Date
July 19, 2025, 11:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.245140] ================================================================== [ 15.245196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.247346] Write of size 1 at addr fff00000c64160da by task kunit_try_catch/163 [ 15.247624] [ 15.247659] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.247736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.247761] Hardware name: linux,dummy-virt (DT) [ 15.247792] Call trace: [ 15.247813] show_stack+0x20/0x38 (C) [ 15.247863] dump_stack_lvl+0x8c/0xd0 [ 15.247909] print_report+0x118/0x5d0 [ 15.247954] kasan_report+0xdc/0x128 [ 15.247999] __asan_report_store1_noabort+0x20/0x30 [ 15.248049] krealloc_less_oob_helper+0xa80/0xc50 [ 15.248096] krealloc_large_less_oob+0x20/0x38 [ 15.248143] kunit_try_run_case+0x170/0x3f0 [ 15.248188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.248239] kthread+0x328/0x630 [ 15.248280] ret_from_fork+0x10/0x20 [ 15.248326] [ 15.248346] The buggy address belongs to the physical page: [ 15.248376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 15.248427] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.249055] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.249119] page_type: f8(unknown) [ 15.249157] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.249205] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.249282] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.249339] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.249387] head: 0bfffe0000000002 ffffc1ffc3190501 00000000ffffffff 00000000ffffffff [ 15.249433] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.249471] page dumped because: kasan: bad access detected [ 15.249501] [ 15.249518] Memory state around the buggy address: [ 15.249557] fff00000c6415f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.249599] fff00000c6416000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.249639] >fff00000c6416080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.249677] ^ [ 15.249759] fff00000c6416100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.249835] fff00000c6416180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.249872] ================================================================== [ 15.230559] ================================================================== [ 15.230606] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.230655] Write of size 1 at addr fff00000c64160d0 by task kunit_try_catch/163 [ 15.230703] [ 15.231286] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.231474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.231501] Hardware name: linux,dummy-virt (DT) [ 15.231542] Call trace: [ 15.231564] show_stack+0x20/0x38 (C) [ 15.231614] dump_stack_lvl+0x8c/0xd0 [ 15.231659] print_report+0x118/0x5d0 [ 15.231705] kasan_report+0xdc/0x128 [ 15.231750] __asan_report_store1_noabort+0x20/0x30 [ 15.231800] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.231847] krealloc_large_less_oob+0x20/0x38 [ 15.231893] kunit_try_run_case+0x170/0x3f0 [ 15.232604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.233390] kthread+0x328/0x630 [ 15.234038] ret_from_fork+0x10/0x20 [ 15.234233] [ 15.234254] The buggy address belongs to the physical page: [ 15.234285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 15.234335] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.234381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.234436] page_type: f8(unknown) [ 15.234475] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.234524] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.234585] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.234632] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.234680] head: 0bfffe0000000002 ffffc1ffc3190501 00000000ffffffff 00000000ffffffff [ 15.234726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.236976] page dumped because: kasan: bad access detected [ 15.237231] [ 15.237744] Memory state around the buggy address: [ 15.238333] fff00000c6415f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.238827] fff00000c6416000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.238880] >fff00000c6416080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.238918] ^ [ 15.239426] fff00000c6416100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.239959] fff00000c6416180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.240457] ================================================================== [ 15.165921] ================================================================== [ 15.166001] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.166162] Write of size 1 at addr fff00000c175ceea by task kunit_try_catch/159 [ 15.166237] [ 15.166267] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.166352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.166685] Hardware name: linux,dummy-virt (DT) [ 15.166779] Call trace: [ 15.166850] show_stack+0x20/0x38 (C) [ 15.166965] dump_stack_lvl+0x8c/0xd0 [ 15.167012] print_report+0x118/0x5d0 [ 15.167092] kasan_report+0xdc/0x128 [ 15.167362] __asan_report_store1_noabort+0x20/0x30 [ 15.167459] krealloc_less_oob_helper+0xae4/0xc50 [ 15.167582] krealloc_less_oob+0x20/0x38 [ 15.167658] kunit_try_run_case+0x170/0x3f0 [ 15.167974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.168059] kthread+0x328/0x630 [ 15.168155] ret_from_fork+0x10/0x20 [ 15.168316] [ 15.168338] Allocated by task 159: [ 15.168366] kasan_save_stack+0x3c/0x68 [ 15.168429] kasan_save_track+0x20/0x40 [ 15.168738] kasan_save_alloc_info+0x40/0x58 [ 15.168829] __kasan_krealloc+0x118/0x178 [ 15.168942] krealloc_noprof+0x128/0x360 [ 15.169019] krealloc_less_oob_helper+0x168/0xc50 [ 15.169281] krealloc_less_oob+0x20/0x38 [ 15.169409] kunit_try_run_case+0x170/0x3f0 [ 15.169520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.169656] kthread+0x328/0x630 [ 15.169871] ret_from_fork+0x10/0x20 [ 15.170012] [ 15.170074] The buggy address belongs to the object at fff00000c175ce00 [ 15.170074] which belongs to the cache kmalloc-256 of size 256 [ 15.170228] The buggy address is located 33 bytes to the right of [ 15.170228] allocated 201-byte region [fff00000c175ce00, fff00000c175cec9) [ 15.170326] [ 15.170496] The buggy address belongs to the physical page: [ 15.170555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10175c [ 15.170665] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.170722] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.170827] page_type: f5(slab) [ 15.171101] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.171181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.171377] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.171439] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.171611] head: 0bfffe0000000001 ffffc1ffc305d701 00000000ffffffff 00000000ffffffff [ 15.171709] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.171889] page dumped because: kasan: bad access detected [ 15.171919] [ 15.171954] Memory state around the buggy address: [ 15.172350] fff00000c175cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.172489] fff00000c175ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.172569] >fff00000c175ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.172704] ^ [ 15.172822] fff00000c175cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.173097] fff00000c175cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.173233] ================================================================== [ 15.174108] ================================================================== [ 15.174157] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.174205] Write of size 1 at addr fff00000c175ceeb by task kunit_try_catch/159 [ 15.174253] [ 15.174282] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.174359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.174385] Hardware name: linux,dummy-virt (DT) [ 15.174420] Call trace: [ 15.174442] show_stack+0x20/0x38 (C) [ 15.174488] dump_stack_lvl+0x8c/0xd0 [ 15.174547] print_report+0x118/0x5d0 [ 15.174592] kasan_report+0xdc/0x128 [ 15.174636] __asan_report_store1_noabort+0x20/0x30 [ 15.174686] krealloc_less_oob_helper+0xa58/0xc50 [ 15.174734] krealloc_less_oob+0x20/0x38 [ 15.174779] kunit_try_run_case+0x170/0x3f0 [ 15.174826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.174878] kthread+0x328/0x630 [ 15.174919] ret_from_fork+0x10/0x20 [ 15.174965] [ 15.174982] Allocated by task 159: [ 15.175008] kasan_save_stack+0x3c/0x68 [ 15.175046] kasan_save_track+0x20/0x40 [ 15.175082] kasan_save_alloc_info+0x40/0x58 [ 15.175120] __kasan_krealloc+0x118/0x178 [ 15.175156] krealloc_noprof+0x128/0x360 [ 15.175192] krealloc_less_oob_helper+0x168/0xc50 [ 15.175229] krealloc_less_oob+0x20/0x38 [ 15.175263] kunit_try_run_case+0x170/0x3f0 [ 15.175299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.175340] kthread+0x328/0x630 [ 15.175372] ret_from_fork+0x10/0x20 [ 15.175407] [ 15.175425] The buggy address belongs to the object at fff00000c175ce00 [ 15.175425] which belongs to the cache kmalloc-256 of size 256 [ 15.175481] The buggy address is located 34 bytes to the right of [ 15.175481] allocated 201-byte region [fff00000c175ce00, fff00000c175cec9) [ 15.175581] [ 15.175675] The buggy address belongs to the physical page: [ 15.175770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10175c [ 15.175865] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.175949] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.176019] page_type: f5(slab) [ 15.176056] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.176122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.176482] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.176558] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.176609] head: 0bfffe0000000001 ffffc1ffc305d701 00000000ffffffff 00000000ffffffff [ 15.176657] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.176697] page dumped because: kasan: bad access detected [ 15.176739] [ 15.176757] Memory state around the buggy address: [ 15.176836] fff00000c175cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.176901] fff00000c175ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.176943] >fff00000c175ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.176989] ^ [ 15.177026] fff00000c175cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.177067] fff00000c175cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.177105] ================================================================== [ 15.249995] ================================================================== [ 15.250073] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.250122] Write of size 1 at addr fff00000c64160ea by task kunit_try_catch/163 [ 15.250169] [ 15.250196] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.250273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.250298] Hardware name: linux,dummy-virt (DT) [ 15.250327] Call trace: [ 15.250348] show_stack+0x20/0x38 (C) [ 15.250526] dump_stack_lvl+0x8c/0xd0 [ 15.250588] print_report+0x118/0x5d0 [ 15.250714] kasan_report+0xdc/0x128 [ 15.250776] __asan_report_store1_noabort+0x20/0x30 [ 15.250867] krealloc_less_oob_helper+0xae4/0xc50 [ 15.250920] krealloc_large_less_oob+0x20/0x38 [ 15.250969] kunit_try_run_case+0x170/0x3f0 [ 15.251015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.251066] kthread+0x328/0x630 [ 15.251107] ret_from_fork+0x10/0x20 [ 15.251153] [ 15.251208] The buggy address belongs to the physical page: [ 15.251241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 15.251291] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.251347] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.251424] page_type: f8(unknown) [ 15.251461] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.251566] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.251618] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.251668] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.251763] head: 0bfffe0000000002 ffffc1ffc3190501 00000000ffffffff 00000000ffffffff [ 15.251838] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.251877] page dumped because: kasan: bad access detected [ 15.251907] [ 15.251924] Memory state around the buggy address: [ 15.251954] fff00000c6415f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.251994] fff00000c6416000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.252034] >fff00000c6416080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.252070] ^ [ 15.252143] fff00000c6416100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.252185] fff00000c6416180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.252220] ================================================================== [ 15.139318] ================================================================== [ 15.139374] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.139429] Write of size 1 at addr fff00000c175cec9 by task kunit_try_catch/159 [ 15.142198] [ 15.142368] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.143042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.143162] Hardware name: linux,dummy-virt (DT) [ 15.143524] Call trace: [ 15.143983] show_stack+0x20/0x38 (C) [ 15.144039] dump_stack_lvl+0x8c/0xd0 [ 15.144908] print_report+0x118/0x5d0 [ 15.145442] kasan_report+0xdc/0x128 [ 15.145973] __asan_report_store1_noabort+0x20/0x30 [ 15.146042] krealloc_less_oob_helper+0xa48/0xc50 [ 15.146091] krealloc_less_oob+0x20/0x38 [ 15.146962] kunit_try_run_case+0x170/0x3f0 [ 15.147230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.147557] kthread+0x328/0x630 [ 15.148208] ret_from_fork+0x10/0x20 [ 15.148397] [ 15.148815] Allocated by task 159: [ 15.148955] kasan_save_stack+0x3c/0x68 [ 15.149098] kasan_save_track+0x20/0x40 [ 15.149298] kasan_save_alloc_info+0x40/0x58 [ 15.149425] __kasan_krealloc+0x118/0x178 [ 15.149864] krealloc_noprof+0x128/0x360 [ 15.150048] krealloc_less_oob_helper+0x168/0xc50 [ 15.150087] krealloc_less_oob+0x20/0x38 [ 15.150122] kunit_try_run_case+0x170/0x3f0 [ 15.150161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.150204] kthread+0x328/0x630 [ 15.150236] ret_from_fork+0x10/0x20 [ 15.150271] [ 15.150292] The buggy address belongs to the object at fff00000c175ce00 [ 15.150292] which belongs to the cache kmalloc-256 of size 256 [ 15.150348] The buggy address is located 0 bytes to the right of [ 15.150348] allocated 201-byte region [fff00000c175ce00, fff00000c175cec9) [ 15.150420] [ 15.150440] The buggy address belongs to the physical page: [ 15.150471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10175c [ 15.150523] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.151722] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.151785] page_type: f5(slab) [ 15.151826] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.151875] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.151924] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.151971] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.152018] head: 0bfffe0000000001 ffffc1ffc305d701 00000000ffffffff 00000000ffffffff [ 15.152065] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.152103] page dumped because: kasan: bad access detected [ 15.152133] [ 15.152151] Memory state around the buggy address: [ 15.152182] fff00000c175cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.152226] fff00000c175ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.152268] >fff00000c175ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.152304] ^ [ 15.152338] fff00000c175cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.152379] fff00000c175cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.152415] ================================================================== [ 15.252304] ================================================================== [ 15.252340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.252418] Write of size 1 at addr fff00000c64160eb by task kunit_try_catch/163 [ 15.252466] [ 15.252492] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.252595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.252622] Hardware name: linux,dummy-virt (DT) [ 15.252650] Call trace: [ 15.252691] show_stack+0x20/0x38 (C) [ 15.252756] dump_stack_lvl+0x8c/0xd0 [ 15.252801] print_report+0x118/0x5d0 [ 15.252846] kasan_report+0xdc/0x128 [ 15.252901] __asan_report_store1_noabort+0x20/0x30 [ 15.252952] krealloc_less_oob_helper+0xa58/0xc50 [ 15.252999] krealloc_large_less_oob+0x20/0x38 [ 15.253044] kunit_try_run_case+0x170/0x3f0 [ 15.253090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.253142] kthread+0x328/0x630 [ 15.253186] ret_from_fork+0x10/0x20 [ 15.253235] [ 15.253264] The buggy address belongs to the physical page: [ 15.253303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 15.253361] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.253407] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.253454] page_type: f8(unknown) [ 15.253496] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.253554] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.253602] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.253802] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.253880] head: 0bfffe0000000002 ffffc1ffc3190501 00000000ffffffff 00000000ffffffff [ 15.253986] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.254024] page dumped because: kasan: bad access detected [ 15.254054] [ 15.254072] Memory state around the buggy address: [ 15.254134] fff00000c6415f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.254177] fff00000c6416000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.254217] >fff00000c6416080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.254253] ^ [ 15.254289] fff00000c6416100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.254344] fff00000c6416180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.254381] ================================================================== [ 15.153297] ================================================================== [ 15.153344] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.153391] Write of size 1 at addr fff00000c175ced0 by task kunit_try_catch/159 [ 15.153439] [ 15.153470] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.153564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.153590] Hardware name: linux,dummy-virt (DT) [ 15.153620] Call trace: [ 15.153641] show_stack+0x20/0x38 (C) [ 15.153688] dump_stack_lvl+0x8c/0xd0 [ 15.153767] print_report+0x118/0x5d0 [ 15.153813] kasan_report+0xdc/0x128 [ 15.153881] __asan_report_store1_noabort+0x20/0x30 [ 15.153947] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.153995] krealloc_less_oob+0x20/0x38 [ 15.154039] kunit_try_run_case+0x170/0x3f0 [ 15.154085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.154136] kthread+0x328/0x630 [ 15.154250] ret_from_fork+0x10/0x20 [ 15.154328] [ 15.154346] Allocated by task 159: [ 15.154372] kasan_save_stack+0x3c/0x68 [ 15.154417] kasan_save_track+0x20/0x40 [ 15.154453] kasan_save_alloc_info+0x40/0x58 [ 15.154515] __kasan_krealloc+0x118/0x178 [ 15.154563] krealloc_noprof+0x128/0x360 [ 15.154599] krealloc_less_oob_helper+0x168/0xc50 [ 15.154637] krealloc_less_oob+0x20/0x38 [ 15.154671] kunit_try_run_case+0x170/0x3f0 [ 15.154707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.154748] kthread+0x328/0x630 [ 15.154800] ret_from_fork+0x10/0x20 [ 15.154834] [ 15.154852] The buggy address belongs to the object at fff00000c175ce00 [ 15.154852] which belongs to the cache kmalloc-256 of size 256 [ 15.154950] The buggy address is located 7 bytes to the right of [ 15.154950] allocated 201-byte region [fff00000c175ce00, fff00000c175cec9) [ 15.155046] [ 15.155143] The buggy address belongs to the physical page: [ 15.155213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10175c [ 15.155304] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.155431] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.155524] page_type: f5(slab) [ 15.155632] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.155729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.155835] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.155952] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.156000] head: 0bfffe0000000001 ffffc1ffc305d701 00000000ffffffff 00000000ffffffff [ 15.156076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.156462] page dumped because: kasan: bad access detected [ 15.156630] [ 15.156748] Memory state around the buggy address: [ 15.156827] fff00000c175cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.156990] fff00000c175ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.157085] >fff00000c175ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.157172] ^ [ 15.157289] fff00000c175cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.157330] fff00000c175cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.157376] ================================================================== [ 15.220869] ================================================================== [ 15.220923] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.220974] Write of size 1 at addr fff00000c64160c9 by task kunit_try_catch/163 [ 15.221022] [ 15.221054] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.221132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.221158] Hardware name: linux,dummy-virt (DT) [ 15.221876] Call trace: [ 15.222011] show_stack+0x20/0x38 (C) [ 15.222201] dump_stack_lvl+0x8c/0xd0 [ 15.222250] print_report+0x118/0x5d0 [ 15.222296] kasan_report+0xdc/0x128 [ 15.222545] __asan_report_store1_noabort+0x20/0x30 [ 15.222712] krealloc_less_oob_helper+0xa48/0xc50 [ 15.222869] krealloc_large_less_oob+0x20/0x38 [ 15.223374] kunit_try_run_case+0x170/0x3f0 [ 15.223503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.223568] kthread+0x328/0x630 [ 15.224122] ret_from_fork+0x10/0x20 [ 15.224415] [ 15.224437] The buggy address belongs to the physical page: [ 15.224468] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 15.225231] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.225295] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.225514] page_type: f8(unknown) [ 15.225879] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.225974] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.226032] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.226079] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.226207] head: 0bfffe0000000002 ffffc1ffc3190501 00000000ffffffff 00000000ffffffff [ 15.226678] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.226880] page dumped because: kasan: bad access detected [ 15.227137] [ 15.227193] Memory state around the buggy address: [ 15.227246] fff00000c6415f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.227670] fff00000c6416000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.227900] >fff00000c6416080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.228015] ^ [ 15.228298] fff00000c6416100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.228730] fff00000c6416180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.228899] ================================================================== [ 15.158146] ================================================================== [ 15.158216] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.158415] Write of size 1 at addr fff00000c175ceda by task kunit_try_catch/159 [ 15.158541] [ 15.158577] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.158818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.158910] Hardware name: linux,dummy-virt (DT) [ 15.158944] Call trace: [ 15.158967] show_stack+0x20/0x38 (C) [ 15.159316] dump_stack_lvl+0x8c/0xd0 [ 15.159472] print_report+0x118/0x5d0 [ 15.159641] kasan_report+0xdc/0x128 [ 15.159773] __asan_report_store1_noabort+0x20/0x30 [ 15.159879] krealloc_less_oob_helper+0xa80/0xc50 [ 15.160028] krealloc_less_oob+0x20/0x38 [ 15.160091] kunit_try_run_case+0x170/0x3f0 [ 15.160370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.160560] kthread+0x328/0x630 [ 15.160685] ret_from_fork+0x10/0x20 [ 15.161117] [ 15.161219] Allocated by task 159: [ 15.161254] kasan_save_stack+0x3c/0x68 [ 15.161555] kasan_save_track+0x20/0x40 [ 15.161621] kasan_save_alloc_info+0x40/0x58 [ 15.161669] __kasan_krealloc+0x118/0x178 [ 15.161862] krealloc_noprof+0x128/0x360 [ 15.161941] krealloc_less_oob_helper+0x168/0xc50 [ 15.162068] krealloc_less_oob+0x20/0x38 [ 15.162116] kunit_try_run_case+0x170/0x3f0 [ 15.162289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.162333] kthread+0x328/0x630 [ 15.162365] ret_from_fork+0x10/0x20 [ 15.162457] [ 15.162664] The buggy address belongs to the object at fff00000c175ce00 [ 15.162664] which belongs to the cache kmalloc-256 of size 256 [ 15.162752] The buggy address is located 17 bytes to the right of [ 15.162752] allocated 201-byte region [fff00000c175ce00, fff00000c175cec9) [ 15.162993] [ 15.163123] The buggy address belongs to the physical page: [ 15.163165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10175c [ 15.163226] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.163306] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.163356] page_type: f5(slab) [ 15.163399] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.163467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.163525] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.163592] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.163640] head: 0bfffe0000000001 ffffc1ffc305d701 00000000ffffffff 00000000ffffffff [ 15.163695] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.163736] page dumped because: kasan: bad access detected [ 15.163785] [ 15.163803] Memory state around the buggy address: [ 15.163833] fff00000c175cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.163873] fff00000c175ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.163914] >fff00000c175ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.163959] ^ [ 15.163997] fff00000c175cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164040] fff00000c175cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164077] ==================================================================
[ 11.979879] ================================================================== [ 11.980294] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.980649] Write of size 1 at addr ffff88810394e0ea by task kunit_try_catch/180 [ 11.980956] [ 11.981096] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.981138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.981148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.981168] Call Trace: [ 11.981184] <TASK> [ 11.981198] dump_stack_lvl+0x73/0xb0 [ 11.981224] print_report+0xd1/0x610 [ 11.981247] ? __virt_addr_valid+0x1db/0x2d0 [ 11.981270] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.981293] ? kasan_addr_to_slab+0x11/0xa0 [ 11.981313] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.981336] kasan_report+0x141/0x180 [ 11.981357] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.981385] __asan_report_store1_noabort+0x1b/0x30 [ 11.981409] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.981435] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.981458] ? irqentry_exit+0x2a/0x60 [ 11.981479] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.981517] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 11.981543] krealloc_large_less_oob+0x1c/0x30 [ 11.981565] kunit_try_run_case+0x1a5/0x480 [ 11.981589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.981610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.981634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.981656] ? __kthread_parkme+0x82/0x180 [ 11.981676] ? preempt_count_sub+0x50/0x80 [ 11.981699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.981724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.981747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.981770] kthread+0x337/0x6f0 [ 11.981788] ? trace_preempt_on+0x20/0xc0 [ 11.981810] ? __pfx_kthread+0x10/0x10 [ 11.981829] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.981850] ? calculate_sigpending+0x7b/0xa0 [ 11.981873] ? __pfx_kthread+0x10/0x10 [ 11.981893] ret_from_fork+0x116/0x1d0 [ 11.981912] ? __pfx_kthread+0x10/0x10 [ 11.981931] ret_from_fork_asm+0x1a/0x30 [ 11.981960] </TASK> [ 11.981970] [ 11.989808] The buggy address belongs to the physical page: [ 11.990085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 11.990569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.990794] flags: 0x200000000000040(head|node=0|zone=2) [ 11.991047] page_type: f8(unknown) [ 11.991220] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.991712] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.992031] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.992352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.992688] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 11.993108] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.993488] page dumped because: kasan: bad access detected [ 11.993664] [ 11.993730] Memory state around the buggy address: [ 11.993899] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.994562] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.994898] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.995392] ^ [ 11.995730] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.996045] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.996377] ================================================================== [ 11.758894] ================================================================== [ 11.759250] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.759685] Write of size 1 at addr ffff8881003384d0 by task kunit_try_catch/176 [ 11.760020] [ 11.760143] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.760354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.760371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.760406] Call Trace: [ 11.760425] <TASK> [ 11.760440] dump_stack_lvl+0x73/0xb0 [ 11.760483] print_report+0xd1/0x610 [ 11.760522] ? __virt_addr_valid+0x1db/0x2d0 [ 11.760544] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.760567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.760590] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.760613] kasan_report+0x141/0x180 [ 11.760634] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.760662] __asan_report_store1_noabort+0x1b/0x30 [ 11.760686] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.760711] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.760733] ? irqentry_exit+0x2a/0x60 [ 11.760754] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.760782] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.760807] krealloc_less_oob+0x1c/0x30 [ 11.760827] kunit_try_run_case+0x1a5/0x480 [ 11.760850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.760871] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.760894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.760917] ? __kthread_parkme+0x82/0x180 [ 11.760937] ? preempt_count_sub+0x50/0x80 [ 11.760960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.760983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.761005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.761028] kthread+0x337/0x6f0 [ 11.761046] ? trace_preempt_on+0x20/0xc0 [ 11.761070] ? __pfx_kthread+0x10/0x10 [ 11.761089] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.761119] ? calculate_sigpending+0x7b/0xa0 [ 11.761143] ? __pfx_kthread+0x10/0x10 [ 11.761465] ret_from_fork+0x116/0x1d0 [ 11.761485] ? __pfx_kthread+0x10/0x10 [ 11.761513] ret_from_fork_asm+0x1a/0x30 [ 11.761543] </TASK> [ 11.761553] [ 11.772033] Allocated by task 176: [ 11.772912] kasan_save_stack+0x45/0x70 [ 11.773198] kasan_save_track+0x18/0x40 [ 11.773426] kasan_save_alloc_info+0x3b/0x50 [ 11.773655] __kasan_krealloc+0x190/0x1f0 [ 11.774140] krealloc_noprof+0xf3/0x340 [ 11.774457] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.774690] krealloc_less_oob+0x1c/0x30 [ 11.774878] kunit_try_run_case+0x1a5/0x480 [ 11.775074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.775664] kthread+0x337/0x6f0 [ 11.775825] ret_from_fork+0x116/0x1d0 [ 11.776541] ret_from_fork_asm+0x1a/0x30 [ 11.776739] [ 11.776817] The buggy address belongs to the object at ffff888100338400 [ 11.776817] which belongs to the cache kmalloc-256 of size 256 [ 11.777506] The buggy address is located 7 bytes to the right of [ 11.777506] allocated 201-byte region [ffff888100338400, ffff8881003384c9) [ 11.778038] [ 11.778145] The buggy address belongs to the physical page: [ 11.778810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100338 [ 11.779074] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.779308] flags: 0x200000000000040(head|node=0|zone=2) [ 11.779506] page_type: f5(slab) [ 11.779681] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.780110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.780437] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.781122] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.781952] head: 0200000000000001 ffffea000400ce01 00000000ffffffff 00000000ffffffff [ 11.782540] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.783269] page dumped because: kasan: bad access detected [ 11.783604] [ 11.783677] Memory state around the buggy address: [ 11.783834] ffff888100338380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.784052] ffff888100338400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.784274] >ffff888100338480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.784486] ^ [ 11.784676] ffff888100338500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.784929] ffff888100338580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.785246] ================================================================== [ 11.916320] ================================================================== [ 11.916836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.917328] Write of size 1 at addr ffff88810394e0c9 by task kunit_try_catch/180 [ 11.917653] [ 11.917751] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.917798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.917809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.917831] Call Trace: [ 11.917844] <TASK> [ 11.917863] dump_stack_lvl+0x73/0xb0 [ 11.917894] print_report+0xd1/0x610 [ 11.917917] ? __virt_addr_valid+0x1db/0x2d0 [ 11.917942] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.917965] ? kasan_addr_to_slab+0x11/0xa0 [ 11.917985] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.918009] kasan_report+0x141/0x180 [ 11.918030] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.918057] __asan_report_store1_noabort+0x1b/0x30 [ 11.918081] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.918106] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.918129] ? irqentry_exit+0x2a/0x60 [ 11.918150] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.918284] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 11.918311] krealloc_large_less_oob+0x1c/0x30 [ 11.918348] kunit_try_run_case+0x1a5/0x480 [ 11.918374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.918396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.918420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.918442] ? __kthread_parkme+0x82/0x180 [ 11.918463] ? preempt_count_sub+0x50/0x80 [ 11.918488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.918519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.918542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.918565] kthread+0x337/0x6f0 [ 11.918583] ? trace_preempt_on+0x20/0xc0 [ 11.918606] ? __pfx_kthread+0x10/0x10 [ 11.918626] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.918646] ? calculate_sigpending+0x7b/0xa0 [ 11.918670] ? __pfx_kthread+0x10/0x10 [ 11.918690] ret_from_fork+0x116/0x1d0 [ 11.918710] ? __pfx_kthread+0x10/0x10 [ 11.918729] ret_from_fork_asm+0x1a/0x30 [ 11.918759] </TASK> [ 11.918769] [ 11.927996] The buggy address belongs to the physical page: [ 11.928301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 11.928621] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.929156] flags: 0x200000000000040(head|node=0|zone=2) [ 11.929502] page_type: f8(unknown) [ 11.929636] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.929980] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.930521] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.930874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.931364] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 11.931655] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.932125] page dumped because: kasan: bad access detected [ 11.932428] [ 11.932539] Memory state around the buggy address: [ 11.932749] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.933341] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.933637] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.934129] ^ [ 11.934517] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.934812] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.935349] ================================================================== [ 11.959740] ================================================================== [ 11.960624] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.961030] Write of size 1 at addr ffff88810394e0da by task kunit_try_catch/180 [ 11.961987] [ 11.962190] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.962342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.962354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.962389] Call Trace: [ 11.962400] <TASK> [ 11.962415] dump_stack_lvl+0x73/0xb0 [ 11.962446] print_report+0xd1/0x610 [ 11.962467] ? __virt_addr_valid+0x1db/0x2d0 [ 11.962489] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.962523] ? kasan_addr_to_slab+0x11/0xa0 [ 11.962542] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.962566] kasan_report+0x141/0x180 [ 11.962586] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.962614] __asan_report_store1_noabort+0x1b/0x30 [ 11.962637] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.962662] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.962685] ? irqentry_exit+0x2a/0x60 [ 11.962705] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.962733] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 11.962760] krealloc_large_less_oob+0x1c/0x30 [ 11.962782] kunit_try_run_case+0x1a5/0x480 [ 11.962805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.962827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.962850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.962872] ? __kthread_parkme+0x82/0x180 [ 11.962892] ? preempt_count_sub+0x50/0x80 [ 11.962915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.962938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.962960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.962983] kthread+0x337/0x6f0 [ 11.963001] ? trace_preempt_on+0x20/0xc0 [ 11.963023] ? __pfx_kthread+0x10/0x10 [ 11.963080] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.963105] ? calculate_sigpending+0x7b/0xa0 [ 11.963128] ? __pfx_kthread+0x10/0x10 [ 11.963148] ret_from_fork+0x116/0x1d0 [ 11.963167] ? __pfx_kthread+0x10/0x10 [ 11.963187] ret_from_fork_asm+0x1a/0x30 [ 11.963216] </TASK> [ 11.963226] [ 11.972487] The buggy address belongs to the physical page: [ 11.972744] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 11.972990] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.973905] flags: 0x200000000000040(head|node=0|zone=2) [ 11.974342] page_type: f8(unknown) [ 11.974474] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.974805] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.975217] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.975607] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.975966] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 11.976454] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.976756] page dumped because: kasan: bad access detected [ 11.976962] [ 11.977055] Memory state around the buggy address: [ 11.977479] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.977758] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.978150] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.978480] ^ [ 11.978710] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.979019] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.979406] ================================================================== [ 11.996826] ================================================================== [ 11.997248] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.997584] Write of size 1 at addr ffff88810394e0eb by task kunit_try_catch/180 [ 11.997896] [ 11.998019] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.998072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.998229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.998255] Call Trace: [ 11.998272] <TASK> [ 11.998287] dump_stack_lvl+0x73/0xb0 [ 11.998362] print_report+0xd1/0x610 [ 11.998384] ? __virt_addr_valid+0x1db/0x2d0 [ 11.998408] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.998431] ? kasan_addr_to_slab+0x11/0xa0 [ 11.998450] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.998473] kasan_report+0x141/0x180 [ 11.998504] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.998532] __asan_report_store1_noabort+0x1b/0x30 [ 11.998556] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.998582] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.998605] ? irqentry_exit+0x2a/0x60 [ 11.998625] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.998663] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 11.998689] krealloc_large_less_oob+0x1c/0x30 [ 11.998711] kunit_try_run_case+0x1a5/0x480 [ 11.998747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.998769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.998792] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.998814] ? __kthread_parkme+0x82/0x180 [ 11.998833] ? preempt_count_sub+0x50/0x80 [ 11.998857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.998880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.998902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.998925] kthread+0x337/0x6f0 [ 11.998942] ? trace_preempt_on+0x20/0xc0 [ 11.998964] ? __pfx_kthread+0x10/0x10 [ 11.998983] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.999005] ? calculate_sigpending+0x7b/0xa0 [ 11.999029] ? __pfx_kthread+0x10/0x10 [ 11.999059] ret_from_fork+0x116/0x1d0 [ 11.999078] ? __pfx_kthread+0x10/0x10 [ 11.999097] ret_from_fork_asm+0x1a/0x30 [ 11.999127] </TASK> [ 11.999136] [ 12.006779] The buggy address belongs to the physical page: [ 12.007550] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 12.007996] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.009011] flags: 0x200000000000040(head|node=0|zone=2) [ 12.009440] page_type: f8(unknown) [ 12.009754] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.010267] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.010711] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.011205] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.011614] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 12.011994] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.012479] page dumped because: kasan: bad access detected [ 12.012723] [ 12.013008] Memory state around the buggy address: [ 12.013463] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.013790] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.014432] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.014836] ^ [ 12.015269] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.015671] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.016121] ================================================================== [ 11.807765] ================================================================== [ 11.808309] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.808682] Write of size 1 at addr ffff8881003384ea by task kunit_try_catch/176 [ 11.809132] [ 11.809219] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.809261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.809272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.809292] Call Trace: [ 11.809308] <TASK> [ 11.809322] dump_stack_lvl+0x73/0xb0 [ 11.809349] print_report+0xd1/0x610 [ 11.809370] ? __virt_addr_valid+0x1db/0x2d0 [ 11.809392] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.809415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.809437] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.809460] kasan_report+0x141/0x180 [ 11.809481] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.809519] __asan_report_store1_noabort+0x1b/0x30 [ 11.809543] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.809568] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.809590] ? irqentry_exit+0x2a/0x60 [ 11.809611] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.809639] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.809664] krealloc_less_oob+0x1c/0x30 [ 11.809685] kunit_try_run_case+0x1a5/0x480 [ 11.809708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.809730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.809754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.809777] ? __kthread_parkme+0x82/0x180 [ 11.809796] ? preempt_count_sub+0x50/0x80 [ 11.809820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.809843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.809865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.809888] kthread+0x337/0x6f0 [ 11.809906] ? trace_preempt_on+0x20/0xc0 [ 11.809928] ? __pfx_kthread+0x10/0x10 [ 11.809947] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.809968] ? calculate_sigpending+0x7b/0xa0 [ 11.809991] ? __pfx_kthread+0x10/0x10 [ 11.810011] ret_from_fork+0x116/0x1d0 [ 11.810029] ? __pfx_kthread+0x10/0x10 [ 11.810048] ret_from_fork_asm+0x1a/0x30 [ 11.810077] </TASK> [ 11.810087] [ 11.818064] Allocated by task 176: [ 11.818266] kasan_save_stack+0x45/0x70 [ 11.818440] kasan_save_track+0x18/0x40 [ 11.818639] kasan_save_alloc_info+0x3b/0x50 [ 11.818883] __kasan_krealloc+0x190/0x1f0 [ 11.819105] krealloc_noprof+0xf3/0x340 [ 11.819424] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.819904] krealloc_less_oob+0x1c/0x30 [ 11.820280] kunit_try_run_case+0x1a5/0x480 [ 11.820510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.820758] kthread+0x337/0x6f0 [ 11.820919] ret_from_fork+0x116/0x1d0 [ 11.821119] ret_from_fork_asm+0x1a/0x30 [ 11.821325] [ 11.821424] The buggy address belongs to the object at ffff888100338400 [ 11.821424] which belongs to the cache kmalloc-256 of size 256 [ 11.821957] The buggy address is located 33 bytes to the right of [ 11.821957] allocated 201-byte region [ffff888100338400, ffff8881003384c9) [ 11.822487] [ 11.822566] The buggy address belongs to the physical page: [ 11.822732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100338 [ 11.822964] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.823539] flags: 0x200000000000040(head|node=0|zone=2) [ 11.823792] page_type: f5(slab) [ 11.823984] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.824414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.824777] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.825317] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.825556] head: 0200000000000001 ffffea000400ce01 00000000ffffffff 00000000ffffffff [ 11.825890] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.826313] page dumped because: kasan: bad access detected [ 11.826560] [ 11.826653] Memory state around the buggy address: [ 11.826868] ffff888100338380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.827276] ffff888100338400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.827601] >ffff888100338480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.827937] ^ [ 11.828249] ffff888100338500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.828581] ffff888100338580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.828899] ================================================================== [ 11.936414] ================================================================== [ 11.937387] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.937732] Write of size 1 at addr ffff88810394e0d0 by task kunit_try_catch/180 [ 11.938024] [ 11.938328] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.938376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.938386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.938406] Call Trace: [ 11.938418] <TASK> [ 11.938434] dump_stack_lvl+0x73/0xb0 [ 11.938463] print_report+0xd1/0x610 [ 11.938484] ? __virt_addr_valid+0x1db/0x2d0 [ 11.938596] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.938632] ? kasan_addr_to_slab+0x11/0xa0 [ 11.938652] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.938707] kasan_report+0x141/0x180 [ 11.938728] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.938767] __asan_report_store1_noabort+0x1b/0x30 [ 11.938791] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.938817] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.938840] ? irqentry_exit+0x2a/0x60 [ 11.938861] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.938889] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 11.938915] krealloc_large_less_oob+0x1c/0x30 [ 11.938937] kunit_try_run_case+0x1a5/0x480 [ 11.938961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.938982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.939006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.939029] ? __kthread_parkme+0x82/0x180 [ 11.939050] ? preempt_count_sub+0x50/0x80 [ 11.939128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.939152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.939175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.939198] kthread+0x337/0x6f0 [ 11.939217] ? trace_preempt_on+0x20/0xc0 [ 11.939238] ? __pfx_kthread+0x10/0x10 [ 11.939258] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.939278] ? calculate_sigpending+0x7b/0xa0 [ 11.939302] ? __pfx_kthread+0x10/0x10 [ 11.939322] ret_from_fork+0x116/0x1d0 [ 11.939341] ? __pfx_kthread+0x10/0x10 [ 11.939360] ret_from_fork_asm+0x1a/0x30 [ 11.939390] </TASK> [ 11.939399] [ 11.949057] The buggy address belongs to the physical page: [ 11.949376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 11.949867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.950100] flags: 0x200000000000040(head|node=0|zone=2) [ 11.950289] page_type: f8(unknown) [ 11.950422] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.951039] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.951613] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.951845] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.952510] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 11.953070] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.953883] page dumped because: kasan: bad access detected [ 11.954631] [ 11.954787] Memory state around the buggy address: [ 11.955324] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.956063] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.956617] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.956838] ^ [ 11.957019] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.957971] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.958800] ================================================================== [ 11.785953] ================================================================== [ 11.786332] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.786598] Write of size 1 at addr ffff8881003384da by task kunit_try_catch/176 [ 11.786930] [ 11.787066] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.787126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.787167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.787188] Call Trace: [ 11.787221] <TASK> [ 11.787239] dump_stack_lvl+0x73/0xb0 [ 11.787269] print_report+0xd1/0x610 [ 11.787312] ? __virt_addr_valid+0x1db/0x2d0 [ 11.787335] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.787358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.787379] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.787403] kasan_report+0x141/0x180 [ 11.787423] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.787451] __asan_report_store1_noabort+0x1b/0x30 [ 11.787504] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.787530] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.787566] ? irqentry_exit+0x2a/0x60 [ 11.787587] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.787629] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.787667] krealloc_less_oob+0x1c/0x30 [ 11.787687] kunit_try_run_case+0x1a5/0x480 [ 11.787711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.787746] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.787769] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.787805] ? __kthread_parkme+0x82/0x180 [ 11.787824] ? preempt_count_sub+0x50/0x80 [ 11.787848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.787871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.787893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.787917] kthread+0x337/0x6f0 [ 11.787935] ? trace_preempt_on+0x20/0xc0 [ 11.787957] ? __pfx_kthread+0x10/0x10 [ 11.787976] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.787997] ? calculate_sigpending+0x7b/0xa0 [ 11.788022] ? __pfx_kthread+0x10/0x10 [ 11.788049] ret_from_fork+0x116/0x1d0 [ 11.788067] ? __pfx_kthread+0x10/0x10 [ 11.788087] ret_from_fork_asm+0x1a/0x30 [ 11.788117] </TASK> [ 11.788127] [ 11.796464] Allocated by task 176: [ 11.796646] kasan_save_stack+0x45/0x70 [ 11.796844] kasan_save_track+0x18/0x40 [ 11.797049] kasan_save_alloc_info+0x3b/0x50 [ 11.797303] __kasan_krealloc+0x190/0x1f0 [ 11.797504] krealloc_noprof+0xf3/0x340 [ 11.797641] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.797802] krealloc_less_oob+0x1c/0x30 [ 11.797939] kunit_try_run_case+0x1a5/0x480 [ 11.798239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.798512] kthread+0x337/0x6f0 [ 11.798724] ret_from_fork+0x116/0x1d0 [ 11.798932] ret_from_fork_asm+0x1a/0x30 [ 11.799245] [ 11.799360] The buggy address belongs to the object at ffff888100338400 [ 11.799360] which belongs to the cache kmalloc-256 of size 256 [ 11.799894] The buggy address is located 17 bytes to the right of [ 11.799894] allocated 201-byte region [ffff888100338400, ffff8881003384c9) [ 11.800609] [ 11.800744] The buggy address belongs to the physical page: [ 11.801077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100338 [ 11.801630] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.801918] flags: 0x200000000000040(head|node=0|zone=2) [ 11.802206] page_type: f5(slab) [ 11.802358] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.802783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.803115] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.803538] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.803825] head: 0200000000000001 ffffea000400ce01 00000000ffffffff 00000000ffffffff [ 11.804195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.804570] page dumped because: kasan: bad access detected [ 11.804791] [ 11.804885] Memory state around the buggy address: [ 11.805115] ffff888100338380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.805530] ffff888100338400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.805888] >ffff888100338480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.806253] ^ [ 11.806563] ffff888100338500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.806886] ffff888100338580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.807219] ================================================================== [ 11.829538] ================================================================== [ 11.829824] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.830211] Write of size 1 at addr ffff8881003384eb by task kunit_try_catch/176 [ 11.830540] [ 11.830650] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.830711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.830721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.830740] Call Trace: [ 11.830756] <TASK> [ 11.830770] dump_stack_lvl+0x73/0xb0 [ 11.830798] print_report+0xd1/0x610 [ 11.830819] ? __virt_addr_valid+0x1db/0x2d0 [ 11.830840] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.830863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.830885] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.830908] kasan_report+0x141/0x180 [ 11.830929] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.830958] __asan_report_store1_noabort+0x1b/0x30 [ 11.830982] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.831007] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.831052] ? irqentry_exit+0x2a/0x60 [ 11.831074] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.831122] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.831177] krealloc_less_oob+0x1c/0x30 [ 11.831212] kunit_try_run_case+0x1a5/0x480 [ 11.831248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.831269] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.831306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.831341] ? __kthread_parkme+0x82/0x180 [ 11.831373] ? preempt_count_sub+0x50/0x80 [ 11.831411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.831447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.831483] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.831516] kthread+0x337/0x6f0 [ 11.831548] ? trace_preempt_on+0x20/0xc0 [ 11.831583] ? __pfx_kthread+0x10/0x10 [ 11.831615] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.831636] ? calculate_sigpending+0x7b/0xa0 [ 11.831672] ? __pfx_kthread+0x10/0x10 [ 11.831705] ret_from_fork+0x116/0x1d0 [ 11.831737] ? __pfx_kthread+0x10/0x10 [ 11.831769] ret_from_fork_asm+0x1a/0x30 [ 11.831812] </TASK> [ 11.831834] [ 11.843041] Allocated by task 176: [ 11.843289] kasan_save_stack+0x45/0x70 [ 11.843515] kasan_save_track+0x18/0x40 [ 11.843699] kasan_save_alloc_info+0x3b/0x50 [ 11.844053] __kasan_krealloc+0x190/0x1f0 [ 11.844366] krealloc_noprof+0xf3/0x340 [ 11.844695] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.844909] krealloc_less_oob+0x1c/0x30 [ 11.845353] kunit_try_run_case+0x1a5/0x480 [ 11.845588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.846017] kthread+0x337/0x6f0 [ 11.846304] ret_from_fork+0x116/0x1d0 [ 11.846538] ret_from_fork_asm+0x1a/0x30 [ 11.846715] [ 11.846807] The buggy address belongs to the object at ffff888100338400 [ 11.846807] which belongs to the cache kmalloc-256 of size 256 [ 11.847270] The buggy address is located 34 bytes to the right of [ 11.847270] allocated 201-byte region [ffff888100338400, ffff8881003384c9) [ 11.848218] [ 11.848318] The buggy address belongs to the physical page: [ 11.848688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100338 [ 11.849180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.849737] flags: 0x200000000000040(head|node=0|zone=2) [ 11.850003] page_type: f5(slab) [ 11.850253] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.850784] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.851142] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.851628] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.851916] head: 0200000000000001 ffffea000400ce01 00000000ffffffff 00000000ffffffff [ 11.852636] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.853039] page dumped because: kasan: bad access detected [ 11.853248] [ 11.853368] Memory state around the buggy address: [ 11.853668] ffff888100338380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.853950] ffff888100338400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.854507] >ffff888100338480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.854780] ^ [ 11.855192] ffff888100338500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.855536] ffff888100338580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.855911] ================================================================== [ 11.727447] ================================================================== [ 11.728860] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.729180] Write of size 1 at addr ffff8881003384c9 by task kunit_try_catch/176 [ 11.729409] [ 11.729509] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.729557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.729568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.729590] Call Trace: [ 11.729604] <TASK> [ 11.729621] dump_stack_lvl+0x73/0xb0 [ 11.729650] print_report+0xd1/0x610 [ 11.729672] ? __virt_addr_valid+0x1db/0x2d0 [ 11.729695] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.729718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.729739] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.729762] kasan_report+0x141/0x180 [ 11.729785] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.729812] __asan_report_store1_noabort+0x1b/0x30 [ 11.729836] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.729861] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.729883] ? irqentry_exit+0x2a/0x60 [ 11.729904] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.729932] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.729957] krealloc_less_oob+0x1c/0x30 [ 11.729977] kunit_try_run_case+0x1a5/0x480 [ 11.730001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.730022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.730046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.730069] ? __kthread_parkme+0x82/0x180 [ 11.730089] ? preempt_count_sub+0x50/0x80 [ 11.730112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.730134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.730157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.730180] kthread+0x337/0x6f0 [ 11.730204] ? trace_preempt_on+0x20/0xc0 [ 11.730226] ? __pfx_kthread+0x10/0x10 [ 11.730246] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.730266] ? calculate_sigpending+0x7b/0xa0 [ 11.730289] ? __pfx_kthread+0x10/0x10 [ 11.730310] ret_from_fork+0x116/0x1d0 [ 11.730328] ? __pfx_kthread+0x10/0x10 [ 11.730347] ret_from_fork_asm+0x1a/0x30 [ 11.730377] </TASK> [ 11.730387] [ 11.743325] Allocated by task 176: [ 11.743740] kasan_save_stack+0x45/0x70 [ 11.744193] kasan_save_track+0x18/0x40 [ 11.744641] kasan_save_alloc_info+0x3b/0x50 [ 11.745134] __kasan_krealloc+0x190/0x1f0 [ 11.745593] krealloc_noprof+0xf3/0x340 [ 11.745970] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.746456] krealloc_less_oob+0x1c/0x30 [ 11.746613] kunit_try_run_case+0x1a5/0x480 [ 11.746760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.746938] kthread+0x337/0x6f0 [ 11.747256] ret_from_fork+0x116/0x1d0 [ 11.747707] ret_from_fork_asm+0x1a/0x30 [ 11.748180] [ 11.748394] The buggy address belongs to the object at ffff888100338400 [ 11.748394] which belongs to the cache kmalloc-256 of size 256 [ 11.749551] The buggy address is located 0 bytes to the right of [ 11.749551] allocated 201-byte region [ffff888100338400, ffff8881003384c9) [ 11.750748] [ 11.750826] The buggy address belongs to the physical page: [ 11.751005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100338 [ 11.751881] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.752641] flags: 0x200000000000040(head|node=0|zone=2) [ 11.753185] page_type: f5(slab) [ 11.753384] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.753631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.753864] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.754248] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.754651] head: 0200000000000001 ffffea000400ce01 00000000ffffffff 00000000ffffffff [ 11.754984] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.755624] page dumped because: kasan: bad access detected [ 11.755855] [ 11.755949] Memory state around the buggy address: [ 11.756125] ffff888100338380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.756682] ffff888100338400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.756992] >ffff888100338480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.757329] ^ [ 11.757658] ffff888100338500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.757960] ffff888100338580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.758350] ==================================================================