Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.744481] ================================================================== [ 16.744564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.744625] Write of size 1 at addr fff00000c45a8ac9 by task kunit_try_catch/159 [ 16.744710] [ 16.744779] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.744858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.744884] Hardware name: linux,dummy-virt (DT) [ 16.745042] Call trace: [ 16.745244] show_stack+0x20/0x38 (C) [ 16.745304] dump_stack_lvl+0x8c/0xd0 [ 16.745397] print_report+0x118/0x608 [ 16.745441] kasan_report+0xdc/0x128 [ 16.745484] __asan_report_store1_noabort+0x20/0x30 [ 16.745544] krealloc_less_oob_helper+0xa48/0xc50 [ 16.745591] krealloc_less_oob+0x20/0x38 [ 16.745665] kunit_try_run_case+0x170/0x3f0 [ 16.745730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.745781] kthread+0x328/0x630 [ 16.745868] ret_from_fork+0x10/0x20 [ 16.745915] [ 16.745932] Allocated by task 159: [ 16.745959] kasan_save_stack+0x3c/0x68 [ 16.746009] kasan_save_track+0x20/0x40 [ 16.746044] kasan_save_alloc_info+0x40/0x58 [ 16.746099] __kasan_krealloc+0x118/0x178 [ 16.746238] krealloc_noprof+0x128/0x360 [ 16.746287] krealloc_less_oob_helper+0x168/0xc50 [ 16.746418] krealloc_less_oob+0x20/0x38 [ 16.746462] kunit_try_run_case+0x170/0x3f0 [ 16.746499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.746590] kthread+0x328/0x630 [ 16.746716] ret_from_fork+0x10/0x20 [ 16.746762] [ 16.746788] The buggy address belongs to the object at fff00000c45a8a00 [ 16.746788] which belongs to the cache kmalloc-256 of size 256 [ 16.746854] The buggy address is located 0 bytes to the right of [ 16.746854] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.746915] [ 16.747222] The buggy address belongs to the physical page: [ 16.747260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.747367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.747443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.747566] page_type: f5(slab) [ 16.747666] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.747801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.747904] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.748012] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.748103] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.748150] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.748202] page dumped because: kasan: bad access detected [ 16.748231] [ 16.748248] Memory state around the buggy address: [ 16.748278] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748332] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.748373] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.748424] ^ [ 16.748463] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748504] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748549] ================================================================== [ 16.810912] ================================================================== [ 16.811112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.811176] Write of size 1 at addr fff00000c78420ea by task kunit_try_catch/163 [ 16.811284] [ 16.811385] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.811461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.811486] Hardware name: linux,dummy-virt (DT) [ 16.811515] Call trace: [ 16.811759] show_stack+0x20/0x38 (C) [ 16.811817] dump_stack_lvl+0x8c/0xd0 [ 16.811864] print_report+0x118/0x608 [ 16.811926] kasan_report+0xdc/0x128 [ 16.811970] __asan_report_store1_noabort+0x20/0x30 [ 16.812032] krealloc_less_oob_helper+0xae4/0xc50 [ 16.812261] krealloc_large_less_oob+0x20/0x38 [ 16.812477] kunit_try_run_case+0x170/0x3f0 [ 16.812656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.812767] kthread+0x328/0x630 [ 16.812806] ret_from_fork+0x10/0x20 [ 16.813182] [ 16.813213] The buggy address belongs to the physical page: [ 16.813244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.813295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.813514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.813744] page_type: f8(unknown) [ 16.813783] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.813832] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.813879] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.813936] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.813996] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.814456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.814579] page dumped because: kasan: bad access detected [ 16.814640] [ 16.814658] Memory state around the buggy address: [ 16.814743] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.814785] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.814826] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.814916] ^ [ 16.815116] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.815291] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.815374] ================================================================== [ 16.797026] ================================================================== [ 16.797271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.797324] Write of size 1 at addr fff00000c78420c9 by task kunit_try_catch/163 [ 16.797456] [ 16.797569] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.797661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.797686] Hardware name: linux,dummy-virt (DT) [ 16.797715] Call trace: [ 16.797805] show_stack+0x20/0x38 (C) [ 16.797863] dump_stack_lvl+0x8c/0xd0 [ 16.797907] print_report+0x118/0x608 [ 16.797951] kasan_report+0xdc/0x128 [ 16.798042] __asan_report_store1_noabort+0x20/0x30 [ 16.798093] krealloc_less_oob_helper+0xa48/0xc50 [ 16.798139] krealloc_large_less_oob+0x20/0x38 [ 16.798209] kunit_try_run_case+0x170/0x3f0 [ 16.798284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.798335] kthread+0x328/0x630 [ 16.798395] ret_from_fork+0x10/0x20 [ 16.798460] [ 16.798497] The buggy address belongs to the physical page: [ 16.798551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.798602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.798685] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.798736] page_type: f8(unknown) [ 16.798791] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.798840] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.798887] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.798934] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.798993] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.799236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.799345] page dumped because: kasan: bad access detected [ 16.799414] [ 16.799476] Memory state around the buggy address: [ 16.799596] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.799638] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.799687] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.799858] ^ [ 16.800077] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.800205] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.800308] ================================================================== [ 16.756112] ================================================================== [ 16.756200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.756265] Write of size 1 at addr fff00000c45a8ada by task kunit_try_catch/159 [ 16.756329] [ 16.756369] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.756460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.756486] Hardware name: linux,dummy-virt (DT) [ 16.756517] Call trace: [ 16.756638] show_stack+0x20/0x38 (C) [ 16.756844] dump_stack_lvl+0x8c/0xd0 [ 16.756890] print_report+0x118/0x608 [ 16.756933] kasan_report+0xdc/0x128 [ 16.756989] __asan_report_store1_noabort+0x20/0x30 [ 16.757057] krealloc_less_oob_helper+0xa80/0xc50 [ 16.757137] krealloc_less_oob+0x20/0x38 [ 16.757181] kunit_try_run_case+0x170/0x3f0 [ 16.757225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.757275] kthread+0x328/0x630 [ 16.757406] ret_from_fork+0x10/0x20 [ 16.757601] [ 16.757646] Allocated by task 159: [ 16.757675] kasan_save_stack+0x3c/0x68 [ 16.757717] kasan_save_track+0x20/0x40 [ 16.757761] kasan_save_alloc_info+0x40/0x58 [ 16.757800] __kasan_krealloc+0x118/0x178 [ 16.757835] krealloc_noprof+0x128/0x360 [ 16.757870] krealloc_less_oob_helper+0x168/0xc50 [ 16.757907] krealloc_less_oob+0x20/0x38 [ 16.757942] kunit_try_run_case+0x170/0x3f0 [ 16.757988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.758029] kthread+0x328/0x630 [ 16.758059] ret_from_fork+0x10/0x20 [ 16.758095] [ 16.758113] The buggy address belongs to the object at fff00000c45a8a00 [ 16.758113] which belongs to the cache kmalloc-256 of size 256 [ 16.758167] The buggy address is located 17 bytes to the right of [ 16.758167] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.758441] [ 16.758485] The buggy address belongs to the physical page: [ 16.758533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.758585] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.758657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.758715] page_type: f5(slab) [ 16.758761] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.758827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.758875] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.759091] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.759188] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.759254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.759338] page dumped because: kasan: bad access detected [ 16.759408] [ 16.759486] Memory state around the buggy address: [ 16.759552] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.759593] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.759750] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.759871] ^ [ 16.760072] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.760135] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.760210] ================================================================== [ 16.816426] ================================================================== [ 16.816472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.816584] Write of size 1 at addr fff00000c78420eb by task kunit_try_catch/163 [ 16.816781] [ 16.816867] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.817010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.817035] Hardware name: linux,dummy-virt (DT) [ 16.817064] Call trace: [ 16.817254] show_stack+0x20/0x38 (C) [ 16.817303] dump_stack_lvl+0x8c/0xd0 [ 16.817348] print_report+0x118/0x608 [ 16.817513] kasan_report+0xdc/0x128 [ 16.817650] __asan_report_store1_noabort+0x20/0x30 [ 16.817837] krealloc_less_oob_helper+0xa58/0xc50 [ 16.817885] krealloc_large_less_oob+0x20/0x38 [ 16.817930] kunit_try_run_case+0x170/0x3f0 [ 16.817987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.818038] kthread+0x328/0x630 [ 16.818078] ret_from_fork+0x10/0x20 [ 16.818123] [ 16.818153] The buggy address belongs to the physical page: [ 16.818182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.818564] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.818620] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.819070] page_type: f8(unknown) [ 16.819115] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.819180] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.819321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.819367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.819414] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.819461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.819499] page dumped because: kasan: bad access detected [ 16.819567] [ 16.819621] Memory state around the buggy address: [ 16.819651] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.819692] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.819732] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.819768] ^ [ 16.819805] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.819847] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.819927] ================================================================== [ 16.806016] ================================================================== [ 16.806074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.806120] Write of size 1 at addr fff00000c78420da by task kunit_try_catch/163 [ 16.806168] [ 16.806197] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.806273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.806299] Hardware name: linux,dummy-virt (DT) [ 16.806328] Call trace: [ 16.806348] show_stack+0x20/0x38 (C) [ 16.806401] dump_stack_lvl+0x8c/0xd0 [ 16.806446] print_report+0x118/0x608 [ 16.806490] kasan_report+0xdc/0x128 [ 16.806532] __asan_report_store1_noabort+0x20/0x30 [ 16.806593] krealloc_less_oob_helper+0xa80/0xc50 [ 16.806680] krealloc_large_less_oob+0x20/0x38 [ 16.806725] kunit_try_run_case+0x170/0x3f0 [ 16.806927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.806987] kthread+0x328/0x630 [ 16.807027] ret_from_fork+0x10/0x20 [ 16.807717] [ 16.807745] The buggy address belongs to the physical page: [ 16.807783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.807857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.807902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.807951] page_type: f8(unknown) [ 16.808244] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.808424] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.808476] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.808650] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.808723] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.808852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.808890] page dumped because: kasan: bad access detected [ 16.808939] [ 16.809021] Memory state around the buggy address: [ 16.809051] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.809172] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.809216] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.809252] ^ [ 16.809288] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.809328] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.809391] ================================================================== [ 16.766767] ================================================================== [ 16.766850] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.767167] Write of size 1 at addr fff00000c45a8aeb by task kunit_try_catch/159 [ 16.767603] [ 16.767650] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.767729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.767754] Hardware name: linux,dummy-virt (DT) [ 16.768109] Call trace: [ 16.768218] show_stack+0x20/0x38 (C) [ 16.768297] dump_stack_lvl+0x8c/0xd0 [ 16.768484] print_report+0x118/0x608 [ 16.768894] kasan_report+0xdc/0x128 [ 16.769092] __asan_report_store1_noabort+0x20/0x30 [ 16.769157] krealloc_less_oob_helper+0xa58/0xc50 [ 16.769291] krealloc_less_oob+0x20/0x38 [ 16.769384] kunit_try_run_case+0x170/0x3f0 [ 16.769632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.769896] kthread+0x328/0x630 [ 16.770148] ret_from_fork+0x10/0x20 [ 16.770385] [ 16.770457] Allocated by task 159: [ 16.770525] kasan_save_stack+0x3c/0x68 [ 16.770689] kasan_save_track+0x20/0x40 [ 16.771076] kasan_save_alloc_info+0x40/0x58 [ 16.771309] __kasan_krealloc+0x118/0x178 [ 16.771467] krealloc_noprof+0x128/0x360 [ 16.771553] krealloc_less_oob_helper+0x168/0xc50 [ 16.771632] krealloc_less_oob+0x20/0x38 [ 16.771762] kunit_try_run_case+0x170/0x3f0 [ 16.772036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.772118] kthread+0x328/0x630 [ 16.772175] ret_from_fork+0x10/0x20 [ 16.772355] [ 16.772533] The buggy address belongs to the object at fff00000c45a8a00 [ 16.772533] which belongs to the cache kmalloc-256 of size 256 [ 16.772678] The buggy address is located 34 bytes to the right of [ 16.772678] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.772777] [ 16.772797] The buggy address belongs to the physical page: [ 16.772847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.773056] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.773252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.773348] page_type: f5(slab) [ 16.773396] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.773554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.773713] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.773775] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.773997] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.774241] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.774316] page dumped because: kasan: bad access detected [ 16.774451] [ 16.774519] Memory state around the buggy address: [ 16.774638] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.774749] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.774791] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.774826] ^ [ 16.775283] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775424] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775505] ================================================================== [ 16.801388] ================================================================== [ 16.801452] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.801514] Write of size 1 at addr fff00000c78420d0 by task kunit_try_catch/163 [ 16.801563] [ 16.801713] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.801939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.802028] Hardware name: linux,dummy-virt (DT) [ 16.802064] Call trace: [ 16.802085] show_stack+0x20/0x38 (C) [ 16.802151] dump_stack_lvl+0x8c/0xd0 [ 16.802197] print_report+0x118/0x608 [ 16.802241] kasan_report+0xdc/0x128 [ 16.802284] __asan_report_store1_noabort+0x20/0x30 [ 16.802332] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.802378] krealloc_large_less_oob+0x20/0x38 [ 16.802424] kunit_try_run_case+0x170/0x3f0 [ 16.802468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.802528] kthread+0x328/0x630 [ 16.802569] ret_from_fork+0x10/0x20 [ 16.802642] [ 16.802661] The buggy address belongs to the physical page: [ 16.802690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.802972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.803032] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.803145] page_type: f8(unknown) [ 16.803220] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.803370] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.803447] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.803551] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.803637] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.803757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.803842] page dumped because: kasan: bad access detected [ 16.803943] [ 16.803961] Memory state around the buggy address: [ 16.804004] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.804082] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.804339] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.804484] ^ [ 16.804550] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.804617] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.804731] ================================================================== [ 16.749496] ================================================================== [ 16.750047] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.750148] Write of size 1 at addr fff00000c45a8ad0 by task kunit_try_catch/159 [ 16.750214] [ 16.750263] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.750368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.750394] Hardware name: linux,dummy-virt (DT) [ 16.750423] Call trace: [ 16.750443] show_stack+0x20/0x38 (C) [ 16.750488] dump_stack_lvl+0x8c/0xd0 [ 16.750532] print_report+0x118/0x608 [ 16.750577] kasan_report+0xdc/0x128 [ 16.750690] __asan_report_store1_noabort+0x20/0x30 [ 16.750881] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.750970] krealloc_less_oob+0x20/0x38 [ 16.751078] kunit_try_run_case+0x170/0x3f0 [ 16.751226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.751331] kthread+0x328/0x630 [ 16.751432] ret_from_fork+0x10/0x20 [ 16.751519] [ 16.751548] Allocated by task 159: [ 16.751575] kasan_save_stack+0x3c/0x68 [ 16.751636] kasan_save_track+0x20/0x40 [ 16.751672] kasan_save_alloc_info+0x40/0x58 [ 16.751745] __kasan_krealloc+0x118/0x178 [ 16.751782] krealloc_noprof+0x128/0x360 [ 16.751909] krealloc_less_oob_helper+0x168/0xc50 [ 16.751950] krealloc_less_oob+0x20/0x38 [ 16.751997] kunit_try_run_case+0x170/0x3f0 [ 16.752100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.752186] kthread+0x328/0x630 [ 16.752282] ret_from_fork+0x10/0x20 [ 16.752380] [ 16.752445] The buggy address belongs to the object at fff00000c45a8a00 [ 16.752445] which belongs to the cache kmalloc-256 of size 256 [ 16.752798] The buggy address is located 7 bytes to the right of [ 16.752798] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.752986] [ 16.753120] The buggy address belongs to the physical page: [ 16.753223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.753285] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.753331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.753422] page_type: f5(slab) [ 16.753762] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.753869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.754010] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.754090] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.754196] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.754289] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.754383] page dumped because: kasan: bad access detected [ 16.754420] [ 16.754437] Memory state around the buggy address: [ 16.754467] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.754644] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.754847] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.754884] ^ [ 16.754920] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.754961] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.755008] ================================================================== [ 16.761332] ================================================================== [ 16.761378] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.761423] Write of size 1 at addr fff00000c45a8aea by task kunit_try_catch/159 [ 16.761470] [ 16.761499] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.761575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.761630] Hardware name: linux,dummy-virt (DT) [ 16.761669] Call trace: [ 16.761702] show_stack+0x20/0x38 (C) [ 16.761831] dump_stack_lvl+0x8c/0xd0 [ 16.761890] print_report+0x118/0x608 [ 16.761934] kasan_report+0xdc/0x128 [ 16.761989] __asan_report_store1_noabort+0x20/0x30 [ 16.762039] krealloc_less_oob_helper+0xae4/0xc50 [ 16.762086] krealloc_less_oob+0x20/0x38 [ 16.763068] kunit_try_run_case+0x170/0x3f0 [ 16.763187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.763242] kthread+0x328/0x630 [ 16.763290] ret_from_fork+0x10/0x20 [ 16.763338] [ 16.763356] Allocated by task 159: [ 16.763400] kasan_save_stack+0x3c/0x68 [ 16.763445] kasan_save_track+0x20/0x40 [ 16.763489] kasan_save_alloc_info+0x40/0x58 [ 16.763538] __kasan_krealloc+0x118/0x178 [ 16.763574] krealloc_noprof+0x128/0x360 [ 16.763611] krealloc_less_oob_helper+0x168/0xc50 [ 16.763648] krealloc_less_oob+0x20/0x38 [ 16.763682] kunit_try_run_case+0x170/0x3f0 [ 16.763718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.763768] kthread+0x328/0x630 [ 16.763807] ret_from_fork+0x10/0x20 [ 16.763850] [ 16.763868] The buggy address belongs to the object at fff00000c45a8a00 [ 16.763868] which belongs to the cache kmalloc-256 of size 256 [ 16.763923] The buggy address is located 33 bytes to the right of [ 16.763923] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.764011] [ 16.764054] The buggy address belongs to the physical page: [ 16.764092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.764143] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.764196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.764246] page_type: f5(slab) [ 16.764291] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.764355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.764412] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.764468] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.764515] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.764570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.764623] page dumped because: kasan: bad access detected [ 16.764658] [ 16.764675] Memory state around the buggy address: [ 16.764705] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764746] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.764786] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.764822] ^ [ 16.764857] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764899] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764944] ==================================================================
[ 16.735766] ================================================================== [ 16.735814] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.735861] Write of size 1 at addr fff00000c172e0eb by task kunit_try_catch/159 [ 16.735924] [ 16.736157] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.736611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.736687] Hardware name: linux,dummy-virt (DT) [ 16.736799] Call trace: [ 16.736827] show_stack+0x20/0x38 (C) [ 16.736926] dump_stack_lvl+0x8c/0xd0 [ 16.736983] print_report+0x118/0x608 [ 16.737131] kasan_report+0xdc/0x128 [ 16.737175] __asan_report_store1_noabort+0x20/0x30 [ 16.737325] krealloc_less_oob_helper+0xa58/0xc50 [ 16.737536] krealloc_less_oob+0x20/0x38 [ 16.737583] kunit_try_run_case+0x170/0x3f0 [ 16.737637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.737711] kthread+0x328/0x630 [ 16.737934] ret_from_fork+0x10/0x20 [ 16.738259] [ 16.738307] Allocated by task 159: [ 16.738334] kasan_save_stack+0x3c/0x68 [ 16.738375] kasan_save_track+0x20/0x40 [ 16.738431] kasan_save_alloc_info+0x40/0x58 [ 16.738470] __kasan_krealloc+0x118/0x178 [ 16.738505] krealloc_noprof+0x128/0x360 [ 16.738541] krealloc_less_oob_helper+0x168/0xc50 [ 16.738807] krealloc_less_oob+0x20/0x38 [ 16.738947] kunit_try_run_case+0x170/0x3f0 [ 16.739007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.739048] kthread+0x328/0x630 [ 16.739079] ret_from_fork+0x10/0x20 [ 16.739418] [ 16.739441] The buggy address belongs to the object at fff00000c172e000 [ 16.739441] which belongs to the cache kmalloc-256 of size 256 [ 16.739499] The buggy address is located 34 bytes to the right of [ 16.739499] allocated 201-byte region [fff00000c172e000, fff00000c172e0c9) [ 16.739755] [ 16.739786] The buggy address belongs to the physical page: [ 16.739888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10172e [ 16.739953] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.740019] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.740091] page_type: f5(slab) [ 16.740440] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.740560] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.740780] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.741015] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.741068] head: 0bfffe0000000001 ffffc1ffc305cb81 00000000ffffffff 00000000ffffffff [ 16.741162] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.741224] page dumped because: kasan: bad access detected [ 16.741253] [ 16.741271] Memory state around the buggy address: [ 16.741301] fff00000c172df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.741343] fff00000c172e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.741586] >fff00000c172e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.741624] ^ [ 16.741698] fff00000c172e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.741979] fff00000c172e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.742161] ================================================================== [ 16.773191] ================================================================== [ 16.773226] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.773269] Write of size 1 at addr fff00000c77120da by task kunit_try_catch/163 [ 16.773344] [ 16.773479] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.773600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.773626] Hardware name: linux,dummy-virt (DT) [ 16.773655] Call trace: [ 16.773681] show_stack+0x20/0x38 (C) [ 16.773732] dump_stack_lvl+0x8c/0xd0 [ 16.773851] print_report+0x118/0x608 [ 16.774049] kasan_report+0xdc/0x128 [ 16.774094] __asan_report_store1_noabort+0x20/0x30 [ 16.774199] krealloc_less_oob_helper+0xa80/0xc50 [ 16.774247] krealloc_large_less_oob+0x20/0x38 [ 16.774292] kunit_try_run_case+0x170/0x3f0 [ 16.774337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.774388] kthread+0x328/0x630 [ 16.774428] ret_from_fork+0x10/0x20 [ 16.774474] [ 16.774493] The buggy address belongs to the physical page: [ 16.774521] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107710 [ 16.774572] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.774618] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.774666] page_type: f8(unknown) [ 16.774744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.774794] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.774842] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.774891] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.774954] head: 0bfffe0000000002 ffffc1ffc31dc401 00000000ffffffff 00000000ffffffff [ 16.775001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.775039] page dumped because: kasan: bad access detected [ 16.775091] [ 16.775114] Memory state around the buggy address: [ 16.775228] fff00000c7711f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.775270] fff00000c7712000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.775373] >fff00000c7712080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.775476] ^ [ 16.775529] fff00000c7712100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.775569] fff00000c7712180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.775606] ================================================================== [ 16.708847] ================================================================== [ 16.708940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.708999] Write of size 1 at addr fff00000c172e0c9 by task kunit_try_catch/159 [ 16.709184] [ 16.709321] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.709401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.709426] Hardware name: linux,dummy-virt (DT) [ 16.709456] Call trace: [ 16.709864] show_stack+0x20/0x38 (C) [ 16.709955] dump_stack_lvl+0x8c/0xd0 [ 16.710278] print_report+0x118/0x608 [ 16.710333] kasan_report+0xdc/0x128 [ 16.710475] __asan_report_store1_noabort+0x20/0x30 [ 16.710529] krealloc_less_oob_helper+0xa48/0xc50 [ 16.710576] krealloc_less_oob+0x20/0x38 [ 16.710619] kunit_try_run_case+0x170/0x3f0 [ 16.710668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.710815] kthread+0x328/0x630 [ 16.710983] ret_from_fork+0x10/0x20 [ 16.711090] [ 16.711110] Allocated by task 159: [ 16.711137] kasan_save_stack+0x3c/0x68 [ 16.711177] kasan_save_track+0x20/0x40 [ 16.711384] kasan_save_alloc_info+0x40/0x58 [ 16.711468] __kasan_krealloc+0x118/0x178 [ 16.711608] krealloc_noprof+0x128/0x360 [ 16.711644] krealloc_less_oob_helper+0x168/0xc50 [ 16.711682] krealloc_less_oob+0x20/0x38 [ 16.711718] kunit_try_run_case+0x170/0x3f0 [ 16.711755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.711797] kthread+0x328/0x630 [ 16.711870] ret_from_fork+0x10/0x20 [ 16.711946] [ 16.711989] The buggy address belongs to the object at fff00000c172e000 [ 16.711989] which belongs to the cache kmalloc-256 of size 256 [ 16.712046] The buggy address is located 0 bytes to the right of [ 16.712046] allocated 201-byte region [fff00000c172e000, fff00000c172e0c9) [ 16.712146] [ 16.712240] The buggy address belongs to the physical page: [ 16.712314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10172e [ 16.712471] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.712598] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.712667] page_type: f5(slab) [ 16.712706] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.712805] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.712949] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.712996] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.713083] head: 0bfffe0000000001 ffffc1ffc305cb81 00000000ffffffff 00000000ffffffff [ 16.713131] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.713512] page dumped because: kasan: bad access detected [ 16.713546] [ 16.713657] Memory state around the buggy address: [ 16.713932] fff00000c172df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714109] fff00000c172e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.714182] >fff00000c172e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.714218] ^ [ 16.714252] fff00000c172e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714293] fff00000c172e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714330] ================================================================== [ 16.766211] ================================================================== [ 16.766333] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.766387] Write of size 1 at addr fff00000c77120c9 by task kunit_try_catch/163 [ 16.766434] [ 16.766465] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.766543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.766568] Hardware name: linux,dummy-virt (DT) [ 16.766597] Call trace: [ 16.766943] show_stack+0x20/0x38 (C) [ 16.767048] dump_stack_lvl+0x8c/0xd0 [ 16.767272] print_report+0x118/0x608 [ 16.767336] kasan_report+0xdc/0x128 [ 16.767397] __asan_report_store1_noabort+0x20/0x30 [ 16.767447] krealloc_less_oob_helper+0xa48/0xc50 [ 16.767494] krealloc_large_less_oob+0x20/0x38 [ 16.767699] kunit_try_run_case+0x170/0x3f0 [ 16.767759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.767935] kthread+0x328/0x630 [ 16.767993] ret_from_fork+0x10/0x20 [ 16.768050] [ 16.768077] The buggy address belongs to the physical page: [ 16.768136] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107710 [ 16.768188] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.768234] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.768535] page_type: f8(unknown) [ 16.768643] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.768755] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.768811] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.768925] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.768974] head: 0bfffe0000000002 ffffc1ffc31dc401 00000000ffffffff 00000000ffffffff [ 16.769021] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.769064] page dumped because: kasan: bad access detected [ 16.769106] [ 16.769124] Memory state around the buggy address: [ 16.769154] fff00000c7711f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.769568] fff00000c7712000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.769615] >fff00000c7712080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.769652] ^ [ 16.769713] fff00000c7712100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.769753] fff00000c7712180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.769845] ================================================================== [ 16.776474] ================================================================== [ 16.776601] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.776763] Write of size 1 at addr fff00000c77120ea by task kunit_try_catch/163 [ 16.776929] [ 16.777013] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.777114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.777236] Hardware name: linux,dummy-virt (DT) [ 16.777281] Call trace: [ 16.777302] show_stack+0x20/0x38 (C) [ 16.777388] dump_stack_lvl+0x8c/0xd0 [ 16.777436] print_report+0x118/0x608 [ 16.777480] kasan_report+0xdc/0x128 [ 16.777524] __asan_report_store1_noabort+0x20/0x30 [ 16.777599] krealloc_less_oob_helper+0xae4/0xc50 [ 16.777779] krealloc_large_less_oob+0x20/0x38 [ 16.777832] kunit_try_run_case+0x170/0x3f0 [ 16.777878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.777939] kthread+0x328/0x630 [ 16.777979] ret_from_fork+0x10/0x20 [ 16.778068] [ 16.778087] The buggy address belongs to the physical page: [ 16.778262] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107710 [ 16.778405] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.778593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.778682] page_type: f8(unknown) [ 16.778718] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.778781] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.778899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.779018] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.779089] head: 0bfffe0000000002 ffffc1ffc31dc401 00000000ffffffff 00000000ffffffff [ 16.779233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.779272] page dumped because: kasan: bad access detected [ 16.779340] [ 16.779363] Memory state around the buggy address: [ 16.779392] fff00000c7711f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.779575] fff00000c7712000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.779671] >fff00000c7712080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.779707] ^ [ 16.779744] fff00000c7712100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.779841] fff00000c7712180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.779939] ================================================================== [ 16.722066] ================================================================== [ 16.722112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.722209] Write of size 1 at addr fff00000c172e0da by task kunit_try_catch/159 [ 16.722529] [ 16.722565] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.722645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.722670] Hardware name: linux,dummy-virt (DT) [ 16.722862] Call trace: [ 16.722897] show_stack+0x20/0x38 (C) [ 16.723052] dump_stack_lvl+0x8c/0xd0 [ 16.723184] print_report+0x118/0x608 [ 16.723233] kasan_report+0xdc/0x128 [ 16.723278] __asan_report_store1_noabort+0x20/0x30 [ 16.723327] krealloc_less_oob_helper+0xa80/0xc50 [ 16.723374] krealloc_less_oob+0x20/0x38 [ 16.723642] kunit_try_run_case+0x170/0x3f0 [ 16.723730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.723874] kthread+0x328/0x630 [ 16.723946] ret_from_fork+0x10/0x20 [ 16.724042] [ 16.724071] Allocated by task 159: [ 16.724099] kasan_save_stack+0x3c/0x68 [ 16.724138] kasan_save_track+0x20/0x40 [ 16.724174] kasan_save_alloc_info+0x40/0x58 [ 16.724481] __kasan_krealloc+0x118/0x178 [ 16.724593] krealloc_noprof+0x128/0x360 [ 16.724629] krealloc_less_oob_helper+0x168/0xc50 [ 16.724687] krealloc_less_oob+0x20/0x38 [ 16.724850] kunit_try_run_case+0x170/0x3f0 [ 16.724943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.724984] kthread+0x328/0x630 [ 16.725015] ret_from_fork+0x10/0x20 [ 16.725056] [ 16.725074] The buggy address belongs to the object at fff00000c172e000 [ 16.725074] which belongs to the cache kmalloc-256 of size 256 [ 16.725357] The buggy address is located 17 bytes to the right of [ 16.725357] allocated 201-byte region [fff00000c172e000, fff00000c172e0c9) [ 16.725473] [ 16.725492] The buggy address belongs to the physical page: [ 16.725528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10172e [ 16.725620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.725683] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.725760] page_type: f5(slab) [ 16.725795] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.726033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.726087] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.726135] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.726341] head: 0bfffe0000000001 ffffc1ffc305cb81 00000000ffffffff 00000000ffffffff [ 16.726509] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.726548] page dumped because: kasan: bad access detected [ 16.726618] [ 16.726694] Memory state around the buggy address: [ 16.726726] fff00000c172df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.726834] fff00000c172e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.727090] >fff00000c172e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.727276] ^ [ 16.727468] fff00000c172e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.727555] fff00000c172e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.727617] ================================================================== [ 16.770429] ================================================================== [ 16.770474] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.770523] Write of size 1 at addr fff00000c77120d0 by task kunit_try_catch/163 [ 16.770571] [ 16.770613] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.770834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.770860] Hardware name: linux,dummy-virt (DT) [ 16.770889] Call trace: [ 16.770920] show_stack+0x20/0x38 (C) [ 16.770989] dump_stack_lvl+0x8c/0xd0 [ 16.771035] print_report+0x118/0x608 [ 16.771080] kasan_report+0xdc/0x128 [ 16.771124] __asan_report_store1_noabort+0x20/0x30 [ 16.771174] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.771308] krealloc_large_less_oob+0x20/0x38 [ 16.771355] kunit_try_run_case+0x170/0x3f0 [ 16.771425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.771523] kthread+0x328/0x630 [ 16.771564] ret_from_fork+0x10/0x20 [ 16.771608] [ 16.771627] The buggy address belongs to the physical page: [ 16.771656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107710 [ 16.771706] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.771751] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.771871] page_type: f8(unknown) [ 16.772054] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.772142] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.772222] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.772269] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.772315] head: 0bfffe0000000002 ffffc1ffc31dc401 00000000ffffffff 00000000ffffffff [ 16.772362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.772407] page dumped because: kasan: bad access detected [ 16.772542] [ 16.772623] Memory state around the buggy address: [ 16.772703] fff00000c7711f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.772789] fff00000c7712000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.772933] >fff00000c7712080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.772970] ^ [ 16.773005] fff00000c7712100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.773045] fff00000c7712180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.773086] ================================================================== [ 16.728409] ================================================================== [ 16.728457] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.728585] Write of size 1 at addr fff00000c172e0ea by task kunit_try_catch/159 [ 16.728823] [ 16.729290] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.729383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.729408] Hardware name: linux,dummy-virt (DT) [ 16.729437] Call trace: [ 16.729458] show_stack+0x20/0x38 (C) [ 16.729697] dump_stack_lvl+0x8c/0xd0 [ 16.729744] print_report+0x118/0x608 [ 16.729789] kasan_report+0xdc/0x128 [ 16.729843] __asan_report_store1_noabort+0x20/0x30 [ 16.730062] krealloc_less_oob_helper+0xae4/0xc50 [ 16.730113] krealloc_less_oob+0x20/0x38 [ 16.730156] kunit_try_run_case+0x170/0x3f0 [ 16.730620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.730782] kthread+0x328/0x630 [ 16.730858] ret_from_fork+0x10/0x20 [ 16.730974] [ 16.730999] Allocated by task 159: [ 16.731026] kasan_save_stack+0x3c/0x68 [ 16.731119] kasan_save_track+0x20/0x40 [ 16.731156] kasan_save_alloc_info+0x40/0x58 [ 16.731331] __kasan_krealloc+0x118/0x178 [ 16.731370] krealloc_noprof+0x128/0x360 [ 16.731655] krealloc_less_oob_helper+0x168/0xc50 [ 16.731698] krealloc_less_oob+0x20/0x38 [ 16.731733] kunit_try_run_case+0x170/0x3f0 [ 16.731808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.731972] kthread+0x328/0x630 [ 16.732005] ret_from_fork+0x10/0x20 [ 16.732149] [ 16.732203] The buggy address belongs to the object at fff00000c172e000 [ 16.732203] which belongs to the cache kmalloc-256 of size 256 [ 16.732259] The buggy address is located 33 bytes to the right of [ 16.732259] allocated 201-byte region [fff00000c172e000, fff00000c172e0c9) [ 16.732361] [ 16.732448] The buggy address belongs to the physical page: [ 16.732598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10172e [ 16.732668] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.732714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.732802] page_type: f5(slab) [ 16.732973] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.733083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.733196] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.733250] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.733297] head: 0bfffe0000000001 ffffc1ffc305cb81 00000000ffffffff 00000000ffffffff [ 16.733414] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.733584] page dumped because: kasan: bad access detected [ 16.733657] [ 16.733675] Memory state around the buggy address: [ 16.733754] fff00000c172df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.733796] fff00000c172e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.733892] >fff00000c172e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.734272] ^ [ 16.734950] fff00000c172e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.735013] fff00000c172e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.735051] ================================================================== [ 16.715196] ================================================================== [ 16.715243] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.715290] Write of size 1 at addr fff00000c172e0d0 by task kunit_try_catch/159 [ 16.715337] [ 16.715365] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.715696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.715942] Hardware name: linux,dummy-virt (DT) [ 16.715980] Call trace: [ 16.716001] show_stack+0x20/0x38 (C) [ 16.716294] dump_stack_lvl+0x8c/0xd0 [ 16.716463] print_report+0x118/0x608 [ 16.716550] kasan_report+0xdc/0x128 [ 16.716595] __asan_report_store1_noabort+0x20/0x30 [ 16.716778] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.716827] krealloc_less_oob+0x20/0x38 [ 16.716872] kunit_try_run_case+0x170/0x3f0 [ 16.717288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.717444] kthread+0x328/0x630 [ 16.717580] ret_from_fork+0x10/0x20 [ 16.717741] [ 16.717759] Allocated by task 159: [ 16.717786] kasan_save_stack+0x3c/0x68 [ 16.717985] kasan_save_track+0x20/0x40 [ 16.718158] kasan_save_alloc_info+0x40/0x58 [ 16.718198] __kasan_krealloc+0x118/0x178 [ 16.718287] krealloc_noprof+0x128/0x360 [ 16.718325] krealloc_less_oob_helper+0x168/0xc50 [ 16.718363] krealloc_less_oob+0x20/0x38 [ 16.718397] kunit_try_run_case+0x170/0x3f0 [ 16.718466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.718510] kthread+0x328/0x630 [ 16.718540] ret_from_fork+0x10/0x20 [ 16.718880] [ 16.718973] The buggy address belongs to the object at fff00000c172e000 [ 16.718973] which belongs to the cache kmalloc-256 of size 256 [ 16.719120] The buggy address is located 7 bytes to the right of [ 16.719120] allocated 201-byte region [fff00000c172e000, fff00000c172e0c9) [ 16.719230] [ 16.719249] The buggy address belongs to the physical page: [ 16.719278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10172e [ 16.719554] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.719643] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.719747] page_type: f5(slab) [ 16.719783] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.719831] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.719878] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.719969] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.720017] head: 0bfffe0000000001 ffffc1ffc305cb81 00000000ffffffff 00000000ffffffff [ 16.720113] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.720154] page dumped because: kasan: bad access detected [ 16.720225] [ 16.720336] Memory state around the buggy address: [ 16.720368] fff00000c172df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720410] fff00000c172e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.720451] >fff00000c172e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.720486] ^ [ 16.720865] fff00000c172e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720908] fff00000c172e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720965] ================================================================== [ 16.780169] ================================================================== [ 16.780210] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.780252] Write of size 1 at addr fff00000c77120eb by task kunit_try_catch/163 [ 16.780298] [ 16.780325] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.780399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.780423] Hardware name: linux,dummy-virt (DT) [ 16.780484] Call trace: [ 16.780584] show_stack+0x20/0x38 (C) [ 16.780629] dump_stack_lvl+0x8c/0xd0 [ 16.780673] print_report+0x118/0x608 [ 16.780752] kasan_report+0xdc/0x128 [ 16.780796] __asan_report_store1_noabort+0x20/0x30 [ 16.780846] krealloc_less_oob_helper+0xa58/0xc50 [ 16.780892] krealloc_large_less_oob+0x20/0x38 [ 16.781038] kunit_try_run_case+0x170/0x3f0 [ 16.781152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.781264] kthread+0x328/0x630 [ 16.781304] ret_from_fork+0x10/0x20 [ 16.781348] [ 16.781402] The buggy address belongs to the physical page: [ 16.781430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107710 [ 16.781480] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.781524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.781635] page_type: f8(unknown) [ 16.781672] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.781726] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.781842] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.782028] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.782104] head: 0bfffe0000000002 ffffc1ffc31dc401 00000000ffffffff 00000000ffffffff [ 16.782151] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.782219] page dumped because: kasan: bad access detected [ 16.782249] [ 16.782265] Memory state around the buggy address: [ 16.782295] fff00000c7711f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.782336] fff00000c7712000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.782375] >fff00000c7712080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.782411] ^ [ 16.782447] fff00000c7712100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.782591] fff00000c7712180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.782636] ==================================================================
[ 12.904207] ================================================================== [ 12.905231] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 12.905962] Write of size 1 at addr ffff888100aa58d0 by task kunit_try_catch/176 [ 12.906942] [ 12.907416] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.907472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.907483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.907504] Call Trace: [ 12.907766] <TASK> [ 12.907799] dump_stack_lvl+0x73/0xb0 [ 12.907837] print_report+0xd1/0x650 [ 12.907857] ? __virt_addr_valid+0x1db/0x2d0 [ 12.907876] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.907896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.907917] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.907937] kasan_report+0x141/0x180 [ 12.907956] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.907980] __asan_report_store1_noabort+0x1b/0x30 [ 12.908000] krealloc_less_oob_helper+0xe23/0x11d0 [ 12.908021] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.908041] ? finish_task_switch.isra.0+0x153/0x700 [ 12.908060] ? __switch_to+0x47/0xf50 [ 12.908082] ? __schedule+0x10cc/0x2b60 [ 12.908101] ? __pfx_read_tsc+0x10/0x10 [ 12.908134] krealloc_less_oob+0x1c/0x30 [ 12.908161] kunit_try_run_case+0x1a5/0x480 [ 12.908196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.908231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.908272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.908313] ? __kthread_parkme+0x82/0x180 [ 12.908348] ? preempt_count_sub+0x50/0x80 [ 12.908385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.908423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.908459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.908495] kthread+0x337/0x6f0 [ 12.908526] ? trace_preempt_on+0x20/0xc0 [ 12.908567] ? __pfx_kthread+0x10/0x10 [ 12.908604] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.908657] ? calculate_sigpending+0x7b/0xa0 [ 12.908715] ? __pfx_kthread+0x10/0x10 [ 12.908750] ret_from_fork+0x116/0x1d0 [ 12.908782] ? __pfx_kthread+0x10/0x10 [ 12.908819] ret_from_fork_asm+0x1a/0x30 [ 12.908877] </TASK> [ 12.908900] [ 12.921491] Allocated by task 176: [ 12.921793] kasan_save_stack+0x45/0x70 [ 12.922416] kasan_save_track+0x18/0x40 [ 12.922921] kasan_save_alloc_info+0x3b/0x50 [ 12.923537] __kasan_krealloc+0x190/0x1f0 [ 12.924019] krealloc_noprof+0xf3/0x340 [ 12.924368] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.924674] krealloc_less_oob+0x1c/0x30 [ 12.925071] kunit_try_run_case+0x1a5/0x480 [ 12.925423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.925794] kthread+0x337/0x6f0 [ 12.926134] ret_from_fork+0x116/0x1d0 [ 12.926761] ret_from_fork_asm+0x1a/0x30 [ 12.927277] [ 12.927424] The buggy address belongs to the object at ffff888100aa5800 [ 12.927424] which belongs to the cache kmalloc-256 of size 256 [ 12.927941] The buggy address is located 7 bytes to the right of [ 12.927941] allocated 201-byte region [ffff888100aa5800, ffff888100aa58c9) [ 12.928532] [ 12.928953] The buggy address belongs to the physical page: [ 12.929263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa4 [ 12.929880] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.930368] flags: 0x200000000000040(head|node=0|zone=2) [ 12.931021] page_type: f5(slab) [ 12.931304] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.931882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.932328] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.933020] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.933446] head: 0200000000000001 ffffea000402a901 00000000ffffffff 00000000ffffffff [ 12.933931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.934297] page dumped because: kasan: bad access detected [ 12.934645] [ 12.934803] Memory state around the buggy address: [ 12.935122] ffff888100aa5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.935456] ffff888100aa5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.936354] >ffff888100aa5880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.936843] ^ [ 12.937422] ffff888100aa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.937701] ffff888100aa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.938141] ================================================================== [ 13.153854] ================================================================== [ 13.154421] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.155051] Write of size 1 at addr ffff888102b320da by task kunit_try_catch/180 [ 13.155579] [ 13.155782] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.155990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.156019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.156054] Call Trace: [ 13.156094] <TASK> [ 13.156118] dump_stack_lvl+0x73/0xb0 [ 13.156173] print_report+0xd1/0x650 [ 13.156222] ? __virt_addr_valid+0x1db/0x2d0 [ 13.156262] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.156313] ? kasan_addr_to_slab+0x11/0xa0 [ 13.156360] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.156403] kasan_report+0x141/0x180 [ 13.156455] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.156499] __asan_report_store1_noabort+0x1b/0x30 [ 13.156930] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.157006] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.157047] ? finish_task_switch.isra.0+0x153/0x700 [ 13.157115] ? __switch_to+0x47/0xf50 [ 13.157158] ? __schedule+0x10cc/0x2b60 [ 13.157195] ? __pfx_read_tsc+0x10/0x10 [ 13.157247] krealloc_large_less_oob+0x1c/0x30 [ 13.157281] kunit_try_run_case+0x1a5/0x480 [ 13.157315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.157345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.157380] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.157417] ? __kthread_parkme+0x82/0x180 [ 13.157455] ? preempt_count_sub+0x50/0x80 [ 13.157498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.157537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.157566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.157586] kthread+0x337/0x6f0 [ 13.157604] ? trace_preempt_on+0x20/0xc0 [ 13.157642] ? __pfx_kthread+0x10/0x10 [ 13.157662] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.157680] ? calculate_sigpending+0x7b/0xa0 [ 13.157701] ? __pfx_kthread+0x10/0x10 [ 13.157720] ret_from_fork+0x116/0x1d0 [ 13.157736] ? __pfx_kthread+0x10/0x10 [ 13.157754] ret_from_fork_asm+0x1a/0x30 [ 13.157781] </TASK> [ 13.157793] [ 13.169553] The buggy address belongs to the physical page: [ 13.170663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30 [ 13.171249] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.171673] flags: 0x200000000000040(head|node=0|zone=2) [ 13.172040] page_type: f8(unknown) [ 13.172686] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.172995] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.173408] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.174513] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.174964] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff [ 13.175426] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.175991] page dumped because: kasan: bad access detected [ 13.176237] [ 13.176342] Memory state around the buggy address: [ 13.176662] ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.177399] ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.177750] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.177990] ^ [ 13.178487] ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.178950] ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.179232] ================================================================== [ 13.005844] ================================================================== [ 13.006219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.006460] Write of size 1 at addr ffff888100aa58eb by task kunit_try_catch/176 [ 13.007700] [ 13.007857] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.007929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.007945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.007975] Call Trace: [ 13.007992] <TASK> [ 13.008018] dump_stack_lvl+0x73/0xb0 [ 13.008063] print_report+0xd1/0x650 [ 13.008096] ? __virt_addr_valid+0x1db/0x2d0 [ 13.008206] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.008244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.008300] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.008340] kasan_report+0x141/0x180 [ 13.008392] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.008436] __asan_report_store1_noabort+0x1b/0x30 [ 13.008461] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.008484] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.008504] ? finish_task_switch.isra.0+0x153/0x700 [ 13.008524] ? __switch_to+0x47/0xf50 [ 13.008546] ? __schedule+0x10cc/0x2b60 [ 13.008565] ? __pfx_read_tsc+0x10/0x10 [ 13.008587] krealloc_less_oob+0x1c/0x30 [ 13.008605] kunit_try_run_case+0x1a5/0x480 [ 13.008643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.008663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.008684] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.008704] ? __kthread_parkme+0x82/0x180 [ 13.008721] ? preempt_count_sub+0x50/0x80 [ 13.008741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.008760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.008780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.008799] kthread+0x337/0x6f0 [ 13.008816] ? trace_preempt_on+0x20/0xc0 [ 13.008837] ? __pfx_kthread+0x10/0x10 [ 13.008854] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.008872] ? calculate_sigpending+0x7b/0xa0 [ 13.008892] ? __pfx_kthread+0x10/0x10 [ 13.008910] ret_from_fork+0x116/0x1d0 [ 13.008926] ? __pfx_kthread+0x10/0x10 [ 13.008943] ret_from_fork_asm+0x1a/0x30 [ 13.008971] </TASK> [ 13.008983] [ 13.017596] Allocated by task 176: [ 13.017893] kasan_save_stack+0x45/0x70 [ 13.018326] kasan_save_track+0x18/0x40 [ 13.018592] kasan_save_alloc_info+0x3b/0x50 [ 13.018784] __kasan_krealloc+0x190/0x1f0 [ 13.018953] krealloc_noprof+0xf3/0x340 [ 13.019115] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.019476] krealloc_less_oob+0x1c/0x30 [ 13.019869] kunit_try_run_case+0x1a5/0x480 [ 13.020216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.020595] kthread+0x337/0x6f0 [ 13.020877] ret_from_fork+0x116/0x1d0 [ 13.021178] ret_from_fork_asm+0x1a/0x30 [ 13.021422] [ 13.021587] The buggy address belongs to the object at ffff888100aa5800 [ 13.021587] which belongs to the cache kmalloc-256 of size 256 [ 13.021968] The buggy address is located 34 bytes to the right of [ 13.021968] allocated 201-byte region [ffff888100aa5800, ffff888100aa58c9) [ 13.022656] [ 13.022829] The buggy address belongs to the physical page: [ 13.023226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa4 [ 13.023790] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.024419] flags: 0x200000000000040(head|node=0|zone=2) [ 13.024687] page_type: f5(slab) [ 13.024848] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.025090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.025736] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.026306] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.026800] head: 0200000000000001 ffffea000402a901 00000000ffffffff 00000000ffffffff [ 13.027076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.027335] page dumped because: kasan: bad access detected [ 13.027584] [ 13.027752] Memory state around the buggy address: [ 13.028191] ffff888100aa5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.028662] ffff888100aa5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.029147] >ffff888100aa5880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.029445] ^ [ 13.029687] ffff888100aa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.030167] ffff888100aa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.030658] ================================================================== [ 13.179800] ================================================================== [ 13.180279] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.181149] Write of size 1 at addr ffff888102b320ea by task kunit_try_catch/180 [ 13.181614] [ 13.181948] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.182027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.182050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.182078] Call Trace: [ 13.182112] <TASK> [ 13.182137] dump_stack_lvl+0x73/0xb0 [ 13.182219] print_report+0xd1/0x650 [ 13.182254] ? __virt_addr_valid+0x1db/0x2d0 [ 13.182284] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.182322] ? kasan_addr_to_slab+0x11/0xa0 [ 13.182353] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.182399] kasan_report+0x141/0x180 [ 13.182437] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.182500] __asan_report_store1_noabort+0x1b/0x30 [ 13.182536] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.182578] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.182635] ? finish_task_switch.isra.0+0x153/0x700 [ 13.182672] ? __switch_to+0x47/0xf50 [ 13.182717] ? __schedule+0x10cc/0x2b60 [ 13.182755] ? __pfx_read_tsc+0x10/0x10 [ 13.182798] krealloc_large_less_oob+0x1c/0x30 [ 13.182836] kunit_try_run_case+0x1a5/0x480 [ 13.182879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.182917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.182958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.183004] ? __kthread_parkme+0x82/0x180 [ 13.183037] ? preempt_count_sub+0x50/0x80 [ 13.183093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.183133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.183174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.183215] kthread+0x337/0x6f0 [ 13.183252] ? trace_preempt_on+0x20/0xc0 [ 13.183294] ? __pfx_kthread+0x10/0x10 [ 13.183331] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.183368] ? calculate_sigpending+0x7b/0xa0 [ 13.183408] ? __pfx_kthread+0x10/0x10 [ 13.183516] ret_from_fork+0x116/0x1d0 [ 13.183560] ? __pfx_kthread+0x10/0x10 [ 13.183590] ret_from_fork_asm+0x1a/0x30 [ 13.183636] </TASK> [ 13.183651] [ 13.195095] The buggy address belongs to the physical page: [ 13.195487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30 [ 13.196214] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.197149] flags: 0x200000000000040(head|node=0|zone=2) [ 13.197408] page_type: f8(unknown) [ 13.197734] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.198273] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.198961] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.199361] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.199993] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff [ 13.200425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.201373] page dumped because: kasan: bad access detected [ 13.201781] [ 13.201897] Memory state around the buggy address: [ 13.202254] ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.202842] ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.203375] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.203850] ^ [ 13.204219] ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.204816] ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.205101] ================================================================== [ 12.939402] ================================================================== [ 12.939927] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 12.940386] Write of size 1 at addr ffff888100aa58da by task kunit_try_catch/176 [ 12.940603] [ 12.940879] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.940956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.940976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.941010] Call Trace: [ 12.941045] <TASK> [ 12.941074] dump_stack_lvl+0x73/0xb0 [ 12.941123] print_report+0xd1/0x650 [ 12.941156] ? __virt_addr_valid+0x1db/0x2d0 [ 12.941190] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.941227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.941336] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.941391] kasan_report+0x141/0x180 [ 12.941431] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.941484] __asan_report_store1_noabort+0x1b/0x30 [ 12.941524] krealloc_less_oob_helper+0xec6/0x11d0 [ 12.941712] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.941772] ? finish_task_switch.isra.0+0x153/0x700 [ 12.941808] ? __switch_to+0x47/0xf50 [ 12.941847] ? __schedule+0x10cc/0x2b60 [ 12.941885] ? __pfx_read_tsc+0x10/0x10 [ 12.941935] krealloc_less_oob+0x1c/0x30 [ 12.941972] kunit_try_run_case+0x1a5/0x480 [ 12.942011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.942043] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.942075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.942142] ? __kthread_parkme+0x82/0x180 [ 12.942182] ? preempt_count_sub+0x50/0x80 [ 12.942224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.942286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.942309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.942329] kthread+0x337/0x6f0 [ 12.942347] ? trace_preempt_on+0x20/0xc0 [ 12.942369] ? __pfx_kthread+0x10/0x10 [ 12.942387] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.942405] ? calculate_sigpending+0x7b/0xa0 [ 12.942425] ? __pfx_kthread+0x10/0x10 [ 12.942443] ret_from_fork+0x116/0x1d0 [ 12.942460] ? __pfx_kthread+0x10/0x10 [ 12.942477] ret_from_fork_asm+0x1a/0x30 [ 12.942519] </TASK> [ 12.942539] [ 12.954463] Allocated by task 176: [ 12.954893] kasan_save_stack+0x45/0x70 [ 12.955212] kasan_save_track+0x18/0x40 [ 12.955380] kasan_save_alloc_info+0x3b/0x50 [ 12.955805] __kasan_krealloc+0x190/0x1f0 [ 12.956155] krealloc_noprof+0xf3/0x340 [ 12.956449] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.957176] krealloc_less_oob+0x1c/0x30 [ 12.957538] kunit_try_run_case+0x1a5/0x480 [ 12.957864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.958068] kthread+0x337/0x6f0 [ 12.958348] ret_from_fork+0x116/0x1d0 [ 12.958654] ret_from_fork_asm+0x1a/0x30 [ 12.958999] [ 12.959201] The buggy address belongs to the object at ffff888100aa5800 [ 12.959201] which belongs to the cache kmalloc-256 of size 256 [ 12.959891] The buggy address is located 17 bytes to the right of [ 12.959891] allocated 201-byte region [ffff888100aa5800, ffff888100aa58c9) [ 12.960960] [ 12.961130] The buggy address belongs to the physical page: [ 12.961331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa4 [ 12.962015] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.962348] flags: 0x200000000000040(head|node=0|zone=2) [ 12.962819] page_type: f5(slab) [ 12.963076] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.963720] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.964020] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.964898] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.965395] head: 0200000000000001 ffffea000402a901 00000000ffffffff 00000000ffffffff [ 12.965738] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.966007] page dumped because: kasan: bad access detected [ 12.966603] [ 12.966744] Memory state around the buggy address: [ 12.967027] ffff888100aa5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.967406] ffff888100aa5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.967818] >ffff888100aa5880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.968218] ^ [ 12.969043] ffff888100aa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.969353] ffff888100aa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.969886] ================================================================== [ 13.099910] ================================================================== [ 13.100362] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.101379] Write of size 1 at addr ffff888102b320c9 by task kunit_try_catch/180 [ 13.102330] [ 13.102528] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.102607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.102645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.102683] Call Trace: [ 13.102708] <TASK> [ 13.102734] dump_stack_lvl+0x73/0xb0 [ 13.102789] print_report+0xd1/0x650 [ 13.102828] ? __virt_addr_valid+0x1db/0x2d0 [ 13.102869] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.102902] ? kasan_addr_to_slab+0x11/0xa0 [ 13.102929] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.102967] kasan_report+0x141/0x180 [ 13.103004] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.103050] __asan_report_store1_noabort+0x1b/0x30 [ 13.103085] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.103138] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.103176] ? finish_task_switch.isra.0+0x153/0x700 [ 13.103217] ? __switch_to+0x47/0xf50 [ 13.103266] ? __schedule+0x10cc/0x2b60 [ 13.103307] ? __pfx_read_tsc+0x10/0x10 [ 13.103337] krealloc_large_less_oob+0x1c/0x30 [ 13.103357] kunit_try_run_case+0x1a5/0x480 [ 13.103380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.103398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.103419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.103439] ? __kthread_parkme+0x82/0x180 [ 13.103457] ? preempt_count_sub+0x50/0x80 [ 13.103477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.103497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.103533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.103562] kthread+0x337/0x6f0 [ 13.103587] ? trace_preempt_on+0x20/0xc0 [ 13.103635] ? __pfx_kthread+0x10/0x10 [ 13.103666] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.103693] ? calculate_sigpending+0x7b/0xa0 [ 13.103725] ? __pfx_kthread+0x10/0x10 [ 13.103754] ret_from_fork+0x116/0x1d0 [ 13.103779] ? __pfx_kthread+0x10/0x10 [ 13.103806] ret_from_fork_asm+0x1a/0x30 [ 13.103852] </TASK> [ 13.103871] [ 13.115194] The buggy address belongs to the physical page: [ 13.115868] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30 [ 13.116796] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.117323] flags: 0x200000000000040(head|node=0|zone=2) [ 13.117542] page_type: f8(unknown) [ 13.117710] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.117945] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.118165] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.118381] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.119787] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff [ 13.120743] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.121241] page dumped because: kasan: bad access detected [ 13.121829] [ 13.121997] Memory state around the buggy address: [ 13.122731] ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.123247] ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.123475] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.124064] ^ [ 13.125223] ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.125476] ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.126375] ================================================================== [ 13.206062] ================================================================== [ 13.206580] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.206960] Write of size 1 at addr ffff888102b320eb by task kunit_try_catch/180 [ 13.207238] [ 13.207359] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.207436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.207459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.207484] Call Trace: [ 13.207502] <TASK> [ 13.207521] dump_stack_lvl+0x73/0xb0 [ 13.207554] print_report+0xd1/0x650 [ 13.207578] ? __virt_addr_valid+0x1db/0x2d0 [ 13.207603] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.208188] ? kasan_addr_to_slab+0x11/0xa0 [ 13.208233] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.208275] kasan_report+0x141/0x180 [ 13.208318] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.208372] __asan_report_store1_noabort+0x1b/0x30 [ 13.208416] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.208464] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.208916] ? finish_task_switch.isra.0+0x153/0x700 [ 13.208965] ? __switch_to+0x47/0xf50 [ 13.208990] ? __schedule+0x10cc/0x2b60 [ 13.209010] ? __pfx_read_tsc+0x10/0x10 [ 13.209031] krealloc_large_less_oob+0x1c/0x30 [ 13.209053] kunit_try_run_case+0x1a5/0x480 [ 13.209074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.209092] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.209134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.209154] ? __kthread_parkme+0x82/0x180 [ 13.209171] ? preempt_count_sub+0x50/0x80 [ 13.209191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.209211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.209230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.209250] kthread+0x337/0x6f0 [ 13.209267] ? trace_preempt_on+0x20/0xc0 [ 13.209287] ? __pfx_kthread+0x10/0x10 [ 13.209305] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.209323] ? calculate_sigpending+0x7b/0xa0 [ 13.209343] ? __pfx_kthread+0x10/0x10 [ 13.209361] ret_from_fork+0x116/0x1d0 [ 13.209378] ? __pfx_kthread+0x10/0x10 [ 13.209395] ret_from_fork_asm+0x1a/0x30 [ 13.209423] </TASK> [ 13.209434] [ 13.221015] The buggy address belongs to the physical page: [ 13.221353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30 [ 13.222343] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.222929] flags: 0x200000000000040(head|node=0|zone=2) [ 13.223164] page_type: f8(unknown) [ 13.223459] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.224098] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.224492] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.225093] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.225492] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff [ 13.226274] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.226614] page dumped because: kasan: bad access detected [ 13.227247] [ 13.227406] Memory state around the buggy address: [ 13.227700] ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.228308] ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.228536] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.229258] ^ [ 13.230070] ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.230307] ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.230935] ================================================================== [ 12.971730] ================================================================== [ 12.972181] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 12.972903] Write of size 1 at addr ffff888100aa58ea by task kunit_try_catch/176 [ 12.973148] [ 12.973287] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.973370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.973393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.973422] Call Trace: [ 12.973442] <TASK> [ 12.973462] dump_stack_lvl+0x73/0xb0 [ 12.973494] print_report+0xd1/0x650 [ 12.973514] ? __virt_addr_valid+0x1db/0x2d0 [ 12.973533] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.973557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.973590] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.973611] kasan_report+0x141/0x180 [ 12.973656] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.973693] __asan_report_store1_noabort+0x1b/0x30 [ 12.973724] krealloc_less_oob_helper+0xe90/0x11d0 [ 12.973760] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.973790] ? finish_task_switch.isra.0+0x153/0x700 [ 12.973820] ? __switch_to+0x47/0xf50 [ 12.973855] ? __schedule+0x10cc/0x2b60 [ 12.973883] ? __pfx_read_tsc+0x10/0x10 [ 12.973925] krealloc_less_oob+0x1c/0x30 [ 12.973957] kunit_try_run_case+0x1a5/0x480 [ 12.973990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.974014] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.974036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.974055] ? __kthread_parkme+0x82/0x180 [ 12.974073] ? preempt_count_sub+0x50/0x80 [ 12.974092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.974150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.974194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.974228] kthread+0x337/0x6f0 [ 12.974259] ? trace_preempt_on+0x20/0xc0 [ 12.974299] ? __pfx_kthread+0x10/0x10 [ 12.974336] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.974374] ? calculate_sigpending+0x7b/0xa0 [ 12.974417] ? __pfx_kthread+0x10/0x10 [ 12.974455] ret_from_fork+0x116/0x1d0 [ 12.974488] ? __pfx_kthread+0x10/0x10 [ 12.974539] ret_from_fork_asm+0x1a/0x30 [ 12.974600] </TASK> [ 12.974639] [ 12.986657] Allocated by task 176: [ 12.987462] kasan_save_stack+0x45/0x70 [ 12.987851] kasan_save_track+0x18/0x40 [ 12.987966] kasan_save_alloc_info+0x3b/0x50 [ 12.988058] __kasan_krealloc+0x190/0x1f0 [ 12.988274] krealloc_noprof+0xf3/0x340 [ 12.988660] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.989272] krealloc_less_oob+0x1c/0x30 [ 12.989754] kunit_try_run_case+0x1a5/0x480 [ 12.989951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.990414] kthread+0x337/0x6f0 [ 12.991082] ret_from_fork+0x116/0x1d0 [ 12.991447] ret_from_fork_asm+0x1a/0x30 [ 12.991840] [ 12.992080] The buggy address belongs to the object at ffff888100aa5800 [ 12.992080] which belongs to the cache kmalloc-256 of size 256 [ 12.992827] The buggy address is located 33 bytes to the right of [ 12.992827] allocated 201-byte region [ffff888100aa5800, ffff888100aa58c9) [ 12.993506] [ 12.993768] The buggy address belongs to the physical page: [ 12.994354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa4 [ 12.994866] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.995533] flags: 0x200000000000040(head|node=0|zone=2) [ 12.996285] page_type: f5(slab) [ 12.996483] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.996824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.997681] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.998130] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.998693] head: 0200000000000001 ffffea000402a901 00000000ffffffff 00000000ffffffff [ 12.999052] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.999493] page dumped because: kasan: bad access detected [ 12.999981] [ 13.000139] Memory state around the buggy address: [ 13.000568] ffff888100aa5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.000907] ffff888100aa5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.001358] >ffff888100aa5880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.002376] ^ [ 13.002674] ffff888100aa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.003667] ffff888100aa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.004179] ================================================================== [ 13.126823] ================================================================== [ 13.127425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.128098] Write of size 1 at addr ffff888102b320d0 by task kunit_try_catch/180 [ 13.128471] [ 13.129154] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.129247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.129271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.129308] Call Trace: [ 13.129335] <TASK> [ 13.129362] dump_stack_lvl+0x73/0xb0 [ 13.129424] print_report+0xd1/0x650 [ 13.129463] ? __virt_addr_valid+0x1db/0x2d0 [ 13.129670] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.129715] ? kasan_addr_to_slab+0x11/0xa0 [ 13.129747] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.129784] kasan_report+0x141/0x180 [ 13.129821] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.129864] __asan_report_store1_noabort+0x1b/0x30 [ 13.129922] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.129983] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.130021] ? finish_task_switch.isra.0+0x153/0x700 [ 13.130060] ? __switch_to+0x47/0xf50 [ 13.130131] ? __schedule+0x10cc/0x2b60 [ 13.130172] ? __pfx_read_tsc+0x10/0x10 [ 13.130230] krealloc_large_less_oob+0x1c/0x30 [ 13.130270] kunit_try_run_case+0x1a5/0x480 [ 13.130293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.130312] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.130333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.130353] ? __kthread_parkme+0x82/0x180 [ 13.130371] ? preempt_count_sub+0x50/0x80 [ 13.130391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.130410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.130430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.130449] kthread+0x337/0x6f0 [ 13.130466] ? trace_preempt_on+0x20/0xc0 [ 13.130487] ? __pfx_kthread+0x10/0x10 [ 13.130544] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.130585] ? calculate_sigpending+0x7b/0xa0 [ 13.130632] ? __pfx_kthread+0x10/0x10 [ 13.130664] ret_from_fork+0x116/0x1d0 [ 13.130691] ? __pfx_kthread+0x10/0x10 [ 13.130709] ret_from_fork_asm+0x1a/0x30 [ 13.130736] </TASK> [ 13.130748] [ 13.142990] The buggy address belongs to the physical page: [ 13.143401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30 [ 13.143873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.144396] flags: 0x200000000000040(head|node=0|zone=2) [ 13.145159] page_type: f8(unknown) [ 13.145334] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.145980] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.146442] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.147141] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.147695] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff [ 13.148173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.148923] page dumped because: kasan: bad access detected [ 13.149265] [ 13.149411] Memory state around the buggy address: [ 13.149735] ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.150190] ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.150877] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.151343] ^ [ 13.151872] ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.152475] ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.153374] ================================================================== [ 12.871297] ================================================================== [ 12.872556] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 12.872912] Write of size 1 at addr ffff888100aa58c9 by task kunit_try_catch/176 [ 12.873816] [ 12.873979] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.874054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.874076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.874109] Call Trace: [ 12.874552] <TASK> [ 12.874602] dump_stack_lvl+0x73/0xb0 [ 12.874679] print_report+0xd1/0x650 [ 12.874713] ? __virt_addr_valid+0x1db/0x2d0 [ 12.874746] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.874768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.874789] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.874809] kasan_report+0x141/0x180 [ 12.874828] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.874853] __asan_report_store1_noabort+0x1b/0x30 [ 12.874873] krealloc_less_oob_helper+0xd70/0x11d0 [ 12.874895] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.874915] ? finish_task_switch.isra.0+0x153/0x700 [ 12.874935] ? __switch_to+0x47/0xf50 [ 12.874958] ? __schedule+0x10cc/0x2b60 [ 12.874978] ? __pfx_read_tsc+0x10/0x10 [ 12.874999] krealloc_less_oob+0x1c/0x30 [ 12.875017] kunit_try_run_case+0x1a5/0x480 [ 12.875039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.875057] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.875077] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.875096] ? __kthread_parkme+0x82/0x180 [ 12.875123] ? preempt_count_sub+0x50/0x80 [ 12.875145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.875164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.875183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.875202] kthread+0x337/0x6f0 [ 12.875219] ? trace_preempt_on+0x20/0xc0 [ 12.875240] ? __pfx_kthread+0x10/0x10 [ 12.875258] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.875275] ? calculate_sigpending+0x7b/0xa0 [ 12.875297] ? __pfx_kthread+0x10/0x10 [ 12.875315] ret_from_fork+0x116/0x1d0 [ 12.875331] ? __pfx_kthread+0x10/0x10 [ 12.875349] ret_from_fork_asm+0x1a/0x30 [ 12.875376] </TASK> [ 12.875387] [ 12.886256] Allocated by task 176: [ 12.886727] kasan_save_stack+0x45/0x70 [ 12.887037] kasan_save_track+0x18/0x40 [ 12.887261] kasan_save_alloc_info+0x3b/0x50 [ 12.887423] __kasan_krealloc+0x190/0x1f0 [ 12.888352] krealloc_noprof+0xf3/0x340 [ 12.888659] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.889114] krealloc_less_oob+0x1c/0x30 [ 12.889298] kunit_try_run_case+0x1a5/0x480 [ 12.889788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.890257] kthread+0x337/0x6f0 [ 12.890690] ret_from_fork+0x116/0x1d0 [ 12.890937] ret_from_fork_asm+0x1a/0x30 [ 12.891088] [ 12.891488] The buggy address belongs to the object at ffff888100aa5800 [ 12.891488] which belongs to the cache kmalloc-256 of size 256 [ 12.891824] The buggy address is located 0 bytes to the right of [ 12.891824] allocated 201-byte region [ffff888100aa5800, ffff888100aa58c9) [ 12.892805] [ 12.893009] The buggy address belongs to the physical page: [ 12.893843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa4 [ 12.894188] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.895071] flags: 0x200000000000040(head|node=0|zone=2) [ 12.895348] page_type: f5(slab) [ 12.895487] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.896114] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.896420] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.897584] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.897953] head: 0200000000000001 ffffea000402a901 00000000ffffffff 00000000ffffffff [ 12.898953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.899286] page dumped because: kasan: bad access detected [ 12.899812] [ 12.899928] Memory state around the buggy address: [ 12.900137] ffff888100aa5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.900855] ffff888100aa5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.901145] >ffff888100aa5880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.901696] ^ [ 12.902031] ffff888100aa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.902770] ffff888100aa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.903388] ==================================================================
[ 13.215442] ================================================================== [ 13.215798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.216150] Write of size 1 at addr ffff888100a302ea by task kunit_try_catch/175 [ 13.216428] [ 13.216542] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.216583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.216594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.216613] Call Trace: [ 13.216628] <TASK> [ 13.216644] dump_stack_lvl+0x73/0xb0 [ 13.216669] print_report+0xd1/0x650 [ 13.216690] ? __virt_addr_valid+0x1db/0x2d0 [ 13.216711] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.216733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.216757] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.216780] kasan_report+0x141/0x180 [ 13.216801] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.216828] __asan_report_store1_noabort+0x1b/0x30 [ 13.216851] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.216875] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.216896] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.216924] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.216950] krealloc_less_oob+0x1c/0x30 [ 13.216971] kunit_try_run_case+0x1a5/0x480 [ 13.216993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.217013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.217036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.217097] ? __kthread_parkme+0x82/0x180 [ 13.217117] ? preempt_count_sub+0x50/0x80 [ 13.217140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.217162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.217184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.217205] kthread+0x337/0x6f0 [ 13.217224] ? trace_preempt_on+0x20/0xc0 [ 13.217246] ? __pfx_kthread+0x10/0x10 [ 13.217266] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.217286] ? calculate_sigpending+0x7b/0xa0 [ 13.217308] ? __pfx_kthread+0x10/0x10 [ 13.217345] ret_from_fork+0x116/0x1d0 [ 13.217362] ? __pfx_kthread+0x10/0x10 [ 13.217382] ret_from_fork_asm+0x1a/0x30 [ 13.217412] </TASK> [ 13.217422] [ 13.224764] Allocated by task 175: [ 13.224945] kasan_save_stack+0x45/0x70 [ 13.225151] kasan_save_track+0x18/0x40 [ 13.225344] kasan_save_alloc_info+0x3b/0x50 [ 13.225566] __kasan_krealloc+0x190/0x1f0 [ 13.225759] krealloc_noprof+0xf3/0x340 [ 13.225953] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.226135] krealloc_less_oob+0x1c/0x30 [ 13.226284] kunit_try_run_case+0x1a5/0x480 [ 13.226495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.226750] kthread+0x337/0x6f0 [ 13.226915] ret_from_fork+0x116/0x1d0 [ 13.227133] ret_from_fork_asm+0x1a/0x30 [ 13.227337] [ 13.227435] The buggy address belongs to the object at ffff888100a30200 [ 13.227435] which belongs to the cache kmalloc-256 of size 256 [ 13.227891] The buggy address is located 33 bytes to the right of [ 13.227891] allocated 201-byte region [ffff888100a30200, ffff888100a302c9) [ 13.228447] [ 13.228522] The buggy address belongs to the physical page: [ 13.228696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30 [ 13.228959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.229455] flags: 0x200000000000040(head|node=0|zone=2) [ 13.229790] page_type: f5(slab) [ 13.229976] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.230327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.230662] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.231058] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.231413] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff [ 13.231763] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.232139] page dumped because: kasan: bad access detected [ 13.232314] [ 13.232386] Memory state around the buggy address: [ 13.232543] ffff888100a30180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.232809] ffff888100a30200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.233145] >ffff888100a30280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.233463] ^ [ 13.233866] ffff888100a30300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.234249] ffff888100a30380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.234467] ================================================================== [ 13.234883] ================================================================== [ 13.235244] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.235783] Write of size 1 at addr ffff888100a302eb by task kunit_try_catch/175 [ 13.236387] [ 13.236473] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.236513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.236524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.236543] Call Trace: [ 13.236558] <TASK> [ 13.236574] dump_stack_lvl+0x73/0xb0 [ 13.236600] print_report+0xd1/0x650 [ 13.236621] ? __virt_addr_valid+0x1db/0x2d0 [ 13.236642] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.236664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.236689] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.236730] kasan_report+0x141/0x180 [ 13.236751] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.236779] __asan_report_store1_noabort+0x1b/0x30 [ 13.236802] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.236827] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.236848] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.236877] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.236903] krealloc_less_oob+0x1c/0x30 [ 13.236924] kunit_try_run_case+0x1a5/0x480 [ 13.236946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.236966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.236989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.237010] ? __kthread_parkme+0x82/0x180 [ 13.237029] ? preempt_count_sub+0x50/0x80 [ 13.237062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.237084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.237105] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.237127] kthread+0x337/0x6f0 [ 13.237149] ? trace_preempt_on+0x20/0xc0 [ 13.237172] ? __pfx_kthread+0x10/0x10 [ 13.237210] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.237230] ? calculate_sigpending+0x7b/0xa0 [ 13.237253] ? __pfx_kthread+0x10/0x10 [ 13.237293] ret_from_fork+0x116/0x1d0 [ 13.237313] ? __pfx_kthread+0x10/0x10 [ 13.237332] ret_from_fork_asm+0x1a/0x30 [ 13.237363] </TASK> [ 13.237374] [ 13.249480] Allocated by task 175: [ 13.249667] kasan_save_stack+0x45/0x70 [ 13.250262] kasan_save_track+0x18/0x40 [ 13.250574] kasan_save_alloc_info+0x3b/0x50 [ 13.251067] __kasan_krealloc+0x190/0x1f0 [ 13.251389] krealloc_noprof+0xf3/0x340 [ 13.251584] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.252259] krealloc_less_oob+0x1c/0x30 [ 13.252640] kunit_try_run_case+0x1a5/0x480 [ 13.253175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.253449] kthread+0x337/0x6f0 [ 13.253616] ret_from_fork+0x116/0x1d0 [ 13.254036] ret_from_fork_asm+0x1a/0x30 [ 13.254447] [ 13.254554] The buggy address belongs to the object at ffff888100a30200 [ 13.254554] which belongs to the cache kmalloc-256 of size 256 [ 13.255387] The buggy address is located 34 bytes to the right of [ 13.255387] allocated 201-byte region [ffff888100a30200, ffff888100a302c9) [ 13.256606] [ 13.256928] The buggy address belongs to the physical page: [ 13.257267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30 [ 13.257613] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.257937] flags: 0x200000000000040(head|node=0|zone=2) [ 13.258191] page_type: f5(slab) [ 13.258352] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.258675] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.258992] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.260076] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.260396] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff [ 13.260796] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.261083] page dumped because: kasan: bad access detected [ 13.261348] [ 13.261447] Memory state around the buggy address: [ 13.261651] ffff888100a30180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.262023] ffff888100a30200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.262358] >ffff888100a30280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.262652] ^ [ 13.263025] ffff888100a30300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.263307] ffff888100a30380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.263645] ================================================================== [ 13.308886] ================================================================== [ 13.310744] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.312005] Write of size 1 at addr ffff8881031d60c9 by task kunit_try_catch/179 [ 13.313100] [ 13.313612] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.313955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.313971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.313993] Call Trace: [ 13.314007] <TASK> [ 13.314021] dump_stack_lvl+0x73/0xb0 [ 13.314067] print_report+0xd1/0x650 [ 13.314088] ? __virt_addr_valid+0x1db/0x2d0 [ 13.314110] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.314132] ? kasan_addr_to_slab+0x11/0xa0 [ 13.314151] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.314174] kasan_report+0x141/0x180 [ 13.314195] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.314223] __asan_report_store1_noabort+0x1b/0x30 [ 13.314246] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.314276] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.314297] ? irqentry_exit+0x2a/0x60 [ 13.314318] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.314346] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 13.314371] krealloc_large_less_oob+0x1c/0x30 [ 13.314393] kunit_try_run_case+0x1a5/0x480 [ 13.314416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314437] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.314458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.314480] ? __kthread_parkme+0x82/0x180 [ 13.314499] ? preempt_count_sub+0x50/0x80 [ 13.314521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.314565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.314586] kthread+0x337/0x6f0 [ 13.314605] ? trace_preempt_on+0x20/0xc0 [ 13.314626] ? __pfx_kthread+0x10/0x10 [ 13.314646] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.314665] ? calculate_sigpending+0x7b/0xa0 [ 13.314687] ? __pfx_kthread+0x10/0x10 [ 13.314716] ret_from_fork+0x116/0x1d0 [ 13.314734] ? __pfx_kthread+0x10/0x10 [ 13.314765] ret_from_fork_asm+0x1a/0x30 [ 13.314796] </TASK> [ 13.314807] [ 13.334189] The buggy address belongs to the physical page: [ 13.334497] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 13.334918] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.335303] flags: 0x200000000000040(head|node=0|zone=2) [ 13.335568] page_type: f8(unknown) [ 13.335753] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.336549] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.336913] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.337629] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.338227] head: 0200000000000002 ffffea00040c7501 00000000ffffffff 00000000ffffffff [ 13.338669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.339212] page dumped because: kasan: bad access detected [ 13.339587] [ 13.339673] Memory state around the buggy address: [ 13.340136] ffff8881031d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.340542] ffff8881031d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.341259] >ffff8881031d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.341680] ^ [ 13.342165] ffff8881031d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.342561] ffff8881031d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.343106] ================================================================== [ 13.396787] ================================================================== [ 13.397130] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.397396] Write of size 1 at addr ffff8881031d60eb by task kunit_try_catch/179 [ 13.397676] [ 13.398098] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.398145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.398157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.398177] Call Trace: [ 13.398190] <TASK> [ 13.398204] dump_stack_lvl+0x73/0xb0 [ 13.398232] print_report+0xd1/0x650 [ 13.398254] ? __virt_addr_valid+0x1db/0x2d0 [ 13.398275] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.398298] ? kasan_addr_to_slab+0x11/0xa0 [ 13.398318] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.398342] kasan_report+0x141/0x180 [ 13.398364] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.398394] __asan_report_store1_noabort+0x1b/0x30 [ 13.398418] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.398444] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.398467] ? irqentry_exit+0x2a/0x60 [ 13.398488] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.398517] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 13.398544] krealloc_large_less_oob+0x1c/0x30 [ 13.398566] kunit_try_run_case+0x1a5/0x480 [ 13.398590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.398611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.398634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.398657] ? __kthread_parkme+0x82/0x180 [ 13.398677] ? preempt_count_sub+0x50/0x80 [ 13.398798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.398827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.398850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.398873] kthread+0x337/0x6f0 [ 13.398893] ? trace_preempt_on+0x20/0xc0 [ 13.398916] ? __pfx_kthread+0x10/0x10 [ 13.398937] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.398957] ? calculate_sigpending+0x7b/0xa0 [ 13.398980] ? __pfx_kthread+0x10/0x10 [ 13.399002] ret_from_fork+0x116/0x1d0 [ 13.399020] ? __pfx_kthread+0x10/0x10 [ 13.399041] ret_from_fork_asm+0x1a/0x30 [ 13.399084] </TASK> [ 13.399096] [ 13.407221] The buggy address belongs to the physical page: [ 13.407442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 13.407789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.408150] flags: 0x200000000000040(head|node=0|zone=2) [ 13.408407] page_type: f8(unknown) [ 13.408555] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.408951] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.409207] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.409567] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.410132] head: 0200000000000002 ffffea00040c7501 00000000ffffffff 00000000ffffffff [ 13.410466] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.410809] page dumped because: kasan: bad access detected [ 13.411030] [ 13.411139] Memory state around the buggy address: [ 13.411369] ffff8881031d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.411785] ffff8881031d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.412085] >ffff8881031d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.412398] ^ [ 13.412613] ffff8881031d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.413039] ffff8881031d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.413377] ================================================================== [ 13.173378] ================================================================== [ 13.174213] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.175066] Write of size 1 at addr ffff888100a302d0 by task kunit_try_catch/175 [ 13.176107] [ 13.176245] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.176295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.176307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.176328] Call Trace: [ 13.176347] <TASK> [ 13.176365] dump_stack_lvl+0x73/0xb0 [ 13.176397] print_report+0xd1/0x650 [ 13.176419] ? __virt_addr_valid+0x1db/0x2d0 [ 13.176441] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.176464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.176490] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.176512] kasan_report+0x141/0x180 [ 13.176533] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.176561] __asan_report_store1_noabort+0x1b/0x30 [ 13.176584] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.176609] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.176631] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.176660] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.176688] krealloc_less_oob+0x1c/0x30 [ 13.176720] kunit_try_run_case+0x1a5/0x480 [ 13.176744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.176764] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.176788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.176809] ? __kthread_parkme+0x82/0x180 [ 13.176828] ? preempt_count_sub+0x50/0x80 [ 13.176853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.176875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.176896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.176917] kthread+0x337/0x6f0 [ 13.176936] ? trace_preempt_on+0x20/0xc0 [ 13.176958] ? __pfx_kthread+0x10/0x10 [ 13.176978] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.176998] ? calculate_sigpending+0x7b/0xa0 [ 13.177021] ? __pfx_kthread+0x10/0x10 [ 13.177042] ret_from_fork+0x116/0x1d0 [ 13.177070] ? __pfx_kthread+0x10/0x10 [ 13.177090] ret_from_fork_asm+0x1a/0x30 [ 13.177121] </TASK> [ 13.177132] [ 13.185461] Allocated by task 175: [ 13.185607] kasan_save_stack+0x45/0x70 [ 13.185764] kasan_save_track+0x18/0x40 [ 13.185962] kasan_save_alloc_info+0x3b/0x50 [ 13.186190] __kasan_krealloc+0x190/0x1f0 [ 13.186394] krealloc_noprof+0xf3/0x340 [ 13.186592] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.186829] krealloc_less_oob+0x1c/0x30 [ 13.187032] kunit_try_run_case+0x1a5/0x480 [ 13.187198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.187377] kthread+0x337/0x6f0 [ 13.187500] ret_from_fork+0x116/0x1d0 [ 13.187634] ret_from_fork_asm+0x1a/0x30 [ 13.187801] [ 13.187876] The buggy address belongs to the object at ffff888100a30200 [ 13.187876] which belongs to the cache kmalloc-256 of size 256 [ 13.188434] The buggy address is located 7 bytes to the right of [ 13.188434] allocated 201-byte region [ffff888100a30200, ffff888100a302c9) [ 13.189383] [ 13.189481] The buggy address belongs to the physical page: [ 13.189778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30 [ 13.190026] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.190657] flags: 0x200000000000040(head|node=0|zone=2) [ 13.190910] page_type: f5(slab) [ 13.191045] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.191404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.191801] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.192096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.192334] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff [ 13.192571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.192859] page dumped because: kasan: bad access detected [ 13.193139] [ 13.193240] Memory state around the buggy address: [ 13.193443] ffff888100a30180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.193774] ffff888100a30200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.194152] >ffff888100a30280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.194418] ^ [ 13.194689] ffff888100a30300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.195003] ffff888100a30380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.195235] ================================================================== [ 13.361585] ================================================================== [ 13.362047] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.362399] Write of size 1 at addr ffff8881031d60da by task kunit_try_catch/179 [ 13.362661] [ 13.362866] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.362909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.362921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.362940] Call Trace: [ 13.362953] <TASK> [ 13.362967] dump_stack_lvl+0x73/0xb0 [ 13.362994] print_report+0xd1/0x650 [ 13.363016] ? __virt_addr_valid+0x1db/0x2d0 [ 13.363037] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.363072] ? kasan_addr_to_slab+0x11/0xa0 [ 13.363092] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.363115] kasan_report+0x141/0x180 [ 13.363136] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.363164] __asan_report_store1_noabort+0x1b/0x30 [ 13.363188] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.363213] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.363235] ? irqentry_exit+0x2a/0x60 [ 13.363256] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.363284] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 13.363310] krealloc_large_less_oob+0x1c/0x30 [ 13.363332] kunit_try_run_case+0x1a5/0x480 [ 13.363354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.363375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.363397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.363419] ? __kthread_parkme+0x82/0x180 [ 13.363438] ? preempt_count_sub+0x50/0x80 [ 13.363461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.363484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.363505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.363527] kthread+0x337/0x6f0 [ 13.363545] ? trace_preempt_on+0x20/0xc0 [ 13.363567] ? __pfx_kthread+0x10/0x10 [ 13.363587] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.363607] ? calculate_sigpending+0x7b/0xa0 [ 13.363630] ? __pfx_kthread+0x10/0x10 [ 13.363650] ret_from_fork+0x116/0x1d0 [ 13.363668] ? __pfx_kthread+0x10/0x10 [ 13.363687] ret_from_fork_asm+0x1a/0x30 [ 13.363796] </TASK> [ 13.363806] [ 13.371498] The buggy address belongs to the physical page: [ 13.371739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 13.372045] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.372940] flags: 0x200000000000040(head|node=0|zone=2) [ 13.373225] page_type: f8(unknown) [ 13.373413] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.373869] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.374221] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.374548] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.374935] head: 0200000000000002 ffffea00040c7501 00000000ffffffff 00000000ffffffff [ 13.375232] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.375471] page dumped because: kasan: bad access detected [ 13.375805] [ 13.375909] Memory state around the buggy address: [ 13.376161] ffff8881031d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.376494] ffff8881031d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.376905] >ffff8881031d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.377265] ^ [ 13.377566] ffff8881031d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.377964] ffff8881031d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.378298] ================================================================== [ 13.195817] ================================================================== [ 13.196141] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.196392] Write of size 1 at addr ffff888100a302da by task kunit_try_catch/175 [ 13.196729] [ 13.196838] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.196878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.196889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.196907] Call Trace: [ 13.196922] <TASK> [ 13.196938] dump_stack_lvl+0x73/0xb0 [ 13.196964] print_report+0xd1/0x650 [ 13.196985] ? __virt_addr_valid+0x1db/0x2d0 [ 13.197007] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.197029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.197090] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.197114] kasan_report+0x141/0x180 [ 13.197135] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.197162] __asan_report_store1_noabort+0x1b/0x30 [ 13.197185] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.197210] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.197231] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.197260] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.197285] krealloc_less_oob+0x1c/0x30 [ 13.197305] kunit_try_run_case+0x1a5/0x480 [ 13.197328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.197348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.197371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.197392] ? __kthread_parkme+0x82/0x180 [ 13.197411] ? preempt_count_sub+0x50/0x80 [ 13.197434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.197456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.197477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.197500] kthread+0x337/0x6f0 [ 13.197518] ? trace_preempt_on+0x20/0xc0 [ 13.197544] ? __pfx_kthread+0x10/0x10 [ 13.197580] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.197600] ? calculate_sigpending+0x7b/0xa0 [ 13.197623] ? __pfx_kthread+0x10/0x10 [ 13.197643] ret_from_fork+0x116/0x1d0 [ 13.197661] ? __pfx_kthread+0x10/0x10 [ 13.197680] ret_from_fork_asm+0x1a/0x30 [ 13.197744] </TASK> [ 13.197754] [ 13.205031] Allocated by task 175: [ 13.205201] kasan_save_stack+0x45/0x70 [ 13.205407] kasan_save_track+0x18/0x40 [ 13.205598] kasan_save_alloc_info+0x3b/0x50 [ 13.205780] __kasan_krealloc+0x190/0x1f0 [ 13.206087] krealloc_noprof+0xf3/0x340 [ 13.206324] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.206530] krealloc_less_oob+0x1c/0x30 [ 13.206701] kunit_try_run_case+0x1a5/0x480 [ 13.206908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.207141] kthread+0x337/0x6f0 [ 13.207312] ret_from_fork+0x116/0x1d0 [ 13.207477] ret_from_fork_asm+0x1a/0x30 [ 13.207658] [ 13.207748] The buggy address belongs to the object at ffff888100a30200 [ 13.207748] which belongs to the cache kmalloc-256 of size 256 [ 13.208332] The buggy address is located 17 bytes to the right of [ 13.208332] allocated 201-byte region [ffff888100a30200, ffff888100a302c9) [ 13.208901] [ 13.208979] The buggy address belongs to the physical page: [ 13.209270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30 [ 13.209621] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.209954] flags: 0x200000000000040(head|node=0|zone=2) [ 13.210227] page_type: f5(slab) [ 13.210391] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.210755] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.211156] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.211491] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.211745] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff [ 13.211980] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.212533] page dumped because: kasan: bad access detected [ 13.212808] [ 13.212937] Memory state around the buggy address: [ 13.213126] ffff888100a30180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.213399] ffff888100a30200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.213620] >ffff888100a30280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.213860] ^ [ 13.214157] ffff888100a30300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.214474] ffff888100a30380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.214915] ================================================================== [ 13.343564] ================================================================== [ 13.344108] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.345046] Write of size 1 at addr ffff8881031d60d0 by task kunit_try_catch/179 [ 13.345679] [ 13.345903] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.345952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.345965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.345985] Call Trace: [ 13.346002] <TASK> [ 13.346019] dump_stack_lvl+0x73/0xb0 [ 13.346062] print_report+0xd1/0x650 [ 13.346086] ? __virt_addr_valid+0x1db/0x2d0 [ 13.346109] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.346132] ? kasan_addr_to_slab+0x11/0xa0 [ 13.346152] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.346176] kasan_report+0x141/0x180 [ 13.346198] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.346227] __asan_report_store1_noabort+0x1b/0x30 [ 13.346252] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.346277] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.346300] ? irqentry_exit+0x2a/0x60 [ 13.346321] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.346350] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 13.346378] krealloc_large_less_oob+0x1c/0x30 [ 13.346400] kunit_try_run_case+0x1a5/0x480 [ 13.346424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.346445] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.346469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.346492] ? __kthread_parkme+0x82/0x180 [ 13.346511] ? preempt_count_sub+0x50/0x80 [ 13.346536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.346559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.346581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.346603] kthread+0x337/0x6f0 [ 13.346623] ? trace_preempt_on+0x20/0xc0 [ 13.346646] ? __pfx_kthread+0x10/0x10 [ 13.346666] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.346687] ? calculate_sigpending+0x7b/0xa0 [ 13.346800] ? __pfx_kthread+0x10/0x10 [ 13.346823] ret_from_fork+0x116/0x1d0 [ 13.346842] ? __pfx_kthread+0x10/0x10 [ 13.346863] ret_from_fork_asm+0x1a/0x30 [ 13.346897] </TASK> [ 13.346907] [ 13.354992] The buggy address belongs to the physical page: [ 13.355281] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 13.355612] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.355973] flags: 0x200000000000040(head|node=0|zone=2) [ 13.356220] page_type: f8(unknown) [ 13.356353] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.356880] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.357184] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.357547] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.357963] head: 0200000000000002 ffffea00040c7501 00000000ffffffff 00000000ffffffff [ 13.358250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.358603] page dumped because: kasan: bad access detected [ 13.358883] [ 13.358960] Memory state around the buggy address: [ 13.359211] ffff8881031d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.359545] ffff8881031d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.359932] >ffff8881031d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.360244] ^ [ 13.360484] ffff8881031d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.360929] ffff8881031d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.361250] ================================================================== [ 13.130406] ================================================================== [ 13.131999] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.133670] Write of size 1 at addr ffff888100a302c9 by task kunit_try_catch/175 [ 13.135159] [ 13.135280] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.135327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.135339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.135359] Call Trace: [ 13.135371] <TASK> [ 13.135386] dump_stack_lvl+0x73/0xb0 [ 13.135415] print_report+0xd1/0x650 [ 13.135436] ? __virt_addr_valid+0x1db/0x2d0 [ 13.135458] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.135507] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135531] kasan_report+0x141/0x180 [ 13.135552] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135581] __asan_report_store1_noabort+0x1b/0x30 [ 13.135605] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.135631] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.135653] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.135683] ? __pfx_krealloc_less_oob+0x10/0x10 [ 13.135709] krealloc_less_oob+0x1c/0x30 [ 13.135730] kunit_try_run_case+0x1a5/0x480 [ 13.135754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.135776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.135799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.135821] ? __kthread_parkme+0x82/0x180 [ 13.135840] ? preempt_count_sub+0x50/0x80 [ 13.135865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.135887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.135909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.135931] kthread+0x337/0x6f0 [ 13.135951] ? trace_preempt_on+0x20/0xc0 [ 13.135975] ? __pfx_kthread+0x10/0x10 [ 13.135995] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.136015] ? calculate_sigpending+0x7b/0xa0 [ 13.136415] ? __pfx_kthread+0x10/0x10 [ 13.136450] ret_from_fork+0x116/0x1d0 [ 13.136471] ? __pfx_kthread+0x10/0x10 [ 13.136492] ret_from_fork_asm+0x1a/0x30 [ 13.136523] </TASK> [ 13.136535] [ 13.153491] Allocated by task 175: [ 13.153641] kasan_save_stack+0x45/0x70 [ 13.154475] kasan_save_track+0x18/0x40 [ 13.155008] kasan_save_alloc_info+0x3b/0x50 [ 13.155519] __kasan_krealloc+0x190/0x1f0 [ 13.156020] krealloc_noprof+0xf3/0x340 [ 13.156644] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.157303] krealloc_less_oob+0x1c/0x30 [ 13.157846] kunit_try_run_case+0x1a5/0x480 [ 13.158013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.158210] kthread+0x337/0x6f0 [ 13.158334] ret_from_fork+0x116/0x1d0 [ 13.158469] ret_from_fork_asm+0x1a/0x30 [ 13.158609] [ 13.158685] The buggy address belongs to the object at ffff888100a30200 [ 13.158685] which belongs to the cache kmalloc-256 of size 256 [ 13.160458] The buggy address is located 0 bytes to the right of [ 13.160458] allocated 201-byte region [ffff888100a30200, ffff888100a302c9) [ 13.161698] [ 13.161890] The buggy address belongs to the physical page: [ 13.162436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30 [ 13.163260] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.163557] flags: 0x200000000000040(head|node=0|zone=2) [ 13.164267] page_type: f5(slab) [ 13.164406] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.164639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.164870] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.165115] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.165350] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff [ 13.166564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.167605] page dumped because: kasan: bad access detected [ 13.168407] [ 13.168580] Memory state around the buggy address: [ 13.169009] ffff888100a30180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.169961] ffff888100a30200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.170584] >ffff888100a30280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.171084] ^ [ 13.171265] ffff888100a30300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.172248] ffff888100a30380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.172483] ================================================================== [ 13.378657] ================================================================== [ 13.379040] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.379396] Write of size 1 at addr ffff8881031d60ea by task kunit_try_catch/179 [ 13.379657] [ 13.379881] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.379926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.379938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.379958] Call Trace: [ 13.379972] <TASK> [ 13.379986] dump_stack_lvl+0x73/0xb0 [ 13.380013] print_report+0xd1/0x650 [ 13.380036] ? __virt_addr_valid+0x1db/0x2d0 [ 13.380072] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.380096] ? kasan_addr_to_slab+0x11/0xa0 [ 13.380116] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.380140] kasan_report+0x141/0x180 [ 13.380162] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.380192] __asan_report_store1_noabort+0x1b/0x30 [ 13.380216] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.380242] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.380265] ? irqentry_exit+0x2a/0x60 [ 13.380286] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.380315] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 13.380342] krealloc_large_less_oob+0x1c/0x30 [ 13.380365] kunit_try_run_case+0x1a5/0x480 [ 13.380389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.380410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.380433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.380456] ? __kthread_parkme+0x82/0x180 [ 13.380475] ? preempt_count_sub+0x50/0x80 [ 13.380500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.380523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.380545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.380568] kthread+0x337/0x6f0 [ 13.380588] ? trace_preempt_on+0x20/0xc0 [ 13.380612] ? __pfx_kthread+0x10/0x10 [ 13.380633] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.380653] ? calculate_sigpending+0x7b/0xa0 [ 13.380677] ? __pfx_kthread+0x10/0x10 [ 13.380861] ret_from_fork+0x116/0x1d0 [ 13.380889] ? __pfx_kthread+0x10/0x10 [ 13.380910] ret_from_fork_asm+0x1a/0x30 [ 13.380942] </TASK> [ 13.380952] [ 13.389283] The buggy address belongs to the physical page: [ 13.389568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 13.389979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.390371] flags: 0x200000000000040(head|node=0|zone=2) [ 13.390638] page_type: f8(unknown) [ 13.390879] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.391230] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.391566] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.392020] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.392365] head: 0200000000000002 ffffea00040c7501 00000000ffffffff 00000000ffffffff [ 13.392680] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.393269] page dumped because: kasan: bad access detected [ 13.393499] [ 13.393580] Memory state around the buggy address: [ 13.393830] ffff8881031d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.394182] ffff8881031d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.394521] >ffff8881031d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.394861] ^ [ 13.395109] ffff8881031d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.395448] ffff8881031d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.395890] ==================================================================
[ 21.282185] ================================================================== [ 21.293768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 21.301428] Write of size 1 at addr ffff888104eb20c9 by task kunit_try_catch/203 [ 21.308822] [ 21.310343] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 21.310353] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 21.310356] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.310359] Call Trace: [ 21.310373] <TASK> [ 21.310375] dump_stack_lvl+0x73/0xb0 [ 21.310380] print_report+0xd1/0x650 [ 21.310397] ? __virt_addr_valid+0x1db/0x2d0 [ 21.310401] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310405] ? kasan_addr_to_slab+0x11/0xa0 [ 21.310409] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310413] kasan_report+0x141/0x180 [ 21.310417] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310422] __asan_report_store1_noabort+0x1b/0x30 [ 21.310427] krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310432] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.310437] ? finish_task_switch.isra.0+0x153/0x700 [ 21.310441] ? __switch_to+0x544/0xf50 [ 21.310445] ? __schedule+0x10cc/0x2b60 [ 21.310450] krealloc_large_less_oob+0x1c/0x30 [ 21.310454] kunit_try_run_case+0x1a2/0x480 [ 21.310459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.310463] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.310467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.310471] ? __kthread_parkme+0x82/0x180 [ 21.310475] ? preempt_count_sub+0x50/0x80 [ 21.310479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.310483] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.310487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.310491] kthread+0x334/0x6f0 [ 21.310495] ? trace_preempt_on+0x20/0xc0 [ 21.310499] ? __pfx_kthread+0x10/0x10 [ 21.310503] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.310506] ? calculate_sigpending+0x7b/0xa0 [ 21.310511] ? __pfx_kthread+0x10/0x10 [ 21.310514] ret_from_fork+0x113/0x1d0 [ 21.310518] ? __pfx_kthread+0x10/0x10 [ 21.310521] ret_from_fork_asm+0x1a/0x30 [ 21.310527] </TASK> [ 21.310529] [ 21.486859] The buggy address belongs to the physical page: [ 21.492434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 21.500439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.508094] flags: 0x200000000000040(head|node=0|zone=2) [ 21.513423] page_type: f8(unknown) [ 21.516830] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.524569] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.532309] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.540168] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.547996] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 21.555829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.563655] page dumped because: kasan: bad access detected [ 21.569229] [ 21.570725] Memory state around the buggy address: [ 21.575520] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.582738] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.589957] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.597177] ^ [ 21.602751] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.609969] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.617188] ================================================================== [ 22.301071] ================================================================== [ 22.308317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 22.316006] Write of size 1 at addr ffff888104eb20ea by task kunit_try_catch/203 [ 22.323430] [ 22.324923] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 22.324931] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 22.324933] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.324936] Call Trace: [ 22.324938] <TASK> [ 22.324940] dump_stack_lvl+0x73/0xb0 [ 22.324944] print_report+0xd1/0x650 [ 22.324948] ? __virt_addr_valid+0x1db/0x2d0 [ 22.324951] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324956] ? kasan_addr_to_slab+0x11/0xa0 [ 22.324959] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324964] kasan_report+0x141/0x180 [ 22.324968] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324973] __asan_report_store1_noabort+0x1b/0x30 [ 22.324978] krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324982] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.324987] ? finish_task_switch.isra.0+0x153/0x700 [ 22.324991] ? __switch_to+0x544/0xf50 [ 22.324996] ? __schedule+0x10cc/0x2b60 [ 22.325000] krealloc_large_less_oob+0x1c/0x30 [ 22.325004] kunit_try_run_case+0x1a2/0x480 [ 22.325009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.325013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.325017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.325021] ? __kthread_parkme+0x82/0x180 [ 22.325024] ? preempt_count_sub+0x50/0x80 [ 22.325028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.325033] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.325037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.325041] kthread+0x334/0x6f0 [ 22.325044] ? trace_preempt_on+0x20/0xc0 [ 22.325048] ? __pfx_kthread+0x10/0x10 [ 22.325052] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.325056] ? calculate_sigpending+0x7b/0xa0 [ 22.325060] ? __pfx_kthread+0x10/0x10 [ 22.325064] ret_from_fork+0x113/0x1d0 [ 22.325067] ? __pfx_kthread+0x10/0x10 [ 22.325071] ret_from_fork_asm+0x1a/0x30 [ 22.325076] </TASK> [ 22.325078] [ 22.501418] The buggy address belongs to the physical page: [ 22.506991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 22.514991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.522643] flags: 0x200000000000040(head|node=0|zone=2) [ 22.527954] page_type: f8(unknown) [ 22.531363] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.539128] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.546869] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.554701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.562527] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 22.570361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.578240] page dumped because: kasan: bad access detected [ 22.583813] [ 22.585311] Memory state around the buggy address: [ 22.590138] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.597375] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.604629] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.611847] ^ [ 22.618461] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.625682] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.632909] ================================================================== [ 18.905164] ================================================================== [ 18.912403] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 18.920057] Write of size 1 at addr ffff88810561ced0 by task kunit_try_catch/199 [ 18.927457] [ 18.928959] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.928967] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 18.928970] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.928973] Call Trace: [ 18.928974] <TASK> [ 18.928976] dump_stack_lvl+0x73/0xb0 [ 18.928980] print_report+0xd1/0x650 [ 18.928984] ? __virt_addr_valid+0x1db/0x2d0 [ 18.928988] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.928992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.928997] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.929002] kasan_report+0x141/0x180 [ 18.929006] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.929011] __asan_report_store1_noabort+0x1b/0x30 [ 18.929016] krealloc_less_oob_helper+0xe23/0x11d0 [ 18.929020] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 18.929025] ? finish_task_switch.isra.0+0x153/0x700 [ 18.929029] ? __switch_to+0x544/0xf50 [ 18.929033] ? __schedule+0x10cc/0x2b60 [ 18.929038] krealloc_less_oob+0x1c/0x30 [ 18.929042] kunit_try_run_case+0x1a2/0x480 [ 18.929046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.929050] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.929054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.929059] ? __kthread_parkme+0x82/0x180 [ 18.929062] ? preempt_count_sub+0x50/0x80 [ 18.929066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.929070] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.929075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.929079] kthread+0x334/0x6f0 [ 18.929082] ? trace_preempt_on+0x20/0xc0 [ 18.929086] ? __pfx_kthread+0x10/0x10 [ 18.929090] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.929093] ? calculate_sigpending+0x7b/0xa0 [ 18.929098] ? __pfx_kthread+0x10/0x10 [ 18.929102] ret_from_fork+0x113/0x1d0 [ 18.929105] ? __pfx_kthread+0x10/0x10 [ 18.929109] ret_from_fork_asm+0x1a/0x30 [ 18.929114] </TASK> [ 18.929116] [ 19.106093] Allocated by task 199: [ 19.109500] kasan_save_stack+0x45/0x70 [ 19.113361] kasan_save_track+0x18/0x40 [ 19.117223] kasan_save_alloc_info+0x3b/0x50 [ 19.121504] __kasan_krealloc+0x190/0x1f0 [ 19.125524] krealloc_noprof+0xf3/0x340 [ 19.129367] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.134182] krealloc_less_oob+0x1c/0x30 [ 19.138107] kunit_try_run_case+0x1a2/0x480 [ 19.142293] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.147695] kthread+0x334/0x6f0 [ 19.150925] ret_from_fork+0x113/0x1d0 [ 19.154678] ret_from_fork_asm+0x1a/0x30 [ 19.158605] [ 19.160105] The buggy address belongs to the object at ffff88810561ce00 [ 19.160105] which belongs to the cache kmalloc-256 of size 256 [ 19.172620] The buggy address is located 7 bytes to the right of [ 19.172620] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 19.185566] [ 19.187067] The buggy address belongs to the physical page: [ 19.192638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 19.200638] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.208291] flags: 0x200000000000040(head|node=0|zone=2) [ 19.213604] page_type: f5(slab) [ 19.216750] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.224499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.232246] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.240073] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.247907] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 19.255741] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.263566] page dumped because: kasan: bad access detected [ 19.269138] [ 19.270630] Memory state around the buggy address: [ 19.275423] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.282641] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.289862] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.297079] ^ [ 19.302912] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.310132] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.317362] ================================================================== [ 19.324613] ================================================================== [ 19.331861] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 19.339520] Write of size 1 at addr ffff88810561ceda by task kunit_try_catch/199 [ 19.346913] [ 19.348413] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 19.348421] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 19.348423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.348426] Call Trace: [ 19.348428] <TASK> [ 19.348429] dump_stack_lvl+0x73/0xb0 [ 19.348434] print_report+0xd1/0x650 [ 19.348438] ? __virt_addr_valid+0x1db/0x2d0 [ 19.348441] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.348451] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348455] kasan_report+0x141/0x180 [ 19.348459] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348465] __asan_report_store1_noabort+0x1b/0x30 [ 19.348469] krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348474] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 19.348479] ? finish_task_switch.isra.0+0x153/0x700 [ 19.348482] ? __switch_to+0x544/0xf50 [ 19.348487] ? __schedule+0x10cc/0x2b60 [ 19.348492] krealloc_less_oob+0x1c/0x30 [ 19.348496] kunit_try_run_case+0x1a2/0x480 [ 19.348500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.348504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.348508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.348512] ? __kthread_parkme+0x82/0x180 [ 19.348516] ? preempt_count_sub+0x50/0x80 [ 19.348520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.348524] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.348528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.348532] kthread+0x334/0x6f0 [ 19.348536] ? trace_preempt_on+0x20/0xc0 [ 19.348540] ? __pfx_kthread+0x10/0x10 [ 19.348543] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.348547] ? calculate_sigpending+0x7b/0xa0 [ 19.348551] ? __pfx_kthread+0x10/0x10 [ 19.348555] ret_from_fork+0x113/0x1d0 [ 19.348558] ? __pfx_kthread+0x10/0x10 [ 19.348562] ret_from_fork_asm+0x1a/0x30 [ 19.348567] </TASK> [ 19.348569] [ 19.525560] Allocated by task 199: [ 19.528965] kasan_save_stack+0x45/0x70 [ 19.532805] kasan_save_track+0x18/0x40 [ 19.536644] kasan_save_alloc_info+0x3b/0x50 [ 19.540926] __kasan_krealloc+0x190/0x1f0 [ 19.544938] krealloc_noprof+0xf3/0x340 [ 19.548776] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.553570] krealloc_less_oob+0x1c/0x30 [ 19.557504] kunit_try_run_case+0x1a2/0x480 [ 19.561691] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.567099] kthread+0x334/0x6f0 [ 19.570348] ret_from_fork+0x113/0x1d0 [ 19.574109] ret_from_fork_asm+0x1a/0x30 [ 19.578036] [ 19.579534] The buggy address belongs to the object at ffff88810561ce00 [ 19.579534] which belongs to the cache kmalloc-256 of size 256 [ 19.592050] The buggy address is located 17 bytes to the right of [ 19.592050] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 19.605093] [ 19.606591] The buggy address belongs to the physical page: [ 19.612164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 19.620163] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.627816] flags: 0x200000000000040(head|node=0|zone=2) [ 19.633128] page_type: f5(slab) [ 19.636276] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.644023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.651764] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.659588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.667420] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 19.675248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.683075] page dumped because: kasan: bad access detected [ 19.688647] [ 19.690147] Memory state around the buggy address: [ 19.694938] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702159] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.709389] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.716614] ^ [ 19.722709] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.729935] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.737154] ================================================================== [ 21.962657] ================================================================== [ 21.969902] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 21.977554] Write of size 1 at addr ffff888104eb20da by task kunit_try_catch/203 [ 21.984947] [ 21.986448] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 21.986456] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 21.986458] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.986461] Call Trace: [ 21.986463] <TASK> [ 21.986465] dump_stack_lvl+0x73/0xb0 [ 21.986469] print_report+0xd1/0x650 [ 21.986473] ? __virt_addr_valid+0x1db/0x2d0 [ 21.986477] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986481] ? kasan_addr_to_slab+0x11/0xa0 [ 21.986485] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986489] kasan_report+0x141/0x180 [ 21.986493] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986498] __asan_report_store1_noabort+0x1b/0x30 [ 21.986503] krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986508] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.986512] ? finish_task_switch.isra.0+0x153/0x700 [ 21.986516] ? __switch_to+0x544/0xf50 [ 21.986521] ? __schedule+0x10cc/0x2b60 [ 21.986525] krealloc_large_less_oob+0x1c/0x30 [ 21.986529] kunit_try_run_case+0x1a2/0x480 [ 21.986534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.986538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.986542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.986546] ? __kthread_parkme+0x82/0x180 [ 21.986550] ? preempt_count_sub+0x50/0x80 [ 21.986554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.986558] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.986562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.986566] kthread+0x334/0x6f0 [ 21.986570] ? trace_preempt_on+0x20/0xc0 [ 21.986574] ? __pfx_kthread+0x10/0x10 [ 21.986577] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.986581] ? calculate_sigpending+0x7b/0xa0 [ 21.986585] ? __pfx_kthread+0x10/0x10 [ 21.986589] ret_from_fork+0x113/0x1d0 [ 21.986592] ? __pfx_kthread+0x10/0x10 [ 21.986596] ret_from_fork_asm+0x1a/0x30 [ 21.986602] </TASK> [ 21.986603] [ 22.162979] The buggy address belongs to the physical page: [ 22.168552] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 22.176559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.184210] flags: 0x200000000000040(head|node=0|zone=2) [ 22.189523] page_type: f8(unknown) [ 22.192930] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.200669] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.208416] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.216244] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.224078] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 22.231906] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.239737] page dumped because: kasan: bad access detected [ 22.245309] [ 22.246809] Memory state around the buggy address: [ 22.251604] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.258823] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.266041] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.273260] ^ [ 22.279359] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.286626] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.293844] ================================================================== [ 19.744392] ================================================================== [ 19.751636] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 19.759290] Write of size 1 at addr ffff88810561ceea by task kunit_try_catch/199 [ 19.766691] [ 19.768191] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 19.768199] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 19.768201] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.768204] Call Trace: [ 19.768206] <TASK> [ 19.768207] dump_stack_lvl+0x73/0xb0 [ 19.768212] print_report+0xd1/0x650 [ 19.768215] ? __virt_addr_valid+0x1db/0x2d0 [ 19.768219] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768224] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.768229] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768233] kasan_report+0x141/0x180 [ 19.768237] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768242] __asan_report_store1_noabort+0x1b/0x30 [ 19.768247] krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768252] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 19.768256] ? finish_task_switch.isra.0+0x153/0x700 [ 19.768260] ? __switch_to+0x544/0xf50 [ 19.768265] ? __schedule+0x10cc/0x2b60 [ 19.768269] krealloc_less_oob+0x1c/0x30 [ 19.768273] kunit_try_run_case+0x1a2/0x480 [ 19.768277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.768282] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.768286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.768290] ? __kthread_parkme+0x82/0x180 [ 19.768293] ? preempt_count_sub+0x50/0x80 [ 19.768297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.768302] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.768306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.768310] kthread+0x334/0x6f0 [ 19.768313] ? trace_preempt_on+0x20/0xc0 [ 19.768317] ? __pfx_kthread+0x10/0x10 [ 19.768321] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.768324] ? calculate_sigpending+0x7b/0xa0 [ 19.768346] ? __pfx_kthread+0x10/0x10 [ 19.768350] ret_from_fork+0x113/0x1d0 [ 19.768353] ? __pfx_kthread+0x10/0x10 [ 19.768357] ret_from_fork_asm+0x1a/0x30 [ 19.768363] </TASK> [ 19.768364] [ 19.945275] Allocated by task 199: [ 19.948682] kasan_save_stack+0x45/0x70 [ 19.952521] kasan_save_track+0x18/0x40 [ 19.956359] kasan_save_alloc_info+0x3b/0x50 [ 19.960657] __kasan_krealloc+0x190/0x1f0 [ 19.964669] krealloc_noprof+0xf3/0x340 [ 19.968510] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.973303] krealloc_less_oob+0x1c/0x30 [ 19.977229] kunit_try_run_case+0x1a2/0x480 [ 19.981415] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.986814] kthread+0x334/0x6f0 [ 19.990046] ret_from_fork+0x113/0x1d0 [ 19.993798] ret_from_fork_asm+0x1a/0x30 [ 19.997726] [ 19.999224] The buggy address belongs to the object at ffff88810561ce00 [ 19.999224] which belongs to the cache kmalloc-256 of size 256 [ 20.011730] The buggy address is located 33 bytes to the right of [ 20.011730] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 20.024764] [ 20.026264] The buggy address belongs to the physical page: [ 20.031839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 20.039845] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.047496] flags: 0x200000000000040(head|node=0|zone=2) [ 20.052811] page_type: f5(slab) [ 20.055958] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.063706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.071454] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.079287] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.087114] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 20.094939] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.102765] page dumped because: kasan: bad access detected [ 20.108363] [ 20.109862] Memory state around the buggy address: [ 20.114655] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.121874] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.129095] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.136312] ^ [ 20.142927] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.150144] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.157366] ================================================================== [ 21.624478] ================================================================== [ 21.631723] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 21.639399] Write of size 1 at addr ffff888104eb20d0 by task kunit_try_catch/203 [ 21.646793] [ 21.648295] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 21.648303] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 21.648306] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.648309] Call Trace: [ 21.648311] <TASK> [ 21.648313] dump_stack_lvl+0x73/0xb0 [ 21.648317] print_report+0xd1/0x650 [ 21.648321] ? __virt_addr_valid+0x1db/0x2d0 [ 21.648344] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648349] ? kasan_addr_to_slab+0x11/0xa0 [ 21.648353] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648357] kasan_report+0x141/0x180 [ 21.648374] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648379] __asan_report_store1_noabort+0x1b/0x30 [ 21.648396] krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648401] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.648406] ? finish_task_switch.isra.0+0x153/0x700 [ 21.648410] ? __switch_to+0x544/0xf50 [ 21.648414] ? __schedule+0x10cc/0x2b60 [ 21.648419] krealloc_large_less_oob+0x1c/0x30 [ 21.648423] kunit_try_run_case+0x1a2/0x480 [ 21.648428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.648432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.648436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.648440] ? __kthread_parkme+0x82/0x180 [ 21.648444] ? preempt_count_sub+0x50/0x80 [ 21.648448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.648452] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.648456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.648460] kthread+0x334/0x6f0 [ 21.648464] ? trace_preempt_on+0x20/0xc0 [ 21.648468] ? __pfx_kthread+0x10/0x10 [ 21.648471] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.648475] ? calculate_sigpending+0x7b/0xa0 [ 21.648479] ? __pfx_kthread+0x10/0x10 [ 21.648483] ret_from_fork+0x113/0x1d0 [ 21.648486] ? __pfx_kthread+0x10/0x10 [ 21.648490] ret_from_fork_asm+0x1a/0x30 [ 21.648496] </TASK> [ 21.648497] [ 21.824849] The buggy address belongs to the physical page: [ 21.830428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 21.838430] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.846084] flags: 0x200000000000040(head|node=0|zone=2) [ 21.851417] page_type: f8(unknown) [ 21.854820] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.862559] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.870299] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.878133] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.885960] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 21.893793] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.901620] page dumped because: kasan: bad access detected [ 21.907191] [ 21.908689] Memory state around the buggy address: [ 21.913485] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.920704] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.927922] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.935140] ^ [ 21.940975] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.948194] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.955429] ================================================================== [ 18.482195] ================================================================== [ 18.493250] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 18.500903] Write of size 1 at addr ffff88810561cec9 by task kunit_try_catch/199 [ 18.508295] [ 18.509798] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.509806] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 18.509809] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.509812] Call Trace: [ 18.509813] <TASK> [ 18.509815] dump_stack_lvl+0x73/0xb0 [ 18.509819] print_report+0xd1/0x650 [ 18.509823] ? __virt_addr_valid+0x1db/0x2d0 [ 18.509827] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.509837] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509841] kasan_report+0x141/0x180 [ 18.509845] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509850] __asan_report_store1_noabort+0x1b/0x30 [ 18.509855] krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509860] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 18.509864] ? finish_task_switch.isra.0+0x153/0x700 [ 18.509868] ? __switch_to+0x544/0xf50 [ 18.509873] ? __schedule+0x10cc/0x2b60 [ 18.509877] krealloc_less_oob+0x1c/0x30 [ 18.509881] kunit_try_run_case+0x1a2/0x480 [ 18.509886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.509890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.509894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.509898] ? __kthread_parkme+0x82/0x180 [ 18.509902] ? preempt_count_sub+0x50/0x80 [ 18.509906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.509910] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.509914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.509918] kthread+0x334/0x6f0 [ 18.509922] ? trace_preempt_on+0x20/0xc0 [ 18.509926] ? __pfx_kthread+0x10/0x10 [ 18.509929] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.509933] ? calculate_sigpending+0x7b/0xa0 [ 18.509938] ? __pfx_kthread+0x10/0x10 [ 18.509941] ret_from_fork+0x113/0x1d0 [ 18.509945] ? __pfx_kthread+0x10/0x10 [ 18.509948] ret_from_fork_asm+0x1a/0x30 [ 18.509954] </TASK> [ 18.509955] [ 18.686899] Allocated by task 199: [ 18.690305] kasan_save_stack+0x45/0x70 [ 18.694142] kasan_save_track+0x18/0x40 [ 18.697983] kasan_save_alloc_info+0x3b/0x50 [ 18.702254] __kasan_krealloc+0x190/0x1f0 [ 18.706268] krealloc_noprof+0xf3/0x340 [ 18.710108] krealloc_less_oob_helper+0x1aa/0x11d0 [ 18.714909] krealloc_less_oob+0x1c/0x30 [ 18.718836] kunit_try_run_case+0x1a2/0x480 [ 18.723029] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.728428] kthread+0x334/0x6f0 [ 18.731661] ret_from_fork+0x113/0x1d0 [ 18.735414] ret_from_fork_asm+0x1a/0x30 [ 18.739364] [ 18.740866] The buggy address belongs to the object at ffff88810561ce00 [ 18.740866] which belongs to the cache kmalloc-256 of size 256 [ 18.753403] The buggy address is located 0 bytes to the right of [ 18.753403] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 18.766364] [ 18.767863] The buggy address belongs to the physical page: [ 18.773435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 18.781441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.789095] flags: 0x200000000000040(head|node=0|zone=2) [ 18.794409] page_type: f5(slab) [ 18.797556] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.805302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.813040] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.820866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.828693] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 18.836520] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.844364] page dumped because: kasan: bad access detected [ 18.849960] [ 18.851460] Memory state around the buggy address: [ 18.856253] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.863471] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.870690] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.877911] ^ [ 18.883482] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.890701] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.897923] ================================================================== [ 20.164615] ================================================================== [ 20.171854] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 20.179509] Write of size 1 at addr ffff88810561ceeb by task kunit_try_catch/199 [ 20.186909] [ 20.188411] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 20.188418] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 20.188421] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.188424] Call Trace: [ 20.188426] <TASK> [ 20.188427] dump_stack_lvl+0x73/0xb0 [ 20.188431] print_report+0xd1/0x650 [ 20.188435] ? __virt_addr_valid+0x1db/0x2d0 [ 20.188439] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.188448] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188453] kasan_report+0x141/0x180 [ 20.188457] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188462] __asan_report_store1_noabort+0x1b/0x30 [ 20.188467] krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188472] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.188476] ? finish_task_switch.isra.0+0x153/0x700 [ 20.188480] ? __switch_to+0x544/0xf50 [ 20.188484] ? __schedule+0x10cc/0x2b60 [ 20.188489] krealloc_less_oob+0x1c/0x30 [ 20.188493] kunit_try_run_case+0x1a2/0x480 [ 20.188497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.188501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.188505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.188509] ? __kthread_parkme+0x82/0x180 [ 20.188513] ? preempt_count_sub+0x50/0x80 [ 20.188517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.188521] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.188525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.188529] kthread+0x334/0x6f0 [ 20.188533] ? trace_preempt_on+0x20/0xc0 [ 20.188537] ? __pfx_kthread+0x10/0x10 [ 20.188540] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.188544] ? calculate_sigpending+0x7b/0xa0 [ 20.188548] ? __pfx_kthread+0x10/0x10 [ 20.188552] ret_from_fork+0x113/0x1d0 [ 20.188556] ? __pfx_kthread+0x10/0x10 [ 20.188559] ret_from_fork_asm+0x1a/0x30 [ 20.188565] </TASK> [ 20.188566] [ 20.365572] Allocated by task 199: [ 20.368976] kasan_save_stack+0x45/0x70 [ 20.372817] kasan_save_track+0x18/0x40 [ 20.376658] kasan_save_alloc_info+0x3b/0x50 [ 20.380938] __kasan_krealloc+0x190/0x1f0 [ 20.384950] krealloc_noprof+0xf3/0x340 [ 20.388790] krealloc_less_oob_helper+0x1aa/0x11d0 [ 20.393583] krealloc_less_oob+0x1c/0x30 [ 20.397516] kunit_try_run_case+0x1a2/0x480 [ 20.401704] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.407112] kthread+0x334/0x6f0 [ 20.410363] ret_from_fork+0x113/0x1d0 [ 20.414138] ret_from_fork_asm+0x1a/0x30 [ 20.418064] [ 20.419565] The buggy address belongs to the object at ffff88810561ce00 [ 20.419565] which belongs to the cache kmalloc-256 of size 256 [ 20.432080] The buggy address is located 34 bytes to the right of [ 20.432080] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 20.445114] [ 20.446612] The buggy address belongs to the physical page: [ 20.452186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 20.460192] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.467845] flags: 0x200000000000040(head|node=0|zone=2) [ 20.473159] page_type: f5(slab) [ 20.476306] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.484044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.491786] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.499619] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.507444] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 20.515271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.523096] page dumped because: kasan: bad access detected [ 20.528667] [ 20.530160] Memory state around the buggy address: [ 20.534953] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.542171] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.549403] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.556628] ^ [ 20.563240] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.570459] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.577678] ================================================================== [ 22.640133] ================================================================== [ 22.647414] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 22.655069] Write of size 1 at addr ffff888104eb20eb by task kunit_try_catch/203 [ 22.662462] [ 22.663962] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 22.663969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 22.663972] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.663975] Call Trace: [ 22.663977] <TASK> [ 22.663978] dump_stack_lvl+0x73/0xb0 [ 22.663982] print_report+0xd1/0x650 [ 22.663986] ? __virt_addr_valid+0x1db/0x2d0 [ 22.663990] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.663994] ? kasan_addr_to_slab+0x11/0xa0 [ 22.663998] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.664002] kasan_report+0x141/0x180 [ 22.664006] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.664011] __asan_report_store1_noabort+0x1b/0x30 [ 22.664016] krealloc_less_oob_helper+0xd47/0x11d0 [ 22.664021] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.664025] ? finish_task_switch.isra.0+0x153/0x700 [ 22.664029] ? __switch_to+0x544/0xf50 [ 22.664034] ? __schedule+0x10cc/0x2b60 [ 22.664038] krealloc_large_less_oob+0x1c/0x30 [ 22.664043] kunit_try_run_case+0x1a2/0x480 [ 22.664047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.664051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.664055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.664059] ? __kthread_parkme+0x82/0x180 [ 22.664063] ? preempt_count_sub+0x50/0x80 [ 22.664067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.664071] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.664075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.664079] kthread+0x334/0x6f0 [ 22.664083] ? trace_preempt_on+0x20/0xc0 [ 22.664087] ? __pfx_kthread+0x10/0x10 [ 22.664090] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.664094] ? calculate_sigpending+0x7b/0xa0 [ 22.664098] ? __pfx_kthread+0x10/0x10 [ 22.664102] ret_from_fork+0x113/0x1d0 [ 22.664105] ? __pfx_kthread+0x10/0x10 [ 22.664109] ret_from_fork_asm+0x1a/0x30 [ 22.664115] </TASK> [ 22.664116] [ 22.840449] The buggy address belongs to the physical page: [ 22.846020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 22.854020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.861674] flags: 0x200000000000040(head|node=0|zone=2) [ 22.866985] page_type: f8(unknown) [ 22.870421] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.878165] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.885904] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.893733] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.901565] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 22.909415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.917244] page dumped because: kasan: bad access detected [ 22.922817] [ 22.924315] Memory state around the buggy address: [ 22.929143] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.936365] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.943607] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.950828] ^ [ 22.957439] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.964659] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.971878] ==================================================================