Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.890676] ================================================================== [ 17.890740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.890797] Write of size 1 at addr fff00000c5d294c9 by task kunit_try_catch/158 [ 17.891678] [ 17.891715] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.891793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.891832] Hardware name: linux,dummy-virt (DT) [ 17.891863] Call trace: [ 17.891885] show_stack+0x20/0x38 (C) [ 17.891940] dump_stack_lvl+0x8c/0xd0 [ 17.891988] print_report+0x118/0x608 [ 17.892033] kasan_report+0xdc/0x128 [ 17.892078] __asan_report_store1_noabort+0x20/0x30 [ 17.892124] krealloc_less_oob_helper+0xa48/0xc50 [ 17.892171] krealloc_less_oob+0x20/0x38 [ 17.892214] kunit_try_run_case+0x170/0x3f0 [ 17.892260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.892310] kthread+0x328/0x630 [ 17.892352] ret_from_fork+0x10/0x20 [ 17.892399] [ 17.892417] Allocated by task 158: [ 17.892443] kasan_save_stack+0x3c/0x68 [ 17.892482] kasan_save_track+0x20/0x40 [ 17.892518] kasan_save_alloc_info+0x40/0x58 [ 17.892557] __kasan_krealloc+0x118/0x178 [ 17.892593] krealloc_noprof+0x128/0x360 [ 17.892629] krealloc_less_oob_helper+0x168/0xc50 [ 17.892666] krealloc_less_oob+0x20/0x38 [ 17.892701] kunit_try_run_case+0x170/0x3f0 [ 17.892737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.892778] kthread+0x328/0x630 [ 17.892818] ret_from_fork+0x10/0x20 [ 17.892853] [ 17.892871] The buggy address belongs to the object at fff00000c5d29400 [ 17.892871] which belongs to the cache kmalloc-256 of size 256 [ 17.892926] The buggy address is located 0 bytes to the right of [ 17.892926] allocated 201-byte region [fff00000c5d29400, fff00000c5d294c9) [ 17.892986] [ 17.893105] The buggy address belongs to the physical page: [ 17.893189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d28 [ 17.893406] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.893599] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.893664] page_type: f5(slab) [ 17.893767] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.894168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.894403] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.894456] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.894504] head: 0bfffe0000000001 ffffc1ffc3174a01 00000000ffffffff 00000000ffffffff [ 17.894723] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.894866] page dumped because: kasan: bad access detected [ 17.894904] [ 17.894922] Memory state around the buggy address: [ 17.894956] fff00000c5d29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.894997] fff00000c5d29400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.895038] >fff00000c5d29480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.895074] ^ [ 17.895109] fff00000c5d29500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.895149] fff00000c5d29580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.895185] ================================================================== [ 17.976567] ================================================================== [ 17.976700] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.976797] Write of size 1 at addr fff00000c76c20d0 by task kunit_try_catch/162 [ 17.976856] [ 17.976932] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.977051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.977150] Hardware name: linux,dummy-virt (DT) [ 17.977207] Call trace: [ 17.977230] show_stack+0x20/0x38 (C) [ 17.977415] dump_stack_lvl+0x8c/0xd0 [ 17.977483] print_report+0x118/0x608 [ 17.977666] kasan_report+0xdc/0x128 [ 17.977823] __asan_report_store1_noabort+0x20/0x30 [ 17.977876] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.977949] krealloc_large_less_oob+0x20/0x38 [ 17.978032] kunit_try_run_case+0x170/0x3f0 [ 17.978129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.978274] kthread+0x328/0x630 [ 17.978326] ret_from_fork+0x10/0x20 [ 17.978448] [ 17.978473] The buggy address belongs to the physical page: [ 17.978503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0 [ 17.978751] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.978861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.978968] page_type: f8(unknown) [ 17.979055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.979193] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.979365] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.979413] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.979669] head: 0bfffe0000000002 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff [ 17.979883] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.979930] page dumped because: kasan: bad access detected [ 17.980165] [ 17.980344] Memory state around the buggy address: [ 17.980407] fff00000c76c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.980501] fff00000c76c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.980544] >fff00000c76c2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.980581] ^ [ 17.980615] fff00000c76c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.980664] fff00000c76c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.980700] ================================================================== [ 17.987153] ================================================================== [ 17.987197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.987246] Write of size 1 at addr fff00000c76c20ea by task kunit_try_catch/162 [ 17.987294] [ 17.987322] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.987397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.987422] Hardware name: linux,dummy-virt (DT) [ 17.987452] Call trace: [ 17.987472] show_stack+0x20/0x38 (C) [ 17.987517] dump_stack_lvl+0x8c/0xd0 [ 17.987563] print_report+0x118/0x608 [ 17.987609] kasan_report+0xdc/0x128 [ 17.987653] __asan_report_store1_noabort+0x20/0x30 [ 17.987700] krealloc_less_oob_helper+0xae4/0xc50 [ 17.987747] krealloc_large_less_oob+0x20/0x38 [ 17.987792] kunit_try_run_case+0x170/0x3f0 [ 17.987849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.988025] kthread+0x328/0x630 [ 17.988081] ret_from_fork+0x10/0x20 [ 17.988209] [ 17.988428] The buggy address belongs to the physical page: [ 17.988473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0 [ 17.988525] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.988571] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.988742] page_type: f8(unknown) [ 17.988855] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.988954] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.989006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.989052] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.989098] head: 0bfffe0000000002 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff [ 17.989329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.989796] page dumped because: kasan: bad access detected [ 17.989927] [ 17.989952] Memory state around the buggy address: [ 17.989984] fff00000c76c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.990589] fff00000c76c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.990748] >fff00000c76c2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.990840] ^ [ 17.990888] fff00000c76c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.991021] fff00000c76c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.991062] ================================================================== [ 17.969568] ================================================================== [ 17.969640] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.969700] Write of size 1 at addr fff00000c76c20c9 by task kunit_try_catch/162 [ 17.969880] [ 17.969939] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.970030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.970057] Hardware name: linux,dummy-virt (DT) [ 17.970089] Call trace: [ 17.970112] show_stack+0x20/0x38 (C) [ 17.970164] dump_stack_lvl+0x8c/0xd0 [ 17.970213] print_report+0x118/0x608 [ 17.970259] kasan_report+0xdc/0x128 [ 17.970326] __asan_report_store1_noabort+0x20/0x30 [ 17.970382] krealloc_less_oob_helper+0xa48/0xc50 [ 17.970438] krealloc_large_less_oob+0x20/0x38 [ 17.970485] kunit_try_run_case+0x170/0x3f0 [ 17.970533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.970584] kthread+0x328/0x630 [ 17.970626] ret_from_fork+0x10/0x20 [ 17.970674] [ 17.970696] The buggy address belongs to the physical page: [ 17.970728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0 [ 17.970789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.970892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.971317] page_type: f8(unknown) [ 17.971371] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.971489] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.971538] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.971609] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.971736] head: 0bfffe0000000002 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff [ 17.971891] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.972015] page dumped because: kasan: bad access detected [ 17.972187] [ 17.972382] Memory state around the buggy address: [ 17.972491] fff00000c76c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.972714] fff00000c76c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.972922] >fff00000c76c2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.973098] ^ [ 17.973264] fff00000c76c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.973339] fff00000c76c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.973478] ================================================================== [ 17.912250] ================================================================== [ 17.912642] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.912707] Write of size 1 at addr fff00000c5d294ea by task kunit_try_catch/158 [ 17.912852] [ 17.912920] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.913011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.913037] Hardware name: linux,dummy-virt (DT) [ 17.913114] Call trace: [ 17.913175] show_stack+0x20/0x38 (C) [ 17.913226] dump_stack_lvl+0x8c/0xd0 [ 17.913273] print_report+0x118/0x608 [ 17.913563] kasan_report+0xdc/0x128 [ 17.913619] __asan_report_store1_noabort+0x20/0x30 [ 17.913672] krealloc_less_oob_helper+0xae4/0xc50 [ 17.913918] krealloc_less_oob+0x20/0x38 [ 17.914001] kunit_try_run_case+0x170/0x3f0 [ 17.914101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.914212] kthread+0x328/0x630 [ 17.914263] ret_from_fork+0x10/0x20 [ 17.914309] [ 17.914327] Allocated by task 158: [ 17.914354] kasan_save_stack+0x3c/0x68 [ 17.914393] kasan_save_track+0x20/0x40 [ 17.914429] kasan_save_alloc_info+0x40/0x58 [ 17.914501] __kasan_krealloc+0x118/0x178 [ 17.914541] krealloc_noprof+0x128/0x360 [ 17.914579] krealloc_less_oob_helper+0x168/0xc50 [ 17.914616] krealloc_less_oob+0x20/0x38 [ 17.914661] kunit_try_run_case+0x170/0x3f0 [ 17.914698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.914739] kthread+0x328/0x630 [ 17.914770] ret_from_fork+0x10/0x20 [ 17.914815] [ 17.914834] The buggy address belongs to the object at fff00000c5d29400 [ 17.914834] which belongs to the cache kmalloc-256 of size 256 [ 17.914888] The buggy address is located 33 bytes to the right of [ 17.914888] allocated 201-byte region [fff00000c5d29400, fff00000c5d294c9) [ 17.914949] [ 17.914967] The buggy address belongs to the physical page: [ 17.914998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d28 [ 17.915049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.915094] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.915144] page_type: f5(slab) [ 17.915180] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.915227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.915274] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.915833] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.915912] head: 0bfffe0000000001 ffffc1ffc3174a01 00000000ffffffff 00000000ffffffff [ 17.916053] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.916401] page dumped because: kasan: bad access detected [ 17.916432] [ 17.916450] Memory state around the buggy address: [ 17.916482] fff00000c5d29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.916525] fff00000c5d29400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.916566] >fff00000c5d29480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.916602] ^ [ 17.917518] fff00000c5d29500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.917567] fff00000c5d29580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.917604] ================================================================== [ 17.981148] ================================================================== [ 17.981193] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.981240] Write of size 1 at addr fff00000c76c20da by task kunit_try_catch/162 [ 17.981297] [ 17.981341] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.981419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.981445] Hardware name: linux,dummy-virt (DT) [ 17.981474] Call trace: [ 17.981495] show_stack+0x20/0x38 (C) [ 17.981551] dump_stack_lvl+0x8c/0xd0 [ 17.981607] print_report+0x118/0x608 [ 17.981653] kasan_report+0xdc/0x128 [ 17.981697] __asan_report_store1_noabort+0x20/0x30 [ 17.981742] krealloc_less_oob_helper+0xa80/0xc50 [ 17.981788] krealloc_large_less_oob+0x20/0x38 [ 17.982338] kunit_try_run_case+0x170/0x3f0 [ 17.982406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.982515] kthread+0x328/0x630 [ 17.982706] ret_from_fork+0x10/0x20 [ 17.982760] [ 17.982779] The buggy address belongs to the physical page: [ 17.983347] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0 [ 17.983489] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.983648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.983812] page_type: f8(unknown) [ 17.983985] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.984164] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.984372] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.984498] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.984747] head: 0bfffe0000000002 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff [ 17.984934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.985051] page dumped because: kasan: bad access detected [ 17.985081] [ 17.985098] Memory state around the buggy address: [ 17.985392] fff00000c76c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.985527] fff00000c76c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.985673] >fff00000c76c2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.985836] ^ [ 17.986035] fff00000c76c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.986119] fff00000c76c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.986161] ================================================================== [ 17.918708] ================================================================== [ 17.918757] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.918816] Write of size 1 at addr fff00000c5d294eb by task kunit_try_catch/158 [ 17.918863] [ 17.918988] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.919146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.919176] Hardware name: linux,dummy-virt (DT) [ 17.919244] Call trace: [ 17.919311] show_stack+0x20/0x38 (C) [ 17.919547] dump_stack_lvl+0x8c/0xd0 [ 17.919597] print_report+0x118/0x608 [ 17.919643] kasan_report+0xdc/0x128 [ 17.919687] __asan_report_store1_noabort+0x20/0x30 [ 17.920263] krealloc_less_oob_helper+0xa58/0xc50 [ 17.920659] krealloc_less_oob+0x20/0x38 [ 17.920731] kunit_try_run_case+0x170/0x3f0 [ 17.920777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.921338] kthread+0x328/0x630 [ 17.921594] ret_from_fork+0x10/0x20 [ 17.921895] [ 17.921918] Allocated by task 158: [ 17.922001] kasan_save_stack+0x3c/0x68 [ 17.922194] kasan_save_track+0x20/0x40 [ 17.922239] kasan_save_alloc_info+0x40/0x58 [ 17.922770] __kasan_krealloc+0x118/0x178 [ 17.922861] krealloc_noprof+0x128/0x360 [ 17.923188] krealloc_less_oob_helper+0x168/0xc50 [ 17.923435] krealloc_less_oob+0x20/0x38 [ 17.923474] kunit_try_run_case+0x170/0x3f0 [ 17.923510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.923552] kthread+0x328/0x630 [ 17.923583] ret_from_fork+0x10/0x20 [ 17.924028] [ 17.924051] The buggy address belongs to the object at fff00000c5d29400 [ 17.924051] which belongs to the cache kmalloc-256 of size 256 [ 17.924248] The buggy address is located 34 bytes to the right of [ 17.924248] allocated 201-byte region [fff00000c5d29400, fff00000c5d294c9) [ 17.924448] [ 17.924661] The buggy address belongs to the physical page: [ 17.924799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d28 [ 17.924864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.924909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.924960] page_type: f5(slab) [ 17.924998] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.925297] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.925955] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.926008] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.926333] head: 0bfffe0000000001 ffffc1ffc3174a01 00000000ffffffff 00000000ffffffff [ 17.926384] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.926659] page dumped because: kasan: bad access detected [ 17.926691] [ 17.926713] Memory state around the buggy address: [ 17.926745] fff00000c5d29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.926788] fff00000c5d29400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.927306] >fff00000c5d29480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.927389] ^ [ 17.927828] fff00000c5d29500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927876] fff00000c5d29580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927916] ================================================================== [ 17.904910] ================================================================== [ 17.904966] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.905159] Write of size 1 at addr fff00000c5d294da by task kunit_try_catch/158 [ 17.905210] [ 17.905307] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.905408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.905441] Hardware name: linux,dummy-virt (DT) [ 17.905575] Call trace: [ 17.905606] show_stack+0x20/0x38 (C) [ 17.905682] dump_stack_lvl+0x8c/0xd0 [ 17.905886] print_report+0x118/0x608 [ 17.906123] kasan_report+0xdc/0x128 [ 17.906238] __asan_report_store1_noabort+0x20/0x30 [ 17.906289] krealloc_less_oob_helper+0xa80/0xc50 [ 17.906336] krealloc_less_oob+0x20/0x38 [ 17.906379] kunit_try_run_case+0x170/0x3f0 [ 17.906425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.906505] kthread+0x328/0x630 [ 17.906552] ret_from_fork+0x10/0x20 [ 17.906598] [ 17.906616] Allocated by task 158: [ 17.906654] kasan_save_stack+0x3c/0x68 [ 17.906694] kasan_save_track+0x20/0x40 [ 17.906731] kasan_save_alloc_info+0x40/0x58 [ 17.906769] __kasan_krealloc+0x118/0x178 [ 17.906824] krealloc_noprof+0x128/0x360 [ 17.906862] krealloc_less_oob_helper+0x168/0xc50 [ 17.906910] krealloc_less_oob+0x20/0x38 [ 17.907131] kunit_try_run_case+0x170/0x3f0 [ 17.907226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.907271] kthread+0x328/0x630 [ 17.907401] ret_from_fork+0x10/0x20 [ 17.907576] [ 17.907674] The buggy address belongs to the object at fff00000c5d29400 [ 17.907674] which belongs to the cache kmalloc-256 of size 256 [ 17.907842] The buggy address is located 17 bytes to the right of [ 17.907842] allocated 201-byte region [fff00000c5d29400, fff00000c5d294c9) [ 17.908214] [ 17.908264] The buggy address belongs to the physical page: [ 17.908424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d28 [ 17.908589] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.908655] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.908732] page_type: f5(slab) [ 17.909082] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.909183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.909440] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.909621] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.909748] head: 0bfffe0000000001 ffffc1ffc3174a01 00000000ffffffff 00000000ffffffff [ 17.909826] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.910127] page dumped because: kasan: bad access detected [ 17.910171] [ 17.910430] Memory state around the buggy address: [ 17.910630] fff00000c5d29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.910734] fff00000c5d29400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.910812] >fff00000c5d29480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.910894] ^ [ 17.911016] fff00000c5d29500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911076] fff00000c5d29580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911112] ================================================================== [ 17.896580] ================================================================== [ 17.896635] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.896689] Write of size 1 at addr fff00000c5d294d0 by task kunit_try_catch/158 [ 17.896737] [ 17.896767] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.896857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.896972] Hardware name: linux,dummy-virt (DT) [ 17.897006] Call trace: [ 17.897107] show_stack+0x20/0x38 (C) [ 17.897343] dump_stack_lvl+0x8c/0xd0 [ 17.897446] print_report+0x118/0x608 [ 17.897503] kasan_report+0xdc/0x128 [ 17.897567] __asan_report_store1_noabort+0x20/0x30 [ 17.897621] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.897669] krealloc_less_oob+0x20/0x38 [ 17.897714] kunit_try_run_case+0x170/0x3f0 [ 17.897762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.897822] kthread+0x328/0x630 [ 17.898091] ret_from_fork+0x10/0x20 [ 17.898468] [ 17.898509] Allocated by task 158: [ 17.898653] kasan_save_stack+0x3c/0x68 [ 17.898773] kasan_save_track+0x20/0x40 [ 17.898826] kasan_save_alloc_info+0x40/0x58 [ 17.898902] __kasan_krealloc+0x118/0x178 [ 17.899333] krealloc_noprof+0x128/0x360 [ 17.899391] krealloc_less_oob_helper+0x168/0xc50 [ 17.899439] krealloc_less_oob+0x20/0x38 [ 17.899474] kunit_try_run_case+0x170/0x3f0 [ 17.899829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.899985] kthread+0x328/0x630 [ 17.900151] ret_from_fork+0x10/0x20 [ 17.900270] [ 17.900402] The buggy address belongs to the object at fff00000c5d29400 [ 17.900402] which belongs to the cache kmalloc-256 of size 256 [ 17.900624] The buggy address is located 7 bytes to the right of [ 17.900624] allocated 201-byte region [fff00000c5d29400, fff00000c5d294c9) [ 17.900746] [ 17.900768] The buggy address belongs to the physical page: [ 17.900813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d28 [ 17.901048] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.901113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.901287] page_type: f5(slab) [ 17.901434] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.901548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.901857] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.902002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.902205] head: 0bfffe0000000001 ffffc1ffc3174a01 00000000ffffffff 00000000ffffffff [ 17.902274] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.902607] page dumped because: kasan: bad access detected [ 17.902685] [ 17.902768] Memory state around the buggy address: [ 17.902844] fff00000c5d29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.902887] fff00000c5d29400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.903134] >fff00000c5d29480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.903184] ^ [ 17.903261] fff00000c5d29500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.903351] fff00000c5d29580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.903504] ================================================================== [ 17.992121] ================================================================== [ 17.992173] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.992226] Write of size 1 at addr fff00000c76c20eb by task kunit_try_catch/162 [ 17.992330] [ 17.992364] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.992475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.992542] Hardware name: linux,dummy-virt (DT) [ 17.992589] Call trace: [ 17.992660] show_stack+0x20/0x38 (C) [ 17.993010] dump_stack_lvl+0x8c/0xd0 [ 17.993083] print_report+0x118/0x608 [ 17.993256] kasan_report+0xdc/0x128 [ 17.993355] __asan_report_store1_noabort+0x20/0x30 [ 17.993742] krealloc_less_oob_helper+0xa58/0xc50 [ 17.993877] krealloc_large_less_oob+0x20/0x38 [ 17.993930] kunit_try_run_case+0x170/0x3f0 [ 17.994375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.994489] kthread+0x328/0x630 [ 17.994618] ret_from_fork+0x10/0x20 [ 17.994672] [ 17.994720] The buggy address belongs to the physical page: [ 17.994753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0 [ 17.994835] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.994891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.995175] page_type: f8(unknown) [ 17.995500] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.995595] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.995731] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.995797] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.996106] head: 0bfffe0000000002 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff [ 17.996276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.996335] page dumped because: kasan: bad access detected [ 17.996365] [ 17.996544] Memory state around the buggy address: [ 17.996790] fff00000c76c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.996947] fff00000c76c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.997300] >fff00000c76c2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.997415] ^ [ 17.997576] fff00000c76c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.997661] fff00000c76c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.997853] ==================================================================
[ 11.604552] ================================================================== [ 11.604976] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.605365] Write of size 1 at addr ffff8881003514eb by task kunit_try_catch/175 [ 11.605657] [ 11.605776] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.605824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.605835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.605855] Call Trace: [ 11.605877] <TASK> [ 11.605897] dump_stack_lvl+0x73/0xb0 [ 11.605927] print_report+0xd1/0x650 [ 11.605949] ? __virt_addr_valid+0x1db/0x2d0 [ 11.605971] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.605993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.606013] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.606035] kasan_report+0x141/0x180 [ 11.606056] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.606083] __asan_report_store1_noabort+0x1b/0x30 [ 11.606102] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.606126] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.606149] ? finish_task_switch.isra.0+0x153/0x700 [ 11.606171] ? __switch_to+0x47/0xf50 [ 11.606195] ? __schedule+0x10cc/0x2b60 [ 11.606215] ? __pfx_read_tsc+0x10/0x10 [ 11.606251] krealloc_less_oob+0x1c/0x30 [ 11.606271] kunit_try_run_case+0x1a5/0x480 [ 11.606295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.606315] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.606338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.606360] ? __kthread_parkme+0x82/0x180 [ 11.606382] ? preempt_count_sub+0x50/0x80 [ 11.606403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.606425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.606445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.606466] kthread+0x337/0x6f0 [ 11.606484] ? trace_preempt_on+0x20/0xc0 [ 11.606507] ? __pfx_kthread+0x10/0x10 [ 11.606526] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.606545] ? calculate_sigpending+0x7b/0xa0 [ 11.606567] ? __pfx_kthread+0x10/0x10 [ 11.606587] ret_from_fork+0x116/0x1d0 [ 11.606604] ? __pfx_kthread+0x10/0x10 [ 11.606623] ret_from_fork_asm+0x1a/0x30 [ 11.606652] </TASK> [ 11.606662] [ 11.614781] Allocated by task 175: [ 11.615009] kasan_save_stack+0x45/0x70 [ 11.615299] kasan_save_track+0x18/0x40 [ 11.615464] kasan_save_alloc_info+0x3b/0x50 [ 11.615616] __kasan_krealloc+0x190/0x1f0 [ 11.615770] krealloc_noprof+0xf3/0x340 [ 11.615971] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.616270] krealloc_less_oob+0x1c/0x30 [ 11.616474] kunit_try_run_case+0x1a5/0x480 [ 11.616685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.616911] kthread+0x337/0x6f0 [ 11.617043] ret_from_fork+0x116/0x1d0 [ 11.617174] ret_from_fork_asm+0x1a/0x30 [ 11.617327] [ 11.617401] The buggy address belongs to the object at ffff888100351400 [ 11.617401] which belongs to the cache kmalloc-256 of size 256 [ 11.617757] The buggy address is located 34 bytes to the right of [ 11.617757] allocated 201-byte region [ffff888100351400, ffff8881003514c9) [ 11.619199] [ 11.619450] The buggy address belongs to the physical page: [ 11.619724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.620083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.620425] flags: 0x200000000000040(head|node=0|zone=2) [ 11.620682] page_type: f5(slab) [ 11.620861] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.621174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.621580] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.621995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.622804] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.623286] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.624337] page dumped because: kasan: bad access detected [ 11.624987] [ 11.625150] Memory state around the buggy address: [ 11.625327] ffff888100351380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.625544] ffff888100351400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.625757] >ffff888100351480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.626016] ^ [ 11.626302] ffff888100351500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.626575] ffff888100351580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.626859] ================================================================== [ 11.719455] ================================================================== [ 11.719848] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.720296] Write of size 1 at addr ffff888102a460da by task kunit_try_catch/179 [ 11.720558] [ 11.720710] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.720814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.720836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.720857] Call Trace: [ 11.720879] <TASK> [ 11.720900] dump_stack_lvl+0x73/0xb0 [ 11.720935] print_report+0xd1/0x650 [ 11.720960] ? __virt_addr_valid+0x1db/0x2d0 [ 11.720984] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.721008] ? kasan_addr_to_slab+0x11/0xa0 [ 11.721029] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.721053] kasan_report+0x141/0x180 [ 11.721076] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.721104] __asan_report_store1_noabort+0x1b/0x30 [ 11.721125] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.721151] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.721175] ? finish_task_switch.isra.0+0x153/0x700 [ 11.721198] ? __switch_to+0x47/0xf50 [ 11.721304] ? __schedule+0x10cc/0x2b60 [ 11.721329] ? __pfx_read_tsc+0x10/0x10 [ 11.721438] krealloc_large_less_oob+0x1c/0x30 [ 11.721463] kunit_try_run_case+0x1a5/0x480 [ 11.721488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.721523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.721548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.721571] ? __kthread_parkme+0x82/0x180 [ 11.721605] ? preempt_count_sub+0x50/0x80 [ 11.721628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.721652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.721689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.721712] kthread+0x337/0x6f0 [ 11.721734] ? trace_preempt_on+0x20/0xc0 [ 11.721770] ? __pfx_kthread+0x10/0x10 [ 11.721791] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.721812] ? calculate_sigpending+0x7b/0xa0 [ 11.721874] ? __pfx_kthread+0x10/0x10 [ 11.721907] ret_from_fork+0x116/0x1d0 [ 11.721926] ? __pfx_kthread+0x10/0x10 [ 11.721947] ret_from_fork_asm+0x1a/0x30 [ 11.721979] </TASK> [ 11.721991] [ 11.729926] The buggy address belongs to the physical page: [ 11.730243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44 [ 11.730611] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.730839] flags: 0x200000000000040(head|node=0|zone=2) [ 11.731160] page_type: f8(unknown) [ 11.731516] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.731760] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.732001] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.732248] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.732648] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff [ 11.733018] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.733541] page dumped because: kasan: bad access detected [ 11.733795] [ 11.733867] Memory state around the buggy address: [ 11.734026] ffff888102a45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.734254] ffff888102a46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.734470] >ffff888102a46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.734904] ^ [ 11.735184] ffff888102a46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.735512] ffff888102a46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.735827] ================================================================== [ 11.560688] ================================================================== [ 11.561015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.561812] Write of size 1 at addr ffff8881003514da by task kunit_try_catch/175 [ 11.562162] [ 11.562448] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.562499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.562511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.562532] Call Trace: [ 11.562554] <TASK> [ 11.562573] dump_stack_lvl+0x73/0xb0 [ 11.562608] print_report+0xd1/0x650 [ 11.562631] ? __virt_addr_valid+0x1db/0x2d0 [ 11.562653] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.562676] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.562697] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.562719] kasan_report+0x141/0x180 [ 11.562739] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.562766] __asan_report_store1_noabort+0x1b/0x30 [ 11.562785] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.562808] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.562831] ? finish_task_switch.isra.0+0x153/0x700 [ 11.562852] ? __switch_to+0x47/0xf50 [ 11.562876] ? __schedule+0x10cc/0x2b60 [ 11.562897] ? __pfx_read_tsc+0x10/0x10 [ 11.562919] krealloc_less_oob+0x1c/0x30 [ 11.562939] kunit_try_run_case+0x1a5/0x480 [ 11.562963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.562983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.563006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.563027] ? __kthread_parkme+0x82/0x180 [ 11.563046] ? preempt_count_sub+0x50/0x80 [ 11.563067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.563088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.563109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.563130] kthread+0x337/0x6f0 [ 11.563148] ? trace_preempt_on+0x20/0xc0 [ 11.563170] ? __pfx_kthread+0x10/0x10 [ 11.563189] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.563208] ? calculate_sigpending+0x7b/0xa0 [ 11.563245] ? __pfx_kthread+0x10/0x10 [ 11.563282] ret_from_fork+0x116/0x1d0 [ 11.563300] ? __pfx_kthread+0x10/0x10 [ 11.563318] ret_from_fork_asm+0x1a/0x30 [ 11.563348] </TASK> [ 11.563359] [ 11.571346] Allocated by task 175: [ 11.571565] kasan_save_stack+0x45/0x70 [ 11.571783] kasan_save_track+0x18/0x40 [ 11.571916] kasan_save_alloc_info+0x3b/0x50 [ 11.572073] __kasan_krealloc+0x190/0x1f0 [ 11.572395] krealloc_noprof+0xf3/0x340 [ 11.572681] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.572924] krealloc_less_oob+0x1c/0x30 [ 11.573117] kunit_try_run_case+0x1a5/0x480 [ 11.573276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.573452] kthread+0x337/0x6f0 [ 11.573574] ret_from_fork+0x116/0x1d0 [ 11.573716] ret_from_fork_asm+0x1a/0x30 [ 11.573909] [ 11.574005] The buggy address belongs to the object at ffff888100351400 [ 11.574005] which belongs to the cache kmalloc-256 of size 256 [ 11.574739] The buggy address is located 17 bytes to the right of [ 11.574739] allocated 201-byte region [ffff888100351400, ffff8881003514c9) [ 11.575512] [ 11.575592] The buggy address belongs to the physical page: [ 11.575775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.576070] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.576620] flags: 0x200000000000040(head|node=0|zone=2) [ 11.576892] page_type: f5(slab) [ 11.577076] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.577512] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.577805] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.578127] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.578483] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.578802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.579104] page dumped because: kasan: bad access detected [ 11.579844] [ 11.579976] Memory state around the buggy address: [ 11.580174] ffff888100351380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.580414] ffff888100351400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.580629] >ffff888100351480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.581323] ^ [ 11.581602] ffff888100351500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.581899] ffff888100351580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.582194] ================================================================== [ 11.582843] ================================================================== [ 11.583128] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.583635] Write of size 1 at addr ffff8881003514ea by task kunit_try_catch/175 [ 11.583928] [ 11.584045] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.584092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.584103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.584124] Call Trace: [ 11.584146] <TASK> [ 11.584165] dump_stack_lvl+0x73/0xb0 [ 11.584194] print_report+0xd1/0x650 [ 11.584216] ? __virt_addr_valid+0x1db/0x2d0 [ 11.584252] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.584274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.584295] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.584317] kasan_report+0x141/0x180 [ 11.584337] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.584364] __asan_report_store1_noabort+0x1b/0x30 [ 11.584383] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.584407] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.584429] ? finish_task_switch.isra.0+0x153/0x700 [ 11.584450] ? __switch_to+0x47/0xf50 [ 11.584474] ? __schedule+0x10cc/0x2b60 [ 11.584495] ? __pfx_read_tsc+0x10/0x10 [ 11.584518] krealloc_less_oob+0x1c/0x30 [ 11.584538] kunit_try_run_case+0x1a5/0x480 [ 11.584561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.584582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.584603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.584624] ? __kthread_parkme+0x82/0x180 [ 11.584643] ? preempt_count_sub+0x50/0x80 [ 11.584664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.584686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.584706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.584728] kthread+0x337/0x6f0 [ 11.584746] ? trace_preempt_on+0x20/0xc0 [ 11.584767] ? __pfx_kthread+0x10/0x10 [ 11.584796] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.584816] ? calculate_sigpending+0x7b/0xa0 [ 11.584839] ? __pfx_kthread+0x10/0x10 [ 11.584858] ret_from_fork+0x116/0x1d0 [ 11.584875] ? __pfx_kthread+0x10/0x10 [ 11.584894] ret_from_fork_asm+0x1a/0x30 [ 11.584923] </TASK> [ 11.584933] [ 11.592848] Allocated by task 175: [ 11.593007] kasan_save_stack+0x45/0x70 [ 11.593163] kasan_save_track+0x18/0x40 [ 11.593347] kasan_save_alloc_info+0x3b/0x50 [ 11.593559] __kasan_krealloc+0x190/0x1f0 [ 11.593760] krealloc_noprof+0xf3/0x340 [ 11.593996] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.594934] krealloc_less_oob+0x1c/0x30 [ 11.595167] kunit_try_run_case+0x1a5/0x480 [ 11.595478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.595717] kthread+0x337/0x6f0 [ 11.595871] ret_from_fork+0x116/0x1d0 [ 11.596034] ret_from_fork_asm+0x1a/0x30 [ 11.596190] [ 11.596276] The buggy address belongs to the object at ffff888100351400 [ 11.596276] which belongs to the cache kmalloc-256 of size 256 [ 11.596639] The buggy address is located 33 bytes to the right of [ 11.596639] allocated 201-byte region [ffff888100351400, ffff8881003514c9) [ 11.597263] [ 11.597360] The buggy address belongs to the physical page: [ 11.597622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.598318] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.598706] flags: 0x200000000000040(head|node=0|zone=2) [ 11.598958] page_type: f5(slab) [ 11.599109] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.599510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.599769] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.599999] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.600306] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.600645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.601002] page dumped because: kasan: bad access detected [ 11.601424] [ 11.601521] Memory state around the buggy address: [ 11.601681] ffff888100351380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.601894] ffff888100351400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.602108] >ffff888100351480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.602331] ^ [ 11.602728] ffff888100351500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.603052] ffff888100351580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.603404] ================================================================== [ 11.736319] ================================================================== [ 11.736655] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.736947] Write of size 1 at addr ffff888102a460ea by task kunit_try_catch/179 [ 11.737176] [ 11.737385] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.737431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.737442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.737463] Call Trace: [ 11.737486] <TASK> [ 11.737506] dump_stack_lvl+0x73/0xb0 [ 11.737538] print_report+0xd1/0x650 [ 11.737563] ? __virt_addr_valid+0x1db/0x2d0 [ 11.737587] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.737611] ? kasan_addr_to_slab+0x11/0xa0 [ 11.737681] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.737719] kasan_report+0x141/0x180 [ 11.737754] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.737811] __asan_report_store1_noabort+0x1b/0x30 [ 11.737832] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.737894] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.737930] ? finish_task_switch.isra.0+0x153/0x700 [ 11.737991] ? __switch_to+0x47/0xf50 [ 11.738018] ? __schedule+0x10cc/0x2b60 [ 11.738041] ? __pfx_read_tsc+0x10/0x10 [ 11.738077] krealloc_large_less_oob+0x1c/0x30 [ 11.738100] kunit_try_run_case+0x1a5/0x480 [ 11.738126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.738148] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.738172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.738195] ? __kthread_parkme+0x82/0x180 [ 11.738244] ? preempt_count_sub+0x50/0x80 [ 11.738268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.738292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.738315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.738338] kthread+0x337/0x6f0 [ 11.738359] ? trace_preempt_on+0x20/0xc0 [ 11.738383] ? __pfx_kthread+0x10/0x10 [ 11.738405] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.738426] ? calculate_sigpending+0x7b/0xa0 [ 11.738451] ? __pfx_kthread+0x10/0x10 [ 11.738473] ret_from_fork+0x116/0x1d0 [ 11.738492] ? __pfx_kthread+0x10/0x10 [ 11.738513] ret_from_fork_asm+0x1a/0x30 [ 11.738544] </TASK> [ 11.738557] [ 11.747095] The buggy address belongs to the physical page: [ 11.747481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44 [ 11.747744] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.748252] flags: 0x200000000000040(head|node=0|zone=2) [ 11.748632] page_type: f8(unknown) [ 11.748899] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.749337] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.749744] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.750034] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.750434] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff [ 11.751794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.753348] page dumped because: kasan: bad access detected [ 11.753784] [ 11.753888] Memory state around the buggy address: [ 11.754066] ffff888102a45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.754795] ffff888102a46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.755119] >ffff888102a46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.755791] ^ [ 11.756612] ffff888102a46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.757098] ffff888102a46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.757711] ================================================================== [ 11.539591] ================================================================== [ 11.539934] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.540325] Write of size 1 at addr ffff8881003514d0 by task kunit_try_catch/175 [ 11.540551] [ 11.540644] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.540690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.540701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.540723] Call Trace: [ 11.540736] <TASK> [ 11.540756] dump_stack_lvl+0x73/0xb0 [ 11.540795] print_report+0xd1/0x650 [ 11.540817] ? __virt_addr_valid+0x1db/0x2d0 [ 11.540839] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.540861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.540881] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.540904] kasan_report+0x141/0x180 [ 11.540924] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.540951] __asan_report_store1_noabort+0x1b/0x30 [ 11.540969] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.540994] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.541016] ? finish_task_switch.isra.0+0x153/0x700 [ 11.541037] ? __switch_to+0x47/0xf50 [ 11.541061] ? __schedule+0x10cc/0x2b60 [ 11.541082] ? __pfx_read_tsc+0x10/0x10 [ 11.541105] krealloc_less_oob+0x1c/0x30 [ 11.541125] kunit_try_run_case+0x1a5/0x480 [ 11.541148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.541169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.541191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.541213] ? __kthread_parkme+0x82/0x180 [ 11.541245] ? preempt_count_sub+0x50/0x80 [ 11.541266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.541287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.541308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.541349] kthread+0x337/0x6f0 [ 11.541368] ? trace_preempt_on+0x20/0xc0 [ 11.541391] ? __pfx_kthread+0x10/0x10 [ 11.541410] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.541430] ? calculate_sigpending+0x7b/0xa0 [ 11.541452] ? __pfx_kthread+0x10/0x10 [ 11.541472] ret_from_fork+0x116/0x1d0 [ 11.541489] ? __pfx_kthread+0x10/0x10 [ 11.541508] ret_from_fork_asm+0x1a/0x30 [ 11.541537] </TASK> [ 11.541549] [ 11.549277] Allocated by task 175: [ 11.549509] kasan_save_stack+0x45/0x70 [ 11.549728] kasan_save_track+0x18/0x40 [ 11.549919] kasan_save_alloc_info+0x3b/0x50 [ 11.550094] __kasan_krealloc+0x190/0x1f0 [ 11.550290] krealloc_noprof+0xf3/0x340 [ 11.550460] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.550621] krealloc_less_oob+0x1c/0x30 [ 11.550758] kunit_try_run_case+0x1a5/0x480 [ 11.551029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.551293] kthread+0x337/0x6f0 [ 11.551464] ret_from_fork+0x116/0x1d0 [ 11.551663] ret_from_fork_asm+0x1a/0x30 [ 11.552289] [ 11.552375] The buggy address belongs to the object at ffff888100351400 [ 11.552375] which belongs to the cache kmalloc-256 of size 256 [ 11.552904] The buggy address is located 7 bytes to the right of [ 11.552904] allocated 201-byte region [ffff888100351400, ffff8881003514c9) [ 11.553509] [ 11.553602] The buggy address belongs to the physical page: [ 11.553827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.554173] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.554546] flags: 0x200000000000040(head|node=0|zone=2) [ 11.554750] page_type: f5(slab) [ 11.554923] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.555186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.555429] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.555659] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.555943] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.556505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.556851] page dumped because: kasan: bad access detected [ 11.557103] [ 11.557196] Memory state around the buggy address: [ 11.557953] ffff888100351380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.558273] ffff888100351400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.558596] >ffff888100351480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.558908] ^ [ 11.559124] ffff888100351500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.559644] ffff888100351580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.559930] ================================================================== [ 11.507410] ================================================================== [ 11.508135] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.509157] Write of size 1 at addr ffff8881003514c9 by task kunit_try_catch/175 [ 11.510059] [ 11.510171] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.510235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.510247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.510270] Call Trace: [ 11.510285] <TASK> [ 11.510305] dump_stack_lvl+0x73/0xb0 [ 11.510345] print_report+0xd1/0x650 [ 11.510369] ? __virt_addr_valid+0x1db/0x2d0 [ 11.510393] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.510416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.510437] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.510460] kasan_report+0x141/0x180 [ 11.510481] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.510508] __asan_report_store1_noabort+0x1b/0x30 [ 11.510527] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.510552] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.510575] ? finish_task_switch.isra.0+0x153/0x700 [ 11.510598] ? __switch_to+0x47/0xf50 [ 11.510623] ? __schedule+0x10cc/0x2b60 [ 11.510644] ? __pfx_read_tsc+0x10/0x10 [ 11.510668] krealloc_less_oob+0x1c/0x30 [ 11.510688] kunit_try_run_case+0x1a5/0x480 [ 11.510713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.510734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.510757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.510779] ? __kthread_parkme+0x82/0x180 [ 11.510799] ? preempt_count_sub+0x50/0x80 [ 11.510820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.510845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.510869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.510893] kthread+0x337/0x6f0 [ 11.510912] ? trace_preempt_on+0x20/0xc0 [ 11.510935] ? __pfx_kthread+0x10/0x10 [ 11.510955] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.510975] ? calculate_sigpending+0x7b/0xa0 [ 11.510999] ? __pfx_kthread+0x10/0x10 [ 11.511020] ret_from_fork+0x116/0x1d0 [ 11.511037] ? __pfx_kthread+0x10/0x10 [ 11.511056] ret_from_fork_asm+0x1a/0x30 [ 11.511086] </TASK> [ 11.511097] [ 11.525746] Allocated by task 175: [ 11.526342] kasan_save_stack+0x45/0x70 [ 11.527041] kasan_save_track+0x18/0x40 [ 11.527538] kasan_save_alloc_info+0x3b/0x50 [ 11.528442] __kasan_krealloc+0x190/0x1f0 [ 11.528852] krealloc_noprof+0xf3/0x340 [ 11.529027] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.529337] krealloc_less_oob+0x1c/0x30 [ 11.529582] kunit_try_run_case+0x1a5/0x480 [ 11.529766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.529963] kthread+0x337/0x6f0 [ 11.530136] ret_from_fork+0x116/0x1d0 [ 11.530349] ret_from_fork_asm+0x1a/0x30 [ 11.530592] [ 11.530675] The buggy address belongs to the object at ffff888100351400 [ 11.530675] which belongs to the cache kmalloc-256 of size 256 [ 11.531172] The buggy address is located 0 bytes to the right of [ 11.531172] allocated 201-byte region [ffff888100351400, ffff8881003514c9) [ 11.532008] [ 11.532114] The buggy address belongs to the physical page: [ 11.532522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.532875] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.533199] flags: 0x200000000000040(head|node=0|zone=2) [ 11.533416] page_type: f5(slab) [ 11.533763] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.534068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.534526] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.534847] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.535187] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.535578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.535857] page dumped because: kasan: bad access detected [ 11.536114] [ 11.536207] Memory state around the buggy address: [ 11.536433] ffff888100351380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.536740] ffff888100351400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.537042] >ffff888100351480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.537279] ^ [ 11.537556] ffff888100351500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.538335] ffff888100351580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.538862] ================================================================== [ 11.674134] ================================================================== [ 11.675294] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.676888] Write of size 1 at addr ffff888102a460c9 by task kunit_try_catch/179 [ 11.677139] [ 11.677268] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.677321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.677333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.677412] Call Trace: [ 11.677430] <TASK> [ 11.677505] dump_stack_lvl+0x73/0xb0 [ 11.677551] print_report+0xd1/0x650 [ 11.677813] ? __virt_addr_valid+0x1db/0x2d0 [ 11.677844] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.677922] ? kasan_addr_to_slab+0x11/0xa0 [ 11.677946] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.677971] kasan_report+0x141/0x180 [ 11.678051] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.678080] __asan_report_store1_noabort+0x1b/0x30 [ 11.678396] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.678430] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.678455] ? finish_task_switch.isra.0+0x153/0x700 [ 11.678481] ? __switch_to+0x47/0xf50 [ 11.678510] ? __schedule+0x10cc/0x2b60 [ 11.678535] ? __pfx_read_tsc+0x10/0x10 [ 11.678561] krealloc_large_less_oob+0x1c/0x30 [ 11.678584] kunit_try_run_case+0x1a5/0x480 [ 11.678613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.678639] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.678664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.678687] ? __kthread_parkme+0x82/0x180 [ 11.678709] ? preempt_count_sub+0x50/0x80 [ 11.678732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.678756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.678779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.678802] kthread+0x337/0x6f0 [ 11.678822] ? trace_preempt_on+0x20/0xc0 [ 11.678846] ? __pfx_kthread+0x10/0x10 [ 11.678867] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.678888] ? calculate_sigpending+0x7b/0xa0 [ 11.678914] ? __pfx_kthread+0x10/0x10 [ 11.678935] ret_from_fork+0x116/0x1d0 [ 11.678954] ? __pfx_kthread+0x10/0x10 [ 11.678975] ret_from_fork_asm+0x1a/0x30 [ 11.679008] </TASK> [ 11.679022] [ 11.689664] The buggy address belongs to the physical page: [ 11.689942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44 [ 11.690790] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.691585] flags: 0x200000000000040(head|node=0|zone=2) [ 11.692092] page_type: f8(unknown) [ 11.692502] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.692893] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.693609] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.694080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.694905] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff [ 11.695422] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.695902] page dumped because: kasan: bad access detected [ 11.696138] [ 11.696492] Memory state around the buggy address: [ 11.696808] ffff888102a45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.697424] ffff888102a46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.698100] >ffff888102a46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.698706] ^ [ 11.699181] ffff888102a46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.699671] ffff888102a46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.699979] ================================================================== [ 11.759000] ================================================================== [ 11.759602] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.759955] Write of size 1 at addr ffff888102a460eb by task kunit_try_catch/179 [ 11.761200] [ 11.761544] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.761686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.761700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.761722] Call Trace: [ 11.761747] <TASK> [ 11.761770] dump_stack_lvl+0x73/0xb0 [ 11.761813] print_report+0xd1/0x650 [ 11.761839] ? __virt_addr_valid+0x1db/0x2d0 [ 11.761863] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.761889] ? kasan_addr_to_slab+0x11/0xa0 [ 11.761909] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.761934] kasan_report+0x141/0x180 [ 11.761956] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.761984] __asan_report_store1_noabort+0x1b/0x30 [ 11.762005] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.762031] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.762055] ? finish_task_switch.isra.0+0x153/0x700 [ 11.762078] ? __switch_to+0x47/0xf50 [ 11.762104] ? __schedule+0x10cc/0x2b60 [ 11.762127] ? __pfx_read_tsc+0x10/0x10 [ 11.762152] krealloc_large_less_oob+0x1c/0x30 [ 11.762175] kunit_try_run_case+0x1a5/0x480 [ 11.762251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.762290] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.762315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.762338] ? __kthread_parkme+0x82/0x180 [ 11.762359] ? preempt_count_sub+0x50/0x80 [ 11.762383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.762407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.762430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.762453] kthread+0x337/0x6f0 [ 11.762473] ? trace_preempt_on+0x20/0xc0 [ 11.762499] ? __pfx_kthread+0x10/0x10 [ 11.762523] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.762546] ? calculate_sigpending+0x7b/0xa0 [ 11.762571] ? __pfx_kthread+0x10/0x10 [ 11.762592] ret_from_fork+0x116/0x1d0 [ 11.762612] ? __pfx_kthread+0x10/0x10 [ 11.762633] ret_from_fork_asm+0x1a/0x30 [ 11.762666] </TASK> [ 11.762679] [ 11.775333] The buggy address belongs to the physical page: [ 11.775882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44 [ 11.776144] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.778033] flags: 0x200000000000040(head|node=0|zone=2) [ 11.778273] page_type: f8(unknown) [ 11.778409] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.778643] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.778874] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.779107] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.779788] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff [ 11.781077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.782474] page dumped because: kasan: bad access detected [ 11.783097] [ 11.783378] Memory state around the buggy address: [ 11.784009] ffff888102a45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.784845] ffff888102a46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.785664] >ffff888102a46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.786178] ^ [ 11.787305] ffff888102a46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.787954] ffff888102a46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.788172] ================================================================== [ 11.700961] ================================================================== [ 11.701831] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.702431] Write of size 1 at addr ffff888102a460d0 by task kunit_try_catch/179 [ 11.702967] [ 11.703092] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.703141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.703152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.703176] Call Trace: [ 11.703202] <TASK> [ 11.703237] dump_stack_lvl+0x73/0xb0 [ 11.703276] print_report+0xd1/0x650 [ 11.703302] ? __virt_addr_valid+0x1db/0x2d0 [ 11.703326] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.703350] ? kasan_addr_to_slab+0x11/0xa0 [ 11.703371] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.703395] kasan_report+0x141/0x180 [ 11.703418] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.703446] __asan_report_store1_noabort+0x1b/0x30 [ 11.703467] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.703493] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.703517] ? finish_task_switch.isra.0+0x153/0x700 [ 11.703540] ? __switch_to+0x47/0xf50 [ 11.703606] ? __schedule+0x10cc/0x2b60 [ 11.703631] ? __pfx_read_tsc+0x10/0x10 [ 11.703656] krealloc_large_less_oob+0x1c/0x30 [ 11.703692] kunit_try_run_case+0x1a5/0x480 [ 11.703717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.703739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.703765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.703788] ? __kthread_parkme+0x82/0x180 [ 11.703810] ? preempt_count_sub+0x50/0x80 [ 11.703833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.703856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.703879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.703902] kthread+0x337/0x6f0 [ 11.703922] ? trace_preempt_on+0x20/0xc0 [ 11.703946] ? __pfx_kthread+0x10/0x10 [ 11.703967] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.703988] ? calculate_sigpending+0x7b/0xa0 [ 11.704013] ? __pfx_kthread+0x10/0x10 [ 11.704035] ret_from_fork+0x116/0x1d0 [ 11.704053] ? __pfx_kthread+0x10/0x10 [ 11.704074] ret_from_fork_asm+0x1a/0x30 [ 11.704106] </TASK> [ 11.704118] [ 11.712315] The buggy address belongs to the physical page: [ 11.712709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44 [ 11.713125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.713635] flags: 0x200000000000040(head|node=0|zone=2) [ 11.713913] page_type: f8(unknown) [ 11.714048] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.714292] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.714573] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.715284] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.715635] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff [ 11.715995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.716233] page dumped because: kasan: bad access detected [ 11.716742] [ 11.716896] Memory state around the buggy address: [ 11.717062] ffff888102a45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.717338] ffff888102a46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.717678] >ffff888102a46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.717981] ^ [ 11.718382] ffff888102a46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.718604] ffff888102a46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.718815] ==================================================================