Date
July 1, 2025, 12:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.315894] ================================================================== [ 17.315946] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.316185] Write of size 1 at addr fff00000c663a0ea by task kunit_try_catch/162 [ 17.316540] [ 17.316590] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.317118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.317163] Hardware name: linux,dummy-virt (DT) [ 17.317261] Call trace: [ 17.317291] show_stack+0x20/0x38 (C) [ 17.317467] dump_stack_lvl+0x8c/0xd0 [ 17.317530] print_report+0x118/0x608 [ 17.317576] kasan_report+0xdc/0x128 [ 17.317629] __asan_report_store1_noabort+0x20/0x30 [ 17.317852] krealloc_less_oob_helper+0xae4/0xc50 [ 17.318263] krealloc_large_less_oob+0x20/0x38 [ 17.318417] kunit_try_run_case+0x170/0x3f0 [ 17.318481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.318535] kthread+0x328/0x630 [ 17.318916] ret_from_fork+0x10/0x20 [ 17.319275] [ 17.319421] The buggy address belongs to the physical page: [ 17.319469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106638 [ 17.319668] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.319899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.320216] page_type: f8(unknown) [ 17.320453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.320520] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.320782] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.321250] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.321380] head: 0bfffe0000000002 ffffc1ffc3198e01 00000000ffffffff 00000000ffffffff [ 17.321647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.321901] page dumped because: kasan: bad access detected [ 17.322042] [ 17.322194] Memory state around the buggy address: [ 17.322426] fff00000c6639f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.322761] fff00000c663a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.322860] >fff00000c663a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.323056] ^ [ 17.323110] fff00000c663a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.323154] fff00000c663a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.323195] ================================================================== [ 17.205477] ================================================================== [ 17.205728] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.205788] Write of size 1 at addr fff00000c46ffcc9 by task kunit_try_catch/158 [ 17.205930] [ 17.205965] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.206049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.206076] Hardware name: linux,dummy-virt (DT) [ 17.206148] Call trace: [ 17.206170] show_stack+0x20/0x38 (C) [ 17.206237] dump_stack_lvl+0x8c/0xd0 [ 17.206426] print_report+0x118/0x608 [ 17.206598] kasan_report+0xdc/0x128 [ 17.206701] __asan_report_store1_noabort+0x20/0x30 [ 17.206750] krealloc_less_oob_helper+0xa48/0xc50 [ 17.206816] krealloc_less_oob+0x20/0x38 [ 17.206920] kunit_try_run_case+0x170/0x3f0 [ 17.207059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.207113] kthread+0x328/0x630 [ 17.207155] ret_from_fork+0x10/0x20 [ 17.207202] [ 17.207276] Allocated by task 158: [ 17.207488] kasan_save_stack+0x3c/0x68 [ 17.207666] kasan_save_track+0x20/0x40 [ 17.207759] kasan_save_alloc_info+0x40/0x58 [ 17.207799] __kasan_krealloc+0x118/0x178 [ 17.208208] krealloc_noprof+0x128/0x360 [ 17.208315] krealloc_less_oob_helper+0x168/0xc50 [ 17.208431] krealloc_less_oob+0x20/0x38 [ 17.208477] kunit_try_run_case+0x170/0x3f0 [ 17.208857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.209283] kthread+0x328/0x630 [ 17.209426] ret_from_fork+0x10/0x20 [ 17.209472] [ 17.209492] The buggy address belongs to the object at fff00000c46ffc00 [ 17.209492] which belongs to the cache kmalloc-256 of size 256 [ 17.209739] The buggy address is located 0 bytes to the right of [ 17.209739] allocated 201-byte region [fff00000c46ffc00, fff00000c46ffcc9) [ 17.209897] [ 17.210031] The buggy address belongs to the physical page: [ 17.210117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046fe [ 17.210171] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.210396] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.210688] page_type: f5(slab) [ 17.210791] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.210843] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.211056] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.211261] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.211405] head: 0bfffe0000000001 ffffc1ffc311bf81 00000000ffffffff 00000000ffffffff [ 17.211519] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.211599] page dumped because: kasan: bad access detected [ 17.211630] [ 17.211678] Memory state around the buggy address: [ 17.211710] fff00000c46ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.211753] fff00000c46ffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.211825] >fff00000c46ffc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.212135] ^ [ 17.212306] fff00000c46ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.212388] fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.212433] ================================================================== [ 17.220259] ================================================================== [ 17.220307] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.220607] Write of size 1 at addr fff00000c46ffcda by task kunit_try_catch/158 [ 17.220743] [ 17.220774] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.220852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.220920] Hardware name: linux,dummy-virt (DT) [ 17.221196] Call trace: [ 17.221395] show_stack+0x20/0x38 (C) [ 17.221552] dump_stack_lvl+0x8c/0xd0 [ 17.221645] print_report+0x118/0x608 [ 17.221692] kasan_report+0xdc/0x128 [ 17.221758] __asan_report_store1_noabort+0x20/0x30 [ 17.222069] krealloc_less_oob_helper+0xa80/0xc50 [ 17.222155] krealloc_less_oob+0x20/0x38 [ 17.222312] kunit_try_run_case+0x170/0x3f0 [ 17.222489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.222544] kthread+0x328/0x630 [ 17.222640] ret_from_fork+0x10/0x20 [ 17.222750] [ 17.222798] Allocated by task 158: [ 17.222825] kasan_save_stack+0x3c/0x68 [ 17.222888] kasan_save_track+0x20/0x40 [ 17.222925] kasan_save_alloc_info+0x40/0x58 [ 17.223378] __kasan_krealloc+0x118/0x178 [ 17.223628] krealloc_noprof+0x128/0x360 [ 17.223919] krealloc_less_oob_helper+0x168/0xc50 [ 17.224020] krealloc_less_oob+0x20/0x38 [ 17.224057] kunit_try_run_case+0x170/0x3f0 [ 17.224115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.224373] kthread+0x328/0x630 [ 17.224558] ret_from_fork+0x10/0x20 [ 17.224684] [ 17.224798] The buggy address belongs to the object at fff00000c46ffc00 [ 17.224798] which belongs to the cache kmalloc-256 of size 256 [ 17.224989] The buggy address is located 17 bytes to the right of [ 17.224989] allocated 201-byte region [fff00000c46ffc00, fff00000c46ffcc9) [ 17.225294] [ 17.225429] The buggy address belongs to the physical page: [ 17.225881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046fe [ 17.226167] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.226217] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.226277] page_type: f5(slab) [ 17.226317] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.226438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.227045] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.227120] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.227169] head: 0bfffe0000000001 ffffc1ffc311bf81 00000000ffffffff 00000000ffffffff [ 17.227609] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.227869] page dumped because: kasan: bad access detected [ 17.228281] [ 17.228534] Memory state around the buggy address: [ 17.228650] fff00000c46ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.228716] fff00000c46ffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.228779] >fff00000c46ffc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.228841] ^ [ 17.229040] fff00000c46ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.229430] fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.229601] ================================================================== [ 17.312302] ================================================================== [ 17.312356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.312404] Write of size 1 at addr fff00000c663a0da by task kunit_try_catch/162 [ 17.312465] [ 17.312494] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.312573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.312599] Hardware name: linux,dummy-virt (DT) [ 17.312640] Call trace: [ 17.312662] show_stack+0x20/0x38 (C) [ 17.312709] dump_stack_lvl+0x8c/0xd0 [ 17.312755] print_report+0x118/0x608 [ 17.312808] kasan_report+0xdc/0x128 [ 17.312853] __asan_report_store1_noabort+0x20/0x30 [ 17.312900] krealloc_less_oob_helper+0xa80/0xc50 [ 17.312947] krealloc_large_less_oob+0x20/0x38 [ 17.313003] kunit_try_run_case+0x170/0x3f0 [ 17.313050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.313101] kthread+0x328/0x630 [ 17.313142] ret_from_fork+0x10/0x20 [ 17.313187] [ 17.313206] The buggy address belongs to the physical page: [ 17.313237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106638 [ 17.313300] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.313347] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.313397] page_type: f8(unknown) [ 17.313441] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.313816] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.313868] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.313916] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.314320] head: 0bfffe0000000002 ffffc1ffc3198e01 00000000ffffffff 00000000ffffffff [ 17.314387] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.314727] page dumped because: kasan: bad access detected [ 17.314778] [ 17.314796] Memory state around the buggy address: [ 17.314842] fff00000c6639f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.314888] fff00000c663a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.314930] >fff00000c663a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.315256] ^ [ 17.315467] fff00000c663a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.315536] fff00000c663a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.315576] ================================================================== [ 17.325033] ================================================================== [ 17.325531] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.325758] Write of size 1 at addr fff00000c663a0eb by task kunit_try_catch/162 [ 17.325913] [ 17.325949] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.326031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.326156] Hardware name: linux,dummy-virt (DT) [ 17.326190] Call trace: [ 17.326211] show_stack+0x20/0x38 (C) [ 17.326515] dump_stack_lvl+0x8c/0xd0 [ 17.326601] print_report+0x118/0x608 [ 17.326897] kasan_report+0xdc/0x128 [ 17.327073] __asan_report_store1_noabort+0x20/0x30 [ 17.327129] krealloc_less_oob_helper+0xa58/0xc50 [ 17.327198] krealloc_large_less_oob+0x20/0x38 [ 17.327438] kunit_try_run_case+0x170/0x3f0 [ 17.327662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.327977] kthread+0x328/0x630 [ 17.328174] ret_from_fork+0x10/0x20 [ 17.328589] [ 17.328633] The buggy address belongs to the physical page: [ 17.328668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106638 [ 17.328890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.329060] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.329212] page_type: f8(unknown) [ 17.329258] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.329311] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.329362] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.329412] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.329656] head: 0bfffe0000000002 ffffc1ffc3198e01 00000000ffffffff 00000000ffffffff [ 17.329727] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.330055] page dumped because: kasan: bad access detected [ 17.330265] [ 17.330643] Memory state around the buggy address: [ 17.330852] fff00000c6639f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.331054] fff00000c663a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.331100] >fff00000c663a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.331154] ^ [ 17.331574] fff00000c663a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.331628] fff00000c663a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.331760] ================================================================== [ 17.240574] ================================================================== [ 17.240625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.241227] Write of size 1 at addr fff00000c46ffceb by task kunit_try_catch/158 [ 17.241372] [ 17.241408] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.241500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.241561] Hardware name: linux,dummy-virt (DT) [ 17.241674] Call trace: [ 17.241696] show_stack+0x20/0x38 (C) [ 17.241911] dump_stack_lvl+0x8c/0xd0 [ 17.242021] print_report+0x118/0x608 [ 17.242075] kasan_report+0xdc/0x128 [ 17.242119] __asan_report_store1_noabort+0x20/0x30 [ 17.242591] krealloc_less_oob_helper+0xa58/0xc50 [ 17.242707] krealloc_less_oob+0x20/0x38 [ 17.242778] kunit_try_run_case+0x170/0x3f0 [ 17.242846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.243225] kthread+0x328/0x630 [ 17.243381] ret_from_fork+0x10/0x20 [ 17.243713] [ 17.243738] Allocated by task 158: [ 17.243917] kasan_save_stack+0x3c/0x68 [ 17.244181] kasan_save_track+0x20/0x40 [ 17.244401] kasan_save_alloc_info+0x40/0x58 [ 17.244507] __kasan_krealloc+0x118/0x178 [ 17.244692] krealloc_noprof+0x128/0x360 [ 17.244875] krealloc_less_oob_helper+0x168/0xc50 [ 17.244984] krealloc_less_oob+0x20/0x38 [ 17.245125] kunit_try_run_case+0x170/0x3f0 [ 17.245201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.245574] kthread+0x328/0x630 [ 17.245926] ret_from_fork+0x10/0x20 [ 17.246104] [ 17.246428] The buggy address belongs to the object at fff00000c46ffc00 [ 17.246428] which belongs to the cache kmalloc-256 of size 256 [ 17.246860] The buggy address is located 34 bytes to the right of [ 17.246860] allocated 201-byte region [fff00000c46ffc00, fff00000c46ffcc9) [ 17.247009] [ 17.247129] The buggy address belongs to the physical page: [ 17.247317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046fe [ 17.247652] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.247703] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.247784] page_type: f5(slab) [ 17.248097] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.248164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.248214] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.248666] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.249048] head: 0bfffe0000000001 ffffc1ffc311bf81 00000000ffffffff 00000000ffffffff [ 17.249119] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.249350] page dumped because: kasan: bad access detected [ 17.249524] [ 17.249753] Memory state around the buggy address: [ 17.249943] fff00000c46ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.250304] fff00000c46ffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.250601] >fff00000c46ffc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.250796] ^ [ 17.250944] fff00000c46ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.251199] fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.251518] ================================================================== [ 17.301525] ================================================================== [ 17.301589] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.302106] Write of size 1 at addr fff00000c663a0d0 by task kunit_try_catch/162 [ 17.302217] [ 17.302558] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.302814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.302851] Hardware name: linux,dummy-virt (DT) [ 17.302984] Call trace: [ 17.303183] show_stack+0x20/0x38 (C) [ 17.303235] dump_stack_lvl+0x8c/0xd0 [ 17.303765] print_report+0x118/0x608 [ 17.303867] kasan_report+0xdc/0x128 [ 17.304222] __asan_report_store1_noabort+0x20/0x30 [ 17.304306] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.304389] krealloc_large_less_oob+0x20/0x38 [ 17.304474] kunit_try_run_case+0x170/0x3f0 [ 17.304660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.305458] kthread+0x328/0x630 [ 17.305532] ret_from_fork+0x10/0x20 [ 17.305954] [ 17.305980] The buggy address belongs to the physical page: [ 17.306192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106638 [ 17.306261] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.306849] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.307263] page_type: f8(unknown) [ 17.307432] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.307580] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.307928] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.308310] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.308646] head: 0bfffe0000000002 ffffc1ffc3198e01 00000000ffffffff 00000000ffffffff [ 17.308711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.308882] page dumped because: kasan: bad access detected [ 17.309029] [ 17.309054] Memory state around the buggy address: [ 17.309419] fff00000c6639f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.309485] fff00000c663a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.309529] >fff00000c663a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.310012] ^ [ 17.310291] fff00000c663a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.310520] fff00000c663a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.310872] ================================================================== [ 17.213970] ================================================================== [ 17.214023] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.214072] Write of size 1 at addr fff00000c46ffcd0 by task kunit_try_catch/158 [ 17.214262] [ 17.214394] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.214513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.214637] Hardware name: linux,dummy-virt (DT) [ 17.214670] Call trace: [ 17.214690] show_stack+0x20/0x38 (C) [ 17.215010] dump_stack_lvl+0x8c/0xd0 [ 17.215184] print_report+0x118/0x608 [ 17.215356] kasan_report+0xdc/0x128 [ 17.215412] __asan_report_store1_noabort+0x20/0x30 [ 17.215471] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.215534] krealloc_less_oob+0x20/0x38 [ 17.215579] kunit_try_run_case+0x170/0x3f0 [ 17.215626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.215688] kthread+0x328/0x630 [ 17.215728] ret_from_fork+0x10/0x20 [ 17.215774] [ 17.215802] Allocated by task 158: [ 17.215830] kasan_save_stack+0x3c/0x68 [ 17.215877] kasan_save_track+0x20/0x40 [ 17.215914] kasan_save_alloc_info+0x40/0x58 [ 17.215959] __kasan_krealloc+0x118/0x178 [ 17.215996] krealloc_noprof+0x128/0x360 [ 17.216032] krealloc_less_oob_helper+0x168/0xc50 [ 17.216071] krealloc_less_oob+0x20/0x38 [ 17.216106] kunit_try_run_case+0x170/0x3f0 [ 17.216142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.216197] kthread+0x328/0x630 [ 17.216238] ret_from_fork+0x10/0x20 [ 17.216272] [ 17.216290] The buggy address belongs to the object at fff00000c46ffc00 [ 17.216290] which belongs to the cache kmalloc-256 of size 256 [ 17.216355] The buggy address is located 7 bytes to the right of [ 17.216355] allocated 201-byte region [fff00000c46ffc00, fff00000c46ffcc9) [ 17.216419] [ 17.216437] The buggy address belongs to the physical page: [ 17.216477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046fe [ 17.216529] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.216602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.216653] page_type: f5(slab) [ 17.216690] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.217064] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.217359] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.217497] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.217645] head: 0bfffe0000000001 ffffc1ffc311bf81 00000000ffffffff 00000000ffffffff [ 17.217828] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.217888] page dumped because: kasan: bad access detected [ 17.217929] [ 17.217946] Memory state around the buggy address: [ 17.217977] fff00000c46ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.218293] fff00000c46ffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.218369] >fff00000c46ffc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.218612] ^ [ 17.218763] fff00000c46ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.218950] fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.219213] ================================================================== [ 17.231893] ================================================================== [ 17.232158] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.232223] Write of size 1 at addr fff00000c46ffcea by task kunit_try_catch/158 [ 17.232471] [ 17.232546] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.232828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.233043] Hardware name: linux,dummy-virt (DT) [ 17.233110] Call trace: [ 17.233332] show_stack+0x20/0x38 (C) [ 17.233394] dump_stack_lvl+0x8c/0xd0 [ 17.233687] print_report+0x118/0x608 [ 17.233987] kasan_report+0xdc/0x128 [ 17.234118] __asan_report_store1_noabort+0x20/0x30 [ 17.234311] krealloc_less_oob_helper+0xae4/0xc50 [ 17.234363] krealloc_less_oob+0x20/0x38 [ 17.234743] kunit_try_run_case+0x170/0x3f0 [ 17.235161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.235285] kthread+0x328/0x630 [ 17.235337] ret_from_fork+0x10/0x20 [ 17.235384] [ 17.235402] Allocated by task 158: [ 17.235736] kasan_save_stack+0x3c/0x68 [ 17.236168] kasan_save_track+0x20/0x40 [ 17.236283] kasan_save_alloc_info+0x40/0x58 [ 17.236539] __kasan_krealloc+0x118/0x178 [ 17.236982] krealloc_noprof+0x128/0x360 [ 17.237051] krealloc_less_oob_helper+0x168/0xc50 [ 17.237091] krealloc_less_oob+0x20/0x38 [ 17.237126] kunit_try_run_case+0x170/0x3f0 [ 17.237163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.237205] kthread+0x328/0x630 [ 17.237256] ret_from_fork+0x10/0x20 [ 17.237312] [ 17.237346] The buggy address belongs to the object at fff00000c46ffc00 [ 17.237346] which belongs to the cache kmalloc-256 of size 256 [ 17.237414] The buggy address is located 33 bytes to the right of [ 17.237414] allocated 201-byte region [fff00000c46ffc00, fff00000c46ffcc9) [ 17.237495] [ 17.237516] The buggy address belongs to the physical page: [ 17.237549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046fe [ 17.237612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.237659] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.237718] page_type: f5(slab) [ 17.237772] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.237833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.237897] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.237951] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.237999] head: 0bfffe0000000001 ffffc1ffc311bf81 00000000ffffffff 00000000ffffffff [ 17.238053] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.238094] page dumped because: kasan: bad access detected [ 17.238134] [ 17.238151] Memory state around the buggy address: [ 17.238188] fff00000c46ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.238252] fff00000c46ffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.238304] >fff00000c46ffc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.238342] ^ [ 17.238389] fff00000c46ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.238440] fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.239051] ================================================================== [ 17.293793] ================================================================== [ 17.293855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.293919] Write of size 1 at addr fff00000c663a0c9 by task kunit_try_catch/162 [ 17.293995] [ 17.294038] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.294150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.294178] Hardware name: linux,dummy-virt (DT) [ 17.294220] Call trace: [ 17.294245] show_stack+0x20/0x38 (C) [ 17.294295] dump_stack_lvl+0x8c/0xd0 [ 17.294345] print_report+0x118/0x608 [ 17.294390] kasan_report+0xdc/0x128 [ 17.294438] __asan_report_store1_noabort+0x20/0x30 [ 17.294497] krealloc_less_oob_helper+0xa48/0xc50 [ 17.294545] krealloc_large_less_oob+0x20/0x38 [ 17.294600] kunit_try_run_case+0x170/0x3f0 [ 17.294650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.294701] kthread+0x328/0x630 [ 17.294743] ret_from_fork+0x10/0x20 [ 17.294800] [ 17.294822] The buggy address belongs to the physical page: [ 17.294865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106638 [ 17.294928] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.295871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.296224] page_type: f8(unknown) [ 17.296617] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.296756] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.296888] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.297260] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.297896] head: 0bfffe0000000002 ffffc1ffc3198e01 00000000ffffffff 00000000ffffffff [ 17.298003] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.298419] page dumped because: kasan: bad access detected [ 17.298794] [ 17.298812] Memory state around the buggy address: [ 17.299023] fff00000c6639f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.299105] fff00000c663a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.299172] >fff00000c663a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.299574] ^ [ 17.299723] fff00000c663a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.299770] fff00000c663a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.299829] ==================================================================
[ 11.164544] ================================================================== [ 11.165092] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.165532] Write of size 1 at addr ffff888100a334d0 by task kunit_try_catch/175 [ 11.165759] [ 11.165848] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.165890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.165901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.165921] Call Trace: [ 11.165933] <TASK> [ 11.165949] dump_stack_lvl+0x73/0xb0 [ 11.165974] print_report+0xd1/0x650 [ 11.165996] ? __virt_addr_valid+0x1db/0x2d0 [ 11.166016] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.166243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.166273] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.166297] kasan_report+0x141/0x180 [ 11.166318] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.166345] __asan_report_store1_noabort+0x1b/0x30 [ 11.166365] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.166389] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.166411] ? finish_task_switch.isra.0+0x153/0x700 [ 11.166433] ? __switch_to+0x47/0xf50 [ 11.166457] ? __schedule+0x10cc/0x2b60 [ 11.166478] ? __pfx_read_tsc+0x10/0x10 [ 11.166500] krealloc_less_oob+0x1c/0x30 [ 11.166520] kunit_try_run_case+0x1a5/0x480 [ 11.166542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.166562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.166584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.166605] ? __kthread_parkme+0x82/0x180 [ 11.166624] ? preempt_count_sub+0x50/0x80 [ 11.166645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.166667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.166687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.166709] kthread+0x337/0x6f0 [ 11.166727] ? trace_preempt_on+0x20/0xc0 [ 11.166749] ? __pfx_kthread+0x10/0x10 [ 11.166768] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.166787] ? calculate_sigpending+0x7b/0xa0 [ 11.166809] ? __pfx_kthread+0x10/0x10 [ 11.166829] ret_from_fork+0x116/0x1d0 [ 11.166846] ? __pfx_kthread+0x10/0x10 [ 11.166865] ret_from_fork_asm+0x1a/0x30 [ 11.166894] </TASK> [ 11.166904] [ 11.181612] Allocated by task 175: [ 11.181751] kasan_save_stack+0x45/0x70 [ 11.181894] kasan_save_track+0x18/0x40 [ 11.182040] kasan_save_alloc_info+0x3b/0x50 [ 11.182374] __kasan_krealloc+0x190/0x1f0 [ 11.182625] krealloc_noprof+0xf3/0x340 [ 11.182776] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.182984] krealloc_less_oob+0x1c/0x30 [ 11.183377] kunit_try_run_case+0x1a5/0x480 [ 11.183522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.183845] kthread+0x337/0x6f0 [ 11.184138] ret_from_fork+0x116/0x1d0 [ 11.184313] ret_from_fork_asm+0x1a/0x30 [ 11.184596] [ 11.184677] The buggy address belongs to the object at ffff888100a33400 [ 11.184677] which belongs to the cache kmalloc-256 of size 256 [ 11.185229] The buggy address is located 7 bytes to the right of [ 11.185229] allocated 201-byte region [ffff888100a33400, ffff888100a334c9) [ 11.185892] [ 11.185965] The buggy address belongs to the physical page: [ 11.186208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a32 [ 11.186772] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.187190] flags: 0x200000000000040(head|node=0|zone=2) [ 11.187494] page_type: f5(slab) [ 11.187628] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.187961] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.188373] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.188719] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.189177] head: 0200000000000001 ffffea0004028c81 00000000ffffffff 00000000ffffffff [ 11.189482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.189832] page dumped because: kasan: bad access detected [ 11.190238] [ 11.190343] Memory state around the buggy address: [ 11.190545] ffff888100a33380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.190832] ffff888100a33400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.191327] >ffff888100a33480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.191689] ^ [ 11.191954] ffff888100a33500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.192393] ffff888100a33580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.192689] ================================================================== [ 11.386230] ================================================================== [ 11.386537] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.386830] Write of size 1 at addr ffff88810295a0eb by task kunit_try_catch/179 [ 11.387171] [ 11.387414] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.387460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.387471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.387491] Call Trace: [ 11.387505] <TASK> [ 11.387519] dump_stack_lvl+0x73/0xb0 [ 11.387546] print_report+0xd1/0x650 [ 11.387568] ? __virt_addr_valid+0x1db/0x2d0 [ 11.387589] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.387613] ? kasan_addr_to_slab+0x11/0xa0 [ 11.387648] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.387672] kasan_report+0x141/0x180 [ 11.387694] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.387734] __asan_report_store1_noabort+0x1b/0x30 [ 11.387754] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.387778] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.387801] ? finish_task_switch.isra.0+0x153/0x700 [ 11.387823] ? __switch_to+0x47/0xf50 [ 11.387846] ? __schedule+0x10cc/0x2b60 [ 11.387867] ? __pfx_read_tsc+0x10/0x10 [ 11.387890] krealloc_large_less_oob+0x1c/0x30 [ 11.387912] kunit_try_run_case+0x1a5/0x480 [ 11.387934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.387955] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.387977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.387998] ? __kthread_parkme+0x82/0x180 [ 11.388018] ? preempt_count_sub+0x50/0x80 [ 11.388050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.388072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.388094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.388124] kthread+0x337/0x6f0 [ 11.388143] ? trace_preempt_on+0x20/0xc0 [ 11.388164] ? __pfx_kthread+0x10/0x10 [ 11.388195] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.388216] ? calculate_sigpending+0x7b/0xa0 [ 11.388239] ? __pfx_kthread+0x10/0x10 [ 11.388260] ret_from_fork+0x116/0x1d0 [ 11.388277] ? __pfx_kthread+0x10/0x10 [ 11.388297] ret_from_fork_asm+0x1a/0x30 [ 11.388326] </TASK> [ 11.388337] [ 11.397309] The buggy address belongs to the physical page: [ 11.397595] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102958 [ 11.397972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.398496] flags: 0x200000000000040(head|node=0|zone=2) [ 11.398715] page_type: f8(unknown) [ 11.398943] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.399253] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.399678] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.399979] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.400389] head: 0200000000000002 ffffea00040a5601 00000000ffffffff 00000000ffffffff [ 11.400915] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.401439] page dumped because: kasan: bad access detected [ 11.401682] [ 11.401825] Memory state around the buggy address: [ 11.402136] ffff888102959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.402562] ffff88810295a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.402875] >ffff88810295a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.403288] ^ [ 11.403632] ffff88810295a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.403885] ffff88810295a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.404229] ================================================================== [ 11.331516] ================================================================== [ 11.331836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.332478] Write of size 1 at addr ffff88810295a0d0 by task kunit_try_catch/179 [ 11.332749] [ 11.332836] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.332876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.332897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.332916] Call Trace: [ 11.332927] <TASK> [ 11.332941] dump_stack_lvl+0x73/0xb0 [ 11.332979] print_report+0xd1/0x650 [ 11.333000] ? __virt_addr_valid+0x1db/0x2d0 [ 11.333021] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.333054] ? kasan_addr_to_slab+0x11/0xa0 [ 11.333074] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.333098] kasan_report+0x141/0x180 [ 11.333119] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.333291] __asan_report_store1_noabort+0x1b/0x30 [ 11.333317] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.333342] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.333377] ? finish_task_switch.isra.0+0x153/0x700 [ 11.333398] ? __switch_to+0x47/0xf50 [ 11.333422] ? __schedule+0x10cc/0x2b60 [ 11.333529] ? __pfx_read_tsc+0x10/0x10 [ 11.333553] krealloc_large_less_oob+0x1c/0x30 [ 11.333575] kunit_try_run_case+0x1a5/0x480 [ 11.333597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.333618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.333640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.333662] ? __kthread_parkme+0x82/0x180 [ 11.333681] ? preempt_count_sub+0x50/0x80 [ 11.333702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.333725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.333746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.333768] kthread+0x337/0x6f0 [ 11.333900] ? trace_preempt_on+0x20/0xc0 [ 11.333925] ? __pfx_kthread+0x10/0x10 [ 11.333945] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.333965] ? calculate_sigpending+0x7b/0xa0 [ 11.333996] ? __pfx_kthread+0x10/0x10 [ 11.334017] ret_from_fork+0x116/0x1d0 [ 11.334054] ? __pfx_kthread+0x10/0x10 [ 11.334074] ret_from_fork_asm+0x1a/0x30 [ 11.334254] </TASK> [ 11.334268] [ 11.342647] The buggy address belongs to the physical page: [ 11.342925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102958 [ 11.343299] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.343554] flags: 0x200000000000040(head|node=0|zone=2) [ 11.344110] page_type: f8(unknown) [ 11.344378] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.344708] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.345039] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.345460] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.345794] head: 0200000000000002 ffffea00040a5601 00000000ffffffff 00000000ffffffff [ 11.346128] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.346674] page dumped because: kasan: bad access detected [ 11.346936] [ 11.347111] Memory state around the buggy address: [ 11.347367] ffff888102959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.347693] ffff88810295a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.347977] >ffff88810295a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.348419] ^ [ 11.348605] ffff88810295a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.348974] ffff88810295a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.349419] ================================================================== [ 11.242913] ================================================================== [ 11.243395] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.243664] Write of size 1 at addr ffff888100a334eb by task kunit_try_catch/175 [ 11.243987] [ 11.244094] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.244146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.244157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.244313] Call Trace: [ 11.244333] <TASK> [ 11.244347] dump_stack_lvl+0x73/0xb0 [ 11.244375] print_report+0xd1/0x650 [ 11.244411] ? __virt_addr_valid+0x1db/0x2d0 [ 11.244431] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.244454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.244475] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.244500] kasan_report+0x141/0x180 [ 11.244524] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.244552] __asan_report_store1_noabort+0x1b/0x30 [ 11.244572] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.244606] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.244629] ? finish_task_switch.isra.0+0x153/0x700 [ 11.244650] ? __switch_to+0x47/0xf50 [ 11.244685] ? __schedule+0x10cc/0x2b60 [ 11.244706] ? __pfx_read_tsc+0x10/0x10 [ 11.244730] krealloc_less_oob+0x1c/0x30 [ 11.244757] kunit_try_run_case+0x1a5/0x480 [ 11.244779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.244800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.244821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.244842] ? __kthread_parkme+0x82/0x180 [ 11.244861] ? preempt_count_sub+0x50/0x80 [ 11.244882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.244905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.244926] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.244947] kthread+0x337/0x6f0 [ 11.244965] ? trace_preempt_on+0x20/0xc0 [ 11.244986] ? __pfx_kthread+0x10/0x10 [ 11.245007] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.245041] ? calculate_sigpending+0x7b/0xa0 [ 11.245066] ? __pfx_kthread+0x10/0x10 [ 11.245144] ret_from_fork+0x116/0x1d0 [ 11.245164] ? __pfx_kthread+0x10/0x10 [ 11.245184] ret_from_fork_asm+0x1a/0x30 [ 11.245224] </TASK> [ 11.245234] [ 11.253253] Allocated by task 175: [ 11.253460] kasan_save_stack+0x45/0x70 [ 11.253661] kasan_save_track+0x18/0x40 [ 11.253849] kasan_save_alloc_info+0x3b/0x50 [ 11.254178] __kasan_krealloc+0x190/0x1f0 [ 11.254351] krealloc_noprof+0xf3/0x340 [ 11.254542] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.254765] krealloc_less_oob+0x1c/0x30 [ 11.254972] kunit_try_run_case+0x1a5/0x480 [ 11.255209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.255554] kthread+0x337/0x6f0 [ 11.255716] ret_from_fork+0x116/0x1d0 [ 11.255849] ret_from_fork_asm+0x1a/0x30 [ 11.255986] [ 11.256324] The buggy address belongs to the object at ffff888100a33400 [ 11.256324] which belongs to the cache kmalloc-256 of size 256 [ 11.256893] The buggy address is located 34 bytes to the right of [ 11.256893] allocated 201-byte region [ffff888100a33400, ffff888100a334c9) [ 11.257724] [ 11.257815] The buggy address belongs to the physical page: [ 11.257986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a32 [ 11.258482] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.258799] flags: 0x200000000000040(head|node=0|zone=2) [ 11.259163] page_type: f5(slab) [ 11.259287] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.259517] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.259860] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.260497] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.260878] head: 0200000000000001 ffffea0004028c81 00000000ffffffff 00000000ffffffff [ 11.261261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.261571] page dumped because: kasan: bad access detected [ 11.261818] [ 11.261916] Memory state around the buggy address: [ 11.262089] ffff888100a33380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.262556] ffff888100a33400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.262898] >ffff888100a33480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.263320] ^ [ 11.263620] ffff888100a33500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.263922] ffff888100a33580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.264410] ================================================================== [ 11.349697] ================================================================== [ 11.350080] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.350559] Write of size 1 at addr ffff88810295a0da by task kunit_try_catch/179 [ 11.350871] [ 11.350985] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.351046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.351102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.351121] Call Trace: [ 11.351134] <TASK> [ 11.351156] dump_stack_lvl+0x73/0xb0 [ 11.351184] print_report+0xd1/0x650 [ 11.351205] ? __virt_addr_valid+0x1db/0x2d0 [ 11.351239] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.351261] ? kasan_addr_to_slab+0x11/0xa0 [ 11.351281] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.351315] kasan_report+0x141/0x180 [ 11.351336] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.351364] __asan_report_store1_noabort+0x1b/0x30 [ 11.351384] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.351410] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.351433] ? finish_task_switch.isra.0+0x153/0x700 [ 11.351454] ? __switch_to+0x47/0xf50 [ 11.351478] ? __schedule+0x10cc/0x2b60 [ 11.351499] ? __pfx_read_tsc+0x10/0x10 [ 11.351521] krealloc_large_less_oob+0x1c/0x30 [ 11.351544] kunit_try_run_case+0x1a5/0x480 [ 11.351566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.351587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.351609] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.351631] ? __kthread_parkme+0x82/0x180 [ 11.351659] ? preempt_count_sub+0x50/0x80 [ 11.351680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.351703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.351735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.351757] kthread+0x337/0x6f0 [ 11.351776] ? trace_preempt_on+0x20/0xc0 [ 11.351798] ? __pfx_kthread+0x10/0x10 [ 11.351818] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.351838] ? calculate_sigpending+0x7b/0xa0 [ 11.351861] ? __pfx_kthread+0x10/0x10 [ 11.351881] ret_from_fork+0x116/0x1d0 [ 11.351899] ? __pfx_kthread+0x10/0x10 [ 11.351918] ret_from_fork_asm+0x1a/0x30 [ 11.351948] </TASK> [ 11.351958] [ 11.360268] The buggy address belongs to the physical page: [ 11.360554] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102958 [ 11.360910] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.361261] flags: 0x200000000000040(head|node=0|zone=2) [ 11.361435] page_type: f8(unknown) [ 11.361852] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.362530] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.363099] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.363365] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.363880] head: 0200000000000002 ffffea00040a5601 00000000ffffffff 00000000ffffffff [ 11.364293] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.364749] page dumped because: kasan: bad access detected [ 11.365084] [ 11.365155] Memory state around the buggy address: [ 11.365352] ffff888102959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.365700] ffff88810295a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.366236] >ffff88810295a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.366560] ^ [ 11.366794] ffff88810295a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.367255] ffff88810295a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.367590] ================================================================== [ 11.124730] ================================================================== [ 11.126074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.127169] Write of size 1 at addr ffff888100a334c9 by task kunit_try_catch/175 [ 11.127404] [ 11.127494] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.127537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.127549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.127568] Call Trace: [ 11.127580] <TASK> [ 11.127594] dump_stack_lvl+0x73/0xb0 [ 11.127623] print_report+0xd1/0x650 [ 11.127644] ? __virt_addr_valid+0x1db/0x2d0 [ 11.127666] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.127688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.127709] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.127731] kasan_report+0x141/0x180 [ 11.127752] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.127779] __asan_report_store1_noabort+0x1b/0x30 [ 11.127798] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.127822] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.127844] ? finish_task_switch.isra.0+0x153/0x700 [ 11.127864] ? __switch_to+0x47/0xf50 [ 11.127889] ? __schedule+0x10cc/0x2b60 [ 11.127909] ? __pfx_read_tsc+0x10/0x10 [ 11.127931] krealloc_less_oob+0x1c/0x30 [ 11.127951] kunit_try_run_case+0x1a5/0x480 [ 11.127975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.127996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.128017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.128056] ? __kthread_parkme+0x82/0x180 [ 11.128337] ? preempt_count_sub+0x50/0x80 [ 11.128368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.128393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.128415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.128436] kthread+0x337/0x6f0 [ 11.128454] ? trace_preempt_on+0x20/0xc0 [ 11.128476] ? __pfx_kthread+0x10/0x10 [ 11.128496] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.128516] ? calculate_sigpending+0x7b/0xa0 [ 11.128538] ? __pfx_kthread+0x10/0x10 [ 11.128558] ret_from_fork+0x116/0x1d0 [ 11.128575] ? __pfx_kthread+0x10/0x10 [ 11.128595] ret_from_fork_asm+0x1a/0x30 [ 11.128625] </TASK> [ 11.128636] [ 11.144886] Allocated by task 175: [ 11.145341] kasan_save_stack+0x45/0x70 [ 11.145722] kasan_save_track+0x18/0x40 [ 11.146175] kasan_save_alloc_info+0x3b/0x50 [ 11.146650] __kasan_krealloc+0x190/0x1f0 [ 11.147022] krealloc_noprof+0xf3/0x340 [ 11.147456] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.147825] krealloc_less_oob+0x1c/0x30 [ 11.147965] kunit_try_run_case+0x1a5/0x480 [ 11.148320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.148813] kthread+0x337/0x6f0 [ 11.149143] ret_from_fork+0x116/0x1d0 [ 11.149646] ret_from_fork_asm+0x1a/0x30 [ 11.149791] [ 11.149863] The buggy address belongs to the object at ffff888100a33400 [ 11.149863] which belongs to the cache kmalloc-256 of size 256 [ 11.150754] The buggy address is located 0 bytes to the right of [ 11.150754] allocated 201-byte region [ffff888100a33400, ffff888100a334c9) [ 11.152087] [ 11.152360] The buggy address belongs to the physical page: [ 11.152683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a32 [ 11.152927] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.153718] flags: 0x200000000000040(head|node=0|zone=2) [ 11.154239] page_type: f5(slab) [ 11.154829] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.155753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.156703] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.157163] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.157706] head: 0200000000000001 ffffea0004028c81 00000000ffffffff 00000000ffffffff [ 11.157941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.158472] page dumped because: kasan: bad access detected [ 11.159105] [ 11.159388] Memory state around the buggy address: [ 11.159823] ffff888100a33380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.160580] ffff888100a33400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.161369] >ffff888100a33480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.161783] ^ [ 11.161959] ffff888100a33500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.162749] ffff888100a33580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.163545] ================================================================== [ 11.368069] ================================================================== [ 11.368474] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.368815] Write of size 1 at addr ffff88810295a0ea by task kunit_try_catch/179 [ 11.369252] [ 11.369463] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.369524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.369536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.369555] Call Trace: [ 11.369569] <TASK> [ 11.369601] dump_stack_lvl+0x73/0xb0 [ 11.369629] print_report+0xd1/0x650 [ 11.369652] ? __virt_addr_valid+0x1db/0x2d0 [ 11.369685] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.369708] ? kasan_addr_to_slab+0x11/0xa0 [ 11.369728] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.369756] kasan_report+0x141/0x180 [ 11.369777] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.369817] __asan_report_store1_noabort+0x1b/0x30 [ 11.369837] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.369862] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.369901] ? finish_task_switch.isra.0+0x153/0x700 [ 11.369922] ? __switch_to+0x47/0xf50 [ 11.369964] ? __schedule+0x10cc/0x2b60 [ 11.369985] ? __pfx_read_tsc+0x10/0x10 [ 11.370008] krealloc_large_less_oob+0x1c/0x30 [ 11.370177] kunit_try_run_case+0x1a5/0x480 [ 11.370205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.370226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.370478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.370515] ? __kthread_parkme+0x82/0x180 [ 11.370534] ? preempt_count_sub+0x50/0x80 [ 11.370556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.370591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.370613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.370635] kthread+0x337/0x6f0 [ 11.370654] ? trace_preempt_on+0x20/0xc0 [ 11.370676] ? __pfx_kthread+0x10/0x10 [ 11.370695] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.370716] ? calculate_sigpending+0x7b/0xa0 [ 11.370739] ? __pfx_kthread+0x10/0x10 [ 11.370759] ret_from_fork+0x116/0x1d0 [ 11.370777] ? __pfx_kthread+0x10/0x10 [ 11.370796] ret_from_fork_asm+0x1a/0x30 [ 11.370835] </TASK> [ 11.370846] [ 11.379323] The buggy address belongs to the physical page: [ 11.379568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102958 [ 11.379915] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.380356] flags: 0x200000000000040(head|node=0|zone=2) [ 11.380630] page_type: f8(unknown) [ 11.380810] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.381237] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.381474] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.381779] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.382154] head: 0200000000000002 ffffea00040a5601 00000000ffffffff 00000000ffffffff [ 11.382563] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.382831] page dumped because: kasan: bad access detected [ 11.383217] [ 11.383478] Memory state around the buggy address: [ 11.383696] ffff888102959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.383948] ffff88810295a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.384476] >ffff88810295a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.384748] ^ [ 11.385016] ffff88810295a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.385453] ffff88810295a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.385752] ================================================================== [ 11.193211] ================================================================== [ 11.193633] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.193957] Write of size 1 at addr ffff888100a334da by task kunit_try_catch/175 [ 11.194229] [ 11.194349] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.194398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.194408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.194427] Call Trace: [ 11.194441] <TASK> [ 11.194455] dump_stack_lvl+0x73/0xb0 [ 11.194579] print_report+0xd1/0x650 [ 11.194604] ? __virt_addr_valid+0x1db/0x2d0 [ 11.194625] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.194647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.194677] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.194700] kasan_report+0x141/0x180 [ 11.194720] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.194757] __asan_report_store1_noabort+0x1b/0x30 [ 11.194778] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.194803] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.194835] ? finish_task_switch.isra.0+0x153/0x700 [ 11.194856] ? __switch_to+0x47/0xf50 [ 11.194881] ? __schedule+0x10cc/0x2b60 [ 11.194911] ? __pfx_read_tsc+0x10/0x10 [ 11.194934] krealloc_less_oob+0x1c/0x30 [ 11.194954] kunit_try_run_case+0x1a5/0x480 [ 11.194978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.194998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.195019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.195054] ? __kthread_parkme+0x82/0x180 [ 11.195072] ? preempt_count_sub+0x50/0x80 [ 11.195093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.195115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.195145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.195167] kthread+0x337/0x6f0 [ 11.195184] ? trace_preempt_on+0x20/0xc0 [ 11.195206] ? __pfx_kthread+0x10/0x10 [ 11.195236] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.195255] ? calculate_sigpending+0x7b/0xa0 [ 11.195277] ? __pfx_kthread+0x10/0x10 [ 11.195297] ret_from_fork+0x116/0x1d0 [ 11.195314] ? __pfx_kthread+0x10/0x10 [ 11.195333] ret_from_fork_asm+0x1a/0x30 [ 11.195361] </TASK> [ 11.195371] [ 11.203926] Allocated by task 175: [ 11.204119] kasan_save_stack+0x45/0x70 [ 11.204319] kasan_save_track+0x18/0x40 [ 11.204510] kasan_save_alloc_info+0x3b/0x50 [ 11.204664] __kasan_krealloc+0x190/0x1f0 [ 11.204992] krealloc_noprof+0xf3/0x340 [ 11.205373] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.205540] krealloc_less_oob+0x1c/0x30 [ 11.205678] kunit_try_run_case+0x1a5/0x480 [ 11.205914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.206335] kthread+0x337/0x6f0 [ 11.206491] ret_from_fork+0x116/0x1d0 [ 11.206743] ret_from_fork_asm+0x1a/0x30 [ 11.206941] [ 11.207015] The buggy address belongs to the object at ffff888100a33400 [ 11.207015] which belongs to the cache kmalloc-256 of size 256 [ 11.207380] The buggy address is located 17 bytes to the right of [ 11.207380] allocated 201-byte region [ffff888100a33400, ffff888100a334c9) [ 11.208233] [ 11.208481] The buggy address belongs to the physical page: [ 11.208843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a32 [ 11.209381] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.209611] flags: 0x200000000000040(head|node=0|zone=2) [ 11.209783] page_type: f5(slab) [ 11.209928] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.210502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.210885] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.211296] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.211630] head: 0200000000000001 ffffea0004028c81 00000000ffffffff 00000000ffffffff [ 11.211997] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.212555] page dumped because: kasan: bad access detected [ 11.212801] [ 11.212911] Memory state around the buggy address: [ 11.213244] ffff888100a33380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.213563] ffff888100a33400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.213781] >ffff888100a33480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.214126] ^ [ 11.214407] ffff888100a33500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.214801] ffff888100a33580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.215222] ================================================================== [ 11.313539] ================================================================== [ 11.314006] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.314403] Write of size 1 at addr ffff88810295a0c9 by task kunit_try_catch/179 [ 11.314737] [ 11.314852] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.314895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.314918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.314938] Call Trace: [ 11.314950] <TASK> [ 11.314964] dump_stack_lvl+0x73/0xb0 [ 11.314992] print_report+0xd1/0x650 [ 11.315013] ? __virt_addr_valid+0x1db/0x2d0 [ 11.315052] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.315134] ? kasan_addr_to_slab+0x11/0xa0 [ 11.315155] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.315191] kasan_report+0x141/0x180 [ 11.315212] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.315249] __asan_report_store1_noabort+0x1b/0x30 [ 11.315269] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.315293] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.315327] ? finish_task_switch.isra.0+0x153/0x700 [ 11.315348] ? __switch_to+0x47/0xf50 [ 11.315372] ? __schedule+0x10cc/0x2b60 [ 11.315395] ? __pfx_read_tsc+0x10/0x10 [ 11.315418] krealloc_large_less_oob+0x1c/0x30 [ 11.315440] kunit_try_run_case+0x1a5/0x480 [ 11.315464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.315484] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.315507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.315528] ? __kthread_parkme+0x82/0x180 [ 11.315547] ? preempt_count_sub+0x50/0x80 [ 11.315578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.315600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.315622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.315655] kthread+0x337/0x6f0 [ 11.315674] ? trace_preempt_on+0x20/0xc0 [ 11.315696] ? __pfx_kthread+0x10/0x10 [ 11.315716] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.315736] ? calculate_sigpending+0x7b/0xa0 [ 11.315759] ? __pfx_kthread+0x10/0x10 [ 11.315788] ret_from_fork+0x116/0x1d0 [ 11.315805] ? __pfx_kthread+0x10/0x10 [ 11.315825] ret_from_fork_asm+0x1a/0x30 [ 11.315865] </TASK> [ 11.315876] [ 11.323858] The buggy address belongs to the physical page: [ 11.324349] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102958 [ 11.324600] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.324950] flags: 0x200000000000040(head|node=0|zone=2) [ 11.325437] page_type: f8(unknown) [ 11.325621] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.325963] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.326405] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.326745] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.327135] head: 0200000000000002 ffffea00040a5601 00000000ffffffff 00000000ffffffff [ 11.327500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.327727] page dumped because: kasan: bad access detected [ 11.327988] [ 11.328247] Memory state around the buggy address: [ 11.328512] ffff888102959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.328733] ffff88810295a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.329290] >ffff88810295a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.329646] ^ [ 11.329924] ffff88810295a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.330385] ffff88810295a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.330650] ================================================================== [ 11.215723] ================================================================== [ 11.216011] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.216585] Write of size 1 at addr ffff888100a334ea by task kunit_try_catch/175 [ 11.216921] [ 11.217020] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.217070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.217081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.217099] Call Trace: [ 11.217114] <TASK> [ 11.217138] dump_stack_lvl+0x73/0xb0 [ 11.217166] print_report+0xd1/0x650 [ 11.217188] ? __virt_addr_valid+0x1db/0x2d0 [ 11.217220] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.217243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.217263] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.217285] kasan_report+0x141/0x180 [ 11.217306] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.217406] __asan_report_store1_noabort+0x1b/0x30 [ 11.217428] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.217453] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.217475] ? finish_task_switch.isra.0+0x153/0x700 [ 11.217496] ? __switch_to+0x47/0xf50 [ 11.217520] ? __schedule+0x10cc/0x2b60 [ 11.217540] ? __pfx_read_tsc+0x10/0x10 [ 11.217562] krealloc_less_oob+0x1c/0x30 [ 11.217582] kunit_try_run_case+0x1a5/0x480 [ 11.217605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.217625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.217647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.217668] ? __kthread_parkme+0x82/0x180 [ 11.217687] ? preempt_count_sub+0x50/0x80 [ 11.217708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.217730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.217751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.217772] kthread+0x337/0x6f0 [ 11.217790] ? trace_preempt_on+0x20/0xc0 [ 11.217811] ? __pfx_kthread+0x10/0x10 [ 11.217839] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.217859] ? calculate_sigpending+0x7b/0xa0 [ 11.217881] ? __pfx_kthread+0x10/0x10 [ 11.217912] ret_from_fork+0x116/0x1d0 [ 11.217929] ? __pfx_kthread+0x10/0x10 [ 11.217948] ret_from_fork_asm+0x1a/0x30 [ 11.217976] </TASK> [ 11.217986] [ 11.231162] Allocated by task 175: [ 11.231423] kasan_save_stack+0x45/0x70 [ 11.231748] kasan_save_track+0x18/0x40 [ 11.231954] kasan_save_alloc_info+0x3b/0x50 [ 11.232257] __kasan_krealloc+0x190/0x1f0 [ 11.232493] krealloc_noprof+0xf3/0x340 [ 11.232852] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.233021] krealloc_less_oob+0x1c/0x30 [ 11.233174] kunit_try_run_case+0x1a5/0x480 [ 11.233564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.233840] kthread+0x337/0x6f0 [ 11.234009] ret_from_fork+0x116/0x1d0 [ 11.234392] ret_from_fork_asm+0x1a/0x30 [ 11.234557] [ 11.234630] The buggy address belongs to the object at ffff888100a33400 [ 11.234630] which belongs to the cache kmalloc-256 of size 256 [ 11.235164] The buggy address is located 33 bytes to the right of [ 11.235164] allocated 201-byte region [ffff888100a33400, ffff888100a334c9) [ 11.235745] [ 11.235847] The buggy address belongs to the physical page: [ 11.236038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a32 [ 11.236296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.236861] flags: 0x200000000000040(head|node=0|zone=2) [ 11.237293] page_type: f5(slab) [ 11.237425] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.237667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.238007] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.238575] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.238923] head: 0200000000000001 ffffea0004028c81 00000000ffffffff 00000000ffffffff [ 11.239380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.239724] page dumped because: kasan: bad access detected [ 11.239962] [ 11.240239] Memory state around the buggy address: [ 11.240460] ffff888100a33380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.240763] ffff888100a33400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.241043] >ffff888100a33480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.241426] ^ [ 11.241709] ffff888100a33500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.242001] ffff888100a33580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.242470] ==================================================================