Date
July 1, 2025, 3:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.919255] ================================================================== [ 16.919448] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.919499] Write of size 1 at addr fff00000c69320eb by task kunit_try_catch/163 [ 16.919656] [ 16.919685] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.919763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.919790] Hardware name: linux,dummy-virt (DT) [ 16.919819] Call trace: [ 16.919839] show_stack+0x20/0x38 (C) [ 16.919894] dump_stack_lvl+0x8c/0xd0 [ 16.919940] print_report+0x118/0x608 [ 16.920207] kasan_report+0xdc/0x128 [ 16.920530] __asan_report_store1_noabort+0x20/0x30 [ 16.920590] krealloc_less_oob_helper+0xa58/0xc50 [ 16.920638] krealloc_large_less_oob+0x20/0x38 [ 16.920684] kunit_try_run_case+0x170/0x3f0 [ 16.920730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.920782] kthread+0x328/0x630 [ 16.920822] ret_from_fork+0x10/0x20 [ 16.920868] [ 16.920888] The buggy address belongs to the physical page: [ 16.920928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106930 [ 16.920980] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.921372] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.921486] page_type: f8(unknown) [ 16.921523] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.921597] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.921740] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.921953] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.922166] head: 0bfffe0000000002 ffffc1ffc31a4c01 00000000ffffffff 00000000ffffffff [ 16.922298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.922390] page dumped because: kasan: bad access detected [ 16.922509] [ 16.922527] Memory state around the buggy address: [ 16.922557] fff00000c6931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.922670] fff00000c6932000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.922855] >fff00000c6932080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.922909] ^ [ 16.922947] fff00000c6932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.923023] fff00000c6932180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.923187] ================================================================== [ 16.831983] ================================================================== [ 16.832053] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.832334] Write of size 1 at addr fff00000c0b9bec9 by task kunit_try_catch/159 [ 16.832448] [ 16.832558] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.832650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.832676] Hardware name: linux,dummy-virt (DT) [ 16.833080] Call trace: [ 16.833127] show_stack+0x20/0x38 (C) [ 16.833178] dump_stack_lvl+0x8c/0xd0 [ 16.833227] print_report+0x118/0x608 [ 16.833278] kasan_report+0xdc/0x128 [ 16.833925] __asan_report_store1_noabort+0x20/0x30 [ 16.834012] krealloc_less_oob_helper+0xa48/0xc50 [ 16.834449] krealloc_less_oob+0x20/0x38 [ 16.834637] kunit_try_run_case+0x170/0x3f0 [ 16.834713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.834781] kthread+0x328/0x630 [ 16.834929] ret_from_fork+0x10/0x20 [ 16.835036] [ 16.835056] Allocated by task 159: [ 16.835084] kasan_save_stack+0x3c/0x68 [ 16.835125] kasan_save_track+0x20/0x40 [ 16.835161] kasan_save_alloc_info+0x40/0x58 [ 16.835199] __kasan_krealloc+0x118/0x178 [ 16.835241] krealloc_noprof+0x128/0x360 [ 16.835368] krealloc_less_oob_helper+0x168/0xc50 [ 16.835428] krealloc_less_oob+0x20/0x38 [ 16.835900] kunit_try_run_case+0x170/0x3f0 [ 16.835950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.835993] kthread+0x328/0x630 [ 16.836023] ret_from_fork+0x10/0x20 [ 16.836057] [ 16.836549] The buggy address belongs to the object at fff00000c0b9be00 [ 16.836549] which belongs to the cache kmalloc-256 of size 256 [ 16.836623] The buggy address is located 0 bytes to the right of [ 16.836623] allocated 201-byte region [fff00000c0b9be00, fff00000c0b9bec9) [ 16.836687] [ 16.836717] The buggy address belongs to the physical page: [ 16.836749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a [ 16.837126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.837270] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.837349] page_type: f5(slab) [ 16.837655] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.837762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.837817] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.837866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.837918] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff [ 16.838078] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.838122] page dumped because: kasan: bad access detected [ 16.838307] [ 16.838360] Memory state around the buggy address: [ 16.838406] fff00000c0b9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.838457] fff00000c0b9be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.838521] >fff00000c0b9be80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.838559] ^ [ 16.838815] fff00000c0b9bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.838883] fff00000c0b9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.838922] ================================================================== [ 16.909941] ================================================================== [ 16.909990] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.910063] Write of size 1 at addr fff00000c69320da by task kunit_try_catch/163 [ 16.910112] [ 16.910339] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.910434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.910500] Hardware name: linux,dummy-virt (DT) [ 16.910547] Call trace: [ 16.910579] show_stack+0x20/0x38 (C) [ 16.910629] dump_stack_lvl+0x8c/0xd0 [ 16.910676] print_report+0x118/0x608 [ 16.910721] kasan_report+0xdc/0x128 [ 16.911097] __asan_report_store1_noabort+0x20/0x30 [ 16.911146] krealloc_less_oob_helper+0xa80/0xc50 [ 16.911194] krealloc_large_less_oob+0x20/0x38 [ 16.911240] kunit_try_run_case+0x170/0x3f0 [ 16.911286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.911344] kthread+0x328/0x630 [ 16.911403] ret_from_fork+0x10/0x20 [ 16.911648] [ 16.911674] The buggy address belongs to the physical page: [ 16.911705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106930 [ 16.911759] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.911805] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.911856] page_type: f8(unknown) [ 16.911893] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.911948] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.912030] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.912077] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.912126] head: 0bfffe0000000002 ffffc1ffc31a4c01 00000000ffffffff 00000000ffffffff [ 16.912174] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.912214] page dumped because: kasan: bad access detected [ 16.912245] [ 16.912269] Memory state around the buggy address: [ 16.912407] fff00000c6931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.912481] fff00000c6932000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.912910] >fff00000c6932080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.913211] ^ [ 16.913643] fff00000c6932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.913738] fff00000c6932180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.913776] ================================================================== [ 16.863006] ================================================================== [ 16.863057] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.863106] Write of size 1 at addr fff00000c0b9beeb by task kunit_try_catch/159 [ 16.863155] [ 16.863195] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.863593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.863620] Hardware name: linux,dummy-virt (DT) [ 16.863650] Call trace: [ 16.863670] show_stack+0x20/0x38 (C) [ 16.863723] dump_stack_lvl+0x8c/0xd0 [ 16.863929] print_report+0x118/0x608 [ 16.864096] kasan_report+0xdc/0x128 [ 16.864162] __asan_report_store1_noabort+0x20/0x30 [ 16.864262] krealloc_less_oob_helper+0xa58/0xc50 [ 16.864347] krealloc_less_oob+0x20/0x38 [ 16.864391] kunit_try_run_case+0x170/0x3f0 [ 16.864437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.864489] kthread+0x328/0x630 [ 16.864529] ret_from_fork+0x10/0x20 [ 16.864586] [ 16.864604] Allocated by task 159: [ 16.864630] kasan_save_stack+0x3c/0x68 [ 16.864670] kasan_save_track+0x20/0x40 [ 16.864749] kasan_save_alloc_info+0x40/0x58 [ 16.864994] __kasan_krealloc+0x118/0x178 [ 16.865077] krealloc_noprof+0x128/0x360 [ 16.865240] krealloc_less_oob_helper+0x168/0xc50 [ 16.865433] krealloc_less_oob+0x20/0x38 [ 16.865469] kunit_try_run_case+0x170/0x3f0 [ 16.865505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.865547] kthread+0x328/0x630 [ 16.865587] ret_from_fork+0x10/0x20 [ 16.865621] [ 16.865639] The buggy address belongs to the object at fff00000c0b9be00 [ 16.865639] which belongs to the cache kmalloc-256 of size 256 [ 16.865698] The buggy address is located 34 bytes to the right of [ 16.865698] allocated 201-byte region [fff00000c0b9be00, fff00000c0b9bec9) [ 16.866309] [ 16.866328] The buggy address belongs to the physical page: [ 16.866359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a [ 16.866636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.866686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.866736] page_type: f5(slab) [ 16.866875] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.867034] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.867084] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.867133] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.867183] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff [ 16.867240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.867279] page dumped because: kasan: bad access detected [ 16.867586] [ 16.867607] Memory state around the buggy address: [ 16.867878] fff00000c0b9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.868090] fff00000c0b9be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.868145] >fff00000c0b9be80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.868316] ^ [ 16.868356] fff00000c0b9bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.868647] fff00000c0b9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.868736] ================================================================== [ 16.856764] ================================================================== [ 16.856865] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.856914] Write of size 1 at addr fff00000c0b9beea by task kunit_try_catch/159 [ 16.856963] [ 16.856995] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.857073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.857105] Hardware name: linux,dummy-virt (DT) [ 16.857239] Call trace: [ 16.857359] show_stack+0x20/0x38 (C) [ 16.857406] dump_stack_lvl+0x8c/0xd0 [ 16.857731] print_report+0x118/0x608 [ 16.857784] kasan_report+0xdc/0x128 [ 16.857829] __asan_report_store1_noabort+0x20/0x30 [ 16.857948] krealloc_less_oob_helper+0xae4/0xc50 [ 16.858128] krealloc_less_oob+0x20/0x38 [ 16.858308] kunit_try_run_case+0x170/0x3f0 [ 16.858355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.858406] kthread+0x328/0x630 [ 16.858447] ret_from_fork+0x10/0x20 [ 16.858495] [ 16.858523] Allocated by task 159: [ 16.858551] kasan_save_stack+0x3c/0x68 [ 16.858711] kasan_save_track+0x20/0x40 [ 16.858865] kasan_save_alloc_info+0x40/0x58 [ 16.858905] __kasan_krealloc+0x118/0x178 [ 16.858941] krealloc_noprof+0x128/0x360 [ 16.859096] krealloc_less_oob_helper+0x168/0xc50 [ 16.859378] krealloc_less_oob+0x20/0x38 [ 16.859459] kunit_try_run_case+0x170/0x3f0 [ 16.859495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.859580] kthread+0x328/0x630 [ 16.859611] ret_from_fork+0x10/0x20 [ 16.859645] [ 16.859669] The buggy address belongs to the object at fff00000c0b9be00 [ 16.859669] which belongs to the cache kmalloc-256 of size 256 [ 16.859962] The buggy address is located 33 bytes to the right of [ 16.859962] allocated 201-byte region [fff00000c0b9be00, fff00000c0b9bec9) [ 16.860099] [ 16.860170] The buggy address belongs to the physical page: [ 16.860261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a [ 16.860332] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.860379] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.860592] page_type: f5(slab) [ 16.860670] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.860853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.860982] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.861117] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.861166] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff [ 16.861214] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.861254] page dumped because: kasan: bad access detected [ 16.861289] [ 16.861338] Memory state around the buggy address: [ 16.861370] fff00000c0b9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.861573] fff00000c0b9be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.861859] >fff00000c0b9be80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.862045] ^ [ 16.862198] fff00000c0b9bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.862241] fff00000c0b9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.862303] ================================================================== [ 16.903196] ================================================================== [ 16.903243] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.903543] Write of size 1 at addr fff00000c69320d0 by task kunit_try_catch/163 [ 16.903603] [ 16.903640] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.903972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.903997] Hardware name: linux,dummy-virt (DT) [ 16.904027] Call trace: [ 16.904047] show_stack+0x20/0x38 (C) [ 16.904094] dump_stack_lvl+0x8c/0xd0 [ 16.904141] print_report+0x118/0x608 [ 16.904192] kasan_report+0xdc/0x128 [ 16.904413] __asan_report_store1_noabort+0x20/0x30 [ 16.904586] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.904634] krealloc_large_less_oob+0x20/0x38 [ 16.904679] kunit_try_run_case+0x170/0x3f0 [ 16.904725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.904777] kthread+0x328/0x630 [ 16.904818] ret_from_fork+0x10/0x20 [ 16.905702] [ 16.905786] The buggy address belongs to the physical page: [ 16.905820] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106930 [ 16.905876] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.905922] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.906072] page_type: f8(unknown) [ 16.906223] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.906371] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.906457] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.906625] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.906732] head: 0bfffe0000000002 ffffc1ffc31a4c01 00000000ffffffff 00000000ffffffff [ 16.907066] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.907196] page dumped because: kasan: bad access detected [ 16.907309] [ 16.907364] Memory state around the buggy address: [ 16.907407] fff00000c6931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.907508] fff00000c6932000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.907557] >fff00000c6932080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.907606] ^ [ 16.907644] fff00000c6932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.907686] fff00000c6932180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.907973] ================================================================== [ 16.849994] ================================================================== [ 16.850043] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.850091] Write of size 1 at addr fff00000c0b9beda by task kunit_try_catch/159 [ 16.850141] [ 16.850169] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.850249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.850275] Hardware name: linux,dummy-virt (DT) [ 16.850305] Call trace: [ 16.850325] show_stack+0x20/0x38 (C) [ 16.850372] dump_stack_lvl+0x8c/0xd0 [ 16.850420] print_report+0x118/0x608 [ 16.850464] kasan_report+0xdc/0x128 [ 16.850508] __asan_report_store1_noabort+0x20/0x30 [ 16.850554] krealloc_less_oob_helper+0xa80/0xc50 [ 16.850614] krealloc_less_oob+0x20/0x38 [ 16.850670] kunit_try_run_case+0x170/0x3f0 [ 16.850716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.851034] kthread+0x328/0x630 [ 16.851580] ret_from_fork+0x10/0x20 [ 16.851630] [ 16.851648] Allocated by task 159: [ 16.851675] kasan_save_stack+0x3c/0x68 [ 16.852054] kasan_save_track+0x20/0x40 [ 16.852220] kasan_save_alloc_info+0x40/0x58 [ 16.852507] __kasan_krealloc+0x118/0x178 [ 16.852546] krealloc_noprof+0x128/0x360 [ 16.852593] krealloc_less_oob_helper+0x168/0xc50 [ 16.852631] krealloc_less_oob+0x20/0x38 [ 16.852681] kunit_try_run_case+0x170/0x3f0 [ 16.852717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.853009] kthread+0x328/0x630 [ 16.853120] ret_from_fork+0x10/0x20 [ 16.853171] [ 16.853190] The buggy address belongs to the object at fff00000c0b9be00 [ 16.853190] which belongs to the cache kmalloc-256 of size 256 [ 16.853248] The buggy address is located 17 bytes to the right of [ 16.853248] allocated 201-byte region [fff00000c0b9be00, fff00000c0b9bec9) [ 16.853350] [ 16.853369] The buggy address belongs to the physical page: [ 16.853539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a [ 16.853686] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.853778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.853974] page_type: f5(slab) [ 16.854151] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.854202] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.854252] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.854352] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.854594] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff [ 16.854644] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.854702] page dumped because: kasan: bad access detected [ 16.854811] [ 16.854828] Memory state around the buggy address: [ 16.854859] fff00000c0b9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.854902] fff00000c0b9be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.854998] >fff00000c0b9be80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.855191] ^ [ 16.855229] fff00000c0b9bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855271] fff00000c0b9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855308] ================================================================== [ 16.842952] ================================================================== [ 16.843006] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.843057] Write of size 1 at addr fff00000c0b9bed0 by task kunit_try_catch/159 [ 16.843268] [ 16.843452] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.843743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.843985] Hardware name: linux,dummy-virt (DT) [ 16.844020] Call trace: [ 16.844040] show_stack+0x20/0x38 (C) [ 16.844193] dump_stack_lvl+0x8c/0xd0 [ 16.844247] print_report+0x118/0x608 [ 16.844454] kasan_report+0xdc/0x128 [ 16.844525] __asan_report_store1_noabort+0x20/0x30 [ 16.844772] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.844873] krealloc_less_oob+0x20/0x38 [ 16.845120] kunit_try_run_case+0x170/0x3f0 [ 16.845213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.845610] kthread+0x328/0x630 [ 16.845706] ret_from_fork+0x10/0x20 [ 16.845753] [ 16.845771] Allocated by task 159: [ 16.845824] kasan_save_stack+0x3c/0x68 [ 16.845866] kasan_save_track+0x20/0x40 [ 16.845901] kasan_save_alloc_info+0x40/0x58 [ 16.845940] __kasan_krealloc+0x118/0x178 [ 16.845976] krealloc_noprof+0x128/0x360 [ 16.846206] krealloc_less_oob_helper+0x168/0xc50 [ 16.846248] krealloc_less_oob+0x20/0x38 [ 16.846283] kunit_try_run_case+0x170/0x3f0 [ 16.846319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.846424] kthread+0x328/0x630 [ 16.846530] ret_from_fork+0x10/0x20 [ 16.846574] [ 16.846593] The buggy address belongs to the object at fff00000c0b9be00 [ 16.846593] which belongs to the cache kmalloc-256 of size 256 [ 16.846937] The buggy address is located 7 bytes to the right of [ 16.846937] allocated 201-byte region [fff00000c0b9be00, fff00000c0b9bec9) [ 16.847144] [ 16.847221] The buggy address belongs to the physical page: [ 16.847254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a [ 16.847316] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.847390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.847443] page_type: f5(slab) [ 16.847481] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.847531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.847591] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.847639] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.847697] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff [ 16.847745] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.847912] page dumped because: kasan: bad access detected [ 16.848086] [ 16.848105] Memory state around the buggy address: [ 16.848260] fff00000c0b9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.848528] fff00000c0b9be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.848752] >fff00000c0b9be80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.848808] ^ [ 16.848866] fff00000c0b9bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.848908] fff00000c0b9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.848948] ================================================================== [ 16.898622] ================================================================== [ 16.898693] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.898954] Write of size 1 at addr fff00000c69320c9 by task kunit_try_catch/163 [ 16.899031] [ 16.899157] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.899238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.899270] Hardware name: linux,dummy-virt (DT) [ 16.899429] Call trace: [ 16.899450] show_stack+0x20/0x38 (C) [ 16.899500] dump_stack_lvl+0x8c/0xd0 [ 16.899547] print_report+0x118/0x608 [ 16.899604] kasan_report+0xdc/0x128 [ 16.899648] __asan_report_store1_noabort+0x20/0x30 [ 16.900262] krealloc_less_oob_helper+0xa48/0xc50 [ 16.900411] krealloc_large_less_oob+0x20/0x38 [ 16.900461] kunit_try_run_case+0x170/0x3f0 [ 16.900509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.900561] kthread+0x328/0x630 [ 16.900615] ret_from_fork+0x10/0x20 [ 16.900662] [ 16.900692] The buggy address belongs to the physical page: [ 16.900726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106930 [ 16.901065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.901122] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.901366] page_type: f8(unknown) [ 16.901417] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.901553] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.901611] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.901669] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.901716] head: 0bfffe0000000002 ffffc1ffc31a4c01 00000000ffffffff 00000000ffffffff [ 16.901764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.901936] page dumped because: kasan: bad access detected [ 16.901971] [ 16.901988] Memory state around the buggy address: [ 16.902022] fff00000c6931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.902076] fff00000c6932000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.902118] >fff00000c6932080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.902156] ^ [ 16.902192] fff00000c6932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.902233] fff00000c6932180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.902271] ================================================================== [ 16.914390] ================================================================== [ 16.914438] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.914483] Write of size 1 at addr fff00000c69320ea by task kunit_try_catch/163 [ 16.914674] [ 16.914717] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.915160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.915376] Hardware name: linux,dummy-virt (DT) [ 16.915551] Call trace: [ 16.915583] show_stack+0x20/0x38 (C) [ 16.915633] dump_stack_lvl+0x8c/0xd0 [ 16.915679] print_report+0x118/0x608 [ 16.915723] kasan_report+0xdc/0x128 [ 16.915776] __asan_report_store1_noabort+0x20/0x30 [ 16.915823] krealloc_less_oob_helper+0xae4/0xc50 [ 16.916237] krealloc_large_less_oob+0x20/0x38 [ 16.916378] kunit_try_run_case+0x170/0x3f0 [ 16.916525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.916588] kthread+0x328/0x630 [ 16.916629] ret_from_fork+0x10/0x20 [ 16.916675] [ 16.916947] The buggy address belongs to the physical page: [ 16.917055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106930 [ 16.917110] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.917160] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.917231] page_type: f8(unknown) [ 16.917312] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.917601] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.917900] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.917951] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.917999] head: 0bfffe0000000002 ffffc1ffc31a4c01 00000000ffffffff 00000000ffffffff [ 16.918047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.918087] page dumped because: kasan: bad access detected [ 16.918355] [ 16.918435] Memory state around the buggy address: [ 16.918494] fff00000c6931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.918537] fff00000c6932000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.918590] >fff00000c6932080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.918637] ^ [ 16.918833] fff00000c6932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.918877] fff00000c6932180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.918914] ==================================================================
[ 11.208044] ================================================================== [ 11.209047] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.209948] Write of size 1 at addr ffff888100ab34d0 by task kunit_try_catch/175 [ 11.210469] [ 11.210572] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.210615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.210627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.210708] Call Trace: [ 11.210725] <TASK> [ 11.210742] dump_stack_lvl+0x73/0xb0 [ 11.210772] print_report+0xd1/0x650 [ 11.210794] ? __virt_addr_valid+0x1db/0x2d0 [ 11.210816] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.210838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.210859] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.210881] kasan_report+0x141/0x180 [ 11.210902] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.210928] __asan_report_store1_noabort+0x1b/0x30 [ 11.210947] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.210971] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.210992] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.211020] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.211056] krealloc_less_oob+0x1c/0x30 [ 11.211076] kunit_try_run_case+0x1a5/0x480 [ 11.211099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.211120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.211143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.211166] ? __kthread_parkme+0x82/0x180 [ 11.211186] ? preempt_count_sub+0x50/0x80 [ 11.211209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.211231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.211252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.211273] kthread+0x337/0x6f0 [ 11.211292] ? trace_preempt_on+0x20/0xc0 [ 11.211314] ? __pfx_kthread+0x10/0x10 [ 11.211334] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.211353] ? calculate_sigpending+0x7b/0xa0 [ 11.211375] ? __pfx_kthread+0x10/0x10 [ 11.211395] ret_from_fork+0x116/0x1d0 [ 11.211413] ? __pfx_kthread+0x10/0x10 [ 11.211432] ret_from_fork_asm+0x1a/0x30 [ 11.211462] </TASK> [ 11.211473] [ 11.224908] Allocated by task 175: [ 11.225073] kasan_save_stack+0x45/0x70 [ 11.225232] kasan_save_track+0x18/0x40 [ 11.225368] kasan_save_alloc_info+0x3b/0x50 [ 11.225516] __kasan_krealloc+0x190/0x1f0 [ 11.225668] krealloc_noprof+0xf3/0x340 [ 11.226011] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.226426] krealloc_less_oob+0x1c/0x30 [ 11.226802] kunit_try_run_case+0x1a5/0x480 [ 11.227228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.227810] kthread+0x337/0x6f0 [ 11.228158] ret_from_fork+0x116/0x1d0 [ 11.228506] ret_from_fork_asm+0x1a/0x30 [ 11.228893] [ 11.229074] The buggy address belongs to the object at ffff888100ab3400 [ 11.229074] which belongs to the cache kmalloc-256 of size 256 [ 11.230278] The buggy address is located 7 bytes to the right of [ 11.230278] allocated 201-byte region [ffff888100ab3400, ffff888100ab34c9) [ 11.231037] [ 11.231154] The buggy address belongs to the physical page: [ 11.231616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 11.232536] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.233202] flags: 0x200000000000040(head|node=0|zone=2) [ 11.233423] page_type: f5(slab) [ 11.233742] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.234508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.235263] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.236009] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.236323] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 11.236555] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.236800] page dumped because: kasan: bad access detected [ 11.236977] [ 11.237059] Memory state around the buggy address: [ 11.237215] ffff888100ab3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.237429] ffff888100ab3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.237651] >ffff888100ab3480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.238324] ^ [ 11.239036] ffff888100ab3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.239810] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.240620] ================================================================== [ 11.457327] ================================================================== [ 11.457557] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.458040] Write of size 1 at addr ffff88810291e0ea by task kunit_try_catch/179 [ 11.458369] [ 11.458570] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.458615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.458626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.458829] Call Trace: [ 11.458850] <TASK> [ 11.458868] dump_stack_lvl+0x73/0xb0 [ 11.458900] print_report+0xd1/0x650 [ 11.458924] ? __virt_addr_valid+0x1db/0x2d0 [ 11.458947] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.458970] ? kasan_addr_to_slab+0x11/0xa0 [ 11.458989] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.459011] kasan_report+0x141/0x180 [ 11.459045] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.459072] __asan_report_store1_noabort+0x1b/0x30 [ 11.459091] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.459115] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.459137] ? finish_task_switch.isra.0+0x153/0x700 [ 11.459159] ? __switch_to+0x47/0xf50 [ 11.459183] ? __schedule+0x10cc/0x2b60 [ 11.459204] ? __pfx_read_tsc+0x10/0x10 [ 11.459227] krealloc_large_less_oob+0x1c/0x30 [ 11.459248] kunit_try_run_case+0x1a5/0x480 [ 11.459271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.459292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.459314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.459335] ? __kthread_parkme+0x82/0x180 [ 11.459354] ? preempt_count_sub+0x50/0x80 [ 11.459375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.459397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.459418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.459440] kthread+0x337/0x6f0 [ 11.459459] ? trace_preempt_on+0x20/0xc0 [ 11.459482] ? __pfx_kthread+0x10/0x10 [ 11.459501] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.459520] ? calculate_sigpending+0x7b/0xa0 [ 11.459543] ? __pfx_kthread+0x10/0x10 [ 11.459563] ret_from_fork+0x116/0x1d0 [ 11.459580] ? __pfx_kthread+0x10/0x10 [ 11.459599] ret_from_fork_asm+0x1a/0x30 [ 11.459628] </TASK> [ 11.459638] [ 11.467477] The buggy address belongs to the physical page: [ 11.467795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c [ 11.468112] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.468384] flags: 0x200000000000040(head|node=0|zone=2) [ 11.468634] page_type: f8(unknown) [ 11.468812] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.469168] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.469461] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.469963] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.470266] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff [ 11.470551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.471194] page dumped because: kasan: bad access detected [ 11.471375] [ 11.471445] Memory state around the buggy address: [ 11.471790] ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.472238] ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.472630] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.472870] ^ [ 11.473126] ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.473448] ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.473758] ================================================================== [ 11.437501] ================================================================== [ 11.438474] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.439046] Write of size 1 at addr ffff88810291e0da by task kunit_try_catch/179 [ 11.439276] [ 11.439371] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.439413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.439424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.439445] Call Trace: [ 11.439464] <TASK> [ 11.439482] dump_stack_lvl+0x73/0xb0 [ 11.439511] print_report+0xd1/0x650 [ 11.439534] ? __virt_addr_valid+0x1db/0x2d0 [ 11.439556] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.439578] ? kasan_addr_to_slab+0x11/0xa0 [ 11.439597] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.439620] kasan_report+0x141/0x180 [ 11.439694] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.439726] __asan_report_store1_noabort+0x1b/0x30 [ 11.439746] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.439770] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.439793] ? finish_task_switch.isra.0+0x153/0x700 [ 11.439813] ? __switch_to+0x47/0xf50 [ 11.439838] ? __schedule+0x10cc/0x2b60 [ 11.439859] ? __pfx_read_tsc+0x10/0x10 [ 11.439882] krealloc_large_less_oob+0x1c/0x30 [ 11.439903] kunit_try_run_case+0x1a5/0x480 [ 11.439927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.439947] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.439969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.439990] ? __kthread_parkme+0x82/0x180 [ 11.440010] ? preempt_count_sub+0x50/0x80 [ 11.440042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.440065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.440086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.440107] kthread+0x337/0x6f0 [ 11.440125] ? trace_preempt_on+0x20/0xc0 [ 11.440153] ? __pfx_kthread+0x10/0x10 [ 11.440173] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.440192] ? calculate_sigpending+0x7b/0xa0 [ 11.440215] ? __pfx_kthread+0x10/0x10 [ 11.440235] ret_from_fork+0x116/0x1d0 [ 11.440252] ? __pfx_kthread+0x10/0x10 [ 11.440271] ret_from_fork_asm+0x1a/0x30 [ 11.440301] </TASK> [ 11.440313] [ 11.450525] The buggy address belongs to the physical page: [ 11.450942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c [ 11.451299] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.451612] flags: 0x200000000000040(head|node=0|zone=2) [ 11.451832] page_type: f8(unknown) [ 11.451961] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.452318] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.452649] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.453054] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.453392] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff [ 11.453622] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.453981] page dumped because: kasan: bad access detected [ 11.454213] [ 11.454281] Memory state around the buggy address: [ 11.454438] ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.455236] ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.455475] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.455710] ^ [ 11.456107] ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.456608] ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.456975] ================================================================== [ 11.174009] ================================================================== [ 11.174421] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.175221] Write of size 1 at addr ffff888100ab34c9 by task kunit_try_catch/175 [ 11.176136] [ 11.176465] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.176529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.176541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.176563] Call Trace: [ 11.176576] <TASK> [ 11.176596] dump_stack_lvl+0x73/0xb0 [ 11.176768] print_report+0xd1/0x650 [ 11.176799] ? __virt_addr_valid+0x1db/0x2d0 [ 11.176824] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.176846] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.176867] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.176889] kasan_report+0x141/0x180 [ 11.176918] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.176945] __asan_report_store1_noabort+0x1b/0x30 [ 11.176964] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.176988] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.177010] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.177048] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.177073] krealloc_less_oob+0x1c/0x30 [ 11.177093] kunit_try_run_case+0x1a5/0x480 [ 11.177119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.177139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.177162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.177183] ? __kthread_parkme+0x82/0x180 [ 11.177204] ? preempt_count_sub+0x50/0x80 [ 11.177229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.177252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.177273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.177294] kthread+0x337/0x6f0 [ 11.177313] ? trace_preempt_on+0x20/0xc0 [ 11.177336] ? __pfx_kthread+0x10/0x10 [ 11.177355] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.177375] ? calculate_sigpending+0x7b/0xa0 [ 11.177398] ? __pfx_kthread+0x10/0x10 [ 11.177419] ret_from_fork+0x116/0x1d0 [ 11.177437] ? __pfx_kthread+0x10/0x10 [ 11.177456] ret_from_fork_asm+0x1a/0x30 [ 11.177486] </TASK> [ 11.177498] [ 11.189761] Allocated by task 175: [ 11.190115] kasan_save_stack+0x45/0x70 [ 11.190476] kasan_save_track+0x18/0x40 [ 11.190849] kasan_save_alloc_info+0x3b/0x50 [ 11.191302] __kasan_krealloc+0x190/0x1f0 [ 11.191857] krealloc_noprof+0xf3/0x340 [ 11.192230] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.192658] krealloc_less_oob+0x1c/0x30 [ 11.193072] kunit_try_run_case+0x1a5/0x480 [ 11.193451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.193956] kthread+0x337/0x6f0 [ 11.194318] ret_from_fork+0x116/0x1d0 [ 11.194606] ret_from_fork_asm+0x1a/0x30 [ 11.194749] [ 11.194837] The buggy address belongs to the object at ffff888100ab3400 [ 11.194837] which belongs to the cache kmalloc-256 of size 256 [ 11.195331] The buggy address is located 0 bytes to the right of [ 11.195331] allocated 201-byte region [ffff888100ab3400, ffff888100ab34c9) [ 11.196564] [ 11.196749] The buggy address belongs to the physical page: [ 11.197385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 11.198227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.199068] flags: 0x200000000000040(head|node=0|zone=2) [ 11.199597] page_type: f5(slab) [ 11.199815] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.200291] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.200527] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.201173] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.201888] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 11.202800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.203308] page dumped because: kasan: bad access detected [ 11.203482] [ 11.203552] Memory state around the buggy address: [ 11.203774] ffff888100ab3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.204414] ffff888100ab3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.205160] >ffff888100ab3480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.205968] ^ [ 11.206479] ffff888100ab3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.207043] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.207422] ================================================================== [ 11.407833] ================================================================== [ 11.408509] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.409507] Write of size 1 at addr ffff88810291e0d0 by task kunit_try_catch/179 [ 11.410371] [ 11.410577] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.410620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.410631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.410651] Call Trace: [ 11.410680] <TASK> [ 11.410717] dump_stack_lvl+0x73/0xb0 [ 11.410810] print_report+0xd1/0x650 [ 11.410834] ? __virt_addr_valid+0x1db/0x2d0 [ 11.410857] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.410879] ? kasan_addr_to_slab+0x11/0xa0 [ 11.410898] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.410921] kasan_report+0x141/0x180 [ 11.410942] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.410968] __asan_report_store1_noabort+0x1b/0x30 [ 11.410988] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.411012] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.411046] ? finish_task_switch.isra.0+0x153/0x700 [ 11.411067] ? __switch_to+0x47/0xf50 [ 11.411092] ? __schedule+0x10cc/0x2b60 [ 11.411113] ? __pfx_read_tsc+0x10/0x10 [ 11.411136] krealloc_large_less_oob+0x1c/0x30 [ 11.411157] kunit_try_run_case+0x1a5/0x480 [ 11.411181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.411202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.411224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.411245] ? __kthread_parkme+0x82/0x180 [ 11.411265] ? preempt_count_sub+0x50/0x80 [ 11.411286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.411308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.411329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.411350] kthread+0x337/0x6f0 [ 11.411368] ? trace_preempt_on+0x20/0xc0 [ 11.411392] ? __pfx_kthread+0x10/0x10 [ 11.411411] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.411430] ? calculate_sigpending+0x7b/0xa0 [ 11.411453] ? __pfx_kthread+0x10/0x10 [ 11.411473] ret_from_fork+0x116/0x1d0 [ 11.411490] ? __pfx_kthread+0x10/0x10 [ 11.411509] ret_from_fork_asm+0x1a/0x30 [ 11.411539] </TASK> [ 11.411550] [ 11.425786] The buggy address belongs to the physical page: [ 11.426422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c [ 11.427264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.428077] flags: 0x200000000000040(head|node=0|zone=2) [ 11.428269] page_type: f8(unknown) [ 11.428397] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.428628] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.429418] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.430165] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.430878] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff [ 11.431652] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.432355] page dumped because: kasan: bad access detected [ 11.432964] [ 11.433054] Memory state around the buggy address: [ 11.433210] ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.433427] ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.433651] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.434387] ^ [ 11.434971] ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.435891] ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.436538] ================================================================== [ 11.313086] ================================================================== [ 11.313426] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.313681] Write of size 1 at addr ffff888100ab34eb by task kunit_try_catch/175 [ 11.314087] [ 11.314209] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.314264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.314275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.314296] Call Trace: [ 11.314316] <TASK> [ 11.314346] dump_stack_lvl+0x73/0xb0 [ 11.314376] print_report+0xd1/0x650 [ 11.314399] ? __virt_addr_valid+0x1db/0x2d0 [ 11.314422] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.314443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.314464] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.314487] kasan_report+0x141/0x180 [ 11.314508] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.314535] __asan_report_store1_noabort+0x1b/0x30 [ 11.314564] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.314589] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.314611] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.314711] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.314740] krealloc_less_oob+0x1c/0x30 [ 11.314760] kunit_try_run_case+0x1a5/0x480 [ 11.314783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.314804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.314827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.314858] ? __kthread_parkme+0x82/0x180 [ 11.314878] ? preempt_count_sub+0x50/0x80 [ 11.314901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.314935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.314957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.314979] kthread+0x337/0x6f0 [ 11.314997] ? trace_preempt_on+0x20/0xc0 [ 11.315036] ? __pfx_kthread+0x10/0x10 [ 11.315056] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.315076] ? calculate_sigpending+0x7b/0xa0 [ 11.315110] ? __pfx_kthread+0x10/0x10 [ 11.315130] ret_from_fork+0x116/0x1d0 [ 11.315149] ? __pfx_kthread+0x10/0x10 [ 11.315168] ret_from_fork_asm+0x1a/0x30 [ 11.315198] </TASK> [ 11.315209] [ 11.323234] Allocated by task 175: [ 11.323382] kasan_save_stack+0x45/0x70 [ 11.323596] kasan_save_track+0x18/0x40 [ 11.324004] kasan_save_alloc_info+0x3b/0x50 [ 11.324239] __kasan_krealloc+0x190/0x1f0 [ 11.324428] krealloc_noprof+0xf3/0x340 [ 11.324579] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.325081] krealloc_less_oob+0x1c/0x30 [ 11.325287] kunit_try_run_case+0x1a5/0x480 [ 11.325497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.325783] kthread+0x337/0x6f0 [ 11.326040] ret_from_fork+0x116/0x1d0 [ 11.326266] ret_from_fork_asm+0x1a/0x30 [ 11.326450] [ 11.326549] The buggy address belongs to the object at ffff888100ab3400 [ 11.326549] which belongs to the cache kmalloc-256 of size 256 [ 11.326909] The buggy address is located 34 bytes to the right of [ 11.326909] allocated 201-byte region [ffff888100ab3400, ffff888100ab34c9) [ 11.327822] [ 11.327916] The buggy address belongs to the physical page: [ 11.328102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 11.328806] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.329180] flags: 0x200000000000040(head|node=0|zone=2) [ 11.329423] page_type: f5(slab) [ 11.329582] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.330909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.331312] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.331634] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.331945] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 11.332269] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.332576] page dumped because: kasan: bad access detected [ 11.333488] [ 11.333588] Memory state around the buggy address: [ 11.334314] ffff888100ab3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.335061] ffff888100ab3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.335369] >ffff888100ab3480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.335915] ^ [ 11.336369] ffff888100ab3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.337215] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.337517] ================================================================== [ 11.474136] ================================================================== [ 11.474421] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.474656] Write of size 1 at addr ffff88810291e0eb by task kunit_try_catch/179 [ 11.474976] [ 11.475258] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.475305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.475317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.475336] Call Trace: [ 11.475351] <TASK> [ 11.475365] dump_stack_lvl+0x73/0xb0 [ 11.475393] print_report+0xd1/0x650 [ 11.475416] ? __virt_addr_valid+0x1db/0x2d0 [ 11.475438] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.475460] ? kasan_addr_to_slab+0x11/0xa0 [ 11.475479] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.475504] kasan_report+0x141/0x180 [ 11.475528] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.475556] __asan_report_store1_noabort+0x1b/0x30 [ 11.475575] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.475599] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.475622] ? finish_task_switch.isra.0+0x153/0x700 [ 11.475705] ? __switch_to+0x47/0xf50 [ 11.475733] ? __schedule+0x10cc/0x2b60 [ 11.475755] ? __pfx_read_tsc+0x10/0x10 [ 11.475780] krealloc_large_less_oob+0x1c/0x30 [ 11.475804] kunit_try_run_case+0x1a5/0x480 [ 11.475828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.475850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.475871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.475893] ? __kthread_parkme+0x82/0x180 [ 11.475912] ? preempt_count_sub+0x50/0x80 [ 11.475934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.475956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.475977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.475999] kthread+0x337/0x6f0 [ 11.476017] ? trace_preempt_on+0x20/0xc0 [ 11.476051] ? __pfx_kthread+0x10/0x10 [ 11.476070] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.476089] ? calculate_sigpending+0x7b/0xa0 [ 11.476111] ? __pfx_kthread+0x10/0x10 [ 11.476131] ret_from_fork+0x116/0x1d0 [ 11.476156] ? __pfx_kthread+0x10/0x10 [ 11.476175] ret_from_fork_asm+0x1a/0x30 [ 11.476204] </TASK> [ 11.476214] [ 11.483425] The buggy address belongs to the physical page: [ 11.483894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c [ 11.484283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.484611] flags: 0x200000000000040(head|node=0|zone=2) [ 11.484944] page_type: f8(unknown) [ 11.485143] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.485490] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.485869] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.486187] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.486482] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff [ 11.486888] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.487187] page dumped because: kasan: bad access detected [ 11.487426] [ 11.487519] Memory state around the buggy address: [ 11.487954] ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.488245] ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.488481] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.488693] ^ [ 11.488891] ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.489243] ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.489557] ================================================================== [ 11.385477] ================================================================== [ 11.386260] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.386615] Write of size 1 at addr ffff88810291e0c9 by task kunit_try_catch/179 [ 11.387017] [ 11.387156] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.387202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.387213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.387245] Call Trace: [ 11.387258] <TASK> [ 11.387276] dump_stack_lvl+0x73/0xb0 [ 11.387316] print_report+0xd1/0x650 [ 11.387339] ? __virt_addr_valid+0x1db/0x2d0 [ 11.387362] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.387384] ? kasan_addr_to_slab+0x11/0xa0 [ 11.387413] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.387435] kasan_report+0x141/0x180 [ 11.387456] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.387493] __asan_report_store1_noabort+0x1b/0x30 [ 11.387513] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.387537] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.387560] ? finish_task_switch.isra.0+0x153/0x700 [ 11.387582] ? __switch_to+0x47/0xf50 [ 11.387607] ? __schedule+0x10cc/0x2b60 [ 11.387629] ? __pfx_read_tsc+0x10/0x10 [ 11.387667] krealloc_large_less_oob+0x1c/0x30 [ 11.387690] kunit_try_run_case+0x1a5/0x480 [ 11.387714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.387735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.387810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.387848] ? __kthread_parkme+0x82/0x180 [ 11.387868] ? preempt_count_sub+0x50/0x80 [ 11.387890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.387912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.387934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.387955] kthread+0x337/0x6f0 [ 11.387981] ? trace_preempt_on+0x20/0xc0 [ 11.388004] ? __pfx_kthread+0x10/0x10 [ 11.388038] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.388059] ? calculate_sigpending+0x7b/0xa0 [ 11.388082] ? __pfx_kthread+0x10/0x10 [ 11.388102] ret_from_fork+0x116/0x1d0 [ 11.388119] ? __pfx_kthread+0x10/0x10 [ 11.388138] ret_from_fork_asm+0x1a/0x30 [ 11.388172] </TASK> [ 11.388183] [ 11.396773] The buggy address belongs to the physical page: [ 11.396966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c [ 11.397626] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.398312] flags: 0x200000000000040(head|node=0|zone=2) [ 11.399091] page_type: f8(unknown) [ 11.399387] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.399719] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.400647] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.401273] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.401515] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff [ 11.402127] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.402847] page dumped because: kasan: bad access detected [ 11.403476] [ 11.403715] Memory state around the buggy address: [ 11.404254] ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.404913] ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.405533] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.406193] ^ [ 11.406740] ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.407224] ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.407440] ================================================================== [ 11.277245] ================================================================== [ 11.277698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.278490] Write of size 1 at addr ffff888100ab34ea by task kunit_try_catch/175 [ 11.279194] [ 11.279299] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.279342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.279354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.279375] Call Trace: [ 11.279394] <TASK> [ 11.279413] dump_stack_lvl+0x73/0xb0 [ 11.279443] print_report+0xd1/0x650 [ 11.279465] ? __virt_addr_valid+0x1db/0x2d0 [ 11.279487] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.279509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.279530] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.279552] kasan_report+0x141/0x180 [ 11.279573] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.279599] __asan_report_store1_noabort+0x1b/0x30 [ 11.279619] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.279655] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.279676] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.279704] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.279729] krealloc_less_oob+0x1c/0x30 [ 11.279750] kunit_try_run_case+0x1a5/0x480 [ 11.279773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.279829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.279853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.279874] ? __kthread_parkme+0x82/0x180 [ 11.279894] ? preempt_count_sub+0x50/0x80 [ 11.279917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.279939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.279961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.279982] kthread+0x337/0x6f0 [ 11.280000] ? trace_preempt_on+0x20/0xc0 [ 11.280034] ? __pfx_kthread+0x10/0x10 [ 11.280055] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.280074] ? calculate_sigpending+0x7b/0xa0 [ 11.280097] ? __pfx_kthread+0x10/0x10 [ 11.280117] ret_from_fork+0x116/0x1d0 [ 11.280135] ? __pfx_kthread+0x10/0x10 [ 11.280160] ret_from_fork_asm+0x1a/0x30 [ 11.280190] </TASK> [ 11.280201] [ 11.294326] Allocated by task 175: [ 11.294707] kasan_save_stack+0x45/0x70 [ 11.295188] kasan_save_track+0x18/0x40 [ 11.295474] kasan_save_alloc_info+0x3b/0x50 [ 11.295625] __kasan_krealloc+0x190/0x1f0 [ 11.296139] krealloc_noprof+0xf3/0x340 [ 11.296535] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.297155] krealloc_less_oob+0x1c/0x30 [ 11.297517] kunit_try_run_case+0x1a5/0x480 [ 11.297783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.298272] kthread+0x337/0x6f0 [ 11.298498] ret_from_fork+0x116/0x1d0 [ 11.298631] ret_from_fork_asm+0x1a/0x30 [ 11.299054] [ 11.299264] The buggy address belongs to the object at ffff888100ab3400 [ 11.299264] which belongs to the cache kmalloc-256 of size 256 [ 11.300230] The buggy address is located 33 bytes to the right of [ 11.300230] allocated 201-byte region [ffff888100ab3400, ffff888100ab34c9) [ 11.300610] [ 11.300812] The buggy address belongs to the physical page: [ 11.301339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 11.302190] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.302926] flags: 0x200000000000040(head|node=0|zone=2) [ 11.303582] page_type: f5(slab) [ 11.303950] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.304852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.305224] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.305458] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.305828] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 11.306518] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.307232] page dumped because: kasan: bad access detected [ 11.307918] [ 11.308123] Memory state around the buggy address: [ 11.308571] ffff888100ab3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.309323] ffff888100ab3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.309728] >ffff888100ab3480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.310347] ^ [ 11.310809] ffff888100ab3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.311444] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.312296] ================================================================== [ 11.241588] ================================================================== [ 11.242290] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.243015] Write of size 1 at addr ffff888100ab34da by task kunit_try_catch/175 [ 11.243747] [ 11.243947] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.244267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.244278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.244300] Call Trace: [ 11.244319] <TASK> [ 11.244339] dump_stack_lvl+0x73/0xb0 [ 11.244369] print_report+0xd1/0x650 [ 11.244391] ? __virt_addr_valid+0x1db/0x2d0 [ 11.244414] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.244436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.244458] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.244480] kasan_report+0x141/0x180 [ 11.244504] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.244533] __asan_report_store1_noabort+0x1b/0x30 [ 11.244554] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.244578] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.244600] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.244628] ? __pfx_krealloc_less_oob+0x10/0x10 [ 11.244665] krealloc_less_oob+0x1c/0x30 [ 11.244685] kunit_try_run_case+0x1a5/0x480 [ 11.244716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.244738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.244761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.244782] ? __kthread_parkme+0x82/0x180 [ 11.244801] ? preempt_count_sub+0x50/0x80 [ 11.244824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.244846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.244868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.244890] kthread+0x337/0x6f0 [ 11.244908] ? trace_preempt_on+0x20/0xc0 [ 11.244930] ? __pfx_kthread+0x10/0x10 [ 11.244950] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.244970] ? calculate_sigpending+0x7b/0xa0 [ 11.244993] ? __pfx_kthread+0x10/0x10 [ 11.245013] ret_from_fork+0x116/0x1d0 [ 11.245041] ? __pfx_kthread+0x10/0x10 [ 11.245060] ret_from_fork_asm+0x1a/0x30 [ 11.245090] </TASK> [ 11.245101] [ 11.258257] Allocated by task 175: [ 11.258395] kasan_save_stack+0x45/0x70 [ 11.258549] kasan_save_track+0x18/0x40 [ 11.258864] kasan_save_alloc_info+0x3b/0x50 [ 11.259268] __kasan_krealloc+0x190/0x1f0 [ 11.259657] krealloc_noprof+0xf3/0x340 [ 11.260162] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.260615] krealloc_less_oob+0x1c/0x30 [ 11.261153] kunit_try_run_case+0x1a5/0x480 [ 11.261511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.261883] kthread+0x337/0x6f0 [ 11.262221] ret_from_fork+0x116/0x1d0 [ 11.262578] ret_from_fork_asm+0x1a/0x30 [ 11.262999] [ 11.263210] The buggy address belongs to the object at ffff888100ab3400 [ 11.263210] which belongs to the cache kmalloc-256 of size 256 [ 11.263929] The buggy address is located 17 bytes to the right of [ 11.263929] allocated 201-byte region [ffff888100ab3400, ffff888100ab34c9) [ 11.264328] [ 11.264401] The buggy address belongs to the physical page: [ 11.264577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 11.265329] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.266377] flags: 0x200000000000040(head|node=0|zone=2) [ 11.267048] page_type: f5(slab) [ 11.267440] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.268173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.268920] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.269597] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.270600] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 11.271142] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.271376] page dumped because: kasan: bad access detected [ 11.271547] [ 11.271617] Memory state around the buggy address: [ 11.272179] ffff888100ab3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.272816] ffff888100ab3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.273601] >ffff888100ab3480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.274426] ^ [ 11.275440] ffff888100ab3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.275921] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.276559] ==================================================================