388] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.269420] ? calculate_sigpending+0x7b/0xa0 [ 18.269456] ? __pfx_kthread+0x10/0x10 [ 18.269485] ret_from_fork+0x116/0x1d0 [ 18.269548] ? __pfx_kthread+0x10/0x10 [ 18.269680] ret_from_fork_asm+0x1a/0x30 [ 18.269762] </TASK> [ 18.269782] [ 18.292209] The buggy address belongs to the physical page: [ 18.293160] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c [ 18.294130] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.295079] flags: 0x200000000000040(head|node=0|zone=2) [ 18.295854] page_type: f8(unknown) [ 18.296341] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.297170] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.298123] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.299146] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.300495] head: 0200000000000002 ffffea0004098701 00000000ffffffff 00000000ffffffff [ 18.301349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.302173] page dumped because: kasan: bad access detected [ 18.303000] [ 18.303197] Memory state around the buggy address: [ 18.303994] ffff88810261df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.304742] ffff88810261e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.305449] >ffff88810261e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.306184] ^ [ 18.306944] ffff88810261e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.307833] ffff88810261e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.308487] ================================================================== [ 17.886165] ================================================================== [ 17.887007] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.887738] Write of size 1 at addr ffff8881003492f0 by task kunit_try_catch/174 [ 17.888437] [ 17.889019] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.889151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.889192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.889378] Call Trace: [ 17.889460] <TASK> [ 17.889534] dump_stack_lvl+0x73/0xb0 [ 17.889660] print_report+0xd1/0x650 [ 17.889735] ? __virt_addr_valid+0x1db/0x2d0 [ 17.889798] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.889858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.889919] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.889981] kasan_report+0x141/0x180 [ 17.890040] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.890110] __asan_report_store1_noabort+0x1b/0x30 [ 17.890188] krealloc_more_oob_helper+0x7eb/0x930 [ 17.890257] ? __schedule+0x10cc/0x2b60 [ 17.890328] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.890397] ? finish_task_switch.isra.0+0x153/0x700 [ 17.890466] ? __switch_to+0x47/0xf50 [ 17.890571] ? __schedule+0x10cc/0x2b60 [ 17.890643] ? __pfx_read_tsc+0x10/0x10 [ 17.890715] krealloc_more_oob+0x1c/0x30 [ 17.890806] kunit_try_run_case+0x1a5/0x480 [ 17.890911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.890983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.891054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.891126] ? __kthread_parkme+0x82/0x180 [ 17.891191] ? preempt_count_sub+0x50/0x80 [ 17.891285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.891362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.891434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.891476] kthread+0x337/0x6f0 [ 17.891541] ? trace_preempt_on+0x20/0xc0 [ 17.891627] ? __pfx_kthread+0x10/0x10 [ 17.891683] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.891745] ? calculate_sigpending+0x7b/0xa0 [ 17.891810] ? __pfx_kthread+0x10/0x10 [ 17.891869] ret_from_fork+0x116/0x1d0 [ 17.891926] ? __pfx_kthread+0x10/0x10 [ 17.891983] ret_from_fork_asm+0x1a/0x30 [ 17.892061] </TASK> [ 17.892092] [ 17.924274] Allocated by task 174: [ 17.924940] kasan_save_stack+0x45/0x70 [ 17.925923] kasan_save_track+0x18/0x40 [ 17.926761] kasan_save_alloc_info+0x3b/0x50 [ 17.927598] __kasan_krealloc+0x190/0x1f0 [ 17.928447] krealloc_noprof+0xf3/0x340 [ 17.928803] krealloc_more_oob_helper+0x1a9/0x930 [ 17.929755] krealloc_more_oob+0x1c/0x30 [ 17.930031] kunit_try_run_case+0x1a5/0x480 [ 17.930321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.931922] kthread+0x337/0x6f0 [ 17.932459] ret_from_fork+0x116/0x1d0 [ 17.933341] ret_from_fork_asm+0x1a/0x30 [ 17.933763] [ 17.934606] The buggy address belongs to the object at ffff888100349200 [ 17.934606] which belongs to the cache kmalloc-256 of size 256 [ 17.936046] The buggy address is located 5 bytes to the right of [ 17.936046] allocated 235-byte region [ffff888100349200, ffff8881003492eb) [ 17.938203] [ 17.938445] The buggy address belongs to the physical page: [ 17.938989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 17.939823] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.940394] flags: 0x200000000000040(head|node=0|zone=2) [ 17.941888] page_type: f5(slab) [ 17.942250] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.942912] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.943785] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.944514] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.946099] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 17.947366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.948196] page dumped because: kasan: bad access detected [ 17.948981] [ 17.949138] Memory state around the buggy address: [ 17.949653] ffff888100349180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.951015] ffff888100349200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.952318] >ffff888100349280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.953271] ^ [ 17.954637] ffff888100349300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.955429] ffff888100349380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.956190] ================================================================== [ 17.828348] ================================================================== [ 17.829351] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.830866] Write of size 1 at addr ffff8881003492eb by task kunit_try_catch/174 [ 17.832093] [ 17.832814] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.832960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.832998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.833044] Call Trace: [ 17.833068] <TASK> [ 17.833092] dump_stack_lvl+0x73/0xb0 [ 17.833147] print_report+0xd1/0x650 [ 17.833180] ? __virt_addr_valid+0x1db/0x2d0 [ 17.833213] ? krealloc_more_oob_helper+0x821/0x930 [ 17.833288] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.833321] ? krealloc_more_oob_helper+0x821/0x930 [ 17.833355] kasan_report+0x141/0x180 [ 17.833385] ? krealloc_more_oob_helper+0x821/0x930 [ 17.833424] __asan_report_store1_noabort+0x1b/0x30 [ 17.833460] krealloc_more_oob_helper+0x821/0x930 [ 17.833491] ? __schedule+0x10cc/0x2b60 [ 17.833612] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.833709] ? finish_task_switch.isra.0+0x153/0x700 [ 17.833745] ? __switch_to+0x47/0xf50 [ 17.833783] ? __schedule+0x10cc/0x2b60 [ 17.833813] ? __pfx_read_tsc+0x10/0x10 [ 17.833847] krealloc_more_oob+0x1c/0x30 [ 17.833879] kunit_try_run_case+0x1a5/0x480 [ 17.833918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.833953] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.833986] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.834018] ? __kthread_parkme+0x82/0x180 [ 17.834044] ? preempt_count_sub+0x50/0x80 [ 17.834074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.834107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.834140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.834173] kthread+0x337/0x6f0 [ 17.834199] ? trace_preempt_on+0x20/0xc0 [ 17.834243] ? __pfx_kthread+0x10/0x10 [ 17.834293] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.834325] ? calculate_sigpending+0x7b/0xa0 [ 17.834359] ? __pfx_kthread+0x10/0x10 [ 17.834389] ret_from_fork+0x116/0x1d0 [ 17.834415] ? __pfx_kthread+0x10/0x10 [ 17.834443] ret_from_fork_asm+0x1a/0x30 [ 17.834484] </TASK> [ 17.834524] [ 17.854157] Allocated by task 174: [ 17.854942] kasan_save_stack+0x45/0x70 [ 17.855705] kasan_save_track+0x18/0x40 [ 17.856041] kasan_save_alloc_info+0x3b/0x50 [ 17.856481] __kasan_krealloc+0x190/0x1f0 [ 17.857044] krealloc_noprof+0xf3/0x340 [ 17.858077] krealloc_more_oob_helper+0x1a9/0x930 [ 17.858915] krealloc_more_oob+0x1c/0x30 [ 17.859477] kunit_try_run_case+0x1a5/0x480 [ 17.860169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.861011] kthread+0x337/0x6f0 [ 17.861454] ret_from_fork+0x116/0x1d0 [ 17.862201] ret_from_fork_asm+0x1a/0x30 [ 17.862869] [ 17.863552] The buggy address belongs to the object at ffff888100349200 [ 17.863552] which belongs to the cache kmalloc-256 of size 256 [ 17.865236] The buggy address is located 0 bytes to the right of [ 17.865236] allocated 235-byte region [ffff888100349200, ffff8881003492eb) [ 17.866240] [ 17.866573] The buggy address belongs to the physical page: [ 17.867063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 17.867695] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.869321] flags: 0x200000000000040(head|node=0|zone=2) [ 17.869999] page_type: f5(slab) [ 17.870869] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.871430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.872293] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.873033] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.874370] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 17.875722] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.876295] page dumped because: kasan: bad access detected [ 17.876968] [ 17.877185] Memory state around the buggy address: [ 17.877786] ffff888100349180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.878773] ffff888100349200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.879225] >ffff888100349280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.880161] ^ [ 17.880650] ffff888100349300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.881919] ffff888100349380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.882841] ================================================================== [ 18.309924] ================================================================== [ 18.311387] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 18.312367] Write of size 1 at addr ffff88810261e0f0 by task kunit_try_catch/178 [ 18.314131] [ 18.314682] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.314802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.314836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.314894] Call Trace: [ 18.314938] <TASK> [ 18.314989] dump_stack_lvl+0x73/0xb0 [ 18.315059] print_report+0xd1/0x650 [ 18.315095] ? __virt_addr_valid+0x1db/0x2d0 [ 18.315129] ? krealloc_more_oob_helper+0x7eb/0x930 [ 18.315164] ? kasan_addr_to_slab+0x11/0xa0 [ 18.315193] ? krealloc_more_oob_helper+0x7eb/0x930 [ 18.315237] kasan_report+0x141/0x180 [ 18.315309] ? krealloc_more_oob_helper+0x7eb/0x930 [ 18.315353] __asan_report_store1_noabort+0x1b/0x30 [ 18.315390] krealloc_more_oob_helper+0x7eb/0x930 [ 18.315422] ? __schedule+0x10cc/0x2b60 [ 18.315457] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 18.315493] ? finish_task_switch.isra.0+0x153/0x700 [ 18.315591] ? __switch_to+0x47/0xf50 [ 18.315675] ? __schedule+0x10cc/0x2b60 [ 18.315735] ? __pfx_read_tsc+0x10/0x10 [ 18.315796] krealloc_large_more_oob+0x1c/0x30 [ 18.315832] kunit_try_run_case+0x1a5/0x480 [ 18.315873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.315908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.315941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.315974] ? __kthread_parkme+0x82/0x180 [ 18.316001] ? preempt_count_sub+0x50/0x80 [ 18.316031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.316067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.316099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.316133] kthread+0x337/0x6f0 [ 18.316159] ? trace_preempt_on+0x20/0xc0 [ 18.316191] ? __pfx_kthread+0x10/0x10 [ 18.316219] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.316278] ? calculate_sigpending+0x7b/0xa0 [ 18.316315] ? __pfx_kthread+0x10/0x10 [ 18.316345] ret_from_fork+0x116/0x1d0 [ 18.316370] ? __pfx_kthread+0x10/0x10 [ 18.316399] ret_from_fork_asm+0x1a/0x30 [ 18.316441] </TASK> [ 18.316455] [ 18.339336] The buggy address belongs to the physical page: [ 18.339889] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c [ 18.340905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.342031] flags: 0x200000000000040(head|node=0|zone=2) [ 18.343427] page_type: f8(unknown) [ 18.344147] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.345542] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.346484] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.347627] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.348734] head: 0200000000000002 ffffea0004098701 00000000ffffffff 00000000ffffffff [ 18.349702] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.351215] page dumped because: kasan: bad access detected [ 18.352014] [ 18.352384] Memory state around the buggy address: [ 18.352910] ffff88810261df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.354521] ffff88810261e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.355535] >ffff88810261e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.356438] ^ [ 18.357050] ffff88810261e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.357987] ffff88810261e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.358378] ==================================================================
[ 17.419048] ================================================================== [ 17.419509] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.420868] Write of size 1 at addr ffff888102a2e0f0 by task kunit_try_catch/178 [ 17.422161] [ 17.422749] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.422860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.422914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.422970] Call Trace: [ 17.423009] <TASK> [ 17.423048] dump_stack_lvl+0x73/0xb0 [ 17.423132] print_report+0xd1/0x650 [ 17.423210] ? __virt_addr_valid+0x1db/0x2d0 [ 17.423317] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.423400] ? kasan_addr_to_slab+0x11/0xa0 [ 17.423471] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.423549] kasan_report+0x141/0x180 [ 17.423630] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.423719] __asan_report_store1_noabort+0x1b/0x30 [ 17.423779] krealloc_more_oob_helper+0x7eb/0x930 [ 17.423814] ? __schedule+0x10cc/0x2b60 [ 17.423849] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.423909] ? finish_task_switch.isra.0+0x153/0x700 [ 17.423944] ? __switch_to+0x47/0xf50 [ 17.423978] ? __schedule+0x10cc/0x2b60 [ 17.424009] ? __pfx_read_tsc+0x10/0x10 [ 17.424041] krealloc_large_more_oob+0x1c/0x30 [ 17.424074] kunit_try_run_case+0x1a5/0x480 [ 17.424129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.424174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.424209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.424243] ? __kthread_parkme+0x82/0x180 [ 17.424271] ? preempt_count_sub+0x50/0x80 [ 17.424301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.424335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.424368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.424401] kthread+0x337/0x6f0 [ 17.424427] ? trace_preempt_on+0x20/0xc0 [ 17.424457] ? __pfx_kthread+0x10/0x10 [ 17.424485] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.424514] ? calculate_sigpending+0x7b/0xa0 [ 17.424547] ? __pfx_kthread+0x10/0x10 [ 17.424576] ret_from_fork+0x116/0x1d0 [ 17.424600] ? __pfx_kthread+0x10/0x10 [ 17.424628] ret_from_fork_asm+0x1a/0x30 [ 17.424667] </TASK> [ 17.424680] [ 17.445942] The buggy address belongs to the physical page: [ 17.446765] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 17.447645] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.448491] flags: 0x200000000000040(head|node=0|zone=2) [ 17.448909] page_type: f8(unknown) [ 17.449202] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.450271] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.450901] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.451618] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.452192] head: 0200000000000002 ffffea00040a8b01 00000000ffffffff 00000000ffffffff [ 17.453134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.454051] page dumped because: kasan: bad access detected [ 17.454850] [ 17.455058] Memory state around the buggy address: [ 17.455870] ffff888102a2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.456764] ffff888102a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.457592] >ffff888102a2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.458197] ^ [ 17.458912] ffff888102a2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.459532] ffff888102a2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.460124] ================================================================== [ 17.038400] ================================================================== [ 17.038946] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.039691] Write of size 1 at addr ffff888100aa6ef0 by task kunit_try_catch/174 [ 17.040433] [ 17.040806] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.040934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.040971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.041017] Call Trace: [ 17.041046] <TASK> [ 17.041084] dump_stack_lvl+0x73/0xb0 [ 17.041160] print_report+0xd1/0x650 [ 17.041224] ? __virt_addr_valid+0x1db/0x2d0 [ 17.041291] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.041367] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.041443] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.041521] kasan_report+0x141/0x180 [ 17.041620] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.041716] __asan_report_store1_noabort+0x1b/0x30 [ 17.041794] krealloc_more_oob_helper+0x7eb/0x930 [ 17.041865] ? __schedule+0x10cc/0x2b60 [ 17.041966] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.042046] ? finish_task_switch.isra.0+0x153/0x700 [ 17.042119] ? __switch_to+0x47/0xf50 [ 17.042205] ? __schedule+0x10cc/0x2b60 [ 17.042289] ? __pfx_read_tsc+0x10/0x10 [ 17.042368] krealloc_more_oob+0x1c/0x30 [ 17.042443] kunit_try_run_case+0x1a5/0x480 [ 17.042523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.042594] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.042665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.042721] ? __kthread_parkme+0x82/0x180 [ 17.042781] ? preempt_count_sub+0x50/0x80 [ 17.042853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.042953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.043033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.043113] kthread+0x337/0x6f0 [ 17.043184] ? trace_preempt_on+0x20/0xc0 [ 17.043263] ? __pfx_kthread+0x10/0x10 [ 17.043336] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.043410] ? calculate_sigpending+0x7b/0xa0 [ 17.043482] ? __pfx_kthread+0x10/0x10 [ 17.043556] ret_from_fork+0x116/0x1d0 [ 17.043621] ? __pfx_kthread+0x10/0x10 [ 17.043695] ret_from_fork_asm+0x1a/0x30 [ 17.043788] </TASK> [ 17.043825] [ 17.060647] Allocated by task 174: [ 17.061041] kasan_save_stack+0x45/0x70 [ 17.061508] kasan_save_track+0x18/0x40 [ 17.061873] kasan_save_alloc_info+0x3b/0x50 [ 17.062528] __kasan_krealloc+0x190/0x1f0 [ 17.062944] krealloc_noprof+0xf3/0x340 [ 17.063528] krealloc_more_oob_helper+0x1a9/0x930 [ 17.064076] krealloc_more_oob+0x1c/0x30 [ 17.064457] kunit_try_run_case+0x1a5/0x480 [ 17.064973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.065516] kthread+0x337/0x6f0 [ 17.065929] ret_from_fork+0x116/0x1d0 [ 17.066449] ret_from_fork_asm+0x1a/0x30 [ 17.066872] [ 17.067157] The buggy address belongs to the object at ffff888100aa6e00 [ 17.067157] which belongs to the cache kmalloc-256 of size 256 [ 17.068037] The buggy address is located 5 bytes to the right of [ 17.068037] allocated 235-byte region [ffff888100aa6e00, ffff888100aa6eeb) [ 17.069004] [ 17.069297] The buggy address belongs to the physical page: [ 17.069820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa6 [ 17.070547] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.071238] flags: 0x200000000000040(head|node=0|zone=2) [ 17.071804] page_type: f5(slab) [ 17.072320] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.072977] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.073652] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.074478] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.075135] head: 0200000000000001 ffffea000402a981 00000000ffffffff 00000000ffffffff [ 17.075829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.076473] page dumped because: kasan: bad access detected [ 17.076970] [ 17.077248] Memory state around the buggy address: [ 17.077734] ffff888100aa6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.078626] ffff888100aa6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.079157] >ffff888100aa6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.079775] ^ [ 17.080328] ffff888100aa6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.081034] ffff888100aa6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.081716] ================================================================== [ 16.992362] ================================================================== [ 16.993340] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 16.994091] Write of size 1 at addr ffff888100aa6eeb by task kunit_try_catch/174 [ 16.995039] [ 16.995642] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 16.995722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.995741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.995770] Call Trace: [ 16.995785] <TASK> [ 16.995803] dump_stack_lvl+0x73/0xb0 [ 16.995844] print_report+0xd1/0x650 [ 16.995894] ? __virt_addr_valid+0x1db/0x2d0 [ 16.995970] ? krealloc_more_oob_helper+0x821/0x930 [ 16.996046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.996226] ? krealloc_more_oob_helper+0x821/0x930 [ 16.996309] kasan_report+0x141/0x180 [ 16.996347] ? krealloc_more_oob_helper+0x821/0x930 [ 16.996433] __asan_report_store1_noabort+0x1b/0x30 [ 16.996475] krealloc_more_oob_helper+0x821/0x930 [ 16.996508] ? __schedule+0x10cc/0x2b60 [ 16.996542] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 16.996576] ? finish_task_switch.isra.0+0x153/0x700 [ 16.996605] ? __switch_to+0x47/0xf50 [ 16.996641] ? __schedule+0x10cc/0x2b60 [ 16.996670] ? __pfx_read_tsc+0x10/0x10 [ 16.996702] krealloc_more_oob+0x1c/0x30 [ 16.996732] kunit_try_run_case+0x1a5/0x480 [ 16.996766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.996798] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.996830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.996862] ? __kthread_parkme+0x82/0x180 [ 16.996914] ? preempt_count_sub+0x50/0x80 [ 16.996947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.996981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.997013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.997046] kthread+0x337/0x6f0 [ 16.997072] ? trace_preempt_on+0x20/0xc0 [ 16.997114] ? __pfx_kthread+0x10/0x10 [ 16.997174] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.997207] ? calculate_sigpending+0x7b/0xa0 [ 16.997241] ? __pfx_kthread+0x10/0x10 [ 16.997271] ret_from_fork+0x116/0x1d0 [ 16.997295] ? __pfx_kthread+0x10/0x10 [ 16.997323] ret_from_fork_asm+0x1a/0x30 [ 16.997364] </TASK> [ 16.997378] [ 17.013974] Allocated by task 174: [ 17.014472] kasan_save_stack+0x45/0x70 [ 17.014926] kasan_save_track+0x18/0x40 [ 17.015244] kasan_save_alloc_info+0x3b/0x50 [ 17.015726] __kasan_krealloc+0x190/0x1f0 [ 17.016346] krealloc_noprof+0xf3/0x340 [ 17.016775] krealloc_more_oob_helper+0x1a9/0x930 [ 17.017417] krealloc_more_oob+0x1c/0x30 [ 17.017916] kunit_try_run_case+0x1a5/0x480 [ 17.018452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.019114] kthread+0x337/0x6f0 [ 17.019480] ret_from_fork+0x116/0x1d0 [ 17.019953] ret_from_fork_asm+0x1a/0x30 [ 17.020555] [ 17.020822] The buggy address belongs to the object at ffff888100aa6e00 [ 17.020822] which belongs to the cache kmalloc-256 of size 256 [ 17.023331] The buggy address is located 0 bytes to the right of [ 17.023331] allocated 235-byte region [ffff888100aa6e00, ffff888100aa6eeb) [ 17.024631] [ 17.024917] The buggy address belongs to the physical page: [ 17.025989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa6 [ 17.026925] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.027545] flags: 0x200000000000040(head|node=0|zone=2) [ 17.028057] page_type: f5(slab) [ 17.028446] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.029049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.029624] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.030298] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.030928] head: 0200000000000001 ffffea000402a981 00000000ffffffff 00000000ffffffff [ 17.031833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.032423] page dumped because: kasan: bad access detected [ 17.032872] [ 17.033153] Memory state around the buggy address: [ 17.033557] ffff888100aa6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.034165] ffff888100aa6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.034748] >ffff888100aa6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.035273] ^ [ 17.035867] ffff888100aa6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.036440] ffff888100aa6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.037027] ================================================================== [ 17.379403] ================================================================== [ 17.380353] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.381031] Write of size 1 at addr ffff888102a2e0eb by task kunit_try_catch/178 [ 17.381632] [ 17.381900] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.382023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.382063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.382165] Call Trace: [ 17.382207] <TASK> [ 17.382267] dump_stack_lvl+0x73/0xb0 [ 17.382358] print_report+0xd1/0x650 [ 17.382437] ? __virt_addr_valid+0x1db/0x2d0 [ 17.382516] ? krealloc_more_oob_helper+0x821/0x930 [ 17.382595] ? kasan_addr_to_slab+0x11/0xa0 [ 17.382666] ? krealloc_more_oob_helper+0x821/0x930 [ 17.382746] kasan_report+0x141/0x180 [ 17.382823] ? krealloc_more_oob_helper+0x821/0x930 [ 17.382927] __asan_report_store1_noabort+0x1b/0x30 [ 17.383008] krealloc_more_oob_helper+0x821/0x930 [ 17.383079] ? __schedule+0x10cc/0x2b60 [ 17.383174] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.383214] ? finish_task_switch.isra.0+0x153/0x700 [ 17.383248] ? __switch_to+0x47/0xf50 [ 17.383284] ? __schedule+0x10cc/0x2b60 [ 17.383315] ? __pfx_read_tsc+0x10/0x10 [ 17.383350] krealloc_large_more_oob+0x1c/0x30 [ 17.383382] kunit_try_run_case+0x1a5/0x480 [ 17.383419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.383452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.383485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.383517] ? __kthread_parkme+0x82/0x180 [ 17.383544] ? preempt_count_sub+0x50/0x80 [ 17.383573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.383608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.383640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.383673] kthread+0x337/0x6f0 [ 17.383699] ? trace_preempt_on+0x20/0xc0 [ 17.383732] ? __pfx_kthread+0x10/0x10 [ 17.383759] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.383789] ? calculate_sigpending+0x7b/0xa0 [ 17.383823] ? __pfx_kthread+0x10/0x10 [ 17.383852] ret_from_fork+0x116/0x1d0 [ 17.383896] ? __pfx_kthread+0x10/0x10 [ 17.383933] ret_from_fork_asm+0x1a/0x30 [ 17.383977] </TASK> [ 17.383993] [ 17.404439] The buggy address belongs to the physical page: [ 17.404890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 17.405900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.406747] flags: 0x200000000000040(head|node=0|zone=2) [ 17.407589] page_type: f8(unknown) [ 17.408099] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.408930] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.409649] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.410515] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.411583] head: 0200000000000002 ffffea00040a8b01 00000000ffffffff 00000000ffffffff [ 17.412145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.412983] page dumped because: kasan: bad access detected [ 17.413449] [ 17.413679] Memory state around the buggy address: [ 17.414127] ffff888102a2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.415117] ffff888102a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.415932] >ffff888102a2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.416708] ^ [ 17.417529] ffff888102a2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.418236] ffff888102a2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.418486] ==================================================================
[ 20.213369] ================================================================== [ 20.214429] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 20.215171] Write of size 1 at addr ffff00000dafa0eb by task kunit_try_catch/213 [ 20.215883] [ 20.216062] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.216138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.216161] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.216187] Call trace: [ 20.216204] show_stack+0x20/0x38 (C) [ 20.216256] dump_stack_lvl+0x8c/0xd0 [ 20.216310] print_report+0x118/0x608 [ 20.216365] kasan_report+0xdc/0x128 [ 20.216417] __asan_report_store1_noabort+0x20/0x30 [ 20.216466] krealloc_more_oob_helper+0x60c/0x678 [ 20.216520] krealloc_large_more_oob+0x20/0x38 [ 20.216572] kunit_try_run_case+0x170/0x3f0 [ 20.216627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.216689] kthread+0x328/0x630 [ 20.216732] ret_from_fork+0x10/0x20 [ 20.216783] [ 20.222925] The buggy address belongs to the physical page: [ 20.223459] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8 [ 20.224211] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.224942] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.225621] page_type: f8(unknown) [ 20.225981] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.226726] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.227470] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.228223] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.228976] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff [ 20.229726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.230466] page dumped because: kasan: bad access detected [ 20.230999] [ 20.231166] Memory state around the buggy address: [ 20.231636] ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.232327] ffff00000dafa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.233019] >ffff00000dafa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.233704] ^ [ 20.234338] ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.235030] ffff00000dafa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.235714] ================================================================== [ 20.236734] ================================================================== [ 20.237431] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 20.238170] Write of size 1 at addr ffff00000dafa0f0 by task kunit_try_catch/213 [ 20.238855] [ 20.239017] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.239065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.239079] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.239095] Call trace: [ 20.239106] show_stack+0x20/0x38 (C) [ 20.239139] dump_stack_lvl+0x8c/0xd0 [ 20.239174] print_report+0x118/0x608 [ 20.239207] kasan_report+0xdc/0x128 [ 20.239238] __asan_report_store1_noabort+0x20/0x30 [ 20.239268] krealloc_more_oob_helper+0x5c0/0x678 [ 20.239300] krealloc_large_more_oob+0x20/0x38 [ 20.239330] kunit_try_run_case+0x170/0x3f0 [ 20.239364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.239401] kthread+0x328/0x630 [ 20.239427] ret_from_fork+0x10/0x20 [ 20.239459] [ 20.245484] The buggy address belongs to the physical page: [ 20.245999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8 [ 20.246722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.247426] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.248075] page_type: f8(unknown) [ 20.248410] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.249124] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.249837] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.250557] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.251279] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff [ 20.252001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.252715] page dumped because: kasan: bad access detected [ 20.253228] [ 20.253382] Memory state around the buggy address: [ 20.253829] ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.254494] ffff00000dafa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.255158] >ffff00000dafa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.255818] ^ [ 20.256451] ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.257115] ffff00000dafa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.257776] ================================================================== [ 20.005702] ================================================================== [ 20.006738] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 20.007456] Write of size 1 at addr ffff00000daa04eb by task kunit_try_catch/209 [ 20.008139] [ 20.008303] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.008352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.008366] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.008383] Call trace: [ 20.008395] show_stack+0x20/0x38 (C) [ 20.008429] dump_stack_lvl+0x8c/0xd0 [ 20.008465] print_report+0x118/0x608 [ 20.008498] kasan_report+0xdc/0x128 [ 20.008530] __asan_report_store1_noabort+0x20/0x30 [ 20.008560] krealloc_more_oob_helper+0x60c/0x678 [ 20.008592] krealloc_more_oob+0x20/0x38 [ 20.008621] kunit_try_run_case+0x170/0x3f0 [ 20.008654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.008691] kthread+0x328/0x630 [ 20.008717] ret_from_fork+0x10/0x20 [ 20.008749] [ 20.014727] Allocated by task 209: [ 20.015052] kasan_save_stack+0x3c/0x68 [ 20.015428] kasan_save_track+0x20/0x40 [ 20.015803] kasan_save_alloc_info+0x40/0x58 [ 20.016218] __kasan_krealloc+0x118/0x178 [ 20.016608] krealloc_noprof+0x128/0x360 [ 20.016992] krealloc_more_oob_helper+0x168/0x678 [ 20.017442] krealloc_more_oob+0x20/0x38 [ 20.017823] kunit_try_run_case+0x170/0x3f0 [ 20.018227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.018750] kthread+0x328/0x630 [ 20.019065] ret_from_fork+0x10/0x20 [ 20.019415] [ 20.019567] The buggy address belongs to the object at ffff00000daa0400 [ 20.019567] which belongs to the cache kmalloc-256 of size 256 [ 20.020697] The buggy address is located 0 bytes to the right of [ 20.020697] allocated 235-byte region [ffff00000daa0400, ffff00000daa04eb) [ 20.021870] [ 20.022023] The buggy address belongs to the physical page: [ 20.022537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaa0 [ 20.023259] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.023964] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.024613] page_type: f5(slab) [ 20.024926] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.025640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.026354] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.027075] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.027797] head: 03fffe0000000001 fffffdffc036a801 00000000ffffffff 00000000ffffffff [ 20.028519] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.029238] page dumped because: kasan: bad access detected [ 20.029775] [ 20.029942] Memory state around the buggy address: [ 20.030412] ffff00000daa0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.031103] ffff00000daa0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.031796] >ffff00000daa0480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.032480] ^ [ 20.033114] ffff00000daa0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.033806] ffff00000daa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.034491] ================================================================== [ 20.035439] ================================================================== [ 20.036133] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 20.036857] Write of size 1 at addr ffff00000daa04f0 by task kunit_try_catch/209 [ 20.037552] [ 20.037722] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.037780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.037797] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.037817] Call trace: [ 20.037830] show_stack+0x20/0x38 (C) [ 20.037869] dump_stack_lvl+0x8c/0xd0 [ 20.037911] print_report+0x118/0x608 [ 20.037950] kasan_report+0xdc/0x128 [ 20.037988] __asan_report_store1_noabort+0x20/0x30 [ 20.038025] krealloc_more_oob_helper+0x5c0/0x678 [ 20.038064] krealloc_more_oob+0x20/0x38 [ 20.038100] kunit_try_run_case+0x170/0x3f0 [ 20.038140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.038184] kthread+0x328/0x630 [ 20.038216] ret_from_fork+0x10/0x20 [ 20.038254] [ 20.044268] Allocated by task 209: [ 20.044598] kasan_save_stack+0x3c/0x68 [ 20.044984] kasan_save_track+0x20/0x40 [ 20.045368] kasan_save_alloc_info+0x40/0x58 [ 20.045795] __kasan_krealloc+0x118/0x178 [ 20.046195] krealloc_noprof+0x128/0x360 [ 20.046589] krealloc_more_oob_helper+0x168/0x678 [ 20.047049] krealloc_more_oob+0x20/0x38 [ 20.047438] kunit_try_run_case+0x170/0x3f0 [ 20.047854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.048386] kthread+0x328/0x630 [ 20.048712] ret_from_fork+0x10/0x20 [ 20.049071] [ 20.049228] The buggy address belongs to the object at ffff00000daa0400 [ 20.049228] which belongs to the cache kmalloc-256 of size 256 [ 20.050370] The buggy address is located 5 bytes to the right of [ 20.050370] allocated 235-byte region [ffff00000daa0400, ffff00000daa04eb) [ 20.051553] [ 20.051712] The buggy address belongs to the physical page: [ 20.052232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaa0 [ 20.052963] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.053677] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.054336] page_type: f5(slab) [ 20.054656] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.055380] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.056104] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.056836] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.057568] head: 03fffe0000000001 fffffdffc036a801 00000000ffffffff 00000000ffffffff [ 20.058300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.059022] page dumped because: kasan: bad access detected [ 20.059542] [ 20.059700] Memory state around the buggy address: [ 20.060154] ffff00000daa0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.060828] ffff00000daa0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.061501] >ffff00000daa0480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.062170] ^ [ 20.062810] ffff00000daa0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.063483] ffff00000daa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.064151] ==================================================================