Date
July 3, 2025, 6:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.635077] ================================================================== [ 16.635132] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.635177] Write of size 1 at addr fff00000c59ab4d0 by task kunit_try_catch/158 [ 16.635232] [ 16.635272] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.635500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.635631] Hardware name: linux,dummy-virt (DT) [ 16.635667] Call trace: [ 16.635896] show_stack+0x20/0x38 (C) [ 16.636085] dump_stack_lvl+0x8c/0xd0 [ 16.636136] print_report+0x118/0x608 [ 16.636302] kasan_report+0xdc/0x128 [ 16.636448] __asan_report_store1_noabort+0x20/0x30 [ 16.636915] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.637205] krealloc_less_oob+0x20/0x38 [ 16.637311] kunit_try_run_case+0x170/0x3f0 [ 16.637609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.637773] kthread+0x328/0x630 [ 16.637849] ret_from_fork+0x10/0x20 [ 16.638313] [ 16.638339] Allocated by task 158: [ 16.638405] kasan_save_stack+0x3c/0x68 [ 16.638476] kasan_save_track+0x20/0x40 [ 16.638623] kasan_save_alloc_info+0x40/0x58 [ 16.638941] __kasan_krealloc+0x118/0x178 [ 16.639040] krealloc_noprof+0x128/0x360 [ 16.639152] krealloc_less_oob_helper+0x168/0xc50 [ 16.639240] krealloc_less_oob+0x20/0x38 [ 16.639470] kunit_try_run_case+0x170/0x3f0 [ 16.639567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.640121] kthread+0x328/0x630 [ 16.640221] ret_from_fork+0x10/0x20 [ 16.640345] [ 16.640398] The buggy address belongs to the object at fff00000c59ab400 [ 16.640398] which belongs to the cache kmalloc-256 of size 256 [ 16.640498] The buggy address is located 7 bytes to the right of [ 16.640498] allocated 201-byte region [fff00000c59ab400, fff00000c59ab4c9) [ 16.640652] [ 16.640712] The buggy address belongs to the physical page: [ 16.640929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa [ 16.641122] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.641300] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.641443] page_type: f5(slab) [ 16.641490] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.641548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.641601] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.641667] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.641714] head: 0bfffe0000000001 ffffc1ffc3166a81 00000000ffffffff 00000000ffffffff [ 16.641765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.641804] page dumped because: kasan: bad access detected [ 16.641833] [ 16.641850] Memory state around the buggy address: [ 16.641896] fff00000c59ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.641945] fff00000c59ab400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.641985] >fff00000c59ab480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.642053] ^ [ 16.642468] fff00000c59ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.642570] fff00000c59ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.643122] ================================================================== [ 16.623949] ================================================================== [ 16.624084] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.624137] Write of size 1 at addr fff00000c59ab4c9 by task kunit_try_catch/158 [ 16.624184] [ 16.624216] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.624551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.624858] Hardware name: linux,dummy-virt (DT) [ 16.624928] Call trace: [ 16.625011] show_stack+0x20/0x38 (C) [ 16.625257] dump_stack_lvl+0x8c/0xd0 [ 16.625502] print_report+0x118/0x608 [ 16.625630] kasan_report+0xdc/0x128 [ 16.625880] __asan_report_store1_noabort+0x20/0x30 [ 16.626114] krealloc_less_oob_helper+0xa48/0xc50 [ 16.626286] krealloc_less_oob+0x20/0x38 [ 16.626470] kunit_try_run_case+0x170/0x3f0 [ 16.626569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.626974] kthread+0x328/0x630 [ 16.627139] ret_from_fork+0x10/0x20 [ 16.627349] [ 16.627505] Allocated by task 158: [ 16.627604] kasan_save_stack+0x3c/0x68 [ 16.627994] kasan_save_track+0x20/0x40 [ 16.628109] kasan_save_alloc_info+0x40/0x58 [ 16.628530] __kasan_krealloc+0x118/0x178 [ 16.628712] krealloc_noprof+0x128/0x360 [ 16.628753] krealloc_less_oob_helper+0x168/0xc50 [ 16.628790] krealloc_less_oob+0x20/0x38 [ 16.628825] kunit_try_run_case+0x170/0x3f0 [ 16.629110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.629288] kthread+0x328/0x630 [ 16.629591] ret_from_fork+0x10/0x20 [ 16.629652] [ 16.629799] The buggy address belongs to the object at fff00000c59ab400 [ 16.629799] which belongs to the cache kmalloc-256 of size 256 [ 16.629887] The buggy address is located 0 bytes to the right of [ 16.629887] allocated 201-byte region [fff00000c59ab400, fff00000c59ab4c9) [ 16.630158] [ 16.630229] The buggy address belongs to the physical page: [ 16.630298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa [ 16.630675] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.631002] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.631193] page_type: f5(slab) [ 16.631306] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.631394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.631723] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.631933] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.632024] head: 0bfffe0000000001 ffffc1ffc3166a81 00000000ffffffff 00000000ffffffff [ 16.632185] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.632281] page dumped because: kasan: bad access detected [ 16.632317] [ 16.632503] Memory state around the buggy address: [ 16.632545] fff00000c59ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.632605] fff00000c59ab400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.632865] >fff00000c59ab480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.632944] ^ [ 16.633148] fff00000c59ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.633211] fff00000c59ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.633247] ================================================================== [ 16.651247] ================================================================== [ 16.651609] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.651719] Write of size 1 at addr fff00000c59ab4ea by task kunit_try_catch/158 [ 16.652050] [ 16.652099] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.652181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.652206] Hardware name: linux,dummy-virt (DT) [ 16.652235] Call trace: [ 16.652416] show_stack+0x20/0x38 (C) [ 16.652483] dump_stack_lvl+0x8c/0xd0 [ 16.652682] print_report+0x118/0x608 [ 16.652810] kasan_report+0xdc/0x128 [ 16.653170] __asan_report_store1_noabort+0x20/0x30 [ 16.653377] krealloc_less_oob_helper+0xae4/0xc50 [ 16.653524] krealloc_less_oob+0x20/0x38 [ 16.653572] kunit_try_run_case+0x170/0x3f0 [ 16.653640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.653910] kthread+0x328/0x630 [ 16.654202] ret_from_fork+0x10/0x20 [ 16.654285] [ 16.654333] Allocated by task 158: [ 16.654425] kasan_save_stack+0x3c/0x68 [ 16.654525] kasan_save_track+0x20/0x40 [ 16.654758] kasan_save_alloc_info+0x40/0x58 [ 16.655047] __kasan_krealloc+0x118/0x178 [ 16.655205] krealloc_noprof+0x128/0x360 [ 16.655325] krealloc_less_oob_helper+0x168/0xc50 [ 16.655400] krealloc_less_oob+0x20/0x38 [ 16.655445] kunit_try_run_case+0x170/0x3f0 [ 16.655639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.655830] kthread+0x328/0x630 [ 16.655993] ret_from_fork+0x10/0x20 [ 16.656157] [ 16.656229] The buggy address belongs to the object at fff00000c59ab400 [ 16.656229] which belongs to the cache kmalloc-256 of size 256 [ 16.656627] The buggy address is located 33 bytes to the right of [ 16.656627] allocated 201-byte region [fff00000c59ab400, fff00000c59ab4c9) [ 16.656802] [ 16.656893] The buggy address belongs to the physical page: [ 16.656962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa [ 16.657182] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.657232] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.657292] page_type: f5(slab) [ 16.657328] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.657703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.657847] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.658018] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.658203] head: 0bfffe0000000001 ffffc1ffc3166a81 00000000ffffffff 00000000ffffffff [ 16.658521] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.658700] page dumped because: kasan: bad access detected [ 16.658827] [ 16.658897] Memory state around the buggy address: [ 16.659042] fff00000c59ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.659173] fff00000c59ab400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.659242] >fff00000c59ab480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.659305] ^ [ 16.659598] fff00000c59ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.659844] fff00000c59ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.659917] ================================================================== [ 16.645145] ================================================================== [ 16.645197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.645243] Write of size 1 at addr fff00000c59ab4da by task kunit_try_catch/158 [ 16.645315] [ 16.645439] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.645541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.645567] Hardware name: linux,dummy-virt (DT) [ 16.645603] Call trace: [ 16.645623] show_stack+0x20/0x38 (C) [ 16.645917] dump_stack_lvl+0x8c/0xd0 [ 16.646070] print_report+0x118/0x608 [ 16.646143] kasan_report+0xdc/0x128 [ 16.646190] __asan_report_store1_noabort+0x20/0x30 [ 16.646236] krealloc_less_oob_helper+0xa80/0xc50 [ 16.646520] krealloc_less_oob+0x20/0x38 [ 16.646656] kunit_try_run_case+0x170/0x3f0 [ 16.646834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.646891] kthread+0x328/0x630 [ 16.646932] ret_from_fork+0x10/0x20 [ 16.647124] [ 16.647296] Allocated by task 158: [ 16.647331] kasan_save_stack+0x3c/0x68 [ 16.647373] kasan_save_track+0x20/0x40 [ 16.647681] kasan_save_alloc_info+0x40/0x58 [ 16.647749] __kasan_krealloc+0x118/0x178 [ 16.647786] krealloc_noprof+0x128/0x360 [ 16.647820] krealloc_less_oob_helper+0x168/0xc50 [ 16.647857] krealloc_less_oob+0x20/0x38 [ 16.647892] kunit_try_run_case+0x170/0x3f0 [ 16.647928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.648421] kthread+0x328/0x630 [ 16.648481] ret_from_fork+0x10/0x20 [ 16.648517] [ 16.648572] The buggy address belongs to the object at fff00000c59ab400 [ 16.648572] which belongs to the cache kmalloc-256 of size 256 [ 16.648628] The buggy address is located 17 bytes to the right of [ 16.648628] allocated 201-byte region [fff00000c59ab400, fff00000c59ab4c9) [ 16.648826] [ 16.649008] The buggy address belongs to the physical page: [ 16.649050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa [ 16.649115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.649159] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.649207] page_type: f5(slab) [ 16.649268] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.649327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.649394] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.649452] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.649512] head: 0bfffe0000000001 ffffc1ffc3166a81 00000000ffffffff 00000000ffffffff [ 16.649564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.649603] page dumped because: kasan: bad access detected [ 16.649641] [ 16.649658] Memory state around the buggy address: [ 16.649687] fff00000c59ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.649728] fff00000c59ab400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.649768] >fff00000c59ab480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.649805] ^ [ 16.649849] fff00000c59ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.649898] fff00000c59ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.649942] ================================================================== [ 16.661769] ================================================================== [ 16.661840] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.661913] Write of size 1 at addr fff00000c59ab4eb by task kunit_try_catch/158 [ 16.662145] [ 16.662193] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.662282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.662307] Hardware name: linux,dummy-virt (DT) [ 16.662336] Call trace: [ 16.662544] show_stack+0x20/0x38 (C) [ 16.662607] dump_stack_lvl+0x8c/0xd0 [ 16.662652] print_report+0x118/0x608 [ 16.662705] kasan_report+0xdc/0x128 [ 16.662898] __asan_report_store1_noabort+0x20/0x30 [ 16.662958] krealloc_less_oob_helper+0xa58/0xc50 [ 16.663005] krealloc_less_oob+0x20/0x38 [ 16.663265] kunit_try_run_case+0x170/0x3f0 [ 16.663329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.663381] kthread+0x328/0x630 [ 16.663421] ret_from_fork+0x10/0x20 [ 16.663476] [ 16.663494] Allocated by task 158: [ 16.663521] kasan_save_stack+0x3c/0x68 [ 16.663560] kasan_save_track+0x20/0x40 [ 16.663595] kasan_save_alloc_info+0x40/0x58 [ 16.663634] __kasan_krealloc+0x118/0x178 [ 16.663670] krealloc_noprof+0x128/0x360 [ 16.663705] krealloc_less_oob_helper+0x168/0xc50 [ 16.663743] krealloc_less_oob+0x20/0x38 [ 16.663776] kunit_try_run_case+0x170/0x3f0 [ 16.663812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.663864] kthread+0x328/0x630 [ 16.663895] ret_from_fork+0x10/0x20 [ 16.663928] [ 16.663947] The buggy address belongs to the object at fff00000c59ab400 [ 16.663947] which belongs to the cache kmalloc-256 of size 256 [ 16.664000] The buggy address is located 34 bytes to the right of [ 16.664000] allocated 201-byte region [fff00000c59ab400, fff00000c59ab4c9) [ 16.664426] [ 16.664658] The buggy address belongs to the physical page: [ 16.664700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa [ 16.664779] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.664840] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.665002] page_type: f5(slab) [ 16.665111] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.665160] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.665633] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.665738] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.665941] head: 0bfffe0000000001 ffffc1ffc3166a81 00000000ffffffff 00000000ffffffff [ 16.666134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.666199] page dumped because: kasan: bad access detected [ 16.666229] [ 16.666246] Memory state around the buggy address: [ 16.666586] fff00000c59ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.666648] fff00000c59ab400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.666806] >fff00000c59ab480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.666929] ^ [ 16.666976] fff00000c59ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.667137] fff00000c59ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.667177] ================================================================== [ 16.725970] ================================================================== [ 16.726021] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.726078] Write of size 1 at addr fff00000c780a0ea by task kunit_try_catch/162 [ 16.726182] [ 16.726213] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.726289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.726314] Hardware name: linux,dummy-virt (DT) [ 16.726343] Call trace: [ 16.726363] show_stack+0x20/0x38 (C) [ 16.726409] dump_stack_lvl+0x8c/0xd0 [ 16.726452] print_report+0x118/0x608 [ 16.726507] kasan_report+0xdc/0x128 [ 16.726551] __asan_report_store1_noabort+0x20/0x30 [ 16.726597] krealloc_less_oob_helper+0xae4/0xc50 [ 16.726643] krealloc_large_less_oob+0x20/0x38 [ 16.726688] kunit_try_run_case+0x170/0x3f0 [ 16.726733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.726784] kthread+0x328/0x630 [ 16.726833] ret_from_fork+0x10/0x20 [ 16.726878] [ 16.726897] The buggy address belongs to the physical page: [ 16.726926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 16.726974] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.727049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.727098] page_type: f8(unknown) [ 16.727142] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.727200] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.727257] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.727305] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.727352] head: 0bfffe0000000002 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 16.727409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.727447] page dumped because: kasan: bad access detected [ 16.727481] [ 16.727499] Memory state around the buggy address: [ 16.727536] fff00000c7809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.727577] fff00000c780a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.727622] >fff00000c780a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.727657] ^ [ 16.727693] fff00000c780a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.727740] fff00000c780a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.727777] ================================================================== [ 16.720865] ================================================================== [ 16.720929] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.720977] Write of size 1 at addr fff00000c780a0da by task kunit_try_catch/162 [ 16.721023] [ 16.721063] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.721139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.721348] Hardware name: linux,dummy-virt (DT) [ 16.721514] Call trace: [ 16.721600] show_stack+0x20/0x38 (C) [ 16.721654] dump_stack_lvl+0x8c/0xd0 [ 16.721698] print_report+0x118/0x608 [ 16.721743] kasan_report+0xdc/0x128 [ 16.721827] __asan_report_store1_noabort+0x20/0x30 [ 16.721905] krealloc_less_oob_helper+0xa80/0xc50 [ 16.721971] krealloc_large_less_oob+0x20/0x38 [ 16.722062] kunit_try_run_case+0x170/0x3f0 [ 16.722108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.722158] kthread+0x328/0x630 [ 16.722318] ret_from_fork+0x10/0x20 [ 16.722630] [ 16.722732] The buggy address belongs to the physical page: [ 16.722770] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 16.722822] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.722899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.722978] page_type: f8(unknown) [ 16.723019] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.723266] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.723329] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.723481] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.723632] head: 0bfffe0000000002 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 16.723727] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.723840] page dumped because: kasan: bad access detected [ 16.723873] [ 16.723890] Memory state around the buggy address: [ 16.724072] fff00000c7809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.724127] fff00000c780a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.724338] >fff00000c780a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.724428] ^ [ 16.724477] fff00000c780a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.724875] fff00000c780a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.724941] ================================================================== [ 16.714585] ================================================================== [ 16.714654] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.714828] Write of size 1 at addr fff00000c780a0d0 by task kunit_try_catch/162 [ 16.714911] [ 16.714942] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.715241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.715390] Hardware name: linux,dummy-virt (DT) [ 16.715432] Call trace: [ 16.715452] show_stack+0x20/0x38 (C) [ 16.715782] dump_stack_lvl+0x8c/0xd0 [ 16.715892] print_report+0x118/0x608 [ 16.715953] kasan_report+0xdc/0x128 [ 16.715999] __asan_report_store1_noabort+0x20/0x30 [ 16.716056] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.716111] krealloc_large_less_oob+0x20/0x38 [ 16.716157] kunit_try_run_case+0x170/0x3f0 [ 16.716202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.716252] kthread+0x328/0x630 [ 16.716299] ret_from_fork+0x10/0x20 [ 16.716356] [ 16.716385] The buggy address belongs to the physical page: [ 16.716417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 16.716473] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.716518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.716831] page_type: f8(unknown) [ 16.716977] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.717139] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.717580] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.717810] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.717886] head: 0bfffe0000000002 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 16.718075] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.718419] page dumped because: kasan: bad access detected [ 16.718574] [ 16.718665] Memory state around the buggy address: [ 16.718780] fff00000c7809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.718854] fff00000c780a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.718901] >fff00000c780a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.719087] ^ [ 16.719147] fff00000c780a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.719448] fff00000c780a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.719516] ================================================================== [ 16.727826] ================================================================== [ 16.727860] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.727907] Write of size 1 at addr fff00000c780a0eb by task kunit_try_catch/162 [ 16.727953] [ 16.727986] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.728321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.728349] Hardware name: linux,dummy-virt (DT) [ 16.728483] Call trace: [ 16.728516] show_stack+0x20/0x38 (C) [ 16.729126] dump_stack_lvl+0x8c/0xd0 [ 16.729208] print_report+0x118/0x608 [ 16.729268] kasan_report+0xdc/0x128 [ 16.729312] __asan_report_store1_noabort+0x20/0x30 [ 16.729358] krealloc_less_oob_helper+0xa58/0xc50 [ 16.729715] krealloc_large_less_oob+0x20/0x38 [ 16.729814] kunit_try_run_case+0x170/0x3f0 [ 16.730058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.730497] kthread+0x328/0x630 [ 16.730666] ret_from_fork+0x10/0x20 [ 16.730850] [ 16.730985] The buggy address belongs to the physical page: [ 16.731063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 16.731137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.731358] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.731775] page_type: f8(unknown) [ 16.731898] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.731997] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.732080] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.732127] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.732502] head: 0bfffe0000000002 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 16.732731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.732831] page dumped because: kasan: bad access detected [ 16.732997] [ 16.733069] Memory state around the buggy address: [ 16.733101] fff00000c7809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.733142] fff00000c780a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.733186] >fff00000c780a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.733383] ^ [ 16.733671] fff00000c780a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.734086] fff00000c780a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.734185] ================================================================== [ 16.704575] ================================================================== [ 16.704671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.704884] Write of size 1 at addr fff00000c780a0c9 by task kunit_try_catch/162 [ 16.704937] [ 16.704970] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.705231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.705377] Hardware name: linux,dummy-virt (DT) [ 16.705466] Call trace: [ 16.705503] show_stack+0x20/0x38 (C) [ 16.705743] dump_stack_lvl+0x8c/0xd0 [ 16.705850] print_report+0x118/0x608 [ 16.706123] kasan_report+0xdc/0x128 [ 16.706259] __asan_report_store1_noabort+0x20/0x30 [ 16.706466] krealloc_less_oob_helper+0xa48/0xc50 [ 16.706793] krealloc_large_less_oob+0x20/0x38 [ 16.706956] kunit_try_run_case+0x170/0x3f0 [ 16.707091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.707249] kthread+0x328/0x630 [ 16.707338] ret_from_fork+0x10/0x20 [ 16.707773] [ 16.707876] The buggy address belongs to the physical page: [ 16.707947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 16.708099] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.708175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.708383] page_type: f8(unknown) [ 16.708648] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.709085] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.709491] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.709589] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.709737] head: 0bfffe0000000002 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 16.709867] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.709947] page dumped because: kasan: bad access detected [ 16.709996] [ 16.710347] Memory state around the buggy address: [ 16.710463] fff00000c7809f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.710524] fff00000c780a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.710857] >fff00000c780a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.711087] ^ [ 16.711347] fff00000c780a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.711419] fff00000c780a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.711499] ==================================================================
[ 11.113951] ================================================================== [ 11.114819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.115415] Write of size 1 at addr ffff88810034a0c9 by task kunit_try_catch/176 [ 11.115792] [ 11.115884] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.115929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.115941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.115962] Call Trace: [ 11.115974] <TASK> [ 11.115990] dump_stack_lvl+0x73/0xb0 [ 11.116018] print_report+0xd1/0x650 [ 11.116040] ? __virt_addr_valid+0x1db/0x2d0 [ 11.116063] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.116086] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.116127] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.116213] kasan_report+0x141/0x180 [ 11.116236] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.116263] __asan_report_store1_noabort+0x1b/0x30 [ 11.116283] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.116308] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.116349] ? finish_task_switch.isra.0+0x153/0x700 [ 11.116371] ? __switch_to+0x47/0xf50 [ 11.116396] ? __schedule+0x10cc/0x2b60 [ 11.116417] ? __pfx_read_tsc+0x10/0x10 [ 11.116441] krealloc_less_oob+0x1c/0x30 [ 11.116461] kunit_try_run_case+0x1a5/0x480 [ 11.116486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.116507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.116529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.116551] ? __kthread_parkme+0x82/0x180 [ 11.116570] ? preempt_count_sub+0x50/0x80 [ 11.116591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.116614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.116635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.116657] kthread+0x337/0x6f0 [ 11.116675] ? trace_preempt_on+0x20/0xc0 [ 11.116698] ? __pfx_kthread+0x10/0x10 [ 11.116718] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.116738] ? calculate_sigpending+0x7b/0xa0 [ 11.116760] ? __pfx_kthread+0x10/0x10 [ 11.116781] ret_from_fork+0x116/0x1d0 [ 11.116798] ? __pfx_kthread+0x10/0x10 [ 11.116817] ret_from_fork_asm+0x1a/0x30 [ 11.116846] </TASK> [ 11.116857] [ 11.130282] Allocated by task 176: [ 11.130624] kasan_save_stack+0x45/0x70 [ 11.130977] kasan_save_track+0x18/0x40 [ 11.131409] kasan_save_alloc_info+0x3b/0x50 [ 11.131769] __kasan_krealloc+0x190/0x1f0 [ 11.131910] krealloc_noprof+0xf3/0x340 [ 11.132047] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.132223] krealloc_less_oob+0x1c/0x30 [ 11.132430] kunit_try_run_case+0x1a5/0x480 [ 11.132622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.133088] kthread+0x337/0x6f0 [ 11.133455] ret_from_fork+0x116/0x1d0 [ 11.133890] ret_from_fork_asm+0x1a/0x30 [ 11.134293] [ 11.134449] The buggy address belongs to the object at ffff88810034a000 [ 11.134449] which belongs to the cache kmalloc-256 of size 256 [ 11.135223] The buggy address is located 0 bytes to the right of [ 11.135223] allocated 201-byte region [ffff88810034a000, ffff88810034a0c9) [ 11.136589] [ 11.136837] The buggy address belongs to the physical page: [ 11.137140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034a [ 11.137447] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.138129] flags: 0x200000000000040(head|node=0|zone=2) [ 11.138704] page_type: f5(slab) [ 11.139032] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.140020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.140602] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.141314] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.141555] head: 0200000000000001 ffffea000400d281 00000000ffffffff 00000000ffffffff [ 11.141794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.142027] page dumped because: kasan: bad access detected [ 11.142219] [ 11.142292] Memory state around the buggy address: [ 11.142617] ffff888100349f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.142878] ffff88810034a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.143134] >ffff88810034a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.143588] ^ [ 11.143887] ffff88810034a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.144246] ffff88810034a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.144580] ================================================================== [ 11.367497] ================================================================== [ 11.367803] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.368100] Write of size 1 at addr ffff8881027ba0ea by task kunit_try_catch/180 [ 11.368537] [ 11.368629] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.368670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.368681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.368701] Call Trace: [ 11.368714] <TASK> [ 11.368728] dump_stack_lvl+0x73/0xb0 [ 11.368753] print_report+0xd1/0x650 [ 11.368774] ? __virt_addr_valid+0x1db/0x2d0 [ 11.368796] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.368818] ? kasan_addr_to_slab+0x11/0xa0 [ 11.368837] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.368860] kasan_report+0x141/0x180 [ 11.368881] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.368909] __asan_report_store1_noabort+0x1b/0x30 [ 11.368929] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.368953] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.368976] ? finish_task_switch.isra.0+0x153/0x700 [ 11.368996] ? __switch_to+0x47/0xf50 [ 11.369020] ? __schedule+0x10cc/0x2b60 [ 11.369040] ? __pfx_read_tsc+0x10/0x10 [ 11.369062] krealloc_large_less_oob+0x1c/0x30 [ 11.369084] kunit_try_run_case+0x1a5/0x480 [ 11.369120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.369142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.369164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.369185] ? __kthread_parkme+0x82/0x180 [ 11.369204] ? preempt_count_sub+0x50/0x80 [ 11.369226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.369249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.369271] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.369293] kthread+0x337/0x6f0 [ 11.369311] ? trace_preempt_on+0x20/0xc0 [ 11.369333] ? __pfx_kthread+0x10/0x10 [ 11.369352] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.369372] ? calculate_sigpending+0x7b/0xa0 [ 11.369394] ? __pfx_kthread+0x10/0x10 [ 11.369414] ret_from_fork+0x116/0x1d0 [ 11.369431] ? __pfx_kthread+0x10/0x10 [ 11.369451] ret_from_fork_asm+0x1a/0x30 [ 11.369480] </TASK> [ 11.369490] [ 11.377198] The buggy address belongs to the physical page: [ 11.377384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b8 [ 11.378267] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.378550] flags: 0x200000000000040(head|node=0|zone=2) [ 11.378726] page_type: f8(unknown) [ 11.378927] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.379494] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.379736] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.379972] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.380275] head: 0200000000000002 ffffea000409ee01 00000000ffffffff 00000000ffffffff [ 11.380613] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.380953] page dumped because: kasan: bad access detected [ 11.381317] [ 11.381511] Memory state around the buggy address: [ 11.381715] ffff8881027b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.381931] ffff8881027ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.382259] >ffff8881027ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.382884] ^ [ 11.383386] ffff8881027ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.383683] ffff8881027ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.383972] ================================================================== [ 11.384421] ================================================================== [ 11.384811] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.385078] Write of size 1 at addr ffff8881027ba0eb by task kunit_try_catch/180 [ 11.385415] [ 11.385519] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.385556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.385567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.385585] Call Trace: [ 11.385599] <TASK> [ 11.385612] dump_stack_lvl+0x73/0xb0 [ 11.385634] print_report+0xd1/0x650 [ 11.385656] ? __virt_addr_valid+0x1db/0x2d0 [ 11.385676] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.385699] ? kasan_addr_to_slab+0x11/0xa0 [ 11.385718] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.385741] kasan_report+0x141/0x180 [ 11.385777] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.385804] __asan_report_store1_noabort+0x1b/0x30 [ 11.385825] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.385849] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.385872] ? finish_task_switch.isra.0+0x153/0x700 [ 11.385892] ? __switch_to+0x47/0xf50 [ 11.385918] ? __schedule+0x10cc/0x2b60 [ 11.385939] ? __pfx_read_tsc+0x10/0x10 [ 11.385962] krealloc_large_less_oob+0x1c/0x30 [ 11.385983] kunit_try_run_case+0x1a5/0x480 [ 11.386006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.386027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.386049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.386071] ? __kthread_parkme+0x82/0x180 [ 11.386090] ? preempt_count_sub+0x50/0x80 [ 11.386121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.386144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.386165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.386187] kthread+0x337/0x6f0 [ 11.386205] ? trace_preempt_on+0x20/0xc0 [ 11.386227] ? __pfx_kthread+0x10/0x10 [ 11.386247] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.386266] ? calculate_sigpending+0x7b/0xa0 [ 11.386288] ? __pfx_kthread+0x10/0x10 [ 11.386308] ret_from_fork+0x116/0x1d0 [ 11.386326] ? __pfx_kthread+0x10/0x10 [ 11.386345] ret_from_fork_asm+0x1a/0x30 [ 11.386374] </TASK> [ 11.386384] [ 11.394007] The buggy address belongs to the physical page: [ 11.394309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b8 [ 11.394581] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.394810] flags: 0x200000000000040(head|node=0|zone=2) [ 11.395062] page_type: f8(unknown) [ 11.395263] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.395577] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.395808] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.396041] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.396646] head: 0200000000000002 ffffea000409ee01 00000000ffffffff 00000000ffffffff [ 11.396997] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.397352] page dumped because: kasan: bad access detected [ 11.397558] [ 11.397629] Memory state around the buggy address: [ 11.397785] ffff8881027b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.398049] ffff8881027ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.398544] >ffff8881027ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.398878] ^ [ 11.399268] ffff8881027ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.399639] ffff8881027ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.399878] ================================================================== [ 11.145307] ================================================================== [ 11.145937] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.146369] Write of size 1 at addr ffff88810034a0d0 by task kunit_try_catch/176 [ 11.146784] [ 11.146950] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.147002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.147013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.147032] Call Trace: [ 11.147043] <TASK> [ 11.147057] dump_stack_lvl+0x73/0xb0 [ 11.147093] print_report+0xd1/0x650 [ 11.147133] ? __virt_addr_valid+0x1db/0x2d0 [ 11.147155] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.147177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.147198] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.147229] kasan_report+0x141/0x180 [ 11.147250] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.147277] __asan_report_store1_noabort+0x1b/0x30 [ 11.147297] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.147321] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.147354] ? finish_task_switch.isra.0+0x153/0x700 [ 11.147374] ? __switch_to+0x47/0xf50 [ 11.147399] ? __schedule+0x10cc/0x2b60 [ 11.147431] ? __pfx_read_tsc+0x10/0x10 [ 11.147454] krealloc_less_oob+0x1c/0x30 [ 11.147474] kunit_try_run_case+0x1a5/0x480 [ 11.147498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.147519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.147541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.147563] ? __kthread_parkme+0x82/0x180 [ 11.147583] ? preempt_count_sub+0x50/0x80 [ 11.147655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.147679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.147701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.147733] kthread+0x337/0x6f0 [ 11.147752] ? trace_preempt_on+0x20/0xc0 [ 11.147776] ? __pfx_kthread+0x10/0x10 [ 11.147806] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.147826] ? calculate_sigpending+0x7b/0xa0 [ 11.147858] ? __pfx_kthread+0x10/0x10 [ 11.147879] ret_from_fork+0x116/0x1d0 [ 11.147896] ? __pfx_kthread+0x10/0x10 [ 11.147926] ret_from_fork_asm+0x1a/0x30 [ 11.147956] </TASK> [ 11.147967] [ 11.159092] Allocated by task 176: [ 11.159387] kasan_save_stack+0x45/0x70 [ 11.159965] kasan_save_track+0x18/0x40 [ 11.160152] kasan_save_alloc_info+0x3b/0x50 [ 11.160523] __kasan_krealloc+0x190/0x1f0 [ 11.160727] krealloc_noprof+0xf3/0x340 [ 11.160913] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.161154] krealloc_less_oob+0x1c/0x30 [ 11.161855] kunit_try_run_case+0x1a5/0x480 [ 11.162169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.162559] kthread+0x337/0x6f0 [ 11.162801] ret_from_fork+0x116/0x1d0 [ 11.163088] ret_from_fork_asm+0x1a/0x30 [ 11.163350] [ 11.163496] The buggy address belongs to the object at ffff88810034a000 [ 11.163496] which belongs to the cache kmalloc-256 of size 256 [ 11.164453] The buggy address is located 7 bytes to the right of [ 11.164453] allocated 201-byte region [ffff88810034a000, ffff88810034a0c9) [ 11.165081] [ 11.165368] The buggy address belongs to the physical page: [ 11.165730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034a [ 11.166062] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.166755] flags: 0x200000000000040(head|node=0|zone=2) [ 11.167137] page_type: f5(slab) [ 11.167499] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.167943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.168435] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.168798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.169305] head: 0200000000000001 ffffea000400d281 00000000ffffffff 00000000ffffffff [ 11.169799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.170306] page dumped because: kasan: bad access detected [ 11.170649] [ 11.170768] Memory state around the buggy address: [ 11.171093] ffff888100349f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.171775] ffff88810034a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.172099] >ffff88810034a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.172716] ^ [ 11.173060] ffff88810034a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.173634] ffff88810034a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.173996] ================================================================== [ 11.350662] ================================================================== [ 11.350887] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.351157] Write of size 1 at addr ffff8881027ba0da by task kunit_try_catch/180 [ 11.351745] [ 11.351864] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.351905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.351916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.351934] Call Trace: [ 11.351949] <TASK> [ 11.351964] dump_stack_lvl+0x73/0xb0 [ 11.351990] print_report+0xd1/0x650 [ 11.352011] ? __virt_addr_valid+0x1db/0x2d0 [ 11.352032] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.352054] ? kasan_addr_to_slab+0x11/0xa0 [ 11.352073] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.352096] kasan_report+0x141/0x180 [ 11.352130] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.352239] __asan_report_store1_noabort+0x1b/0x30 [ 11.352264] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.352289] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.352312] ? finish_task_switch.isra.0+0x153/0x700 [ 11.352332] ? __switch_to+0x47/0xf50 [ 11.352355] ? __schedule+0x10cc/0x2b60 [ 11.352375] ? __pfx_read_tsc+0x10/0x10 [ 11.352398] krealloc_large_less_oob+0x1c/0x30 [ 11.352419] kunit_try_run_case+0x1a5/0x480 [ 11.352443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.352464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.352486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.352507] ? __kthread_parkme+0x82/0x180 [ 11.352527] ? preempt_count_sub+0x50/0x80 [ 11.352548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.352571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.352592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.352614] kthread+0x337/0x6f0 [ 11.352632] ? trace_preempt_on+0x20/0xc0 [ 11.352655] ? __pfx_kthread+0x10/0x10 [ 11.352674] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.352694] ? calculate_sigpending+0x7b/0xa0 [ 11.352716] ? __pfx_kthread+0x10/0x10 [ 11.352736] ret_from_fork+0x116/0x1d0 [ 11.352754] ? __pfx_kthread+0x10/0x10 [ 11.352774] ret_from_fork_asm+0x1a/0x30 [ 11.352803] </TASK> [ 11.352813] [ 11.361021] The buggy address belongs to the physical page: [ 11.361394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b8 [ 11.361685] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.361915] flags: 0x200000000000040(head|node=0|zone=2) [ 11.362170] page_type: f8(unknown) [ 11.362347] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.362710] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.362944] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.363194] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.363444] head: 0200000000000002 ffffea000409ee01 00000000ffffffff 00000000ffffffff [ 11.364120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.364476] page dumped because: kasan: bad access detected [ 11.364963] [ 11.365043] Memory state around the buggy address: [ 11.365212] ffff8881027b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.365442] ffff8881027ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.365767] >ffff8881027ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.366077] ^ [ 11.366356] ffff8881027ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.366677] ffff8881027ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.366955] ================================================================== [ 11.205774] ================================================================== [ 11.206018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.206990] Write of size 1 at addr ffff88810034a0ea by task kunit_try_catch/176 [ 11.207763] [ 11.208029] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.208284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.208298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.208340] Call Trace: [ 11.208356] <TASK> [ 11.208372] dump_stack_lvl+0x73/0xb0 [ 11.208401] print_report+0xd1/0x650 [ 11.208425] ? __virt_addr_valid+0x1db/0x2d0 [ 11.208449] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.208474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.208496] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.208519] kasan_report+0x141/0x180 [ 11.208541] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.208568] __asan_report_store1_noabort+0x1b/0x30 [ 11.208588] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.208612] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.208635] ? finish_task_switch.isra.0+0x153/0x700 [ 11.208656] ? __switch_to+0x47/0xf50 [ 11.208680] ? __schedule+0x10cc/0x2b60 [ 11.208701] ? __pfx_read_tsc+0x10/0x10 [ 11.208724] krealloc_less_oob+0x1c/0x30 [ 11.208745] kunit_try_run_case+0x1a5/0x480 [ 11.208768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.208788] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.208811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.208832] ? __kthread_parkme+0x82/0x180 [ 11.208851] ? preempt_count_sub+0x50/0x80 [ 11.208873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.208895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.208916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.208937] kthread+0x337/0x6f0 [ 11.208956] ? trace_preempt_on+0x20/0xc0 [ 11.208979] ? __pfx_kthread+0x10/0x10 [ 11.208999] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.209019] ? calculate_sigpending+0x7b/0xa0 [ 11.209040] ? __pfx_kthread+0x10/0x10 [ 11.209061] ret_from_fork+0x116/0x1d0 [ 11.209078] ? __pfx_kthread+0x10/0x10 [ 11.209097] ret_from_fork_asm+0x1a/0x30 [ 11.209198] </TASK> [ 11.209213] [ 11.220680] Allocated by task 176: [ 11.220854] kasan_save_stack+0x45/0x70 [ 11.221037] kasan_save_track+0x18/0x40 [ 11.221934] kasan_save_alloc_info+0x3b/0x50 [ 11.222390] __kasan_krealloc+0x190/0x1f0 [ 11.222557] krealloc_noprof+0xf3/0x340 [ 11.222984] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.223436] krealloc_less_oob+0x1c/0x30 [ 11.223610] kunit_try_run_case+0x1a5/0x480 [ 11.224071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.224702] kthread+0x337/0x6f0 [ 11.224996] ret_from_fork+0x116/0x1d0 [ 11.225428] ret_from_fork_asm+0x1a/0x30 [ 11.225832] [ 11.225930] The buggy address belongs to the object at ffff88810034a000 [ 11.225930] which belongs to the cache kmalloc-256 of size 256 [ 11.226655] The buggy address is located 33 bytes to the right of [ 11.226655] allocated 201-byte region [ffff88810034a000, ffff88810034a0c9) [ 11.227618] [ 11.227926] The buggy address belongs to the physical page: [ 11.228252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034a [ 11.228685] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.229368] flags: 0x200000000000040(head|node=0|zone=2) [ 11.229819] page_type: f5(slab) [ 11.230087] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.230672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.231150] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.231467] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.231818] head: 0200000000000001 ffffea000400d281 00000000ffffffff 00000000ffffffff [ 11.232490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.232797] page dumped because: kasan: bad access detected [ 11.233232] [ 11.233343] Memory state around the buggy address: [ 11.233785] ffff888100349f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.234289] ffff88810034a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.234696] >ffff88810034a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.235120] ^ [ 11.235749] ffff88810034a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.236270] ffff88810034a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.236672] ================================================================== [ 11.333944] ================================================================== [ 11.334331] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.334657] Write of size 1 at addr ffff8881027ba0d0 by task kunit_try_catch/180 [ 11.334967] [ 11.335070] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.335121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.335132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.335150] Call Trace: [ 11.335178] <TASK> [ 11.335191] dump_stack_lvl+0x73/0xb0 [ 11.335221] print_report+0xd1/0x650 [ 11.335242] ? __virt_addr_valid+0x1db/0x2d0 [ 11.335264] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.335286] ? kasan_addr_to_slab+0x11/0xa0 [ 11.335306] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.335329] kasan_report+0x141/0x180 [ 11.335350] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.335377] __asan_report_store1_noabort+0x1b/0x30 [ 11.335397] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.335422] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.335445] ? finish_task_switch.isra.0+0x153/0x700 [ 11.335465] ? __switch_to+0x47/0xf50 [ 11.335488] ? __schedule+0x10cc/0x2b60 [ 11.335509] ? __pfx_read_tsc+0x10/0x10 [ 11.335531] krealloc_large_less_oob+0x1c/0x30 [ 11.335553] kunit_try_run_case+0x1a5/0x480 [ 11.335577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.335598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.335620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.335641] ? __kthread_parkme+0x82/0x180 [ 11.335660] ? preempt_count_sub+0x50/0x80 [ 11.335681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.335704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.335725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.335747] kthread+0x337/0x6f0 [ 11.335766] ? trace_preempt_on+0x20/0xc0 [ 11.335789] ? __pfx_kthread+0x10/0x10 [ 11.335809] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.335828] ? calculate_sigpending+0x7b/0xa0 [ 11.335850] ? __pfx_kthread+0x10/0x10 [ 11.335871] ret_from_fork+0x116/0x1d0 [ 11.335888] ? __pfx_kthread+0x10/0x10 [ 11.335907] ret_from_fork_asm+0x1a/0x30 [ 11.335936] </TASK> [ 11.335946] [ 11.344212] The buggy address belongs to the physical page: [ 11.344452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b8 [ 11.344816] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.345138] flags: 0x200000000000040(head|node=0|zone=2) [ 11.345369] page_type: f8(unknown) [ 11.345542] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.345824] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.346413] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.346712] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.347019] head: 0200000000000002 ffffea000409ee01 00000000ffffffff 00000000ffffffff [ 11.347519] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.347818] page dumped because: kasan: bad access detected [ 11.348053] [ 11.348145] Memory state around the buggy address: [ 11.348322] ffff8881027b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.348644] ffff8881027ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.349008] >ffff8881027ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.349383] ^ [ 11.349674] ffff8881027ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.349961] ffff8881027ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.350273] ================================================================== [ 11.174875] ================================================================== [ 11.175564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.175903] Write of size 1 at addr ffff88810034a0da by task kunit_try_catch/176 [ 11.176443] [ 11.176650] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.176695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.176806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.176829] Call Trace: [ 11.176845] <TASK> [ 11.176861] dump_stack_lvl+0x73/0xb0 [ 11.176888] print_report+0xd1/0x650 [ 11.176910] ? __virt_addr_valid+0x1db/0x2d0 [ 11.176931] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.176953] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.176975] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.176997] kasan_report+0x141/0x180 [ 11.177018] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.177045] __asan_report_store1_noabort+0x1b/0x30 [ 11.177065] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.177090] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.177124] ? finish_task_switch.isra.0+0x153/0x700 [ 11.177145] ? __switch_to+0x47/0xf50 [ 11.177169] ? __schedule+0x10cc/0x2b60 [ 11.177190] ? __pfx_read_tsc+0x10/0x10 [ 11.177212] krealloc_less_oob+0x1c/0x30 [ 11.177233] kunit_try_run_case+0x1a5/0x480 [ 11.177255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.177276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.177299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.177321] ? __kthread_parkme+0x82/0x180 [ 11.177340] ? preempt_count_sub+0x50/0x80 [ 11.177361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.177383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.177405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.177426] kthread+0x337/0x6f0 [ 11.177446] ? trace_preempt_on+0x20/0xc0 [ 11.177468] ? __pfx_kthread+0x10/0x10 [ 11.177488] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.177507] ? calculate_sigpending+0x7b/0xa0 [ 11.177529] ? __pfx_kthread+0x10/0x10 [ 11.177550] ret_from_fork+0x116/0x1d0 [ 11.177567] ? __pfx_kthread+0x10/0x10 [ 11.177586] ret_from_fork_asm+0x1a/0x30 [ 11.177616] </TASK> [ 11.177627] [ 11.189771] Allocated by task 176: [ 11.189984] kasan_save_stack+0x45/0x70 [ 11.190549] kasan_save_track+0x18/0x40 [ 11.190771] kasan_save_alloc_info+0x3b/0x50 [ 11.191009] __kasan_krealloc+0x190/0x1f0 [ 11.191215] krealloc_noprof+0xf3/0x340 [ 11.191680] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.191876] krealloc_less_oob+0x1c/0x30 [ 11.192192] kunit_try_run_case+0x1a5/0x480 [ 11.192741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.192995] kthread+0x337/0x6f0 [ 11.193325] ret_from_fork+0x116/0x1d0 [ 11.193786] ret_from_fork_asm+0x1a/0x30 [ 11.194160] [ 11.194244] The buggy address belongs to the object at ffff88810034a000 [ 11.194244] which belongs to the cache kmalloc-256 of size 256 [ 11.195345] The buggy address is located 17 bytes to the right of [ 11.195345] allocated 201-byte region [ffff88810034a000, ffff88810034a0c9) [ 11.196032] [ 11.196155] The buggy address belongs to the physical page: [ 11.196642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034a [ 11.196994] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.197788] flags: 0x200000000000040(head|node=0|zone=2) [ 11.198184] page_type: f5(slab) [ 11.198524] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.198875] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.199193] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.199693] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.200004] head: 0200000000000001 ffffea000400d281 00000000ffffffff 00000000ffffffff [ 11.200376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.200625] page dumped because: kasan: bad access detected [ 11.200804] [ 11.200880] Memory state around the buggy address: [ 11.201040] ffff888100349f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.201983] ffff88810034a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.203319] >ffff88810034a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.204246] ^ [ 11.204570] ffff88810034a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.204916] ffff88810034a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.205264] ================================================================== [ 11.240346] ================================================================== [ 11.240824] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.241074] Write of size 1 at addr ffff88810034a0eb by task kunit_try_catch/176 [ 11.241572] [ 11.241778] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.241822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.241833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.241853] Call Trace: [ 11.241867] <TASK> [ 11.241881] dump_stack_lvl+0x73/0xb0 [ 11.241908] print_report+0xd1/0x650 [ 11.241930] ? __virt_addr_valid+0x1db/0x2d0 [ 11.241952] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.241976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.241997] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.242020] kasan_report+0x141/0x180 [ 11.242042] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.242069] __asan_report_store1_noabort+0x1b/0x30 [ 11.242088] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.242124] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.242148] ? finish_task_switch.isra.0+0x153/0x700 [ 11.242170] ? __switch_to+0x47/0xf50 [ 11.242194] ? __schedule+0x10cc/0x2b60 [ 11.242215] ? __pfx_read_tsc+0x10/0x10 [ 11.242238] krealloc_less_oob+0x1c/0x30 [ 11.242259] kunit_try_run_case+0x1a5/0x480 [ 11.242282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.242302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.242325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.242346] ? __kthread_parkme+0x82/0x180 [ 11.242366] ? preempt_count_sub+0x50/0x80 [ 11.242398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.242421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.242442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.242464] kthread+0x337/0x6f0 [ 11.242482] ? trace_preempt_on+0x20/0xc0 [ 11.242506] ? __pfx_kthread+0x10/0x10 [ 11.242525] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.242545] ? calculate_sigpending+0x7b/0xa0 [ 11.242568] ? __pfx_kthread+0x10/0x10 [ 11.242588] ret_from_fork+0x116/0x1d0 [ 11.242605] ? __pfx_kthread+0x10/0x10 [ 11.242624] ret_from_fork_asm+0x1a/0x30 [ 11.242654] </TASK> [ 11.242665] [ 11.254919] Allocated by task 176: [ 11.255056] kasan_save_stack+0x45/0x70 [ 11.255405] kasan_save_track+0x18/0x40 [ 11.255567] kasan_save_alloc_info+0x3b/0x50 [ 11.255727] __kasan_krealloc+0x190/0x1f0 [ 11.255877] krealloc_noprof+0xf3/0x340 [ 11.256267] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.256723] krealloc_less_oob+0x1c/0x30 [ 11.257096] kunit_try_run_case+0x1a5/0x480 [ 11.257519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.258014] kthread+0x337/0x6f0 [ 11.258149] ret_from_fork+0x116/0x1d0 [ 11.258283] ret_from_fork_asm+0x1a/0x30 [ 11.258621] [ 11.258781] The buggy address belongs to the object at ffff88810034a000 [ 11.258781] which belongs to the cache kmalloc-256 of size 256 [ 11.260007] The buggy address is located 34 bytes to the right of [ 11.260007] allocated 201-byte region [ffff88810034a000, ffff88810034a0c9) [ 11.261150] [ 11.261325] The buggy address belongs to the physical page: [ 11.261816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034a [ 11.262060] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.262650] flags: 0x200000000000040(head|node=0|zone=2) [ 11.263223] page_type: f5(slab) [ 11.263563] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.264287] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.265021] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.265526] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.266228] head: 0200000000000001 ffffea000400d281 00000000ffffffff 00000000ffffffff [ 11.266888] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.267309] page dumped because: kasan: bad access detected [ 11.267503] [ 11.267672] Memory state around the buggy address: [ 11.267848] ffff888100349f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.268066] ffff88810034a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.268589] >ffff88810034a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.268874] ^ [ 11.269287] ffff88810034a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.269857] ffff88810034a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.270148] ================================================================== [ 11.315417] ================================================================== [ 11.316918] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.317464] Write of size 1 at addr ffff8881027ba0c9 by task kunit_try_catch/180 [ 11.317997] [ 11.318124] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.318168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.318180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.318200] Call Trace: [ 11.318213] <TASK> [ 11.318228] dump_stack_lvl+0x73/0xb0 [ 11.318256] print_report+0xd1/0x650 [ 11.318279] ? __virt_addr_valid+0x1db/0x2d0 [ 11.318301] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.318324] ? kasan_addr_to_slab+0x11/0xa0 [ 11.318343] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.318366] kasan_report+0x141/0x180 [ 11.318387] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.318413] __asan_report_store1_noabort+0x1b/0x30 [ 11.318433] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.318458] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.318481] ? finish_task_switch.isra.0+0x153/0x700 [ 11.318502] ? __switch_to+0x47/0xf50 [ 11.318527] ? __schedule+0x10cc/0x2b60 [ 11.318548] ? __pfx_read_tsc+0x10/0x10 [ 11.318571] krealloc_large_less_oob+0x1c/0x30 [ 11.318593] kunit_try_run_case+0x1a5/0x480 [ 11.318617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.318638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.318661] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.318683] ? __kthread_parkme+0x82/0x180 [ 11.318704] ? preempt_count_sub+0x50/0x80 [ 11.318727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.318751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.318773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.318795] kthread+0x337/0x6f0 [ 11.318813] ? trace_preempt_on+0x20/0xc0 [ 11.318836] ? __pfx_kthread+0x10/0x10 [ 11.318855] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.318875] ? calculate_sigpending+0x7b/0xa0 [ 11.318899] ? __pfx_kthread+0x10/0x10 [ 11.318919] ret_from_fork+0x116/0x1d0 [ 11.318936] ? __pfx_kthread+0x10/0x10 [ 11.318955] ret_from_fork_asm+0x1a/0x30 [ 11.318985] </TASK> [ 11.318996] [ 11.326916] The buggy address belongs to the physical page: [ 11.327165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b8 [ 11.327576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.327809] flags: 0x200000000000040(head|node=0|zone=2) [ 11.328063] page_type: f8(unknown) [ 11.328415] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.328760] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.329117] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.329632] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.329907] head: 0200000000000002 ffffea000409ee01 00000000ffffffff 00000000ffffffff [ 11.330157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.330521] page dumped because: kasan: bad access detected [ 11.330773] [ 11.330868] Memory state around the buggy address: [ 11.331309] ffff8881027b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.331641] ffff8881027ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.331922] >ffff8881027ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.332299] ^ [ 11.332582] ffff8881027ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.332841] ffff8881027ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.333129] ==================================================================