Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.934406] ================================================================== [ 17.934462] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.934513] Write of size 1 at addr fff00000c44ecac9 by task kunit_try_catch/158 [ 17.934560] [ 17.934591] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.934671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.934718] Hardware name: linux,dummy-virt (DT) [ 17.934749] Call trace: [ 17.934771] show_stack+0x20/0x38 (C) [ 17.934818] dump_stack_lvl+0x8c/0xd0 [ 17.934862] print_report+0x118/0x608 [ 17.934906] kasan_report+0xdc/0x128 [ 17.934950] __asan_report_store1_noabort+0x20/0x30 [ 17.935008] krealloc_less_oob_helper+0xa48/0xc50 [ 17.935056] krealloc_less_oob+0x20/0x38 [ 17.935099] kunit_try_run_case+0x170/0x3f0 [ 17.935143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.935206] kthread+0x328/0x630 [ 17.935246] ret_from_fork+0x10/0x20 [ 17.935299] [ 17.935317] Allocated by task 158: [ 17.935348] kasan_save_stack+0x3c/0x68 [ 17.935388] kasan_save_track+0x20/0x40 [ 17.935433] kasan_save_alloc_info+0x40/0x58 [ 17.935472] __kasan_krealloc+0x118/0x178 [ 17.935507] krealloc_noprof+0x128/0x360 [ 17.935543] krealloc_less_oob_helper+0x168/0xc50 [ 17.935581] krealloc_less_oob+0x20/0x38 [ 17.935616] kunit_try_run_case+0x170/0x3f0 [ 17.935661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.935703] kthread+0x328/0x630 [ 17.935743] ret_from_fork+0x10/0x20 [ 17.935787] [ 17.935805] The buggy address belongs to the object at fff00000c44eca00 [ 17.935805] which belongs to the cache kmalloc-256 of size 256 [ 17.935868] The buggy address is located 0 bytes to the right of [ 17.935868] allocated 201-byte region [fff00000c44eca00, fff00000c44ecac9) [ 17.935969] [ 17.935987] The buggy address belongs to the physical page: [ 17.936042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ec [ 17.936124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.936195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.936244] page_type: f5(slab) [ 17.936280] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.936328] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.936375] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.936421] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.936467] head: 0bfffe0000000001 ffffc1ffc3113b01 00000000ffffffff 00000000ffffffff [ 17.936536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.936600] page dumped because: kasan: bad access detected [ 17.936675] [ 17.936693] Memory state around the buggy address: [ 17.936724] fff00000c44ec980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.936765] fff00000c44eca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.936825] >fff00000c44eca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.936862] ^ [ 17.936895] fff00000c44ecb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.936942] fff00000c44ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.936978] ================================================================== [ 17.989652] ================================================================== [ 17.989811] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.989866] Write of size 1 at addr fff00000c78360ea by task kunit_try_catch/162 [ 17.989940] [ 17.989998] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.990105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.990131] Hardware name: linux,dummy-virt (DT) [ 17.990189] Call trace: [ 17.990238] show_stack+0x20/0x38 (C) [ 17.990322] dump_stack_lvl+0x8c/0xd0 [ 17.990394] print_report+0x118/0x608 [ 17.990448] kasan_report+0xdc/0x128 [ 17.990500] __asan_report_store1_noabort+0x20/0x30 [ 17.990546] krealloc_less_oob_helper+0xae4/0xc50 [ 17.990592] krealloc_large_less_oob+0x20/0x38 [ 17.990647] kunit_try_run_case+0x170/0x3f0 [ 17.990698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.990750] kthread+0x328/0x630 [ 17.990799] ret_from_fork+0x10/0x20 [ 17.990845] [ 17.990865] The buggy address belongs to the physical page: [ 17.990894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834 [ 17.990943] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.991000] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.991048] page_type: f8(unknown) [ 17.991085] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.991132] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.991190] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.991236] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.991282] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff [ 17.991328] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.991514] page dumped because: kasan: bad access detected [ 17.991591] [ 17.991609] Memory state around the buggy address: [ 17.991703] fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.991761] fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.991837] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.991883] ^ [ 17.991920] fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.991980] fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.992037] ================================================================== [ 17.953261] ================================================================== [ 17.953307] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.953354] Write of size 1 at addr fff00000c44ecaeb by task kunit_try_catch/158 [ 17.953400] [ 17.953427] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.953504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.953531] Hardware name: linux,dummy-virt (DT) [ 17.953560] Call trace: [ 17.953580] show_stack+0x20/0x38 (C) [ 17.953625] dump_stack_lvl+0x8c/0xd0 [ 17.953669] print_report+0x118/0x608 [ 17.953713] kasan_report+0xdc/0x128 [ 17.953757] __asan_report_store1_noabort+0x20/0x30 [ 17.953802] krealloc_less_oob_helper+0xa58/0xc50 [ 17.953849] krealloc_less_oob+0x20/0x38 [ 17.953892] kunit_try_run_case+0x170/0x3f0 [ 17.953937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.953987] kthread+0x328/0x630 [ 17.954027] ret_from_fork+0x10/0x20 [ 17.954071] [ 17.954089] Allocated by task 158: [ 17.954114] kasan_save_stack+0x3c/0x68 [ 17.954167] kasan_save_track+0x20/0x40 [ 17.954203] kasan_save_alloc_info+0x40/0x58 [ 17.954241] __kasan_krealloc+0x118/0x178 [ 17.954277] krealloc_noprof+0x128/0x360 [ 17.954312] krealloc_less_oob_helper+0x168/0xc50 [ 17.954350] krealloc_less_oob+0x20/0x38 [ 17.954384] kunit_try_run_case+0x170/0x3f0 [ 17.954419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.954460] kthread+0x328/0x630 [ 17.954490] ret_from_fork+0x10/0x20 [ 17.954525] [ 17.954543] The buggy address belongs to the object at fff00000c44eca00 [ 17.954543] which belongs to the cache kmalloc-256 of size 256 [ 17.954597] The buggy address is located 34 bytes to the right of [ 17.954597] allocated 201-byte region [fff00000c44eca00, fff00000c44ecac9) [ 17.954658] [ 17.954676] The buggy address belongs to the physical page: [ 17.954705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ec [ 17.954753] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.954796] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.954844] page_type: f5(slab) [ 17.954879] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.954926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.954976] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.955022] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.955068] head: 0bfffe0000000001 ffffc1ffc3113b01 00000000ffffffff 00000000ffffffff [ 17.955114] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.955185] page dumped because: kasan: bad access detected [ 17.955266] [ 17.955284] Memory state around the buggy address: [ 17.955341] fff00000c44ec980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.955383] fff00000c44eca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.955423] >fff00000c44eca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.955458] ^ [ 17.955494] fff00000c44ecb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.955560] fff00000c44ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.955618] ================================================================== [ 17.943236] ================================================================== [ 17.943321] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.943370] Write of size 1 at addr fff00000c44ecada by task kunit_try_catch/158 [ 17.943418] [ 17.943445] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.943593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.943669] Hardware name: linux,dummy-virt (DT) [ 17.943742] Call trace: [ 17.943800] show_stack+0x20/0x38 (C) [ 17.943846] dump_stack_lvl+0x8c/0xd0 [ 17.943933] print_report+0x118/0x608 [ 17.944003] kasan_report+0xdc/0x128 [ 17.944050] __asan_report_store1_noabort+0x20/0x30 [ 17.944619] krealloc_less_oob_helper+0xa80/0xc50 [ 17.944681] krealloc_less_oob+0x20/0x38 [ 17.944727] kunit_try_run_case+0x170/0x3f0 [ 17.944772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.944822] kthread+0x328/0x630 [ 17.944862] ret_from_fork+0x10/0x20 [ 17.944907] [ 17.944926] Allocated by task 158: [ 17.944952] kasan_save_stack+0x3c/0x68 [ 17.944991] kasan_save_track+0x20/0x40 [ 17.945027] kasan_save_alloc_info+0x40/0x58 [ 17.945064] __kasan_krealloc+0x118/0x178 [ 17.945100] krealloc_noprof+0x128/0x360 [ 17.945135] krealloc_less_oob_helper+0x168/0xc50 [ 17.945324] krealloc_less_oob+0x20/0x38 [ 17.945483] kunit_try_run_case+0x170/0x3f0 [ 17.945560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.945601] kthread+0x328/0x630 [ 17.945632] ret_from_fork+0x10/0x20 [ 17.945667] [ 17.945687] The buggy address belongs to the object at fff00000c44eca00 [ 17.945687] which belongs to the cache kmalloc-256 of size 256 [ 17.945756] The buggy address is located 17 bytes to the right of [ 17.945756] allocated 201-byte region [fff00000c44eca00, fff00000c44ecac9) [ 17.945817] [ 17.945836] The buggy address belongs to the physical page: [ 17.945865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ec [ 17.945923] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.945968] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.946016] page_type: f5(slab) [ 17.946051] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.946109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.946177] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.946224] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.946271] head: 0bfffe0000000001 ffffc1ffc3113b01 00000000ffffffff 00000000ffffffff [ 17.946325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.946374] page dumped because: kasan: bad access detected [ 17.946432] [ 17.946463] Memory state around the buggy address: [ 17.946493] fff00000c44ec980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.946533] fff00000c44eca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.946576] >fff00000c44eca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.946621] ^ [ 17.946672] fff00000c44ecb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.946721] fff00000c44ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.946765] ================================================================== [ 17.983345] ================================================================== [ 17.983622] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.983700] Write of size 1 at addr fff00000c78360da by task kunit_try_catch/162 [ 17.983785] [ 17.983813] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.983946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.983972] Hardware name: linux,dummy-virt (DT) [ 17.984023] Call trace: [ 17.984045] show_stack+0x20/0x38 (C) [ 17.984092] dump_stack_lvl+0x8c/0xd0 [ 17.984136] print_report+0x118/0x608 [ 17.984219] kasan_report+0xdc/0x128 [ 17.984265] __asan_report_store1_noabort+0x20/0x30 [ 17.984312] krealloc_less_oob_helper+0xa80/0xc50 [ 17.984547] krealloc_large_less_oob+0x20/0x38 [ 17.984613] kunit_try_run_case+0x170/0x3f0 [ 17.984842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.984953] kthread+0x328/0x630 [ 17.985126] ret_from_fork+0x10/0x20 [ 17.985288] [ 17.985346] The buggy address belongs to the physical page: [ 17.985402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834 [ 17.985451] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.985844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.985954] page_type: f8(unknown) [ 17.986050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.986270] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.986356] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.986513] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.986663] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff [ 17.986753] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.987187] page dumped because: kasan: bad access detected [ 17.987313] [ 17.987468] Memory state around the buggy address: [ 17.987544] fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.987637] fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.987756] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.988051] ^ [ 17.988094] fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.988134] fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.988178] ================================================================== [ 17.947566] ================================================================== [ 17.947739] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.947834] Write of size 1 at addr fff00000c44ecaea by task kunit_try_catch/158 [ 17.947913] [ 17.947972] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.948097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.948122] Hardware name: linux,dummy-virt (DT) [ 17.948196] Call trace: [ 17.948268] show_stack+0x20/0x38 (C) [ 17.948366] dump_stack_lvl+0x8c/0xd0 [ 17.948468] print_report+0x118/0x608 [ 17.948522] kasan_report+0xdc/0x128 [ 17.948663] __asan_report_store1_noabort+0x20/0x30 [ 17.948727] krealloc_less_oob_helper+0xae4/0xc50 [ 17.948774] krealloc_less_oob+0x20/0x38 [ 17.948835] kunit_try_run_case+0x170/0x3f0 [ 17.948881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.948933] kthread+0x328/0x630 [ 17.948974] ret_from_fork+0x10/0x20 [ 17.949047] [ 17.949103] Allocated by task 158: [ 17.949129] kasan_save_stack+0x3c/0x68 [ 17.949180] kasan_save_track+0x20/0x40 [ 17.949216] kasan_save_alloc_info+0x40/0x58 [ 17.949253] __kasan_krealloc+0x118/0x178 [ 17.949289] krealloc_noprof+0x128/0x360 [ 17.949324] krealloc_less_oob_helper+0x168/0xc50 [ 17.949361] krealloc_less_oob+0x20/0x38 [ 17.949396] kunit_try_run_case+0x170/0x3f0 [ 17.949731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.949811] kthread+0x328/0x630 [ 17.949885] ret_from_fork+0x10/0x20 [ 17.949920] [ 17.949939] The buggy address belongs to the object at fff00000c44eca00 [ 17.949939] which belongs to the cache kmalloc-256 of size 256 [ 17.950014] The buggy address is located 33 bytes to the right of [ 17.950014] allocated 201-byte region [fff00000c44eca00, fff00000c44ecac9) [ 17.950277] [ 17.950375] The buggy address belongs to the physical page: [ 17.950451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ec [ 17.950584] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.950725] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.950809] page_type: f5(slab) [ 17.950851] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.951001] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.951096] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.951145] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.951202] head: 0bfffe0000000001 ffffc1ffc3113b01 00000000ffffffff 00000000ffffffff [ 17.951274] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.951442] page dumped because: kasan: bad access detected [ 17.951554] [ 17.951628] Memory state around the buggy address: [ 17.951778] fff00000c44ec980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.952355] fff00000c44eca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.952440] >fff00000c44eca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.952553] ^ [ 17.952591] fff00000c44ecb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.952632] fff00000c44ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.952667] ================================================================== [ 17.937960] ================================================================== [ 17.938008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.938054] Write of size 1 at addr fff00000c44ecad0 by task kunit_try_catch/158 [ 17.938139] [ 17.938185] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.938316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.938342] Hardware name: linux,dummy-virt (DT) [ 17.938371] Call trace: [ 17.938391] show_stack+0x20/0x38 (C) [ 17.938438] dump_stack_lvl+0x8c/0xd0 [ 17.938514] print_report+0x118/0x608 [ 17.938559] kasan_report+0xdc/0x128 [ 17.938602] __asan_report_store1_noabort+0x20/0x30 [ 17.938648] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.938697] krealloc_less_oob+0x20/0x38 [ 17.938741] kunit_try_run_case+0x170/0x3f0 [ 17.938815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.938868] kthread+0x328/0x630 [ 17.938926] ret_from_fork+0x10/0x20 [ 17.938995] [ 17.939014] Allocated by task 158: [ 17.939041] kasan_save_stack+0x3c/0x68 [ 17.939119] kasan_save_track+0x20/0x40 [ 17.939175] kasan_save_alloc_info+0x40/0x58 [ 17.939252] __kasan_krealloc+0x118/0x178 [ 17.939305] krealloc_noprof+0x128/0x360 [ 17.939341] krealloc_less_oob_helper+0x168/0xc50 [ 17.939407] krealloc_less_oob+0x20/0x38 [ 17.939443] kunit_try_run_case+0x170/0x3f0 [ 17.939494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.939535] kthread+0x328/0x630 [ 17.939565] ret_from_fork+0x10/0x20 [ 17.939626] [ 17.939936] The buggy address belongs to the object at fff00000c44eca00 [ 17.939936] which belongs to the cache kmalloc-256 of size 256 [ 17.940012] The buggy address is located 7 bytes to the right of [ 17.940012] allocated 201-byte region [fff00000c44eca00, fff00000c44ecac9) [ 17.940139] [ 17.940178] The buggy address belongs to the physical page: [ 17.940207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ec [ 17.940276] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.940321] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.940368] page_type: f5(slab) [ 17.940403] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.940451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.940769] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.940843] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.940958] head: 0bfffe0000000001 ffffc1ffc3113b01 00000000ffffffff 00000000ffffffff [ 17.941062] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.941140] page dumped because: kasan: bad access detected [ 17.941200] [ 17.941277] Memory state around the buggy address: [ 17.941308] fff00000c44ec980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.941349] fff00000c44eca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.941390] >fff00000c44eca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.941425] ^ [ 17.941487] fff00000c44ecb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.941655] fff00000c44ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.941764] ================================================================== [ 17.981399] ================================================================== [ 17.981465] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.981512] Write of size 1 at addr fff00000c78360d0 by task kunit_try_catch/162 [ 17.981580] [ 17.981618] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.981694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.981719] Hardware name: linux,dummy-virt (DT) [ 17.981797] Call trace: [ 17.981853] show_stack+0x20/0x38 (C) [ 17.981922] dump_stack_lvl+0x8c/0xd0 [ 17.981967] print_report+0x118/0x608 [ 17.982011] kasan_report+0xdc/0x128 [ 17.982054] __asan_report_store1_noabort+0x20/0x30 [ 17.982162] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.982210] krealloc_large_less_oob+0x20/0x38 [ 17.982255] kunit_try_run_case+0x170/0x3f0 [ 17.982300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.982350] kthread+0x328/0x630 [ 17.982399] ret_from_fork+0x10/0x20 [ 17.982445] [ 17.982463] The buggy address belongs to the physical page: [ 17.982492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834 [ 17.982548] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.982597] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.982650] page_type: f8(unknown) [ 17.982686] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.982733] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.982780] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.982826] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.982872] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff [ 17.982926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.982964] page dumped because: kasan: bad access detected [ 17.983006] [ 17.983024] Memory state around the buggy address: [ 17.983052] fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.983100] fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.983143] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.983187] ^ [ 17.983221] fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.983260] fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.983296] ================================================================== [ 17.992223] ================================================================== [ 17.992264] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.992394] Write of size 1 at addr fff00000c78360eb by task kunit_try_catch/162 [ 17.992449] [ 17.992476] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.992597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.992625] Hardware name: linux,dummy-virt (DT) [ 17.992653] Call trace: [ 17.992724] show_stack+0x20/0x38 (C) [ 17.992995] dump_stack_lvl+0x8c/0xd0 [ 17.993080] print_report+0x118/0x608 [ 17.993213] kasan_report+0xdc/0x128 [ 17.993258] __asan_report_store1_noabort+0x20/0x30 [ 17.993343] krealloc_less_oob_helper+0xa58/0xc50 [ 17.993416] krealloc_large_less_oob+0x20/0x38 [ 17.993497] kunit_try_run_case+0x170/0x3f0 [ 17.993543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.993616] kthread+0x328/0x630 [ 17.993910] ret_from_fork+0x10/0x20 [ 17.993967] [ 17.993986] The buggy address belongs to the physical page: [ 17.994066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834 [ 17.994117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.994197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.994282] page_type: f8(unknown) [ 17.994354] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.994410] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.994481] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.994546] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.994611] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff [ 17.994658] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.994698] page dumped because: kasan: bad access detected [ 17.994861] [ 17.994880] Memory state around the buggy address: [ 17.994989] fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.995102] fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.995194] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.995250] ^ [ 17.995322] fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.995369] fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.995421] ================================================================== [ 17.977329] ================================================================== [ 17.977385] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.977568] Write of size 1 at addr fff00000c78360c9 by task kunit_try_catch/162 [ 17.977694] [ 17.977767] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.977873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.977899] Hardware name: linux,dummy-virt (DT) [ 17.977954] Call trace: [ 17.978003] show_stack+0x20/0x38 (C) [ 17.978078] dump_stack_lvl+0x8c/0xd0 [ 17.978131] print_report+0x118/0x608 [ 17.978194] kasan_report+0xdc/0x128 [ 17.978237] __asan_report_store1_noabort+0x20/0x30 [ 17.978515] krealloc_less_oob_helper+0xa48/0xc50 [ 17.978578] krealloc_large_less_oob+0x20/0x38 [ 17.978624] kunit_try_run_case+0x170/0x3f0 [ 17.978670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.978721] kthread+0x328/0x630 [ 17.978797] ret_from_fork+0x10/0x20 [ 17.978863] [ 17.978921] The buggy address belongs to the physical page: [ 17.978989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834 [ 17.979093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.979195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.979247] page_type: f8(unknown) [ 17.979284] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.979340] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.979502] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.979551] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.979704] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff [ 17.979760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.979799] page dumped because: kasan: bad access detected [ 17.979828] [ 17.979846] Memory state around the buggy address: [ 17.980050] fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.980329] fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.980450] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.980578] ^ [ 17.980698] fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.980767] fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.980834] ==================================================================
[ 13.380953] ================================================================== [ 13.381710] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.382021] Write of size 1 at addr ffff8881028ee0d0 by task kunit_try_catch/180 [ 13.382925] [ 13.383233] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.383299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.383315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.383348] Call Trace: [ 13.383365] <TASK> [ 13.383412] dump_stack_lvl+0x73/0xb0 [ 13.383453] print_report+0xd1/0x650 [ 13.383480] ? __virt_addr_valid+0x1db/0x2d0 [ 13.383508] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.383537] ? kasan_addr_to_slab+0x11/0xa0 [ 13.383563] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.383592] kasan_report+0x141/0x180 [ 13.383618] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.383652] __asan_report_store1_noabort+0x1b/0x30 [ 13.383677] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.383708] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.383737] ? finish_task_switch.isra.0+0x153/0x700 [ 13.383764] ? __switch_to+0x47/0xf50 [ 13.383807] ? __schedule+0x10cc/0x2b60 [ 13.383836] ? __pfx_read_tsc+0x10/0x10 [ 13.383865] krealloc_large_less_oob+0x1c/0x30 [ 13.383892] kunit_try_run_case+0x1a5/0x480 [ 13.383921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.383948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.383976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.384004] ? __kthread_parkme+0x82/0x180 [ 13.384029] ? preempt_count_sub+0x50/0x80 [ 13.384056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.384102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.384131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.384381] kthread+0x337/0x6f0 [ 13.384410] ? trace_preempt_on+0x20/0xc0 [ 13.384439] ? __pfx_kthread+0x10/0x10 [ 13.384463] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.384489] ? calculate_sigpending+0x7b/0xa0 [ 13.384518] ? __pfx_kthread+0x10/0x10 [ 13.384543] ret_from_fork+0x116/0x1d0 [ 13.384567] ? __pfx_kthread+0x10/0x10 [ 13.384591] ret_from_fork_asm+0x1a/0x30 [ 13.384627] </TASK> [ 13.384642] [ 13.399884] The buggy address belongs to the physical page: [ 13.400486] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ec [ 13.401034] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.401973] flags: 0x200000000000040(head|node=0|zone=2) [ 13.402838] page_type: f8(unknown) [ 13.403225] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.403603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.403885] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.404173] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.404728] head: 0200000000000002 ffffea00040a3b01 00000000ffffffff 00000000ffffffff [ 13.405553] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.406351] page dumped because: kasan: bad access detected [ 13.406980] [ 13.407188] Memory state around the buggy address: [ 13.407387] ffff8881028edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.407639] ffff8881028ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.407908] >ffff8881028ee080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.408537] ^ [ 13.408823] ffff8881028ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.409163] ffff8881028ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.409487] ================================================================== [ 13.229111] ================================================================== [ 13.229459] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.229905] Write of size 1 at addr ffff88810033a2ea by task kunit_try_catch/176 [ 13.230418] [ 13.230579] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.230643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.230657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.230681] Call Trace: [ 13.230702] <TASK> [ 13.230722] dump_stack_lvl+0x73/0xb0 [ 13.230759] print_report+0xd1/0x650 [ 13.230785] ? __virt_addr_valid+0x1db/0x2d0 [ 13.230820] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.230855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.230880] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.230906] kasan_report+0x141/0x180 [ 13.230953] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.230985] __asan_report_store1_noabort+0x1b/0x30 [ 13.231007] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.231047] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.231071] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.231105] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.231135] krealloc_less_oob+0x1c/0x30 [ 13.231274] kunit_try_run_case+0x1a5/0x480 [ 13.231316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.231341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.231367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.231392] ? __kthread_parkme+0x82/0x180 [ 13.231415] ? preempt_count_sub+0x50/0x80 [ 13.231442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.231478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.231502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.231539] kthread+0x337/0x6f0 [ 13.231560] ? trace_preempt_on+0x20/0xc0 [ 13.231586] ? __pfx_kthread+0x10/0x10 [ 13.231609] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.231632] ? calculate_sigpending+0x7b/0xa0 [ 13.231658] ? __pfx_kthread+0x10/0x10 [ 13.231681] ret_from_fork+0x116/0x1d0 [ 13.231704] ? __pfx_kthread+0x10/0x10 [ 13.231726] ret_from_fork_asm+0x1a/0x30 [ 13.231761] </TASK> [ 13.231775] [ 13.241102] Allocated by task 176: [ 13.241387] kasan_save_stack+0x45/0x70 [ 13.241639] kasan_save_track+0x18/0x40 [ 13.241869] kasan_save_alloc_info+0x3b/0x50 [ 13.242038] __kasan_krealloc+0x190/0x1f0 [ 13.242418] krealloc_noprof+0xf3/0x340 [ 13.242674] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.242915] krealloc_less_oob+0x1c/0x30 [ 13.243094] kunit_try_run_case+0x1a5/0x480 [ 13.243365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.243588] kthread+0x337/0x6f0 [ 13.243748] ret_from_fork+0x116/0x1d0 [ 13.246501] ret_from_fork_asm+0x1a/0x30 [ 13.247293] [ 13.247816] The buggy address belongs to the object at ffff88810033a200 [ 13.247816] which belongs to the cache kmalloc-256 of size 256 [ 13.248544] The buggy address is located 33 bytes to the right of [ 13.248544] allocated 201-byte region [ffff88810033a200, ffff88810033a2c9) [ 13.250959] [ 13.252200] The buggy address belongs to the physical page: [ 13.252417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033a [ 13.252781] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.253644] flags: 0x200000000000040(head|node=0|zone=2) [ 13.254337] page_type: f5(slab) [ 13.254482] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.255338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.255843] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.256356] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.256949] head: 0200000000000001 ffffea000400ce81 00000000ffffffff 00000000ffffffff [ 13.257304] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.257680] page dumped because: kasan: bad access detected [ 13.258045] [ 13.258272] Memory state around the buggy address: [ 13.258461] ffff88810033a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.258858] ffff88810033a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.259239] >ffff88810033a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.259741] ^ [ 13.260835] ffff88810033a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.261218] ffff88810033a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.261764] ================================================================== [ 13.345431] ================================================================== [ 13.347166] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.347848] Write of size 1 at addr ffff8881028ee0c9 by task kunit_try_catch/180 [ 13.348501] [ 13.348720] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.348802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.348819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.348885] Call Trace: [ 13.348903] <TASK> [ 13.348958] dump_stack_lvl+0x73/0xb0 [ 13.349003] print_report+0xd1/0x650 [ 13.349044] ? __virt_addr_valid+0x1db/0x2d0 [ 13.349097] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.349127] ? kasan_addr_to_slab+0x11/0xa0 [ 13.349151] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.349180] kasan_report+0x141/0x180 [ 13.349205] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.349239] __asan_report_store1_noabort+0x1b/0x30 [ 13.349264] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.349294] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.349323] ? finish_task_switch.isra.0+0x153/0x700 [ 13.349377] ? __switch_to+0x47/0xf50 [ 13.349409] ? __schedule+0x10cc/0x2b60 [ 13.349436] ? __pfx_read_tsc+0x10/0x10 [ 13.349466] krealloc_large_less_oob+0x1c/0x30 [ 13.349493] kunit_try_run_case+0x1a5/0x480 [ 13.349525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.349551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.349580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.349608] ? __kthread_parkme+0x82/0x180 [ 13.349634] ? preempt_count_sub+0x50/0x80 [ 13.349660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.349689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.349716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.349745] kthread+0x337/0x6f0 [ 13.349767] ? trace_preempt_on+0x20/0xc0 [ 13.349805] ? __pfx_kthread+0x10/0x10 [ 13.349829] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.349854] ? calculate_sigpending+0x7b/0xa0 [ 13.349884] ? __pfx_kthread+0x10/0x10 [ 13.349909] ret_from_fork+0x116/0x1d0 [ 13.349931] ? __pfx_kthread+0x10/0x10 [ 13.349955] ret_from_fork_asm+0x1a/0x30 [ 13.349992] </TASK> [ 13.350006] [ 13.367335] The buggy address belongs to the physical page: [ 13.368555] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ec [ 13.369540] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.370683] flags: 0x200000000000040(head|node=0|zone=2) [ 13.371172] page_type: f8(unknown) [ 13.371519] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.372250] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.372775] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.373062] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.374089] head: 0200000000000002 ffffea00040a3b01 00000000ffffffff 00000000ffffffff [ 13.374942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.375575] page dumped because: kasan: bad access detected [ 13.375781] [ 13.375879] Memory state around the buggy address: [ 13.376057] ffff8881028edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.376305] ffff8881028ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.377184] >ffff8881028ee080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.377529] ^ [ 13.378075] ffff8881028ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.378633] ffff8881028ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.379521] ================================================================== [ 13.409947] ================================================================== [ 13.410328] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.410679] Write of size 1 at addr ffff8881028ee0da by task kunit_try_catch/180 [ 13.411068] [ 13.411224] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.411283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.411299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.411332] Call Trace: [ 13.411354] <TASK> [ 13.411482] dump_stack_lvl+0x73/0xb0 [ 13.411525] print_report+0xd1/0x650 [ 13.411553] ? __virt_addr_valid+0x1db/0x2d0 [ 13.411581] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.411609] ? kasan_addr_to_slab+0x11/0xa0 [ 13.411634] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.411662] kasan_report+0x141/0x180 [ 13.411688] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.411721] __asan_report_store1_noabort+0x1b/0x30 [ 13.411746] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.411777] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.411822] ? finish_task_switch.isra.0+0x153/0x700 [ 13.411848] ? __switch_to+0x47/0xf50 [ 13.411878] ? __schedule+0x10cc/0x2b60 [ 13.411904] ? __pfx_read_tsc+0x10/0x10 [ 13.411933] krealloc_large_less_oob+0x1c/0x30 [ 13.411959] kunit_try_run_case+0x1a5/0x480 [ 13.411989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.412016] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.412043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.412070] ? __kthread_parkme+0x82/0x180 [ 13.412095] ? preempt_count_sub+0x50/0x80 [ 13.412121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.412149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.412363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.412403] kthread+0x337/0x6f0 [ 13.412426] ? trace_preempt_on+0x20/0xc0 [ 13.412456] ? __pfx_kthread+0x10/0x10 [ 13.412480] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.412506] ? calculate_sigpending+0x7b/0xa0 [ 13.412535] ? __pfx_kthread+0x10/0x10 [ 13.412559] ret_from_fork+0x116/0x1d0 [ 13.412582] ? __pfx_kthread+0x10/0x10 [ 13.412606] ret_from_fork_asm+0x1a/0x30 [ 13.412642] </TASK> [ 13.412657] [ 13.421742] The buggy address belongs to the physical page: [ 13.421986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ec [ 13.422457] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.422881] flags: 0x200000000000040(head|node=0|zone=2) [ 13.423241] page_type: f8(unknown) [ 13.423402] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.423675] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.424064] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.424470] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.425278] head: 0200000000000002 ffffea00040a3b01 00000000ffffffff 00000000ffffffff [ 13.425570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.425949] page dumped because: kasan: bad access detected [ 13.426434] [ 13.426551] Memory state around the buggy address: [ 13.426832] ffff8881028edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.427230] ffff8881028ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.427567] >ffff8881028ee080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.427937] ^ [ 13.428415] ffff8881028ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.428761] ffff8881028ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.429075] ================================================================== [ 13.201922] ================================================================== [ 13.202432] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.202854] Write of size 1 at addr ffff88810033a2da by task kunit_try_catch/176 [ 13.203380] [ 13.203522] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.203574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.203588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.203612] Call Trace: [ 13.203627] <TASK> [ 13.203649] dump_stack_lvl+0x73/0xb0 [ 13.203686] print_report+0xd1/0x650 [ 13.203712] ? __virt_addr_valid+0x1db/0x2d0 [ 13.203737] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.203763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.203799] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.203826] kasan_report+0x141/0x180 [ 13.203863] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.203895] __asan_report_store1_noabort+0x1b/0x30 [ 13.203918] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.203959] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.203984] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.204017] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.204046] krealloc_less_oob+0x1c/0x30 [ 13.204091] kunit_try_run_case+0x1a5/0x480 [ 13.204119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.204317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.204346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.204372] ? __kthread_parkme+0x82/0x180 [ 13.204396] ? preempt_count_sub+0x50/0x80 [ 13.204422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.204448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.204474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.204499] kthread+0x337/0x6f0 [ 13.204520] ? trace_preempt_on+0x20/0xc0 [ 13.204547] ? __pfx_kthread+0x10/0x10 [ 13.204570] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.204593] ? calculate_sigpending+0x7b/0xa0 [ 13.204619] ? __pfx_kthread+0x10/0x10 [ 13.204643] ret_from_fork+0x116/0x1d0 [ 13.204665] ? __pfx_kthread+0x10/0x10 [ 13.204687] ret_from_fork_asm+0x1a/0x30 [ 13.204722] </TASK> [ 13.204736] [ 13.213934] Allocated by task 176: [ 13.214259] kasan_save_stack+0x45/0x70 [ 13.214506] kasan_save_track+0x18/0x40 [ 13.214726] kasan_save_alloc_info+0x3b/0x50 [ 13.214985] __kasan_krealloc+0x190/0x1f0 [ 13.215193] krealloc_noprof+0xf3/0x340 [ 13.215349] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.215608] krealloc_less_oob+0x1c/0x30 [ 13.215920] kunit_try_run_case+0x1a5/0x480 [ 13.216439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.216750] kthread+0x337/0x6f0 [ 13.216929] ret_from_fork+0x116/0x1d0 [ 13.217117] ret_from_fork_asm+0x1a/0x30 [ 13.217468] [ 13.217582] The buggy address belongs to the object at ffff88810033a200 [ 13.217582] which belongs to the cache kmalloc-256 of size 256 [ 13.218714] The buggy address is located 17 bytes to the right of [ 13.218714] allocated 201-byte region [ffff88810033a200, ffff88810033a2c9) [ 13.219335] [ 13.219441] The buggy address belongs to the physical page: [ 13.219708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033a [ 13.220958] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.221636] flags: 0x200000000000040(head|node=0|zone=2) [ 13.222237] page_type: f5(slab) [ 13.222437] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.222818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.223115] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.223519] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.223953] head: 0200000000000001 ffffea000400ce81 00000000ffffffff 00000000ffffffff [ 13.224612] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.225030] page dumped because: kasan: bad access detected [ 13.225447] [ 13.225563] Memory state around the buggy address: [ 13.225783] ffff88810033a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.226171] ffff88810033a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.226662] >ffff88810033a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.227017] ^ [ 13.227329] ffff88810033a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.227807] ffff88810033a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.228262] ================================================================== [ 13.262415] ================================================================== [ 13.262808] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.263359] Write of size 1 at addr ffff88810033a2eb by task kunit_try_catch/176 [ 13.263696] [ 13.263849] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.263902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.263916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.263941] Call Trace: [ 13.263963] <TASK> [ 13.263985] dump_stack_lvl+0x73/0xb0 [ 13.264022] print_report+0xd1/0x650 [ 13.264050] ? __virt_addr_valid+0x1db/0x2d0 [ 13.264100] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.264141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.264166] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.264192] kasan_report+0x141/0x180 [ 13.264216] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.264462] __asan_report_store1_noabort+0x1b/0x30 [ 13.264495] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.264556] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.264582] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.264632] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.264662] krealloc_less_oob+0x1c/0x30 [ 13.264685] kunit_try_run_case+0x1a5/0x480 [ 13.264712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.264736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.264763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.264804] ? __kthread_parkme+0x82/0x180 [ 13.264833] ? preempt_count_sub+0x50/0x80 [ 13.264861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.264889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.264913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.264938] kthread+0x337/0x6f0 [ 13.264959] ? trace_preempt_on+0x20/0xc0 [ 13.264985] ? __pfx_kthread+0x10/0x10 [ 13.265008] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.265031] ? calculate_sigpending+0x7b/0xa0 [ 13.265058] ? __pfx_kthread+0x10/0x10 [ 13.265082] ret_from_fork+0x116/0x1d0 [ 13.265106] ? __pfx_kthread+0x10/0x10 [ 13.265130] ret_from_fork_asm+0x1a/0x30 [ 13.265167] </TASK> [ 13.265181] [ 13.275732] Allocated by task 176: [ 13.276004] kasan_save_stack+0x45/0x70 [ 13.276188] kasan_save_track+0x18/0x40 [ 13.276527] kasan_save_alloc_info+0x3b/0x50 [ 13.276781] __kasan_krealloc+0x190/0x1f0 [ 13.277015] krealloc_noprof+0xf3/0x340 [ 13.277284] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.277534] krealloc_less_oob+0x1c/0x30 [ 13.277781] kunit_try_run_case+0x1a5/0x480 [ 13.278261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.278707] kthread+0x337/0x6f0 [ 13.278945] ret_from_fork+0x116/0x1d0 [ 13.279293] ret_from_fork_asm+0x1a/0x30 [ 13.279535] [ 13.279645] The buggy address belongs to the object at ffff88810033a200 [ 13.279645] which belongs to the cache kmalloc-256 of size 256 [ 13.280342] The buggy address is located 34 bytes to the right of [ 13.280342] allocated 201-byte region [ffff88810033a200, ffff88810033a2c9) [ 13.280894] [ 13.281031] The buggy address belongs to the physical page: [ 13.281535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033a [ 13.281960] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.282488] flags: 0x200000000000040(head|node=0|zone=2) [ 13.283056] page_type: f5(slab) [ 13.283239] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.283875] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.284287] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.284862] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.285513] head: 0200000000000001 ffffea000400ce81 00000000ffffffff 00000000ffffffff [ 13.285892] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.286733] page dumped because: kasan: bad access detected [ 13.287050] [ 13.287141] Memory state around the buggy address: [ 13.287391] ffff88810033a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.287757] ffff88810033a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.288564] >ffff88810033a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.288906] ^ [ 13.289356] ffff88810033a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.289640] ffff88810033a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.290003] ================================================================== [ 13.132485] ================================================================== [ 13.133568] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.134690] Write of size 1 at addr ffff88810033a2c9 by task kunit_try_catch/176 [ 13.134978] [ 13.135120] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.135220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.135236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.135278] Call Trace: [ 13.135312] <TASK> [ 13.135335] dump_stack_lvl+0x73/0xb0 [ 13.135373] print_report+0xd1/0x650 [ 13.135400] ? __virt_addr_valid+0x1db/0x2d0 [ 13.135427] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.135478] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135504] kasan_report+0x141/0x180 [ 13.135529] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135561] __asan_report_store1_noabort+0x1b/0x30 [ 13.135583] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135613] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.135642] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.135677] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.135706] krealloc_less_oob+0x1c/0x30 [ 13.135730] kunit_try_run_case+0x1a5/0x480 [ 13.135758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.135783] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.135823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.135849] ? __kthread_parkme+0x82/0x180 [ 13.135874] ? preempt_count_sub+0x50/0x80 [ 13.135901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.135927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.135952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.135977] kthread+0x337/0x6f0 [ 13.135998] ? trace_preempt_on+0x20/0xc0 [ 13.136024] ? __pfx_kthread+0x10/0x10 [ 13.136047] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.136091] ? calculate_sigpending+0x7b/0xa0 [ 13.136119] ? __pfx_kthread+0x10/0x10 [ 13.136161] ret_from_fork+0x116/0x1d0 [ 13.136183] ? __pfx_kthread+0x10/0x10 [ 13.136206] ret_from_fork_asm+0x1a/0x30 [ 13.136241] </TASK> [ 13.136254] [ 13.150102] Allocated by task 176: [ 13.150559] kasan_save_stack+0x45/0x70 [ 13.150977] kasan_save_track+0x18/0x40 [ 13.151395] kasan_save_alloc_info+0x3b/0x50 [ 13.151573] __kasan_krealloc+0x190/0x1f0 [ 13.151729] krealloc_noprof+0xf3/0x340 [ 13.151900] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.152085] krealloc_less_oob+0x1c/0x30 [ 13.152517] kunit_try_run_case+0x1a5/0x480 [ 13.152965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.153587] kthread+0x337/0x6f0 [ 13.153948] ret_from_fork+0x116/0x1d0 [ 13.154417] ret_from_fork_asm+0x1a/0x30 [ 13.154829] [ 13.155014] The buggy address belongs to the object at ffff88810033a200 [ 13.155014] which belongs to the cache kmalloc-256 of size 256 [ 13.156352] The buggy address is located 0 bytes to the right of [ 13.156352] allocated 201-byte region [ffff88810033a200, ffff88810033a2c9) [ 13.156833] [ 13.156919] The buggy address belongs to the physical page: [ 13.157284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033a [ 13.158087] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.158898] flags: 0x200000000000040(head|node=0|zone=2) [ 13.159537] page_type: f5(slab) [ 13.159887] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.160495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.161368] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.161741] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.162028] head: 0200000000000001 ffffea000400ce81 00000000ffffffff 00000000ffffffff [ 13.162298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.162556] page dumped because: kasan: bad access detected [ 13.162757] [ 13.162848] Memory state around the buggy address: [ 13.163026] ffff88810033a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.163266] ffff88810033a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.163509] >ffff88810033a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.163748] ^ [ 13.164262] ffff88810033a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.164947] ffff88810033a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.165920] ================================================================== [ 13.429843] ================================================================== [ 13.430284] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.430579] Write of size 1 at addr ffff8881028ee0ea by task kunit_try_catch/180 [ 13.430967] [ 13.431103] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.431162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.431177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.431210] Call Trace: [ 13.431231] <TASK> [ 13.431250] dump_stack_lvl+0x73/0xb0 [ 13.431285] print_report+0xd1/0x650 [ 13.431312] ? __virt_addr_valid+0x1db/0x2d0 [ 13.431339] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.431368] ? kasan_addr_to_slab+0x11/0xa0 [ 13.431393] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.431421] kasan_report+0x141/0x180 [ 13.431447] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.431481] __asan_report_store1_noabort+0x1b/0x30 [ 13.431506] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.431537] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.431566] ? finish_task_switch.isra.0+0x153/0x700 [ 13.431593] ? __switch_to+0x47/0xf50 [ 13.431624] ? __schedule+0x10cc/0x2b60 [ 13.431651] ? __pfx_read_tsc+0x10/0x10 [ 13.431680] krealloc_large_less_oob+0x1c/0x30 [ 13.431709] kunit_try_run_case+0x1a5/0x480 [ 13.431737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.431764] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.432072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.432112] ? __kthread_parkme+0x82/0x180 [ 13.432311] ? preempt_count_sub+0x50/0x80 [ 13.432348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.432378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.432407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.432435] kthread+0x337/0x6f0 [ 13.432458] ? trace_preempt_on+0x20/0xc0 [ 13.432487] ? __pfx_kthread+0x10/0x10 [ 13.432512] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.432540] ? calculate_sigpending+0x7b/0xa0 [ 13.432570] ? __pfx_kthread+0x10/0x10 [ 13.432597] ret_from_fork+0x116/0x1d0 [ 13.432623] ? __pfx_kthread+0x10/0x10 [ 13.432648] ret_from_fork_asm+0x1a/0x30 [ 13.432686] </TASK> [ 13.432700] [ 13.441936] The buggy address belongs to the physical page: [ 13.442327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ec [ 13.442635] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.443025] flags: 0x200000000000040(head|node=0|zone=2) [ 13.443504] page_type: f8(unknown) [ 13.443668] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.443958] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.444354] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.444749] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.445034] head: 0200000000000002 ffffea00040a3b01 00000000ffffffff 00000000ffffffff [ 13.445511] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.445913] page dumped because: kasan: bad access detected [ 13.446114] [ 13.446560] Memory state around the buggy address: [ 13.446858] ffff8881028edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.447155] ffff8881028ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.447475] >ffff8881028ee080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.448062] ^ [ 13.448556] ffff8881028ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.448902] ffff8881028ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.449355] ================================================================== [ 13.167156] ================================================================== [ 13.168382] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.169164] Write of size 1 at addr ffff88810033a2d0 by task kunit_try_catch/176 [ 13.169982] [ 13.170309] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.170367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.170381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.170406] Call Trace: [ 13.170430] <TASK> [ 13.170452] dump_stack_lvl+0x73/0xb0 [ 13.170489] print_report+0xd1/0x650 [ 13.170515] ? __virt_addr_valid+0x1db/0x2d0 [ 13.170541] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.170567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.170592] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.170618] kasan_report+0x141/0x180 [ 13.170642] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.170673] __asan_report_store1_noabort+0x1b/0x30 [ 13.170696] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.170724] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.170749] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.170782] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.170828] krealloc_less_oob+0x1c/0x30 [ 13.170852] kunit_try_run_case+0x1a5/0x480 [ 13.170880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.170903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.170929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.170954] ? __kthread_parkme+0x82/0x180 [ 13.170977] ? preempt_count_sub+0x50/0x80 [ 13.171003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.171029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.171053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.171078] kthread+0x337/0x6f0 [ 13.171099] ? trace_preempt_on+0x20/0xc0 [ 13.171125] ? __pfx_kthread+0x10/0x10 [ 13.171147] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.171170] ? calculate_sigpending+0x7b/0xa0 [ 13.171196] ? __pfx_kthread+0x10/0x10 [ 13.171220] ret_from_fork+0x116/0x1d0 [ 13.171244] ? __pfx_kthread+0x10/0x10 [ 13.171267] ret_from_fork_asm+0x1a/0x30 [ 13.171305] </TASK> [ 13.171319] [ 13.184526] Allocated by task 176: [ 13.185290] kasan_save_stack+0x45/0x70 [ 13.185603] kasan_save_track+0x18/0x40 [ 13.185844] kasan_save_alloc_info+0x3b/0x50 [ 13.186085] __kasan_krealloc+0x190/0x1f0 [ 13.186926] krealloc_noprof+0xf3/0x340 [ 13.187126] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.187317] krealloc_less_oob+0x1c/0x30 [ 13.187476] kunit_try_run_case+0x1a5/0x480 [ 13.187642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.187871] kthread+0x337/0x6f0 [ 13.188067] ret_from_fork+0x116/0x1d0 [ 13.188284] ret_from_fork_asm+0x1a/0x30 [ 13.188513] [ 13.188990] The buggy address belongs to the object at ffff88810033a200 [ 13.188990] which belongs to the cache kmalloc-256 of size 256 [ 13.190522] The buggy address is located 7 bytes to the right of [ 13.190522] allocated 201-byte region [ffff88810033a200, ffff88810033a2c9) [ 13.191463] [ 13.191676] The buggy address belongs to the physical page: [ 13.192063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033a [ 13.192948] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.193632] flags: 0x200000000000040(head|node=0|zone=2) [ 13.194293] page_type: f5(slab) [ 13.194442] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.194703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.194982] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.195505] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.195827] head: 0200000000000001 ffffea000400ce81 00000000ffffffff 00000000ffffffff [ 13.196458] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.196818] page dumped because: kasan: bad access detected [ 13.197107] [ 13.197218] Memory state around the buggy address: [ 13.197582] ffff88810033a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.197951] ffff88810033a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.198462] >ffff88810033a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.198821] ^ [ 13.199132] ffff88810033a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.199539] ffff88810033a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.199922] ================================================================== [ 13.449804] ================================================================== [ 13.450455] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.450889] Write of size 1 at addr ffff8881028ee0eb by task kunit_try_catch/180 [ 13.451366] [ 13.451498] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.451556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.451571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.451603] Call Trace: [ 13.451624] <TASK> [ 13.451642] dump_stack_lvl+0x73/0xb0 [ 13.451679] print_report+0xd1/0x650 [ 13.451706] ? __virt_addr_valid+0x1db/0x2d0 [ 13.451734] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.451763] ? kasan_addr_to_slab+0x11/0xa0 [ 13.451803] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.451833] kasan_report+0x141/0x180 [ 13.451859] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.451893] __asan_report_store1_noabort+0x1b/0x30 [ 13.451919] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.451950] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.451979] ? finish_task_switch.isra.0+0x153/0x700 [ 13.452005] ? __switch_to+0x47/0xf50 [ 13.452034] ? __schedule+0x10cc/0x2b60 [ 13.452060] ? __pfx_read_tsc+0x10/0x10 [ 13.452102] krealloc_large_less_oob+0x1c/0x30 [ 13.452129] kunit_try_run_case+0x1a5/0x480 [ 13.452157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.452183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.452212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.452241] ? __kthread_parkme+0x82/0x180 [ 13.452265] ? preempt_count_sub+0x50/0x80 [ 13.452292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.452320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.452348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.452377] kthread+0x337/0x6f0 [ 13.452399] ? trace_preempt_on+0x20/0xc0 [ 13.452426] ? __pfx_kthread+0x10/0x10 [ 13.452450] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.452476] ? calculate_sigpending+0x7b/0xa0 [ 13.452505] ? __pfx_kthread+0x10/0x10 [ 13.452530] ret_from_fork+0x116/0x1d0 [ 13.452552] ? __pfx_kthread+0x10/0x10 [ 13.452575] ret_from_fork_asm+0x1a/0x30 [ 13.452611] </TASK> [ 13.452624] [ 13.461414] The buggy address belongs to the physical page: [ 13.461630] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ec [ 13.461988] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.462376] flags: 0x200000000000040(head|node=0|zone=2) [ 13.462670] page_type: f8(unknown) [ 13.462884] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.463366] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.463636] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.464042] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.464436] head: 0200000000000002 ffffea00040a3b01 00000000ffffffff 00000000ffffffff [ 13.465002] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.465618] page dumped because: kasan: bad access detected [ 13.465897] [ 13.466006] Memory state around the buggy address: [ 13.466312] ffff8881028edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.466640] ffff8881028ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.466930] >ffff8881028ee080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.467174] ^ [ 13.467509] ffff8881028ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.467906] ffff8881028ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.468847] ==================================================================