Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.190682] ================================================================== [ 15.190741] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.191004] Write of size 1 at addr fff00000c0919ac9 by task kunit_try_catch/159 [ 15.191069] [ 15.191215] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.191306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.191332] Hardware name: linux,dummy-virt (DT) [ 15.191368] Call trace: [ 15.191534] show_stack+0x20/0x38 (C) [ 15.191596] dump_stack_lvl+0x8c/0xd0 [ 15.191644] print_report+0x118/0x5d0 [ 15.191947] kasan_report+0xdc/0x128 [ 15.192086] __asan_report_store1_noabort+0x20/0x30 [ 15.192142] krealloc_less_oob_helper+0xa48/0xc50 [ 15.192218] krealloc_less_oob+0x20/0x38 [ 15.192325] kunit_try_run_case+0x170/0x3f0 [ 15.192402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.192696] kthread+0x328/0x630 [ 15.192955] ret_from_fork+0x10/0x20 [ 15.193152] [ 15.193233] Allocated by task 159: [ 15.193366] kasan_save_stack+0x3c/0x68 [ 15.193474] kasan_save_track+0x20/0x40 [ 15.193518] kasan_save_alloc_info+0x40/0x58 [ 15.193700] __kasan_krealloc+0x118/0x178 [ 15.193922] krealloc_noprof+0x128/0x360 [ 15.194063] krealloc_less_oob_helper+0x168/0xc50 [ 15.194178] krealloc_less_oob+0x20/0x38 [ 15.194266] kunit_try_run_case+0x170/0x3f0 [ 15.194412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.194491] kthread+0x328/0x630 [ 15.195484] ret_from_fork+0x10/0x20 [ 15.195562] [ 15.195581] The buggy address belongs to the object at fff00000c0919a00 [ 15.195581] which belongs to the cache kmalloc-256 of size 256 [ 15.195659] The buggy address is located 0 bytes to the right of [ 15.195659] allocated 201-byte region [fff00000c0919a00, fff00000c0919ac9) [ 15.195752] [ 15.195801] The buggy address belongs to the physical page: [ 15.196120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100918 [ 15.196675] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.197053] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.197146] page_type: f5(slab) [ 15.197239] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.197327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.197464] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.197553] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.197609] head: 0bfffe0000000001 ffffc1ffc3024601 00000000ffffffff 00000000ffffffff [ 15.197657] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.197697] page dumped because: kasan: bad access detected [ 15.197744] [ 15.197762] Memory state around the buggy address: [ 15.197796] fff00000c0919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.197839] fff00000c0919a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.197880] >fff00000c0919a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.197918] ^ [ 15.197964] fff00000c0919b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.198032] fff00000c0919b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.198070] ================================================================== [ 15.276427] ================================================================== [ 15.276472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.276519] Write of size 1 at addr fff00000c65ca0ea by task kunit_try_catch/163 [ 15.276567] [ 15.276594] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.276680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.276711] Hardware name: linux,dummy-virt (DT) [ 15.276749] Call trace: [ 15.276770] show_stack+0x20/0x38 (C) [ 15.276829] dump_stack_lvl+0x8c/0xd0 [ 15.277018] print_report+0x118/0x5d0 [ 15.277304] kasan_report+0xdc/0x128 [ 15.277425] __asan_report_store1_noabort+0x20/0x30 [ 15.278030] krealloc_less_oob_helper+0xae4/0xc50 [ 15.278144] krealloc_large_less_oob+0x20/0x38 [ 15.278295] kunit_try_run_case+0x170/0x3f0 [ 15.278345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.278688] kthread+0x328/0x630 [ 15.278769] ret_from_fork+0x10/0x20 [ 15.278817] [ 15.278836] The buggy address belongs to the physical page: [ 15.279255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c8 [ 15.279349] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.279457] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.279996] page_type: f8(unknown) [ 15.280043] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.280165] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.280240] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.280352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.280671] head: 0bfffe0000000002 ffffc1ffc3197201 00000000ffffffff 00000000ffffffff [ 15.280841] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.281024] page dumped because: kasan: bad access detected [ 15.281104] [ 15.281179] Memory state around the buggy address: [ 15.281268] fff00000c65c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.281352] fff00000c65ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.281518] >fff00000c65ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.281560] ^ [ 15.281598] fff00000c65ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.281764] fff00000c65ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.282009] ================================================================== [ 15.207369] ================================================================== [ 15.207429] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.207833] Write of size 1 at addr fff00000c0919ada by task kunit_try_catch/159 [ 15.207975] [ 15.208040] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.208129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.208157] Hardware name: linux,dummy-virt (DT) [ 15.208433] Call trace: [ 15.208536] show_stack+0x20/0x38 (C) [ 15.208591] dump_stack_lvl+0x8c/0xd0 [ 15.208685] print_report+0x118/0x5d0 [ 15.208740] kasan_report+0xdc/0x128 [ 15.208785] __asan_report_store1_noabort+0x20/0x30 [ 15.209222] krealloc_less_oob_helper+0xa80/0xc50 [ 15.209343] krealloc_less_oob+0x20/0x38 [ 15.209414] kunit_try_run_case+0x170/0x3f0 [ 15.209525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.209581] kthread+0x328/0x630 [ 15.209622] ret_from_fork+0x10/0x20 [ 15.209785] [ 15.210033] Allocated by task 159: [ 15.210193] kasan_save_stack+0x3c/0x68 [ 15.210272] kasan_save_track+0x20/0x40 [ 15.210378] kasan_save_alloc_info+0x40/0x58 [ 15.210439] __kasan_krealloc+0x118/0x178 [ 15.210499] krealloc_noprof+0x128/0x360 [ 15.211052] krealloc_less_oob_helper+0x168/0xc50 [ 15.211097] krealloc_less_oob+0x20/0x38 [ 15.211417] kunit_try_run_case+0x170/0x3f0 [ 15.211569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.211677] kthread+0x328/0x630 [ 15.211821] ret_from_fork+0x10/0x20 [ 15.211860] [ 15.211930] The buggy address belongs to the object at fff00000c0919a00 [ 15.211930] which belongs to the cache kmalloc-256 of size 256 [ 15.212143] The buggy address is located 17 bytes to the right of [ 15.212143] allocated 201-byte region [fff00000c0919a00, fff00000c0919ac9) [ 15.212233] [ 15.212252] The buggy address belongs to the physical page: [ 15.212293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100918 [ 15.212354] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.212400] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.212449] page_type: f5(slab) [ 15.212487] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.212548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.212597] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.212654] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.212703] head: 0bfffe0000000001 ffffc1ffc3024601 00000000ffffffff 00000000ffffffff [ 15.212760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.213017] page dumped because: kasan: bad access detected [ 15.213339] [ 15.213396] Memory state around the buggy address: [ 15.213461] fff00000c0919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.213545] fff00000c0919a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.213684] >fff00000c0919a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.213804] ^ [ 15.214021] fff00000c0919b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214068] fff00000c0919b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214106] ================================================================== [ 15.283078] ================================================================== [ 15.283207] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.283331] Write of size 1 at addr fff00000c65ca0eb by task kunit_try_catch/163 [ 15.283382] [ 15.283412] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.283543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.283570] Hardware name: linux,dummy-virt (DT) [ 15.283599] Call trace: [ 15.283658] show_stack+0x20/0x38 (C) [ 15.284001] dump_stack_lvl+0x8c/0xd0 [ 15.284071] print_report+0x118/0x5d0 [ 15.284118] kasan_report+0xdc/0x128 [ 15.284163] __asan_report_store1_noabort+0x20/0x30 [ 15.284341] krealloc_less_oob_helper+0xa58/0xc50 [ 15.284402] krealloc_large_less_oob+0x20/0x38 [ 15.284448] kunit_try_run_case+0x170/0x3f0 [ 15.284494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.284545] kthread+0x328/0x630 [ 15.284585] ret_from_fork+0x10/0x20 [ 15.284631] [ 15.284650] The buggy address belongs to the physical page: [ 15.284706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c8 [ 15.284769] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.284826] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.284876] page_type: f8(unknown) [ 15.284913] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.284968] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.285411] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.285674] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.285870] head: 0bfffe0000000002 ffffc1ffc3197201 00000000ffffffff 00000000ffffffff [ 15.286062] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.286162] page dumped because: kasan: bad access detected [ 15.286299] [ 15.286380] Memory state around the buggy address: [ 15.286413] fff00000c65c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.286472] fff00000c65ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.286779] >fff00000c65ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.286864] ^ [ 15.287021] fff00000c65ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.287106] fff00000c65ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.287244] ================================================================== [ 15.269723] ================================================================== [ 15.269816] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.269953] Write of size 1 at addr fff00000c65ca0da by task kunit_try_catch/163 [ 15.270280] [ 15.270325] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.271120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.271376] Hardware name: linux,dummy-virt (DT) [ 15.271430] Call trace: [ 15.271461] show_stack+0x20/0x38 (C) [ 15.271514] dump_stack_lvl+0x8c/0xd0 [ 15.271624] print_report+0x118/0x5d0 [ 15.271710] kasan_report+0xdc/0x128 [ 15.271755] __asan_report_store1_noabort+0x20/0x30 [ 15.271897] krealloc_less_oob_helper+0xa80/0xc50 [ 15.271963] krealloc_large_less_oob+0x20/0x38 [ 15.272051] kunit_try_run_case+0x170/0x3f0 [ 15.272096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.272208] kthread+0x328/0x630 [ 15.272253] ret_from_fork+0x10/0x20 [ 15.272593] [ 15.272646] The buggy address belongs to the physical page: [ 15.272704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c8 [ 15.272842] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.272919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.272970] page_type: f8(unknown) [ 15.273128] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.273409] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.273549] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.273658] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.274353] head: 0bfffe0000000002 ffffc1ffc3197201 00000000ffffffff 00000000ffffffff [ 15.274481] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.274606] page dumped because: kasan: bad access detected [ 15.274637] [ 15.274689] Memory state around the buggy address: [ 15.275100] fff00000c65c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.275180] fff00000c65ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.275223] >fff00000c65ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.275379] ^ [ 15.275579] fff00000c65ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.275649] fff00000c65ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.275913] ================================================================== [ 15.215122] ================================================================== [ 15.215434] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.215551] Write of size 1 at addr fff00000c0919aea by task kunit_try_catch/159 [ 15.215648] [ 15.215685] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.215856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.215885] Hardware name: linux,dummy-virt (DT) [ 15.215922] Call trace: [ 15.215961] show_stack+0x20/0x38 (C) [ 15.216148] dump_stack_lvl+0x8c/0xd0 [ 15.216523] print_report+0x118/0x5d0 [ 15.216666] kasan_report+0xdc/0x128 [ 15.216742] __asan_report_store1_noabort+0x20/0x30 [ 15.216882] krealloc_less_oob_helper+0xae4/0xc50 [ 15.216954] krealloc_less_oob+0x20/0x38 [ 15.217245] kunit_try_run_case+0x170/0x3f0 [ 15.217388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.217577] kthread+0x328/0x630 [ 15.217655] ret_from_fork+0x10/0x20 [ 15.217787] [ 15.217922] Allocated by task 159: [ 15.218031] kasan_save_stack+0x3c/0x68 [ 15.218100] kasan_save_track+0x20/0x40 [ 15.218137] kasan_save_alloc_info+0x40/0x58 [ 15.218544] __kasan_krealloc+0x118/0x178 [ 15.218622] krealloc_noprof+0x128/0x360 [ 15.218741] krealloc_less_oob_helper+0x168/0xc50 [ 15.218843] krealloc_less_oob+0x20/0x38 [ 15.218920] kunit_try_run_case+0x170/0x3f0 [ 15.219315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.219437] kthread+0x328/0x630 [ 15.219480] ret_from_fork+0x10/0x20 [ 15.219515] [ 15.219551] The buggy address belongs to the object at fff00000c0919a00 [ 15.219551] which belongs to the cache kmalloc-256 of size 256 [ 15.219617] The buggy address is located 33 bytes to the right of [ 15.219617] allocated 201-byte region [fff00000c0919a00, fff00000c0919ac9) [ 15.219728] [ 15.219747] The buggy address belongs to the physical page: [ 15.219778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100918 [ 15.219838] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.219885] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.219945] page_type: f5(slab) [ 15.219991] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.220041] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.220091] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.220149] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.220198] head: 0bfffe0000000001 ffffc1ffc3024601 00000000ffffffff 00000000ffffffff [ 15.220246] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.220295] page dumped because: kasan: bad access detected [ 15.220325] [ 15.220342] Memory state around the buggy address: [ 15.220371] fff00000c0919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220413] fff00000c0919a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.220455] >fff00000c0919a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.220491] ^ [ 15.220529] fff00000c0919b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220580] fff00000c0919b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220618] ================================================================== [ 15.263436] ================================================================== [ 15.263488] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.263647] Write of size 1 at addr fff00000c65ca0d0 by task kunit_try_catch/163 [ 15.263766] [ 15.263817] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.263899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.264023] Hardware name: linux,dummy-virt (DT) [ 15.264092] Call trace: [ 15.264122] show_stack+0x20/0x38 (C) [ 15.264336] dump_stack_lvl+0x8c/0xd0 [ 15.264391] print_report+0x118/0x5d0 [ 15.264537] kasan_report+0xdc/0x128 [ 15.264595] __asan_report_store1_noabort+0x20/0x30 [ 15.264801] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.264872] krealloc_large_less_oob+0x20/0x38 [ 15.265076] kunit_try_run_case+0x170/0x3f0 [ 15.265302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.265408] kthread+0x328/0x630 [ 15.265494] ret_from_fork+0x10/0x20 [ 15.265675] [ 15.265699] The buggy address belongs to the physical page: [ 15.265733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c8 [ 15.265789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.266024] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.266091] page_type: f8(unknown) [ 15.266210] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.266261] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.266319] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.266367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.266415] head: 0bfffe0000000002 ffffc1ffc3197201 00000000ffffffff 00000000ffffffff [ 15.266469] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.266524] page dumped because: kasan: bad access detected [ 15.266554] [ 15.266571] Memory state around the buggy address: [ 15.266600] fff00000c65c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.266642] fff00000c65ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.266694] >fff00000c65ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.266731] ^ [ 15.266767] fff00000c65ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.266809] fff00000c65ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.266845] ================================================================== [ 15.256833] ================================================================== [ 15.257178] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.257325] Write of size 1 at addr fff00000c65ca0c9 by task kunit_try_catch/163 [ 15.257421] [ 15.257525] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.257897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.257954] Hardware name: linux,dummy-virt (DT) [ 15.258080] Call trace: [ 15.258140] show_stack+0x20/0x38 (C) [ 15.258276] dump_stack_lvl+0x8c/0xd0 [ 15.258386] print_report+0x118/0x5d0 [ 15.258582] kasan_report+0xdc/0x128 [ 15.258679] __asan_report_store1_noabort+0x20/0x30 [ 15.259201] krealloc_less_oob_helper+0xa48/0xc50 [ 15.259369] krealloc_large_less_oob+0x20/0x38 [ 15.259503] kunit_try_run_case+0x170/0x3f0 [ 15.259672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.259758] kthread+0x328/0x630 [ 15.259808] ret_from_fork+0x10/0x20 [ 15.260088] [ 15.260225] The buggy address belongs to the physical page: [ 15.260368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c8 [ 15.260528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.260579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.260655] page_type: f8(unknown) [ 15.260728] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.260997] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.261256] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.261334] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.261470] head: 0bfffe0000000002 ffffc1ffc3197201 00000000ffffffff 00000000ffffffff [ 15.261703] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.261903] page dumped because: kasan: bad access detected [ 15.261998] [ 15.262032] Memory state around the buggy address: [ 15.262100] fff00000c65c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.262161] fff00000c65ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.262203] >fff00000c65ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.262240] ^ [ 15.262283] fff00000c65ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.262324] fff00000c65ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.262377] ================================================================== [ 15.222150] ================================================================== [ 15.222203] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.222251] Write of size 1 at addr fff00000c0919aeb by task kunit_try_catch/159 [ 15.222489] [ 15.222610] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.222701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.222726] Hardware name: linux,dummy-virt (DT) [ 15.222764] Call trace: [ 15.222802] show_stack+0x20/0x38 (C) [ 15.222908] dump_stack_lvl+0x8c/0xd0 [ 15.223187] print_report+0x118/0x5d0 [ 15.223401] kasan_report+0xdc/0x128 [ 15.223495] __asan_report_store1_noabort+0x20/0x30 [ 15.223576] krealloc_less_oob_helper+0xa58/0xc50 [ 15.223667] krealloc_less_oob+0x20/0x38 [ 15.223753] kunit_try_run_case+0x170/0x3f0 [ 15.224135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.224308] kthread+0x328/0x630 [ 15.224354] ret_from_fork+0x10/0x20 [ 15.224439] [ 15.224506] Allocated by task 159: [ 15.224533] kasan_save_stack+0x3c/0x68 [ 15.224590] kasan_save_track+0x20/0x40 [ 15.224627] kasan_save_alloc_info+0x40/0x58 [ 15.224714] __kasan_krealloc+0x118/0x178 [ 15.224823] krealloc_noprof+0x128/0x360 [ 15.224863] krealloc_less_oob_helper+0x168/0xc50 [ 15.224925] krealloc_less_oob+0x20/0x38 [ 15.224967] kunit_try_run_case+0x170/0x3f0 [ 15.225155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.225403] kthread+0x328/0x630 [ 15.225527] ret_from_fork+0x10/0x20 [ 15.225634] [ 15.225755] The buggy address belongs to the object at fff00000c0919a00 [ 15.225755] which belongs to the cache kmalloc-256 of size 256 [ 15.225860] The buggy address is located 34 bytes to the right of [ 15.225860] allocated 201-byte region [fff00000c0919a00, fff00000c0919ac9) [ 15.226075] [ 15.226291] The buggy address belongs to the physical page: [ 15.226344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100918 [ 15.226478] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.226615] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.226766] page_type: f5(slab) [ 15.226816] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.227170] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.227393] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.227482] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.227628] head: 0bfffe0000000001 ffffc1ffc3024601 00000000ffffffff 00000000ffffffff [ 15.227739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.228159] page dumped because: kasan: bad access detected [ 15.228237] [ 15.228277] Memory state around the buggy address: [ 15.228338] fff00000c0919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.228505] fff00000c0919a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.228604] >fff00000c0919a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.228830] ^ [ 15.229015] fff00000c0919b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.229079] fff00000c0919b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.229492] ================================================================== [ 15.198544] ================================================================== [ 15.198591] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.198640] Write of size 1 at addr fff00000c0919ad0 by task kunit_try_catch/159 [ 15.198688] [ 15.198717] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.198813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.198840] Hardware name: linux,dummy-virt (DT) [ 15.198869] Call trace: [ 15.198890] show_stack+0x20/0x38 (C) [ 15.198936] dump_stack_lvl+0x8c/0xd0 [ 15.199308] print_report+0x118/0x5d0 [ 15.199407] kasan_report+0xdc/0x128 [ 15.199464] __asan_report_store1_noabort+0x20/0x30 [ 15.199872] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.200044] krealloc_less_oob+0x20/0x38 [ 15.200258] kunit_try_run_case+0x170/0x3f0 [ 15.200474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.200540] kthread+0x328/0x630 [ 15.200804] ret_from_fork+0x10/0x20 [ 15.201033] [ 15.201183] Allocated by task 159: [ 15.201215] kasan_save_stack+0x3c/0x68 [ 15.201446] kasan_save_track+0x20/0x40 [ 15.201540] kasan_save_alloc_info+0x40/0x58 [ 15.201651] __kasan_krealloc+0x118/0x178 [ 15.201717] krealloc_noprof+0x128/0x360 [ 15.201753] krealloc_less_oob_helper+0x168/0xc50 [ 15.202034] krealloc_less_oob+0x20/0x38 [ 15.202164] kunit_try_run_case+0x170/0x3f0 [ 15.202243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.202387] kthread+0x328/0x630 [ 15.202422] ret_from_fork+0x10/0x20 [ 15.202508] [ 15.202821] The buggy address belongs to the object at fff00000c0919a00 [ 15.202821] which belongs to the cache kmalloc-256 of size 256 [ 15.202909] The buggy address is located 7 bytes to the right of [ 15.202909] allocated 201-byte region [fff00000c0919a00, fff00000c0919ac9) [ 15.203095] [ 15.203115] The buggy address belongs to the physical page: [ 15.203147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100918 [ 15.203615] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.203712] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.203774] page_type: f5(slab) [ 15.204126] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.204258] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.204355] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.204507] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.204714] head: 0bfffe0000000001 ffffc1ffc3024601 00000000ffffffff 00000000ffffffff [ 15.204926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.205004] page dumped because: kasan: bad access detected [ 15.205036] [ 15.205053] Memory state around the buggy address: [ 15.205199] fff00000c0919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.205494] fff00000c0919a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.205547] >fff00000c0919a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.205650] ^ [ 15.205739] fff00000c0919b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.205781] fff00000c0919b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.205830] ==================================================================
[ 12.748725] ================================================================== [ 12.749056] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 12.749431] Write of size 1 at addr ffff888100342ada by task kunit_try_catch/175 [ 12.749734] [ 12.749833] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.749874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.749886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.749906] Call Trace: [ 12.749919] <TASK> [ 12.749935] dump_stack_lvl+0x73/0xb0 [ 12.749963] print_report+0xd1/0x610 [ 12.749987] ? __virt_addr_valid+0x1db/0x2d0 [ 12.750009] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.750035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.750060] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.750085] kasan_report+0x141/0x180 [ 12.750108] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.750139] __asan_report_store1_noabort+0x1b/0x30 [ 12.750165] krealloc_less_oob_helper+0xec6/0x11d0 [ 12.750192] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.750218] ? finish_task_switch.isra.0+0x153/0x700 [ 12.750396] ? __switch_to+0x47/0xf50 [ 12.750439] ? __schedule+0x10cc/0x2b60 [ 12.750461] ? __pfx_read_tsc+0x10/0x10 [ 12.750484] krealloc_less_oob+0x1c/0x30 [ 12.750507] kunit_try_run_case+0x1a5/0x480 [ 12.750531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.750569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.750593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.750616] ? __kthread_parkme+0x82/0x180 [ 12.750637] ? preempt_count_sub+0x50/0x80 [ 12.750659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.750683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.750707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.750733] kthread+0x337/0x6f0 [ 12.750751] ? trace_preempt_on+0x20/0xc0 [ 12.750774] ? __pfx_kthread+0x10/0x10 [ 12.750794] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.750815] ? calculate_sigpending+0x7b/0xa0 [ 12.750839] ? __pfx_kthread+0x10/0x10 [ 12.750860] ret_from_fork+0x116/0x1d0 [ 12.750878] ? __pfx_kthread+0x10/0x10 [ 12.750898] ret_from_fork_asm+0x1a/0x30 [ 12.750928] </TASK> [ 12.750937] [ 12.758714] Allocated by task 175: [ 12.759180] kasan_save_stack+0x45/0x70 [ 12.759366] kasan_save_track+0x18/0x40 [ 12.759696] kasan_save_alloc_info+0x3b/0x50 [ 12.759902] __kasan_krealloc+0x190/0x1f0 [ 12.760048] krealloc_noprof+0xf3/0x340 [ 12.760183] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.760344] krealloc_less_oob+0x1c/0x30 [ 12.760595] kunit_try_run_case+0x1a5/0x480 [ 12.760802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.761057] kthread+0x337/0x6f0 [ 12.761225] ret_from_fork+0x116/0x1d0 [ 12.761421] ret_from_fork_asm+0x1a/0x30 [ 12.761739] [ 12.761817] The buggy address belongs to the object at ffff888100342a00 [ 12.761817] which belongs to the cache kmalloc-256 of size 256 [ 12.762176] The buggy address is located 17 bytes to the right of [ 12.762176] allocated 201-byte region [ffff888100342a00, ffff888100342ac9) [ 12.762944] [ 12.763052] The buggy address belongs to the physical page: [ 12.763428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 12.763746] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.764015] flags: 0x200000000000040(head|node=0|zone=2) [ 12.764192] page_type: f5(slab) [ 12.764309] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.764599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.765045] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.765388] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.765908] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 12.766221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.766660] page dumped because: kasan: bad access detected [ 12.766880] [ 12.766978] Memory state around the buggy address: [ 12.767205] ffff888100342980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.767737] ffff888100342a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.768015] >ffff888100342a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.768354] ^ [ 12.768604] ffff888100342b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.768924] ffff888100342b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.769193] ================================================================== [ 12.769691] ================================================================== [ 12.769929] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 12.770270] Write of size 1 at addr ffff888100342aea by task kunit_try_catch/175 [ 12.770635] [ 12.770741] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.770781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.770792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.770810] Call Trace: [ 12.770823] <TASK> [ 12.770838] dump_stack_lvl+0x73/0xb0 [ 12.770863] print_report+0xd1/0x610 [ 12.770884] ? __virt_addr_valid+0x1db/0x2d0 [ 12.770904] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.770927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.770948] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.770971] kasan_report+0x141/0x180 [ 12.770991] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.771019] __asan_report_store1_noabort+0x1b/0x30 [ 12.771042] krealloc_less_oob_helper+0xe90/0x11d0 [ 12.771067] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.771090] ? finish_task_switch.isra.0+0x153/0x700 [ 12.771111] ? __switch_to+0x47/0xf50 [ 12.771134] ? __schedule+0x10cc/0x2b60 [ 12.771154] ? __pfx_read_tsc+0x10/0x10 [ 12.771176] krealloc_less_oob+0x1c/0x30 [ 12.771365] kunit_try_run_case+0x1a5/0x480 [ 12.771396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.771435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.771461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.771485] ? __kthread_parkme+0x82/0x180 [ 12.771505] ? preempt_count_sub+0x50/0x80 [ 12.771528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.771565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.771589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.771615] kthread+0x337/0x6f0 [ 12.771634] ? trace_preempt_on+0x20/0xc0 [ 12.771657] ? __pfx_kthread+0x10/0x10 [ 12.771677] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.771698] ? calculate_sigpending+0x7b/0xa0 [ 12.771721] ? __pfx_kthread+0x10/0x10 [ 12.771742] ret_from_fork+0x116/0x1d0 [ 12.771761] ? __pfx_kthread+0x10/0x10 [ 12.771781] ret_from_fork_asm+0x1a/0x30 [ 12.771811] </TASK> [ 12.771820] [ 12.780056] Allocated by task 175: [ 12.780186] kasan_save_stack+0x45/0x70 [ 12.780609] kasan_save_track+0x18/0x40 [ 12.780812] kasan_save_alloc_info+0x3b/0x50 [ 12.781023] __kasan_krealloc+0x190/0x1f0 [ 12.781223] krealloc_noprof+0xf3/0x340 [ 12.781405] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.781668] krealloc_less_oob+0x1c/0x30 [ 12.781840] kunit_try_run_case+0x1a5/0x480 [ 12.782023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.782239] kthread+0x337/0x6f0 [ 12.782401] ret_from_fork+0x116/0x1d0 [ 12.782590] ret_from_fork_asm+0x1a/0x30 [ 12.782737] [ 12.782828] The buggy address belongs to the object at ffff888100342a00 [ 12.782828] which belongs to the cache kmalloc-256 of size 256 [ 12.783304] The buggy address is located 33 bytes to the right of [ 12.783304] allocated 201-byte region [ffff888100342a00, ffff888100342ac9) [ 12.783683] [ 12.783753] The buggy address belongs to the physical page: [ 12.784002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 12.784460] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.784804] flags: 0x200000000000040(head|node=0|zone=2) [ 12.785042] page_type: f5(slab) [ 12.785177] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.785406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.785754] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.786096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.786563] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 12.786885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.787180] page dumped because: kasan: bad access detected [ 12.787509] [ 12.787602] Memory state around the buggy address: [ 12.787757] ffff888100342980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.787975] ffff888100342a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.788365] >ffff888100342a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.788698] ^ [ 12.789297] ffff888100342b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.789603] ffff888100342b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.789879] ================================================================== [ 12.953778] ================================================================== [ 12.954431] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 12.955098] Write of size 1 at addr ffff8881027d20eb by task kunit_try_catch/179 [ 12.955740] [ 12.955888] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.955933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.955944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.955964] Call Trace: [ 12.955975] <TASK> [ 12.955990] dump_stack_lvl+0x73/0xb0 [ 12.956019] print_report+0xd1/0x610 [ 12.956047] ? __virt_addr_valid+0x1db/0x2d0 [ 12.956069] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.956094] ? kasan_addr_to_slab+0x11/0xa0 [ 12.956114] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.956138] kasan_report+0x141/0x180 [ 12.956160] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.956188] __asan_report_store1_noabort+0x1b/0x30 [ 12.956214] krealloc_less_oob_helper+0xd47/0x11d0 [ 12.956240] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.956264] ? irqentry_exit+0x2a/0x60 [ 12.956286] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.956315] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 12.956343] krealloc_large_less_oob+0x1c/0x30 [ 12.956367] kunit_try_run_case+0x1a5/0x480 [ 12.956392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.956668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.956699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.956723] ? __kthread_parkme+0x82/0x180 [ 12.956744] ? preempt_count_sub+0x50/0x80 [ 12.956767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.956793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.956820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.956845] kthread+0x337/0x6f0 [ 12.956865] ? trace_preempt_on+0x20/0xc0 [ 12.956888] ? __pfx_kthread+0x10/0x10 [ 12.956909] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.956930] ? calculate_sigpending+0x7b/0xa0 [ 12.956954] ? __pfx_kthread+0x10/0x10 [ 12.956975] ret_from_fork+0x116/0x1d0 [ 12.956994] ? __pfx_kthread+0x10/0x10 [ 12.957016] ret_from_fork_asm+0x1a/0x30 [ 12.957048] </TASK> [ 12.957060] [ 12.973005] The buggy address belongs to the physical page: [ 12.973609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027d0 [ 12.974138] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.974574] flags: 0x200000000000040(head|node=0|zone=2) [ 12.975214] page_type: f8(unknown) [ 12.975793] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.976426] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.976821] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.977057] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.977769] head: 0200000000000002 ffffea000409f401 00000000ffffffff 00000000ffffffff [ 12.978577] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.979323] page dumped because: kasan: bad access detected [ 12.980128] [ 12.980341] Memory state around the buggy address: [ 12.980854] ffff8881027d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.981073] ffff8881027d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.981362] >ffff8881027d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.982246] ^ [ 12.982953] ffff8881027d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.983860] ffff8881027d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.984509] ================================================================== [ 12.897489] ================================================================== [ 12.897834] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 12.898164] Write of size 1 at addr ffff8881027d20da by task kunit_try_catch/179 [ 12.899612] [ 12.899728] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.899771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.899782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.899802] Call Trace: [ 12.899814] <TASK> [ 12.899827] dump_stack_lvl+0x73/0xb0 [ 12.899856] print_report+0xd1/0x610 [ 12.899878] ? __virt_addr_valid+0x1db/0x2d0 [ 12.899901] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.899927] ? kasan_addr_to_slab+0x11/0xa0 [ 12.899948] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.899974] kasan_report+0x141/0x180 [ 12.899995] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.900024] __asan_report_store1_noabort+0x1b/0x30 [ 12.900057] krealloc_less_oob_helper+0xec6/0x11d0 [ 12.900083] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.900108] ? irqentry_exit+0x2a/0x60 [ 12.900128] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.900158] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 12.900185] krealloc_large_less_oob+0x1c/0x30 [ 12.900209] kunit_try_run_case+0x1a5/0x480 [ 12.900232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.900408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.900437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.900476] ? __kthread_parkme+0x82/0x180 [ 12.900497] ? preempt_count_sub+0x50/0x80 [ 12.900521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.900593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.900620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.900645] kthread+0x337/0x6f0 [ 12.900664] ? trace_preempt_on+0x20/0xc0 [ 12.900687] ? __pfx_kthread+0x10/0x10 [ 12.900707] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.900728] ? calculate_sigpending+0x7b/0xa0 [ 12.900752] ? __pfx_kthread+0x10/0x10 [ 12.900773] ret_from_fork+0x116/0x1d0 [ 12.900792] ? __pfx_kthread+0x10/0x10 [ 12.900813] ret_from_fork_asm+0x1a/0x30 [ 12.900843] </TASK> [ 12.900853] [ 12.913136] The buggy address belongs to the physical page: [ 12.913662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027d0 [ 12.914187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.914752] flags: 0x200000000000040(head|node=0|zone=2) [ 12.915102] page_type: f8(unknown) [ 12.915425] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.915734] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.916038] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.916746] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.917162] head: 0200000000000002 ffffea000409f401 00000000ffffffff 00000000ffffffff [ 12.917724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.918314] page dumped because: kasan: bad access detected [ 12.918773] [ 12.919000] Memory state around the buggy address: [ 12.919332] ffff8881027d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.919871] ffff8881027d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.920167] >ffff8881027d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.920984] ^ [ 12.921430] ffff8881027d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.921949] ffff8881027d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.922613] ================================================================== [ 12.881147] ================================================================== [ 12.881481] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 12.881859] Write of size 1 at addr ffff8881027d20d0 by task kunit_try_catch/179 [ 12.882142] [ 12.882253] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.882295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.882306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.882326] Call Trace: [ 12.882338] <TASK> [ 12.882351] dump_stack_lvl+0x73/0xb0 [ 12.882377] print_report+0xd1/0x610 [ 12.882399] ? __virt_addr_valid+0x1db/0x2d0 [ 12.882421] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.882445] ? kasan_addr_to_slab+0x11/0xa0 [ 12.882466] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.882490] kasan_report+0x141/0x180 [ 12.882511] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.882540] __asan_report_store1_noabort+0x1b/0x30 [ 12.882763] krealloc_less_oob_helper+0xe23/0x11d0 [ 12.882798] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.882823] ? irqentry_exit+0x2a/0x60 [ 12.882845] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.882874] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 12.882903] krealloc_large_less_oob+0x1c/0x30 [ 12.882926] kunit_try_run_case+0x1a5/0x480 [ 12.882950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.882973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.882997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.883021] ? __kthread_parkme+0x82/0x180 [ 12.883042] ? preempt_count_sub+0x50/0x80 [ 12.883065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.883089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.883113] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.883139] kthread+0x337/0x6f0 [ 12.883158] ? trace_preempt_on+0x20/0xc0 [ 12.883181] ? __pfx_kthread+0x10/0x10 [ 12.883201] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.883223] ? calculate_sigpending+0x7b/0xa0 [ 12.883246] ? __pfx_kthread+0x10/0x10 [ 12.883267] ret_from_fork+0x116/0x1d0 [ 12.883286] ? __pfx_kthread+0x10/0x10 [ 12.883306] ret_from_fork_asm+0x1a/0x30 [ 12.883393] </TASK> [ 12.883404] [ 12.891182] The buggy address belongs to the physical page: [ 12.891489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027d0 [ 12.891747] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.891972] flags: 0x200000000000040(head|node=0|zone=2) [ 12.892254] page_type: f8(unknown) [ 12.892421] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.892735] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.892970] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.893290] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.893743] head: 0200000000000002 ffffea000409f401 00000000ffffffff 00000000ffffffff [ 12.894088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.894632] page dumped because: kasan: bad access detected [ 12.894890] [ 12.894980] Memory state around the buggy address: [ 12.895176] ffff8881027d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.895391] ffff8881027d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.895622] >ffff8881027d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.896099] ^ [ 12.896369] ffff8881027d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.896697] ffff8881027d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.896955] ================================================================== [ 12.864339] ================================================================== [ 12.864876] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 12.865212] Write of size 1 at addr ffff8881027d20c9 by task kunit_try_catch/179 [ 12.865828] [ 12.865937] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.865981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.865993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.866013] Call Trace: [ 12.866025] <TASK> [ 12.866039] dump_stack_lvl+0x73/0xb0 [ 12.866071] print_report+0xd1/0x610 [ 12.866095] ? __virt_addr_valid+0x1db/0x2d0 [ 12.866118] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.866143] ? kasan_addr_to_slab+0x11/0xa0 [ 12.866163] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.866188] kasan_report+0x141/0x180 [ 12.866209] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.866238] __asan_report_store1_noabort+0x1b/0x30 [ 12.866264] krealloc_less_oob_helper+0xd70/0x11d0 [ 12.866290] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.866315] ? irqentry_exit+0x2a/0x60 [ 12.866337] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.866367] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 12.866398] krealloc_large_less_oob+0x1c/0x30 [ 12.866663] kunit_try_run_case+0x1a5/0x480 [ 12.866689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.866712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.866750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.866774] ? __kthread_parkme+0x82/0x180 [ 12.866795] ? preempt_count_sub+0x50/0x80 [ 12.866819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.866851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.866876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.866901] kthread+0x337/0x6f0 [ 12.866920] ? trace_preempt_on+0x20/0xc0 [ 12.866943] ? __pfx_kthread+0x10/0x10 [ 12.866963] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.866985] ? calculate_sigpending+0x7b/0xa0 [ 12.867009] ? __pfx_kthread+0x10/0x10 [ 12.867030] ret_from_fork+0x116/0x1d0 [ 12.867050] ? __pfx_kthread+0x10/0x10 [ 12.867070] ret_from_fork_asm+0x1a/0x30 [ 12.867101] </TASK> [ 12.867111] [ 12.874647] The buggy address belongs to the physical page: [ 12.874906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027d0 [ 12.875312] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.875684] flags: 0x200000000000040(head|node=0|zone=2) [ 12.875935] page_type: f8(unknown) [ 12.876098] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.876330] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.876678] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.877106] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.877615] head: 0200000000000002 ffffea000409f401 00000000ffffffff 00000000ffffffff [ 12.877875] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.878213] page dumped because: kasan: bad access detected [ 12.878609] [ 12.878705] Memory state around the buggy address: [ 12.878897] ffff8881027d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.879113] ffff8881027d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.879349] >ffff8881027d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.879844] ^ [ 12.880110] ffff8881027d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.880518] ffff8881027d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.880793] ================================================================== [ 12.690748] ================================================================== [ 12.691169] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 12.691416] Write of size 1 at addr ffff888100342ac9 by task kunit_try_catch/175 [ 12.692153] [ 12.692491] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.692572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.692584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.692606] Call Trace: [ 12.692632] <TASK> [ 12.692649] dump_stack_lvl+0x73/0xb0 [ 12.692681] print_report+0xd1/0x610 [ 12.692703] ? __virt_addr_valid+0x1db/0x2d0 [ 12.692726] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.692750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.692773] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.692798] kasan_report+0x141/0x180 [ 12.692819] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.692848] __asan_report_store1_noabort+0x1b/0x30 [ 12.692891] krealloc_less_oob_helper+0xd70/0x11d0 [ 12.692917] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.692942] ? finish_task_switch.isra.0+0x153/0x700 [ 12.692965] ? __switch_to+0x47/0xf50 [ 12.692990] ? __schedule+0x10cc/0x2b60 [ 12.693012] ? __pfx_read_tsc+0x10/0x10 [ 12.693036] krealloc_less_oob+0x1c/0x30 [ 12.693057] kunit_try_run_case+0x1a5/0x480 [ 12.693081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.693104] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.693128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.693152] ? __kthread_parkme+0x82/0x180 [ 12.693172] ? preempt_count_sub+0x50/0x80 [ 12.693195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.693219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.693313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.693339] kthread+0x337/0x6f0 [ 12.693358] ? trace_preempt_on+0x20/0xc0 [ 12.693382] ? __pfx_kthread+0x10/0x10 [ 12.693420] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.693442] ? calculate_sigpending+0x7b/0xa0 [ 12.693466] ? __pfx_kthread+0x10/0x10 [ 12.693487] ret_from_fork+0x116/0x1d0 [ 12.693506] ? __pfx_kthread+0x10/0x10 [ 12.693526] ret_from_fork_asm+0x1a/0x30 [ 12.693564] </TASK> [ 12.693574] [ 12.705975] Allocated by task 175: [ 12.706618] kasan_save_stack+0x45/0x70 [ 12.706991] kasan_save_track+0x18/0x40 [ 12.707432] kasan_save_alloc_info+0x3b/0x50 [ 12.707972] __kasan_krealloc+0x190/0x1f0 [ 12.708401] krealloc_noprof+0xf3/0x340 [ 12.708844] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.709369] krealloc_less_oob+0x1c/0x30 [ 12.709786] kunit_try_run_case+0x1a5/0x480 [ 12.710167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.710712] kthread+0x337/0x6f0 [ 12.711093] ret_from_fork+0x116/0x1d0 [ 12.711314] ret_from_fork_asm+0x1a/0x30 [ 12.711736] [ 12.711895] The buggy address belongs to the object at ffff888100342a00 [ 12.711895] which belongs to the cache kmalloc-256 of size 256 [ 12.712948] The buggy address is located 0 bytes to the right of [ 12.712948] allocated 201-byte region [ffff888100342a00, ffff888100342ac9) [ 12.713528] [ 12.713733] The buggy address belongs to the physical page: [ 12.714212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 12.715072] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.715575] flags: 0x200000000000040(head|node=0|zone=2) [ 12.715759] page_type: f5(slab) [ 12.715880] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.716116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.716650] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.717317] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.718032] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 12.718893] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.719729] page dumped because: kasan: bad access detected [ 12.720430] [ 12.720657] Memory state around the buggy address: [ 12.721082] ffff888100342980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.721427] ffff888100342a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.722056] >ffff888100342a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.722857] ^ [ 12.723100] ffff888100342b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.723541] ffff888100342b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.724166] ================================================================== [ 12.725106] ================================================================== [ 12.725757] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 12.726152] Write of size 1 at addr ffff888100342ad0 by task kunit_try_catch/175 [ 12.726941] [ 12.727131] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.727176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.727187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.727208] Call Trace: [ 12.727222] <TASK> [ 12.727236] dump_stack_lvl+0x73/0xb0 [ 12.727265] print_report+0xd1/0x610 [ 12.727286] ? __virt_addr_valid+0x1db/0x2d0 [ 12.727327] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.727352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.727374] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.727399] kasan_report+0x141/0x180 [ 12.727437] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.727466] __asan_report_store1_noabort+0x1b/0x30 [ 12.727491] krealloc_less_oob_helper+0xe23/0x11d0 [ 12.727518] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.727543] ? finish_task_switch.isra.0+0x153/0x700 [ 12.727576] ? __switch_to+0x47/0xf50 [ 12.727600] ? __schedule+0x10cc/0x2b60 [ 12.727621] ? __pfx_read_tsc+0x10/0x10 [ 12.727646] krealloc_less_oob+0x1c/0x30 [ 12.727668] kunit_try_run_case+0x1a5/0x480 [ 12.727692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.727714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.727738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.727762] ? __kthread_parkme+0x82/0x180 [ 12.727782] ? preempt_count_sub+0x50/0x80 [ 12.727804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.727828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.727852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.727877] kthread+0x337/0x6f0 [ 12.727896] ? trace_preempt_on+0x20/0xc0 [ 12.727919] ? __pfx_kthread+0x10/0x10 [ 12.727939] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.727961] ? calculate_sigpending+0x7b/0xa0 [ 12.727984] ? __pfx_kthread+0x10/0x10 [ 12.728006] ret_from_fork+0x116/0x1d0 [ 12.728025] ? __pfx_kthread+0x10/0x10 [ 12.728052] ret_from_fork_asm+0x1a/0x30 [ 12.728084] </TASK> [ 12.728093] [ 12.737582] Allocated by task 175: [ 12.737762] kasan_save_stack+0x45/0x70 [ 12.737966] kasan_save_track+0x18/0x40 [ 12.738155] kasan_save_alloc_info+0x3b/0x50 [ 12.738625] __kasan_krealloc+0x190/0x1f0 [ 12.738814] krealloc_noprof+0xf3/0x340 [ 12.738991] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.739197] krealloc_less_oob+0x1c/0x30 [ 12.739487] kunit_try_run_case+0x1a5/0x480 [ 12.739691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.739896] kthread+0x337/0x6f0 [ 12.740017] ret_from_fork+0x116/0x1d0 [ 12.740154] ret_from_fork_asm+0x1a/0x30 [ 12.740501] [ 12.740620] The buggy address belongs to the object at ffff888100342a00 [ 12.740620] which belongs to the cache kmalloc-256 of size 256 [ 12.741342] The buggy address is located 7 bytes to the right of [ 12.741342] allocated 201-byte region [ffff888100342a00, ffff888100342ac9) [ 12.741857] [ 12.741954] The buggy address belongs to the physical page: [ 12.742162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 12.742509] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.743023] flags: 0x200000000000040(head|node=0|zone=2) [ 12.743351] page_type: f5(slab) [ 12.743600] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.743883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.744120] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.744413] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.744761] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 12.745233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.745671] page dumped because: kasan: bad access detected [ 12.745847] [ 12.745915] Memory state around the buggy address: [ 12.746069] ffff888100342980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.746734] ffff888100342a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.747066] >ffff888100342a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.747455] ^ [ 12.747676] ffff888100342b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.747893] ffff888100342b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.748194] ================================================================== [ 12.923385] ================================================================== [ 12.924086] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 12.924540] Write of size 1 at addr ffff8881027d20ea by task kunit_try_catch/179 [ 12.924858] [ 12.924966] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.925008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.925020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.925039] Call Trace: [ 12.925054] <TASK> [ 12.925070] dump_stack_lvl+0x73/0xb0 [ 12.925098] print_report+0xd1/0x610 [ 12.925120] ? __virt_addr_valid+0x1db/0x2d0 [ 12.925143] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.925167] ? kasan_addr_to_slab+0x11/0xa0 [ 12.925188] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.925212] kasan_report+0x141/0x180 [ 12.925234] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.925568] __asan_report_store1_noabort+0x1b/0x30 [ 12.925596] krealloc_less_oob_helper+0xe90/0x11d0 [ 12.925623] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.925648] ? irqentry_exit+0x2a/0x60 [ 12.925704] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.925734] ? __pfx_krealloc_large_less_oob+0x10/0x10 [ 12.925762] krealloc_large_less_oob+0x1c/0x30 [ 12.925806] kunit_try_run_case+0x1a5/0x480 [ 12.925831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.925854] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.925878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.925902] ? __kthread_parkme+0x82/0x180 [ 12.925923] ? preempt_count_sub+0x50/0x80 [ 12.925947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.925972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.925996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.926021] kthread+0x337/0x6f0 [ 12.926040] ? trace_preempt_on+0x20/0xc0 [ 12.926063] ? __pfx_kthread+0x10/0x10 [ 12.926084] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.926107] ? calculate_sigpending+0x7b/0xa0 [ 12.926131] ? __pfx_kthread+0x10/0x10 [ 12.926152] ret_from_fork+0x116/0x1d0 [ 12.926171] ? __pfx_kthread+0x10/0x10 [ 12.926191] ret_from_fork_asm+0x1a/0x30 [ 12.926222] </TASK> [ 12.926232] [ 12.941168] The buggy address belongs to the physical page: [ 12.941715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027d0 [ 12.942480] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.943124] flags: 0x200000000000040(head|node=0|zone=2) [ 12.943681] page_type: f8(unknown) [ 12.944057] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.944628] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.944974] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.945209] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.945961] head: 0200000000000002 ffffea000409f401 00000000ffffffff 00000000ffffffff [ 12.946730] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.947580] page dumped because: kasan: bad access detected [ 12.947760] [ 12.947828] Memory state around the buggy address: [ 12.947985] ffff8881027d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.948208] ffff8881027d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.948430] >ffff8881027d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.948935] ^ [ 12.949597] ffff8881027d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.950190] ffff8881027d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.950867] ================================================================== [ 12.790258] ================================================================== [ 12.790592] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 12.790922] Write of size 1 at addr ffff888100342aeb by task kunit_try_catch/175 [ 12.791498] [ 12.791610] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.791650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.791661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.791680] Call Trace: [ 12.791692] <TASK> [ 12.791705] dump_stack_lvl+0x73/0xb0 [ 12.791732] print_report+0xd1/0x610 [ 12.791753] ? __virt_addr_valid+0x1db/0x2d0 [ 12.791774] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.791798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.791821] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.791845] kasan_report+0x141/0x180 [ 12.791866] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.791895] __asan_report_store1_noabort+0x1b/0x30 [ 12.791920] krealloc_less_oob_helper+0xd47/0x11d0 [ 12.791947] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.791971] ? finish_task_switch.isra.0+0x153/0x700 [ 12.791993] ? __switch_to+0x47/0xf50 [ 12.792017] ? __schedule+0x10cc/0x2b60 [ 12.792038] ? __pfx_read_tsc+0x10/0x10 [ 12.792071] krealloc_less_oob+0x1c/0x30 [ 12.792093] kunit_try_run_case+0x1a5/0x480 [ 12.792116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.792139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.792162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.792186] ? __kthread_parkme+0x82/0x180 [ 12.792205] ? preempt_count_sub+0x50/0x80 [ 12.792228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.792252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.792276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.792301] kthread+0x337/0x6f0 [ 12.792319] ? trace_preempt_on+0x20/0xc0 [ 12.792342] ? __pfx_kthread+0x10/0x10 [ 12.792362] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.792435] ? calculate_sigpending+0x7b/0xa0 [ 12.792459] ? __pfx_kthread+0x10/0x10 [ 12.792481] ret_from_fork+0x116/0x1d0 [ 12.792500] ? __pfx_kthread+0x10/0x10 [ 12.792520] ret_from_fork_asm+0x1a/0x30 [ 12.792549] </TASK> [ 12.792571] [ 12.800217] Allocated by task 175: [ 12.800398] kasan_save_stack+0x45/0x70 [ 12.800773] kasan_save_track+0x18/0x40 [ 12.800965] kasan_save_alloc_info+0x3b/0x50 [ 12.801167] __kasan_krealloc+0x190/0x1f0 [ 12.801307] krealloc_noprof+0xf3/0x340 [ 12.801712] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.801964] krealloc_less_oob+0x1c/0x30 [ 12.802163] kunit_try_run_case+0x1a5/0x480 [ 12.802439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.802681] kthread+0x337/0x6f0 [ 12.802831] ret_from_fork+0x116/0x1d0 [ 12.802963] ret_from_fork_asm+0x1a/0x30 [ 12.803104] [ 12.803174] The buggy address belongs to the object at ffff888100342a00 [ 12.803174] which belongs to the cache kmalloc-256 of size 256 [ 12.803805] The buggy address is located 34 bytes to the right of [ 12.803805] allocated 201-byte region [ffff888100342a00, ffff888100342ac9) [ 12.804439] [ 12.804535] The buggy address belongs to the physical page: [ 12.804727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 12.804968] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.805194] flags: 0x200000000000040(head|node=0|zone=2) [ 12.805830] page_type: f5(slab) [ 12.806010] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.806358] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.806768] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.807124] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.807439] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 12.807709] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.808021] page dumped because: kasan: bad access detected [ 12.808278] [ 12.808351] Memory state around the buggy address: [ 12.808663] ffff888100342980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.808931] ffff888100342a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.809189] >ffff888100342a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.809527] ^ [ 12.809818] ffff888100342b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.810059] ffff888100342b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.810354] ==================================================================