Date
July 6, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.953785] ================================================================== [ 17.953839] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.953886] Write of size 1 at addr fff00000c78420c9 by task kunit_try_catch/162 [ 17.953933] [ 17.953989] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.954066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.954091] Hardware name: linux,dummy-virt (DT) [ 17.954126] Call trace: [ 17.954147] show_stack+0x20/0x38 (C) [ 17.954487] dump_stack_lvl+0x8c/0xd0 [ 17.955042] print_report+0x118/0x608 [ 17.955155] kasan_report+0xdc/0x128 [ 17.955369] __asan_report_store1_noabort+0x20/0x30 [ 17.955515] krealloc_less_oob_helper+0xa48/0xc50 [ 17.955648] krealloc_large_less_oob+0x20/0x38 [ 17.955804] kunit_try_run_case+0x170/0x3f0 [ 17.955868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.956039] kthread+0x328/0x630 [ 17.956085] ret_from_fork+0x10/0x20 [ 17.956327] [ 17.956445] The buggy address belongs to the physical page: [ 17.956498] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 17.956801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.956904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.957099] page_type: f8(unknown) [ 17.957329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.957392] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.957669] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.957794] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.957912] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 17.958088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.958239] page dumped because: kasan: bad access detected [ 17.958359] [ 17.958500] Memory state around the buggy address: [ 17.958560] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.958608] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.958870] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.958987] ^ [ 17.959078] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.959238] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.959325] ================================================================== [ 17.966154] ================================================================== [ 17.966207] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.966254] Write of size 1 at addr fff00000c78420da by task kunit_try_catch/162 [ 17.966301] [ 17.966589] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.966758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.966868] Hardware name: linux,dummy-virt (DT) [ 17.966917] Call trace: [ 17.966966] show_stack+0x20/0x38 (C) [ 17.967033] dump_stack_lvl+0x8c/0xd0 [ 17.967166] print_report+0x118/0x608 [ 17.967242] kasan_report+0xdc/0x128 [ 17.967287] __asan_report_store1_noabort+0x20/0x30 [ 17.967333] krealloc_less_oob_helper+0xa80/0xc50 [ 17.967380] krealloc_large_less_oob+0x20/0x38 [ 17.967484] kunit_try_run_case+0x170/0x3f0 [ 17.967531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.967582] kthread+0x328/0x630 [ 17.967622] ret_from_fork+0x10/0x20 [ 17.967667] [ 17.967686] The buggy address belongs to the physical page: [ 17.967715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 17.967767] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.967811] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.967868] page_type: f8(unknown) [ 17.967905] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.967961] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.968017] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.968063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.968110] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 17.968156] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.968203] page dumped because: kasan: bad access detected [ 17.968634] [ 17.968657] Memory state around the buggy address: [ 17.968688] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.968730] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.968966] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.969113] ^ [ 17.969160] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.969279] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.969322] ================================================================== [ 17.928597] ================================================================== [ 17.928724] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.928962] Write of size 1 at addr fff00000c0b97ceb by task kunit_try_catch/158 [ 17.929010] [ 17.929575] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.929676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.929702] Hardware name: linux,dummy-virt (DT) [ 17.929792] Call trace: [ 17.929814] show_stack+0x20/0x38 (C) [ 17.929863] dump_stack_lvl+0x8c/0xd0 [ 17.929908] print_report+0x118/0x608 [ 17.929960] kasan_report+0xdc/0x128 [ 17.930004] __asan_report_store1_noabort+0x20/0x30 [ 17.930051] krealloc_less_oob_helper+0xa58/0xc50 [ 17.930101] krealloc_less_oob+0x20/0x38 [ 17.930146] kunit_try_run_case+0x170/0x3f0 [ 17.930200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.930376] kthread+0x328/0x630 [ 17.930602] ret_from_fork+0x10/0x20 [ 17.930821] [ 17.930841] Allocated by task 158: [ 17.930868] kasan_save_stack+0x3c/0x68 [ 17.930908] kasan_save_track+0x20/0x40 [ 17.930964] kasan_save_alloc_info+0x40/0x58 [ 17.931012] __kasan_krealloc+0x118/0x178 [ 17.931049] krealloc_noprof+0x128/0x360 [ 17.931084] krealloc_less_oob_helper+0x168/0xc50 [ 17.931122] krealloc_less_oob+0x20/0x38 [ 17.931159] kunit_try_run_case+0x170/0x3f0 [ 17.931206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.931247] kthread+0x328/0x630 [ 17.931279] ret_from_fork+0x10/0x20 [ 17.931314] [ 17.931332] The buggy address belongs to the object at fff00000c0b97c00 [ 17.931332] which belongs to the cache kmalloc-256 of size 256 [ 17.931386] The buggy address is located 34 bytes to the right of [ 17.931386] allocated 201-byte region [fff00000c0b97c00, fff00000c0b97cc9) [ 17.931447] [ 17.931476] The buggy address belongs to the physical page: [ 17.931505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b96 [ 17.931578] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.931638] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.931695] page_type: f5(slab) [ 17.931732] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.931785] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.931842] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.931898] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.931944] head: 0bfffe0000000001 ffffc1ffc302e581 00000000ffffffff 00000000ffffffff [ 17.931990] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.932028] page dumped because: kasan: bad access detected [ 17.932066] [ 17.932084] Memory state around the buggy address: [ 17.932113] fff00000c0b97b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.932154] fff00000c0b97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.932212] >fff00000c0b97c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.933024] ^ [ 17.933104] fff00000c0b97d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.933155] fff00000c0b97d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.933271] ================================================================== [ 17.960529] ================================================================== [ 17.960595] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.960696] Write of size 1 at addr fff00000c78420d0 by task kunit_try_catch/162 [ 17.960773] [ 17.960821] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.960905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.960930] Hardware name: linux,dummy-virt (DT) [ 17.961143] Call trace: [ 17.961283] show_stack+0x20/0x38 (C) [ 17.961338] dump_stack_lvl+0x8c/0xd0 [ 17.961401] print_report+0x118/0x608 [ 17.961447] kasan_report+0xdc/0x128 [ 17.961612] __asan_report_store1_noabort+0x20/0x30 [ 17.961696] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.961744] krealloc_large_less_oob+0x20/0x38 [ 17.961818] kunit_try_run_case+0x170/0x3f0 [ 17.961987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.962159] kthread+0x328/0x630 [ 17.962239] ret_from_fork+0x10/0x20 [ 17.962426] [ 17.962516] The buggy address belongs to the physical page: [ 17.962729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 17.962786] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.962839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.962888] page_type: f8(unknown) [ 17.962992] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.963113] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.963289] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.963376] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.963490] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 17.963588] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.963702] page dumped because: kasan: bad access detected [ 17.963790] [ 17.963833] Memory state around the buggy address: [ 17.963864] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.964079] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.964136] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.964203] ^ [ 17.964271] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.964424] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.964560] ================================================================== [ 17.969391] ================================================================== [ 17.969432] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.969702] Write of size 1 at addr fff00000c78420ea by task kunit_try_catch/162 [ 17.969791] [ 17.969873] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.970007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.970135] Hardware name: linux,dummy-virt (DT) [ 17.970301] Call trace: [ 17.970433] show_stack+0x20/0x38 (C) [ 17.970521] dump_stack_lvl+0x8c/0xd0 [ 17.970701] print_report+0x118/0x608 [ 17.970748] kasan_report+0xdc/0x128 [ 17.970793] __asan_report_store1_noabort+0x20/0x30 [ 17.970898] krealloc_less_oob_helper+0xae4/0xc50 [ 17.971069] krealloc_large_less_oob+0x20/0x38 [ 17.971244] kunit_try_run_case+0x170/0x3f0 [ 17.971332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.971427] kthread+0x328/0x630 [ 17.971604] ret_from_fork+0x10/0x20 [ 17.971757] [ 17.971777] The buggy address belongs to the physical page: [ 17.971807] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 17.972133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.972267] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.972424] page_type: f8(unknown) [ 17.972553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.972642] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.972843] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.972908] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.973282] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 17.973377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.973488] page dumped because: kasan: bad access detected [ 17.973519] [ 17.973537] Memory state around the buggy address: [ 17.973567] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.973608] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.973648] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.973683] ^ [ 17.973722] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.973763] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.973798] ================================================================== [ 17.974819] ================================================================== [ 17.974885] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.975134] Write of size 1 at addr fff00000c78420eb by task kunit_try_catch/162 [ 17.975222] [ 17.975349] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.975565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.975611] Hardware name: linux,dummy-virt (DT) [ 17.975670] Call trace: [ 17.975709] show_stack+0x20/0x38 (C) [ 17.975815] dump_stack_lvl+0x8c/0xd0 [ 17.975862] print_report+0x118/0x608 [ 17.975907] kasan_report+0xdc/0x128 [ 17.975950] __asan_report_store1_noabort+0x20/0x30 [ 17.976002] krealloc_less_oob_helper+0xa58/0xc50 [ 17.976334] krealloc_large_less_oob+0x20/0x38 [ 17.976467] kunit_try_run_case+0x170/0x3f0 [ 17.976517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.976568] kthread+0x328/0x630 [ 17.976609] ret_from_fork+0x10/0x20 [ 17.976666] [ 17.976686] The buggy address belongs to the physical page: [ 17.976715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 17.976765] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.976810] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.976864] page_type: f8(unknown) [ 17.976902] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.976960] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.977009] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.977055] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.977110] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 17.977167] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.977215] page dumped because: kasan: bad access detected [ 17.977249] [ 17.977267] Memory state around the buggy address: [ 17.977305] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.977347] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.977395] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.977432] ^ [ 17.977468] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.977826] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.977907] ================================================================== [ 17.915402] ================================================================== [ 17.915479] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.915545] Write of size 1 at addr fff00000c0b97cda by task kunit_try_catch/158 [ 17.915643] [ 17.915713] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.915792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.915818] Hardware name: linux,dummy-virt (DT) [ 17.916022] Call trace: [ 17.916068] show_stack+0x20/0x38 (C) [ 17.916176] dump_stack_lvl+0x8c/0xd0 [ 17.916243] print_report+0x118/0x608 [ 17.916382] kasan_report+0xdc/0x128 [ 17.916474] __asan_report_store1_noabort+0x20/0x30 [ 17.916560] krealloc_less_oob_helper+0xa80/0xc50 [ 17.916616] krealloc_less_oob+0x20/0x38 [ 17.916963] kunit_try_run_case+0x170/0x3f0 [ 17.917048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.917102] kthread+0x328/0x630 [ 17.917154] ret_from_fork+0x10/0x20 [ 17.917365] [ 17.917514] Allocated by task 158: [ 17.917594] kasan_save_stack+0x3c/0x68 [ 17.917770] kasan_save_track+0x20/0x40 [ 17.917819] kasan_save_alloc_info+0x40/0x58 [ 17.917867] __kasan_krealloc+0x118/0x178 [ 17.917911] krealloc_noprof+0x128/0x360 [ 17.918185] krealloc_less_oob_helper+0x168/0xc50 [ 17.918376] krealloc_less_oob+0x20/0x38 [ 17.918599] kunit_try_run_case+0x170/0x3f0 [ 17.918742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.918866] kthread+0x328/0x630 [ 17.919018] ret_from_fork+0x10/0x20 [ 17.919063] [ 17.919144] The buggy address belongs to the object at fff00000c0b97c00 [ 17.919144] which belongs to the cache kmalloc-256 of size 256 [ 17.919323] The buggy address is located 17 bytes to the right of [ 17.919323] allocated 201-byte region [fff00000c0b97c00, fff00000c0b97cc9) [ 17.919414] [ 17.919434] The buggy address belongs to the physical page: [ 17.919472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b96 [ 17.919539] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.919583] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.919633] page_type: f5(slab) [ 17.919687] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.919745] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.919803] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.919849] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.919896] head: 0bfffe0000000001 ffffc1ffc302e581 00000000ffffffff 00000000ffffffff [ 17.919942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.919979] page dumped because: kasan: bad access detected [ 17.920023] [ 17.920042] Memory state around the buggy address: [ 17.920072] fff00000c0b97b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.920112] fff00000c0b97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.920160] >fff00000c0b97c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.920223] ^ [ 17.920274] fff00000c0b97d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.920334] fff00000c0b97d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.920379] ================================================================== [ 17.907217] ================================================================== [ 17.907489] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.907535] Write of size 1 at addr fff00000c0b97cd0 by task kunit_try_catch/158 [ 17.907840] [ 17.907873] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.908416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.908456] Hardware name: linux,dummy-virt (DT) [ 17.908488] Call trace: [ 17.908508] show_stack+0x20/0x38 (C) [ 17.908557] dump_stack_lvl+0x8c/0xd0 [ 17.908624] print_report+0x118/0x608 [ 17.908681] kasan_report+0xdc/0x128 [ 17.908727] __asan_report_store1_noabort+0x20/0x30 [ 17.908773] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.908819] krealloc_less_oob+0x20/0x38 [ 17.908862] kunit_try_run_case+0x170/0x3f0 [ 17.908907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.909036] kthread+0x328/0x630 [ 17.909081] ret_from_fork+0x10/0x20 [ 17.909127] [ 17.909145] Allocated by task 158: [ 17.909172] kasan_save_stack+0x3c/0x68 [ 17.909436] kasan_save_track+0x20/0x40 [ 17.909588] kasan_save_alloc_info+0x40/0x58 [ 17.909907] __kasan_krealloc+0x118/0x178 [ 17.909955] krealloc_noprof+0x128/0x360 [ 17.910102] krealloc_less_oob_helper+0x168/0xc50 [ 17.910257] krealloc_less_oob+0x20/0x38 [ 17.910365] kunit_try_run_case+0x170/0x3f0 [ 17.910441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.910547] kthread+0x328/0x630 [ 17.910869] ret_from_fork+0x10/0x20 [ 17.910977] [ 17.911097] The buggy address belongs to the object at fff00000c0b97c00 [ 17.911097] which belongs to the cache kmalloc-256 of size 256 [ 17.911156] The buggy address is located 7 bytes to the right of [ 17.911156] allocated 201-byte region [fff00000c0b97c00, fff00000c0b97cc9) [ 17.911530] [ 17.911578] The buggy address belongs to the physical page: [ 17.911616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b96 [ 17.911702] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.911748] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.912113] page_type: f5(slab) [ 17.912322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.912394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.912464] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.912712] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.912837] head: 0bfffe0000000001 ffffc1ffc302e581 00000000ffffffff 00000000ffffffff [ 17.913099] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.913228] page dumped because: kasan: bad access detected [ 17.913288] [ 17.913352] Memory state around the buggy address: [ 17.913501] fff00000c0b97b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.913715] fff00000c0b97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.914078] >fff00000c0b97c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.914160] ^ [ 17.914311] fff00000c0b97d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.914377] fff00000c0b97d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.914515] ================================================================== [ 17.902713] ================================================================== [ 17.902773] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.902824] Write of size 1 at addr fff00000c0b97cc9 by task kunit_try_catch/158 [ 17.902872] [ 17.902903] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.902979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.903004] Hardware name: linux,dummy-virt (DT) [ 17.903033] Call trace: [ 17.903054] show_stack+0x20/0x38 (C) [ 17.903129] dump_stack_lvl+0x8c/0xd0 [ 17.903175] print_report+0x118/0x608 [ 17.903240] kasan_report+0xdc/0x128 [ 17.903284] __asan_report_store1_noabort+0x20/0x30 [ 17.903330] krealloc_less_oob_helper+0xa48/0xc50 [ 17.903386] krealloc_less_oob+0x20/0x38 [ 17.903430] kunit_try_run_case+0x170/0x3f0 [ 17.903484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.903535] kthread+0x328/0x630 [ 17.903576] ret_from_fork+0x10/0x20 [ 17.903631] [ 17.903649] Allocated by task 158: [ 17.903682] kasan_save_stack+0x3c/0x68 [ 17.903721] kasan_save_track+0x20/0x40 [ 17.903757] kasan_save_alloc_info+0x40/0x58 [ 17.903801] __kasan_krealloc+0x118/0x178 [ 17.903838] krealloc_noprof+0x128/0x360 [ 17.903873] krealloc_less_oob_helper+0x168/0xc50 [ 17.903917] krealloc_less_oob+0x20/0x38 [ 17.903952] kunit_try_run_case+0x170/0x3f0 [ 17.903995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.904036] kthread+0x328/0x630 [ 17.904067] ret_from_fork+0x10/0x20 [ 17.904102] [ 17.904120] The buggy address belongs to the object at fff00000c0b97c00 [ 17.904120] which belongs to the cache kmalloc-256 of size 256 [ 17.904173] The buggy address is located 0 bytes to the right of [ 17.904173] allocated 201-byte region [fff00000c0b97c00, fff00000c0b97cc9) [ 17.904518] [ 17.904546] The buggy address belongs to the physical page: [ 17.904610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b96 [ 17.904669] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.904714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.904810] page_type: f5(slab) [ 17.905137] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.905205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.905254] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.905336] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.905586] head: 0bfffe0000000001 ffffc1ffc302e581 00000000ffffffff 00000000ffffffff [ 17.905676] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.905805] page dumped because: kasan: bad access detected [ 17.905837] [ 17.905855] Memory state around the buggy address: [ 17.905958] fff00000c0b97b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906098] fff00000c0b97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.906157] >fff00000c0b97c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.906405] ^ [ 17.906453] fff00000c0b97d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906495] fff00000c0b97d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906532] ================================================================== [ 17.920959] ================================================================== [ 17.921023] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.921081] Write of size 1 at addr fff00000c0b97cea by task kunit_try_catch/158 [ 17.921179] [ 17.921266] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.921346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.921407] Hardware name: linux,dummy-virt (DT) [ 17.921540] Call trace: [ 17.921898] show_stack+0x20/0x38 (C) [ 17.921952] dump_stack_lvl+0x8c/0xd0 [ 17.921997] print_report+0x118/0x608 [ 17.922159] kasan_report+0xdc/0x128 [ 17.922342] __asan_report_store1_noabort+0x20/0x30 [ 17.922458] krealloc_less_oob_helper+0xae4/0xc50 [ 17.922631] krealloc_less_oob+0x20/0x38 [ 17.922725] kunit_try_run_case+0x170/0x3f0 [ 17.922938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.923000] kthread+0x328/0x630 [ 17.923040] ret_from_fork+0x10/0x20 [ 17.923114] [ 17.923132] Allocated by task 158: [ 17.923159] kasan_save_stack+0x3c/0x68 [ 17.923424] kasan_save_track+0x20/0x40 [ 17.923572] kasan_save_alloc_info+0x40/0x58 [ 17.923669] __kasan_krealloc+0x118/0x178 [ 17.923859] krealloc_noprof+0x128/0x360 [ 17.923927] krealloc_less_oob_helper+0x168/0xc50 [ 17.924216] krealloc_less_oob+0x20/0x38 [ 17.924377] kunit_try_run_case+0x170/0x3f0 [ 17.924581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.924678] kthread+0x328/0x630 [ 17.924811] ret_from_fork+0x10/0x20 [ 17.924868] [ 17.924929] The buggy address belongs to the object at fff00000c0b97c00 [ 17.924929] which belongs to the cache kmalloc-256 of size 256 [ 17.925188] The buggy address is located 33 bytes to the right of [ 17.925188] allocated 201-byte region [fff00000c0b97c00, fff00000c0b97cc9) [ 17.925457] [ 17.925515] The buggy address belongs to the physical page: [ 17.925696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b96 [ 17.925867] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.925945] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.926016] page_type: f5(slab) [ 17.926053] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.926317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.926485] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.926561] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.926707] head: 0bfffe0000000001 ffffc1ffc302e581 00000000ffffffff 00000000ffffffff [ 17.926820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.926940] page dumped because: kasan: bad access detected [ 17.927020] [ 17.927083] Memory state around the buggy address: [ 17.927202] fff00000c0b97b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927247] fff00000c0b97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.927320] >fff00000c0b97c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.927530] ^ [ 17.927745] fff00000c0b97d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927838] fff00000c0b97d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.928000] ==================================================================
[ 11.325843] ================================================================== [ 11.326509] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.327146] Write of size 1 at addr ffff8881003502ea by task kunit_try_catch/175 [ 11.327741] [ 11.327991] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.328034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.328046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.328066] Call Trace: [ 11.328084] <TASK> [ 11.328102] dump_stack_lvl+0x73/0xb0 [ 11.328130] print_report+0xd1/0x650 [ 11.328153] ? __virt_addr_valid+0x1db/0x2d0 [ 11.328175] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.328197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.328218] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.328241] kasan_report+0x141/0x180 [ 11.328263] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.328302] __asan_report_store1_noabort+0x1b/0x30 [ 11.328322] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.328347] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.328381] ? finish_task_switch.isra.0+0x153/0x700 [ 11.328403] ? __switch_to+0x47/0xf50 [ 11.328428] ? __schedule+0x10cc/0x2b60 [ 11.328449] ? __pfx_read_tsc+0x10/0x10 [ 11.328479] krealloc_less_oob+0x1c/0x30 [ 11.328500] kunit_try_run_case+0x1a5/0x480 [ 11.328523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.328545] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.328567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.328589] ? __kthread_parkme+0x82/0x180 [ 11.328609] ? preempt_count_sub+0x50/0x80 [ 11.328631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.328654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.328676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.328698] kthread+0x337/0x6f0 [ 11.328717] ? trace_preempt_on+0x20/0xc0 [ 11.328740] ? __pfx_kthread+0x10/0x10 [ 11.328760] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.328780] ? calculate_sigpending+0x7b/0xa0 [ 11.328803] ? __pfx_kthread+0x10/0x10 [ 11.328824] ret_from_fork+0x116/0x1d0 [ 11.328841] ? __pfx_kthread+0x10/0x10 [ 11.328861] ret_from_fork_asm+0x1a/0x30 [ 11.328890] </TASK> [ 11.328901] [ 11.343122] Allocated by task 175: [ 11.343370] kasan_save_stack+0x45/0x70 [ 11.343810] kasan_save_track+0x18/0x40 [ 11.344012] kasan_save_alloc_info+0x3b/0x50 [ 11.344232] __kasan_krealloc+0x190/0x1f0 [ 11.344640] krealloc_noprof+0xf3/0x340 [ 11.345105] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.345588] krealloc_less_oob+0x1c/0x30 [ 11.346029] kunit_try_run_case+0x1a5/0x480 [ 11.346193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.346368] kthread+0x337/0x6f0 [ 11.346694] ret_from_fork+0x116/0x1d0 [ 11.346833] ret_from_fork_asm+0x1a/0x30 [ 11.347018] [ 11.347210] The buggy address belongs to the object at ffff888100350200 [ 11.347210] which belongs to the cache kmalloc-256 of size 256 [ 11.348400] The buggy address is located 33 bytes to the right of [ 11.348400] allocated 201-byte region [ffff888100350200, ffff8881003502c9) [ 11.349646] [ 11.349721] The buggy address belongs to the physical page: [ 11.349907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.350546] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.350968] flags: 0x200000000000040(head|node=0|zone=2) [ 11.351354] page_type: f5(slab) [ 11.351662] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.352502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.353234] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.353803] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.354399] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.354667] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.355354] page dumped because: kasan: bad access detected [ 11.355758] [ 11.355835] Memory state around the buggy address: [ 11.356079] ffff888100350180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.356788] ffff888100350200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.357402] >ffff888100350280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.358147] ^ [ 11.358606] ffff888100350300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.359186] ffff888100350380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.359978] ================================================================== [ 11.448829] ================================================================== [ 11.449370] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.449706] Write of size 1 at addr ffff888102b720c9 by task kunit_try_catch/179 [ 11.450015] [ 11.450123] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.450167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.450179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.450200] Call Trace: [ 11.450213] <TASK> [ 11.450230] dump_stack_lvl+0x73/0xb0 [ 11.450258] print_report+0xd1/0x650 [ 11.450280] ? __virt_addr_valid+0x1db/0x2d0 [ 11.450302] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.450325] ? kasan_addr_to_slab+0x11/0xa0 [ 11.450344] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.450368] kasan_report+0x141/0x180 [ 11.450389] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.450416] __asan_report_store1_noabort+0x1b/0x30 [ 11.450436] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.450460] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.450483] ? finish_task_switch.isra.0+0x153/0x700 [ 11.450505] ? __switch_to+0x47/0xf50 [ 11.450529] ? __schedule+0x10cc/0x2b60 [ 11.450551] ? __pfx_read_tsc+0x10/0x10 [ 11.450573] krealloc_large_less_oob+0x1c/0x30 [ 11.450595] kunit_try_run_case+0x1a5/0x480 [ 11.450620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.450641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.450663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.450684] ? __kthread_parkme+0x82/0x180 [ 11.450705] ? preempt_count_sub+0x50/0x80 [ 11.450726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.450748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.450770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.450791] kthread+0x337/0x6f0 [ 11.450811] ? trace_preempt_on+0x20/0xc0 [ 11.450833] ? __pfx_kthread+0x10/0x10 [ 11.450853] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.450873] ? calculate_sigpending+0x7b/0xa0 [ 11.450897] ? __pfx_kthread+0x10/0x10 [ 11.450917] ret_from_fork+0x116/0x1d0 [ 11.450966] ? __pfx_kthread+0x10/0x10 [ 11.450986] ret_from_fork_asm+0x1a/0x30 [ 11.451016] </TASK> [ 11.451027] [ 11.462924] The buggy address belongs to the physical page: [ 11.463228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b70 [ 11.463732] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.464236] flags: 0x200000000000040(head|node=0|zone=2) [ 11.464621] page_type: f8(unknown) [ 11.464793] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.465336] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.465808] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.466300] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.466547] head: 0200000000000002 ffffea00040adc01 00000000ffffffff 00000000ffffffff [ 11.466780] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.467025] page dumped because: kasan: bad access detected [ 11.467252] [ 11.467349] Memory state around the buggy address: [ 11.467596] ffff888102b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.467871] ffff888102b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.468193] >ffff888102b72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.468455] ^ [ 11.468707] ffff888102b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.468999] ffff888102b72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.469328] ================================================================== [ 11.513518] ================================================================== [ 11.513868] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.514643] Write of size 1 at addr ffff888102b720ea by task kunit_try_catch/179 [ 11.514915] [ 11.515040] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.515092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.515108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.515127] Call Trace: [ 11.515154] <TASK> [ 11.515170] dump_stack_lvl+0x73/0xb0 [ 11.515207] print_report+0xd1/0x650 [ 11.515228] ? __virt_addr_valid+0x1db/0x2d0 [ 11.515249] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.515282] ? kasan_addr_to_slab+0x11/0xa0 [ 11.515302] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.515325] kasan_report+0x141/0x180 [ 11.515347] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.515374] __asan_report_store1_noabort+0x1b/0x30 [ 11.515394] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.515420] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.515443] ? finish_task_switch.isra.0+0x153/0x700 [ 11.515464] ? __switch_to+0x47/0xf50 [ 11.515498] ? __schedule+0x10cc/0x2b60 [ 11.515520] ? __pfx_read_tsc+0x10/0x10 [ 11.515544] krealloc_large_less_oob+0x1c/0x30 [ 11.515577] kunit_try_run_case+0x1a5/0x480 [ 11.515600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.515623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.515655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.515677] ? __kthread_parkme+0x82/0x180 [ 11.515697] ? preempt_count_sub+0x50/0x80 [ 11.515719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.515752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.515774] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.515796] kthread+0x337/0x6f0 [ 11.515824] ? trace_preempt_on+0x20/0xc0 [ 11.515846] ? __pfx_kthread+0x10/0x10 [ 11.515866] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.515896] ? calculate_sigpending+0x7b/0xa0 [ 11.515920] ? __pfx_kthread+0x10/0x10 [ 11.515948] ret_from_fork+0x116/0x1d0 [ 11.515966] ? __pfx_kthread+0x10/0x10 [ 11.515986] ret_from_fork_asm+0x1a/0x30 [ 11.516016] </TASK> [ 11.516027] [ 11.523913] The buggy address belongs to the physical page: [ 11.524212] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b70 [ 11.524623] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.524923] flags: 0x200000000000040(head|node=0|zone=2) [ 11.525250] page_type: f8(unknown) [ 11.525392] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.525745] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.526019] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.526451] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.526806] head: 0200000000000002 ffffea00040adc01 00000000ffffffff 00000000ffffffff [ 11.527244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.527594] page dumped because: kasan: bad access detected [ 11.527836] [ 11.527944] Memory state around the buggy address: [ 11.528199] ffff888102b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.528500] ffff888102b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.528793] >ffff888102b72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.529142] ^ [ 11.529408] ffff888102b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.529646] ffff888102b72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.529856] ================================================================== [ 11.360642] ================================================================== [ 11.360883] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.361600] Write of size 1 at addr ffff8881003502eb by task kunit_try_catch/175 [ 11.362381] [ 11.362558] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.362601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.362612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.362633] Call Trace: [ 11.362651] <TASK> [ 11.362669] dump_stack_lvl+0x73/0xb0 [ 11.362697] print_report+0xd1/0x650 [ 11.362719] ? __virt_addr_valid+0x1db/0x2d0 [ 11.362741] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.362763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.362785] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.362808] kasan_report+0x141/0x180 [ 11.362829] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.362856] __asan_report_store1_noabort+0x1b/0x30 [ 11.362876] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.362911] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.362951] ? finish_task_switch.isra.0+0x153/0x700 [ 11.362973] ? __switch_to+0x47/0xf50 [ 11.363007] ? __schedule+0x10cc/0x2b60 [ 11.363028] ? __pfx_read_tsc+0x10/0x10 [ 11.363051] krealloc_less_oob+0x1c/0x30 [ 11.363082] kunit_try_run_case+0x1a5/0x480 [ 11.363111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.363133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.363155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.363178] ? __kthread_parkme+0x82/0x180 [ 11.363198] ? preempt_count_sub+0x50/0x80 [ 11.363220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.363244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.363267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.363289] kthread+0x337/0x6f0 [ 11.363308] ? trace_preempt_on+0x20/0xc0 [ 11.363331] ? __pfx_kthread+0x10/0x10 [ 11.363351] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.363371] ? calculate_sigpending+0x7b/0xa0 [ 11.363394] ? __pfx_kthread+0x10/0x10 [ 11.363418] ret_from_fork+0x116/0x1d0 [ 11.363439] ? __pfx_kthread+0x10/0x10 [ 11.363472] ret_from_fork_asm+0x1a/0x30 [ 11.363504] </TASK> [ 11.363515] [ 11.376379] Allocated by task 175: [ 11.376768] kasan_save_stack+0x45/0x70 [ 11.377162] kasan_save_track+0x18/0x40 [ 11.377561] kasan_save_alloc_info+0x3b/0x50 [ 11.377945] __kasan_krealloc+0x190/0x1f0 [ 11.378344] krealloc_noprof+0xf3/0x340 [ 11.378967] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.379523] krealloc_less_oob+0x1c/0x30 [ 11.379770] kunit_try_run_case+0x1a5/0x480 [ 11.379920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.380192] kthread+0x337/0x6f0 [ 11.380491] ret_from_fork+0x116/0x1d0 [ 11.380915] ret_from_fork_asm+0x1a/0x30 [ 11.381338] [ 11.381505] The buggy address belongs to the object at ffff888100350200 [ 11.381505] which belongs to the cache kmalloc-256 of size 256 [ 11.382365] The buggy address is located 34 bytes to the right of [ 11.382365] allocated 201-byte region [ffff888100350200, ffff8881003502c9) [ 11.383593] [ 11.383794] The buggy address belongs to the physical page: [ 11.384353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.384937] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.385277] flags: 0x200000000000040(head|node=0|zone=2) [ 11.385778] page_type: f5(slab) [ 11.386099] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.386909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.387607] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.388319] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.388813] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.389563] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.389961] page dumped because: kasan: bad access detected [ 11.390267] [ 11.390422] Memory state around the buggy address: [ 11.391049] ffff888100350180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.391760] ffff888100350200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.392019] >ffff888100350280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.392429] ^ [ 11.393033] ffff888100350300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.393749] ffff888100350380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.394373] ================================================================== [ 11.470137] ================================================================== [ 11.470887] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.471228] Write of size 1 at addr ffff888102b720d0 by task kunit_try_catch/179 [ 11.471671] [ 11.471844] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.471885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.471897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.471918] Call Trace: [ 11.471942] <TASK> [ 11.471958] dump_stack_lvl+0x73/0xb0 [ 11.471985] print_report+0xd1/0x650 [ 11.472007] ? __virt_addr_valid+0x1db/0x2d0 [ 11.472030] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.472052] ? kasan_addr_to_slab+0x11/0xa0 [ 11.472072] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.472096] kasan_report+0x141/0x180 [ 11.472118] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.472145] __asan_report_store1_noabort+0x1b/0x30 [ 11.472165] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.472193] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.472218] ? finish_task_switch.isra.0+0x153/0x700 [ 11.472240] ? __switch_to+0x47/0xf50 [ 11.472264] ? __schedule+0x10cc/0x2b60 [ 11.472285] ? __pfx_read_tsc+0x10/0x10 [ 11.472309] krealloc_large_less_oob+0x1c/0x30 [ 11.472331] kunit_try_run_case+0x1a5/0x480 [ 11.472354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.472376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.472398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.472420] ? __kthread_parkme+0x82/0x180 [ 11.472440] ? preempt_count_sub+0x50/0x80 [ 11.472462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.472484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.472506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.472528] kthread+0x337/0x6f0 [ 11.472546] ? trace_preempt_on+0x20/0xc0 [ 11.472569] ? __pfx_kthread+0x10/0x10 [ 11.472589] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.472609] ? calculate_sigpending+0x7b/0xa0 [ 11.472702] ? __pfx_kthread+0x10/0x10 [ 11.472726] ret_from_fork+0x116/0x1d0 [ 11.472744] ? __pfx_kthread+0x10/0x10 [ 11.472765] ret_from_fork_asm+0x1a/0x30 [ 11.472795] </TASK> [ 11.472806] [ 11.485817] The buggy address belongs to the physical page: [ 11.486735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b70 [ 11.487296] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.487526] flags: 0x200000000000040(head|node=0|zone=2) [ 11.487704] page_type: f8(unknown) [ 11.487830] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.489217] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.489798] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.490651] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.491365] head: 0200000000000002 ffffea00040adc01 00000000ffffffff 00000000ffffffff [ 11.491689] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.492023] page dumped because: kasan: bad access detected [ 11.492694] [ 11.492778] Memory state around the buggy address: [ 11.493207] ffff888102b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.493612] ffff888102b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.494039] >ffff888102b72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.494492] ^ [ 11.494851] ffff888102b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.495272] ffff888102b72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.495576] ================================================================== [ 11.290471] ================================================================== [ 11.291133] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.291725] Write of size 1 at addr ffff8881003502da by task kunit_try_catch/175 [ 11.292403] [ 11.292646] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.292689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.292701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.292724] Call Trace: [ 11.292742] <TASK> [ 11.292759] dump_stack_lvl+0x73/0xb0 [ 11.292789] print_report+0xd1/0x650 [ 11.292811] ? __virt_addr_valid+0x1db/0x2d0 [ 11.292833] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.292855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.292876] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.292899] kasan_report+0x141/0x180 [ 11.292948] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.292976] __asan_report_store1_noabort+0x1b/0x30 [ 11.292996] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.293020] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.293043] ? finish_task_switch.isra.0+0x153/0x700 [ 11.293064] ? __switch_to+0x47/0xf50 [ 11.293099] ? __schedule+0x10cc/0x2b60 [ 11.293120] ? __pfx_read_tsc+0x10/0x10 [ 11.293144] krealloc_less_oob+0x1c/0x30 [ 11.293165] kunit_try_run_case+0x1a5/0x480 [ 11.293187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.293208] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.293230] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.293252] ? __kthread_parkme+0x82/0x180 [ 11.293272] ? preempt_count_sub+0x50/0x80 [ 11.293294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.293316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.293339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.293360] kthread+0x337/0x6f0 [ 11.293379] ? trace_preempt_on+0x20/0xc0 [ 11.293402] ? __pfx_kthread+0x10/0x10 [ 11.293422] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.293442] ? calculate_sigpending+0x7b/0xa0 [ 11.293479] ? __pfx_kthread+0x10/0x10 [ 11.293500] ret_from_fork+0x116/0x1d0 [ 11.293518] ? __pfx_kthread+0x10/0x10 [ 11.293537] ret_from_fork_asm+0x1a/0x30 [ 11.293567] </TASK> [ 11.293579] [ 11.308015] Allocated by task 175: [ 11.308258] kasan_save_stack+0x45/0x70 [ 11.308605] kasan_save_track+0x18/0x40 [ 11.309021] kasan_save_alloc_info+0x3b/0x50 [ 11.309473] __kasan_krealloc+0x190/0x1f0 [ 11.309864] krealloc_noprof+0xf3/0x340 [ 11.310009] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.310184] krealloc_less_oob+0x1c/0x30 [ 11.310580] kunit_try_run_case+0x1a5/0x480 [ 11.310988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.311362] kthread+0x337/0x6f0 [ 11.311484] ret_from_fork+0x116/0x1d0 [ 11.311881] ret_from_fork_asm+0x1a/0x30 [ 11.312297] [ 11.312460] The buggy address belongs to the object at ffff888100350200 [ 11.312460] which belongs to the cache kmalloc-256 of size 256 [ 11.313460] The buggy address is located 17 bytes to the right of [ 11.313460] allocated 201-byte region [ffff888100350200, ffff8881003502c9) [ 11.314548] [ 11.314708] The buggy address belongs to the physical page: [ 11.315282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.315706] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.316172] flags: 0x200000000000040(head|node=0|zone=2) [ 11.316369] page_type: f5(slab) [ 11.316491] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.316733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.317486] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.318396] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.319252] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.320173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.320918] page dumped because: kasan: bad access detected [ 11.321502] [ 11.321685] Memory state around the buggy address: [ 11.322020] ffff888100350180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.322722] ffff888100350200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.323131] >ffff888100350280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.323369] ^ [ 11.324035] ffff888100350300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.324686] ffff888100350380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.324909] ================================================================== [ 11.222901] ================================================================== [ 11.223580] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.223904] Write of size 1 at addr ffff8881003502c9 by task kunit_try_catch/175 [ 11.224138] [ 11.224231] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.224276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.224289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.224310] Call Trace: [ 11.224322] <TASK> [ 11.224340] dump_stack_lvl+0x73/0xb0 [ 11.224367] print_report+0xd1/0x650 [ 11.224390] ? __virt_addr_valid+0x1db/0x2d0 [ 11.224413] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.224436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.224458] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.224482] kasan_report+0x141/0x180 [ 11.224504] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.224532] __asan_report_store1_noabort+0x1b/0x30 [ 11.224552] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.224578] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.224602] ? finish_task_switch.isra.0+0x153/0x700 [ 11.224624] ? __switch_to+0x47/0xf50 [ 11.224650] ? __schedule+0x10cc/0x2b60 [ 11.224672] ? __pfx_read_tsc+0x10/0x10 [ 11.224721] krealloc_less_oob+0x1c/0x30 [ 11.224743] kunit_try_run_case+0x1a5/0x480 [ 11.224767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.224790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.224813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.224836] ? __kthread_parkme+0x82/0x180 [ 11.224857] ? preempt_count_sub+0x50/0x80 [ 11.224880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.224903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.224926] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.224962] kthread+0x337/0x6f0 [ 11.224982] ? trace_preempt_on+0x20/0xc0 [ 11.225005] ? __pfx_kthread+0x10/0x10 [ 11.225026] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.225047] ? calculate_sigpending+0x7b/0xa0 [ 11.225072] ? __pfx_kthread+0x10/0x10 [ 11.225093] ret_from_fork+0x116/0x1d0 [ 11.225938] ? __pfx_kthread+0x10/0x10 [ 11.225966] ret_from_fork_asm+0x1a/0x30 [ 11.225998] </TASK> [ 11.226011] [ 11.239741] Allocated by task 175: [ 11.240157] kasan_save_stack+0x45/0x70 [ 11.240460] kasan_save_track+0x18/0x40 [ 11.240813] kasan_save_alloc_info+0x3b/0x50 [ 11.241191] __kasan_krealloc+0x190/0x1f0 [ 11.241522] krealloc_noprof+0xf3/0x340 [ 11.241804] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.242130] krealloc_less_oob+0x1c/0x30 [ 11.242334] kunit_try_run_case+0x1a5/0x480 [ 11.242764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.243041] kthread+0x337/0x6f0 [ 11.243185] ret_from_fork+0x116/0x1d0 [ 11.243367] ret_from_fork_asm+0x1a/0x30 [ 11.243574] [ 11.243657] The buggy address belongs to the object at ffff888100350200 [ 11.243657] which belongs to the cache kmalloc-256 of size 256 [ 11.244734] The buggy address is located 0 bytes to the right of [ 11.244734] allocated 201-byte region [ffff888100350200, ffff8881003502c9) [ 11.245567] [ 11.245669] The buggy address belongs to the physical page: [ 11.246100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.246697] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.247033] flags: 0x200000000000040(head|node=0|zone=2) [ 11.247429] page_type: f5(slab) [ 11.247801] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.248584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.248893] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.249389] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.249899] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.250637] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.250996] page dumped because: kasan: bad access detected [ 11.251362] [ 11.251634] Memory state around the buggy address: [ 11.252165] ffff888100350180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.252815] ffff888100350200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.253335] >ffff888100350280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.253921] ^ [ 11.254390] ffff888100350300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.254863] ffff888100350380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.255439] ================================================================== [ 11.531035] ================================================================== [ 11.531426] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.531839] Write of size 1 at addr ffff888102b720eb by task kunit_try_catch/179 [ 11.532381] [ 11.532481] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.532533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.532546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.532566] Call Trace: [ 11.532593] <TASK> [ 11.532609] dump_stack_lvl+0x73/0xb0 [ 11.532636] print_report+0xd1/0x650 [ 11.532658] ? __virt_addr_valid+0x1db/0x2d0 [ 11.532680] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.532705] ? kasan_addr_to_slab+0x11/0xa0 [ 11.532727] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.532753] kasan_report+0x141/0x180 [ 11.532774] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.532801] __asan_report_store1_noabort+0x1b/0x30 [ 11.532830] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.532855] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.532879] ? finish_task_switch.isra.0+0x153/0x700 [ 11.532910] ? __switch_to+0x47/0xf50 [ 11.532943] ? __schedule+0x10cc/0x2b60 [ 11.532964] ? __pfx_read_tsc+0x10/0x10 [ 11.532987] krealloc_large_less_oob+0x1c/0x30 [ 11.533009] kunit_try_run_case+0x1a5/0x480 [ 11.533033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.533054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.533077] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.533099] ? __kthread_parkme+0x82/0x180 [ 11.533118] ? preempt_count_sub+0x50/0x80 [ 11.533142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.533165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.533187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.533209] kthread+0x337/0x6f0 [ 11.533229] ? trace_preempt_on+0x20/0xc0 [ 11.533251] ? __pfx_kthread+0x10/0x10 [ 11.533271] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.533291] ? calculate_sigpending+0x7b/0xa0 [ 11.533313] ? __pfx_kthread+0x10/0x10 [ 11.533334] ret_from_fork+0x116/0x1d0 [ 11.533351] ? __pfx_kthread+0x10/0x10 [ 11.533371] ret_from_fork_asm+0x1a/0x30 [ 11.533400] </TASK> [ 11.533410] [ 11.541288] The buggy address belongs to the physical page: [ 11.541690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b70 [ 11.541988] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.542299] flags: 0x200000000000040(head|node=0|zone=2) [ 11.542576] page_type: f8(unknown) [ 11.542874] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.543260] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.543591] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.543822] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.544207] head: 0200000000000002 ffffea00040adc01 00000000ffffffff 00000000ffffffff [ 11.544581] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.544950] page dumped because: kasan: bad access detected [ 11.545274] [ 11.545368] Memory state around the buggy address: [ 11.545587] ffff888102b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.545887] ffff888102b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.546247] >ffff888102b72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.546547] ^ [ 11.546787] ffff888102b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.547077] ffff888102b72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.547396] ================================================================== [ 11.496138] ================================================================== [ 11.497188] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.497452] Write of size 1 at addr ffff888102b720da by task kunit_try_catch/179 [ 11.497680] [ 11.497772] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.497816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.497828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.497849] Call Trace: [ 11.497867] <TASK> [ 11.497884] dump_stack_lvl+0x73/0xb0 [ 11.497911] print_report+0xd1/0x650 [ 11.497944] ? __virt_addr_valid+0x1db/0x2d0 [ 11.498215] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.498244] ? kasan_addr_to_slab+0x11/0xa0 [ 11.498288] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.498313] kasan_report+0x141/0x180 [ 11.498512] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.498542] __asan_report_store1_noabort+0x1b/0x30 [ 11.498576] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.498602] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.498625] ? finish_task_switch.isra.0+0x153/0x700 [ 11.498646] ? __switch_to+0x47/0xf50 [ 11.498671] ? __schedule+0x10cc/0x2b60 [ 11.498693] ? __pfx_read_tsc+0x10/0x10 [ 11.498717] krealloc_large_less_oob+0x1c/0x30 [ 11.498739] kunit_try_run_case+0x1a5/0x480 [ 11.498765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.498787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.498809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.498831] ? __kthread_parkme+0x82/0x180 [ 11.498851] ? preempt_count_sub+0x50/0x80 [ 11.498873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.498895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.498917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.498951] kthread+0x337/0x6f0 [ 11.498971] ? trace_preempt_on+0x20/0xc0 [ 11.498996] ? __pfx_kthread+0x10/0x10 [ 11.499016] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.499036] ? calculate_sigpending+0x7b/0xa0 [ 11.499067] ? __pfx_kthread+0x10/0x10 [ 11.499088] ret_from_fork+0x116/0x1d0 [ 11.499111] ? __pfx_kthread+0x10/0x10 [ 11.499130] ret_from_fork_asm+0x1a/0x30 [ 11.499161] </TASK> [ 11.499173] [ 11.507032] The buggy address belongs to the physical page: [ 11.507326] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b70 [ 11.507742] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.508070] flags: 0x200000000000040(head|node=0|zone=2) [ 11.508327] page_type: f8(unknown) [ 11.508536] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.508835] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.509244] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.509606] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.509916] head: 0200000000000002 ffffea00040adc01 00000000ffffffff 00000000ffffffff [ 11.510299] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.510633] page dumped because: kasan: bad access detected [ 11.510869] [ 11.510976] Memory state around the buggy address: [ 11.511215] ffff888102b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.511521] ffff888102b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.511832] >ffff888102b72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.512125] ^ [ 11.512408] ffff888102b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.512683] ffff888102b72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.512894] ================================================================== [ 11.257034] ================================================================== [ 11.257367] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.257841] Write of size 1 at addr ffff8881003502d0 by task kunit_try_catch/175 [ 11.258508] [ 11.258818] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.258866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.258879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.258900] Call Trace: [ 11.258913] <TASK> [ 11.259055] dump_stack_lvl+0x73/0xb0 [ 11.259094] print_report+0xd1/0x650 [ 11.259122] ? __virt_addr_valid+0x1db/0x2d0 [ 11.259145] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.259167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.259189] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.259212] kasan_report+0x141/0x180 [ 11.259235] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.259262] __asan_report_store1_noabort+0x1b/0x30 [ 11.259282] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.259307] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.259330] ? finish_task_switch.isra.0+0x153/0x700 [ 11.259351] ? __switch_to+0x47/0xf50 [ 11.259377] ? __schedule+0x10cc/0x2b60 [ 11.259399] ? __pfx_read_tsc+0x10/0x10 [ 11.259422] krealloc_less_oob+0x1c/0x30 [ 11.259443] kunit_try_run_case+0x1a5/0x480 [ 11.259478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.259500] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.259522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.259544] ? __kthread_parkme+0x82/0x180 [ 11.259564] ? preempt_count_sub+0x50/0x80 [ 11.259586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.259610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.259631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.259653] kthread+0x337/0x6f0 [ 11.259672] ? trace_preempt_on+0x20/0xc0 [ 11.259695] ? __pfx_kthread+0x10/0x10 [ 11.259716] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.259736] ? calculate_sigpending+0x7b/0xa0 [ 11.259759] ? __pfx_kthread+0x10/0x10 [ 11.259779] ret_from_fork+0x116/0x1d0 [ 11.259797] ? __pfx_kthread+0x10/0x10 [ 11.259816] ret_from_fork_asm+0x1a/0x30 [ 11.259846] </TASK> [ 11.259857] [ 11.272458] Allocated by task 175: [ 11.272794] kasan_save_stack+0x45/0x70 [ 11.273134] kasan_save_track+0x18/0x40 [ 11.273343] kasan_save_alloc_info+0x3b/0x50 [ 11.273769] __kasan_krealloc+0x190/0x1f0 [ 11.274115] krealloc_noprof+0xf3/0x340 [ 11.274343] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.274829] krealloc_less_oob+0x1c/0x30 [ 11.275189] kunit_try_run_case+0x1a5/0x480 [ 11.275485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.275909] kthread+0x337/0x6f0 [ 11.276202] ret_from_fork+0x116/0x1d0 [ 11.276409] ret_from_fork_asm+0x1a/0x30 [ 11.276615] [ 11.277168] The buggy address belongs to the object at ffff888100350200 [ 11.277168] which belongs to the cache kmalloc-256 of size 256 [ 11.278077] The buggy address is located 7 bytes to the right of [ 11.278077] allocated 201-byte region [ffff888100350200, ffff8881003502c9) [ 11.278826] [ 11.278911] The buggy address belongs to the physical page: [ 11.279210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.280114] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.280996] flags: 0x200000000000040(head|node=0|zone=2) [ 11.281557] page_type: f5(slab) [ 11.281850] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.282530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.282785] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.283528] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.284294] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.284874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.285238] page dumped because: kasan: bad access detected [ 11.285764] [ 11.285982] Memory state around the buggy address: [ 11.286525] ffff888100350180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.287173] ffff888100350200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.287524] >ffff888100350280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.288274] ^ [ 11.288725] ffff888100350300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.288977] ffff888100350380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.289638] ==================================================================