Date
May 23, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 27.160639] ================================================================== [ 27.160784] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 27.160934] Write of size 1 at addr fff00000c1a548eb by task kunit_try_catch/160 [ 27.161085] [ 27.161208] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.162064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.162172] Hardware name: linux,dummy-virt (DT) [ 27.162285] Call trace: [ 27.162467] show_stack+0x20/0x38 (C) [ 27.162734] dump_stack_lvl+0x8c/0xd0 [ 27.162887] print_report+0x118/0x608 [ 27.163016] kasan_report+0xdc/0x128 [ 27.163150] __asan_report_store1_noabort+0x20/0x30 [ 27.163300] krealloc_less_oob_helper+0xa58/0xc50 [ 27.163851] krealloc_less_oob+0x20/0x38 [ 27.164840] kunit_try_run_case+0x170/0x3f0 [ 27.164990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.165151] kthread+0x328/0x630 [ 27.165437] ret_from_fork+0x10/0x20 [ 27.165723] [ 27.165780] Allocated by task 160: [ 27.165970] kasan_save_stack+0x3c/0x68 [ 27.166623] kasan_save_track+0x20/0x40 [ 27.166760] kasan_save_alloc_info+0x40/0x58 [ 27.166873] __kasan_krealloc+0x118/0x178 [ 27.167085] krealloc_noprof+0x128/0x360 [ 27.167191] krealloc_less_oob_helper+0x168/0xc50 [ 27.167324] krealloc_less_oob+0x20/0x38 [ 27.167478] kunit_try_run_case+0x170/0x3f0 [ 27.167595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.167734] kthread+0x328/0x630 [ 27.167845] ret_from_fork+0x10/0x20 [ 27.168204] [ 27.168788] The buggy address belongs to the object at fff00000c1a54800 [ 27.168788] which belongs to the cache kmalloc-256 of size 256 [ 27.169117] The buggy address is located 34 bytes to the right of [ 27.169117] allocated 201-byte region [fff00000c1a54800, fff00000c1a548c9) [ 27.169461] [ 27.169532] The buggy address belongs to the physical page: [ 27.169877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a54 [ 27.170091] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.170249] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.170407] page_type: f5(slab) [ 27.170534] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.171791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.172373] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.172558] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.172674] head: 0bfffe0000000001 ffffc1ffc3069501 00000000ffffffff 00000000ffffffff [ 27.172782] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.172903] page dumped because: kasan: bad access detected [ 27.172994] [ 27.173550] Memory state around the buggy address: [ 27.173945] fff00000c1a54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.174295] fff00000c1a54800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.174474] >fff00000c1a54880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 27.174593] ^ [ 27.174749] fff00000c1a54900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.174942] fff00000c1a54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.175517] ================================================================== [ 27.095479] ================================================================== [ 27.095662] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 27.096121] Write of size 1 at addr fff00000c1a548c9 by task kunit_try_catch/160 [ 27.096545] [ 27.096817] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.097435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.097538] Hardware name: linux,dummy-virt (DT) [ 27.097631] Call trace: [ 27.097698] show_stack+0x20/0x38 (C) [ 27.097846] dump_stack_lvl+0x8c/0xd0 [ 27.097987] print_report+0x118/0x608 [ 27.098123] kasan_report+0xdc/0x128 [ 27.098262] __asan_report_store1_noabort+0x20/0x30 [ 27.098473] krealloc_less_oob_helper+0xa48/0xc50 [ 27.098605] krealloc_less_oob+0x20/0x38 [ 27.099073] kunit_try_run_case+0x170/0x3f0 [ 27.099260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.099442] kthread+0x328/0x630 [ 27.099626] ret_from_fork+0x10/0x20 [ 27.099790] [ 27.099840] Allocated by task 160: [ 27.099912] kasan_save_stack+0x3c/0x68 [ 27.100018] kasan_save_track+0x20/0x40 [ 27.100203] kasan_save_alloc_info+0x40/0x58 [ 27.100611] __kasan_krealloc+0x118/0x178 [ 27.100804] krealloc_noprof+0x128/0x360 [ 27.100917] krealloc_less_oob_helper+0x168/0xc50 [ 27.101028] krealloc_less_oob+0x20/0x38 [ 27.101140] kunit_try_run_case+0x170/0x3f0 [ 27.101252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.101381] kthread+0x328/0x630 [ 27.101501] ret_from_fork+0x10/0x20 [ 27.101606] [ 27.101658] The buggy address belongs to the object at fff00000c1a54800 [ 27.101658] which belongs to the cache kmalloc-256 of size 256 [ 27.101790] The buggy address is located 0 bytes to the right of [ 27.101790] allocated 201-byte region [fff00000c1a54800, fff00000c1a548c9) [ 27.101945] [ 27.102000] The buggy address belongs to the physical page: [ 27.102208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a54 [ 27.102353] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.102690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.102935] page_type: f5(slab) [ 27.103096] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.103249] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.103430] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.103648] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.103792] head: 0bfffe0000000001 ffffc1ffc3069501 00000000ffffffff 00000000ffffffff [ 27.103945] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.104053] page dumped because: kasan: bad access detected [ 27.104140] [ 27.104465] Memory state around the buggy address: [ 27.104571] fff00000c1a54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.104701] fff00000c1a54800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.104829] >fff00000c1a54880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 27.104932] ^ [ 27.105350] fff00000c1a54900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.105502] fff00000c1a54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.106110] ================================================================== [ 27.258677] ================================================================== [ 27.258933] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 27.259111] Write of size 1 at addr fff00000c77da0c9 by task kunit_try_catch/164 [ 27.259312] [ 27.259465] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.259673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.259752] Hardware name: linux,dummy-virt (DT) [ 27.259843] Call trace: [ 27.259953] show_stack+0x20/0x38 (C) [ 27.260107] dump_stack_lvl+0x8c/0xd0 [ 27.260243] print_report+0x118/0x608 [ 27.260469] kasan_report+0xdc/0x128 [ 27.260601] __asan_report_store1_noabort+0x20/0x30 [ 27.260740] krealloc_less_oob_helper+0xa48/0xc50 [ 27.260907] krealloc_large_less_oob+0x20/0x38 [ 27.261045] kunit_try_run_case+0x170/0x3f0 [ 27.261164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.261314] kthread+0x328/0x630 [ 27.261389] ret_from_fork+0x10/0x20 [ 27.261508] [ 27.261566] The buggy address belongs to the physical page: [ 27.261676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d8 [ 27.261832] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.261967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.262124] page_type: f8(unknown) [ 27.262235] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.262378] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.262544] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.262688] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.262839] head: 0bfffe0000000002 ffffc1ffc31df601 00000000ffffffff 00000000ffffffff [ 27.262973] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.263086] page dumped because: kasan: bad access detected [ 27.263197] [ 27.263245] Memory state around the buggy address: [ 27.263340] fff00000c77d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.263486] fff00000c77da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.263648] >fff00000c77da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 27.263832] ^ [ 27.263970] fff00000c77da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.264098] fff00000c77da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.264212] ================================================================== [ 27.281773] ================================================================== [ 27.281902] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 27.282048] Write of size 1 at addr fff00000c77da0da by task kunit_try_catch/164 [ 27.282192] [ 27.282284] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.285000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.285361] Hardware name: linux,dummy-virt (DT) [ 27.285951] Call trace: [ 27.286457] show_stack+0x20/0x38 (C) [ 27.287183] dump_stack_lvl+0x8c/0xd0 [ 27.288100] print_report+0x118/0x608 [ 27.288299] kasan_report+0xdc/0x128 [ 27.288415] __asan_report_store1_noabort+0x20/0x30 [ 27.289345] krealloc_less_oob_helper+0xa80/0xc50 [ 27.289686] krealloc_large_less_oob+0x20/0x38 [ 27.290462] kunit_try_run_case+0x170/0x3f0 [ 27.290750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.291033] kthread+0x328/0x630 [ 27.291626] ret_from_fork+0x10/0x20 [ 27.291793] [ 27.291904] The buggy address belongs to the physical page: [ 27.292271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d8 [ 27.292700] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.292904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.295877] page_type: f8(unknown) [ 27.296055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.296304] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.296509] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.296628] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.296941] head: 0bfffe0000000002 ffffc1ffc31df601 00000000ffffffff 00000000ffffffff [ 27.297096] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.297355] page dumped because: kasan: bad access detected [ 27.297839] [ 27.297908] Memory state around the buggy address: [ 27.298094] fff00000c77d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.298337] fff00000c77da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.298542] >fff00000c77da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 27.298670] ^ [ 27.298784] fff00000c77da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.298948] fff00000c77da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.299126] ================================================================== [ 27.313821] ================================================================== [ 27.314232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 27.314559] Write of size 1 at addr fff00000c77da0eb by task kunit_try_catch/164 [ 27.314798] [ 27.315053] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.315579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.315661] Hardware name: linux,dummy-virt (DT) [ 27.315852] Call trace: [ 27.316023] show_stack+0x20/0x38 (C) [ 27.316330] dump_stack_lvl+0x8c/0xd0 [ 27.316486] print_report+0x118/0x608 [ 27.316620] kasan_report+0xdc/0x128 [ 27.316733] __asan_report_store1_noabort+0x20/0x30 [ 27.317045] krealloc_less_oob_helper+0xa58/0xc50 [ 27.317311] krealloc_large_less_oob+0x20/0x38 [ 27.317654] kunit_try_run_case+0x170/0x3f0 [ 27.317927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.318304] kthread+0x328/0x630 [ 27.318608] ret_from_fork+0x10/0x20 [ 27.319233] [ 27.319407] The buggy address belongs to the physical page: [ 27.319662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d8 [ 27.319848] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.319982] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.320117] page_type: f8(unknown) [ 27.320211] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.320344] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.320500] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.320644] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.321225] head: 0bfffe0000000002 ffffc1ffc31df601 00000000ffffffff 00000000ffffffff [ 27.321784] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.322237] page dumped because: kasan: bad access detected [ 27.322443] [ 27.322510] Memory state around the buggy address: [ 27.322619] fff00000c77d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.322788] fff00000c77da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.322942] >fff00000c77da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 27.323065] ^ [ 27.323230] fff00000c77da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.323415] fff00000c77da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.323591] ================================================================== [ 27.122828] ================================================================== [ 27.122963] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 27.123108] Write of size 1 at addr fff00000c1a548da by task kunit_try_catch/160 [ 27.123250] [ 27.123339] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.125891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.126281] Hardware name: linux,dummy-virt (DT) [ 27.126799] Call trace: [ 27.126889] show_stack+0x20/0x38 (C) [ 27.127053] dump_stack_lvl+0x8c/0xd0 [ 27.127194] print_report+0x118/0x608 [ 27.128099] kasan_report+0xdc/0x128 [ 27.128351] __asan_report_store1_noabort+0x20/0x30 [ 27.128497] krealloc_less_oob_helper+0xa80/0xc50 [ 27.129222] krealloc_less_oob+0x20/0x38 [ 27.129392] kunit_try_run_case+0x170/0x3f0 [ 27.129750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.130391] kthread+0x328/0x630 [ 27.130876] ret_from_fork+0x10/0x20 [ 27.131058] [ 27.131113] Allocated by task 160: [ 27.131197] kasan_save_stack+0x3c/0x68 [ 27.131570] kasan_save_track+0x20/0x40 [ 27.131709] kasan_save_alloc_info+0x40/0x58 [ 27.131891] __kasan_krealloc+0x118/0x178 [ 27.132144] krealloc_noprof+0x128/0x360 [ 27.132256] krealloc_less_oob_helper+0x168/0xc50 [ 27.132359] krealloc_less_oob+0x20/0x38 [ 27.132464] kunit_try_run_case+0x170/0x3f0 [ 27.133232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.133516] kthread+0x328/0x630 [ 27.133964] ret_from_fork+0x10/0x20 [ 27.134333] [ 27.134409] The buggy address belongs to the object at fff00000c1a54800 [ 27.134409] which belongs to the cache kmalloc-256 of size 256 [ 27.134941] The buggy address is located 17 bytes to the right of [ 27.134941] allocated 201-byte region [fff00000c1a54800, fff00000c1a548c9) [ 27.135514] [ 27.135576] The buggy address belongs to the physical page: [ 27.136045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a54 [ 27.136631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.136777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.136937] page_type: f5(slab) [ 27.138053] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.138249] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.138463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.138898] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.139316] head: 0bfffe0000000001 ffffc1ffc3069501 00000000ffffffff 00000000ffffffff [ 27.139706] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.139999] page dumped because: kasan: bad access detected [ 27.140099] [ 27.140160] Memory state around the buggy address: [ 27.140242] fff00000c1a54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.140340] fff00000c1a54800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.141101] >fff00000c1a54880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 27.141374] ^ [ 27.141598] fff00000c1a54900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.141741] fff00000c1a54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.141859] ================================================================== [ 27.109364] ================================================================== [ 27.109570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 27.109726] Write of size 1 at addr fff00000c1a548d0 by task kunit_try_catch/160 [ 27.109867] [ 27.109959] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.110196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.110274] Hardware name: linux,dummy-virt (DT) [ 27.110365] Call trace: [ 27.110429] show_stack+0x20/0x38 (C) [ 27.110586] dump_stack_lvl+0x8c/0xd0 [ 27.110986] print_report+0x118/0x608 [ 27.111137] kasan_report+0xdc/0x128 [ 27.111267] __asan_report_store1_noabort+0x20/0x30 [ 27.111432] krealloc_less_oob_helper+0xb9c/0xc50 [ 27.112586] krealloc_less_oob+0x20/0x38 [ 27.113120] kunit_try_run_case+0x170/0x3f0 [ 27.113580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.114074] kthread+0x328/0x630 [ 27.114251] ret_from_fork+0x10/0x20 [ 27.114412] [ 27.114505] Allocated by task 160: [ 27.114621] kasan_save_stack+0x3c/0x68 [ 27.114780] kasan_save_track+0x20/0x40 [ 27.114884] kasan_save_alloc_info+0x40/0x58 [ 27.115008] __kasan_krealloc+0x118/0x178 [ 27.115144] krealloc_noprof+0x128/0x360 [ 27.115247] krealloc_less_oob_helper+0x168/0xc50 [ 27.115423] krealloc_less_oob+0x20/0x38 [ 27.115591] kunit_try_run_case+0x170/0x3f0 [ 27.115867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.116054] kthread+0x328/0x630 [ 27.116280] ret_from_fork+0x10/0x20 [ 27.116596] [ 27.116656] The buggy address belongs to the object at fff00000c1a54800 [ 27.116656] which belongs to the cache kmalloc-256 of size 256 [ 27.116856] The buggy address is located 7 bytes to the right of [ 27.116856] allocated 201-byte region [fff00000c1a54800, fff00000c1a548c9) [ 27.117117] [ 27.117197] The buggy address belongs to the physical page: [ 27.117350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a54 [ 27.117599] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.118113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.118283] page_type: f5(slab) [ 27.118396] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.118560] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.118705] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.118854] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.119941] head: 0bfffe0000000001 ffffc1ffc3069501 00000000ffffffff 00000000ffffffff [ 27.120101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.120164] page dumped because: kasan: bad access detected [ 27.120207] [ 27.120246] Memory state around the buggy address: [ 27.120325] fff00000c1a54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.120469] fff00000c1a54800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.120595] >fff00000c1a54880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 27.120694] ^ [ 27.120778] fff00000c1a54900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.120911] fff00000c1a54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.121020] ================================================================== [ 27.145670] ================================================================== [ 27.145909] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 27.146744] Write of size 1 at addr fff00000c1a548ea by task kunit_try_catch/160 [ 27.147000] [ 27.147179] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.147799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.147886] Hardware name: linux,dummy-virt (DT) [ 27.148509] Call trace: [ 27.148792] show_stack+0x20/0x38 (C) [ 27.148960] dump_stack_lvl+0x8c/0xd0 [ 27.149101] print_report+0x118/0x608 [ 27.149357] kasan_report+0xdc/0x128 [ 27.149629] __asan_report_store1_noabort+0x20/0x30 [ 27.150482] krealloc_less_oob_helper+0xae4/0xc50 [ 27.150875] krealloc_less_oob+0x20/0x38 [ 27.151126] kunit_try_run_case+0x170/0x3f0 [ 27.151284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.151468] kthread+0x328/0x630 [ 27.152030] ret_from_fork+0x10/0x20 [ 27.152371] [ 27.152432] Allocated by task 160: [ 27.152746] kasan_save_stack+0x3c/0x68 [ 27.152862] kasan_save_track+0x20/0x40 [ 27.152962] kasan_save_alloc_info+0x40/0x58 [ 27.153523] __kasan_krealloc+0x118/0x178 [ 27.153704] krealloc_noprof+0x128/0x360 [ 27.153825] krealloc_less_oob_helper+0x168/0xc50 [ 27.153946] krealloc_less_oob+0x20/0x38 [ 27.154066] kunit_try_run_case+0x170/0x3f0 [ 27.154223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.154347] kthread+0x328/0x630 [ 27.154501] ret_from_fork+0x10/0x20 [ 27.154647] [ 27.154732] The buggy address belongs to the object at fff00000c1a54800 [ 27.154732] which belongs to the cache kmalloc-256 of size 256 [ 27.154967] The buggy address is located 33 bytes to the right of [ 27.154967] allocated 201-byte region [fff00000c1a54800, fff00000c1a548c9) [ 27.155229] [ 27.155314] The buggy address belongs to the physical page: [ 27.155423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a54 [ 27.155572] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.155723] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.156123] page_type: f5(slab) [ 27.156289] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.156431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.156569] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 27.156692] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.156796] head: 0bfffe0000000001 ffffc1ffc3069501 00000000ffffffff 00000000ffffffff [ 27.156921] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.157262] page dumped because: kasan: bad access detected [ 27.157550] [ 27.157638] Memory state around the buggy address: [ 27.157726] fff00000c1a54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.157896] fff00000c1a54800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.158020] >fff00000c1a54880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 27.158131] ^ [ 27.158248] fff00000c1a54900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.158410] fff00000c1a54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.158537] ================================================================== [ 27.301547] ================================================================== [ 27.301681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 27.301919] Write of size 1 at addr fff00000c77da0ea by task kunit_try_catch/164 [ 27.302262] [ 27.302482] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.302791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.302915] Hardware name: linux,dummy-virt (DT) [ 27.303315] Call trace: [ 27.303419] show_stack+0x20/0x38 (C) [ 27.303651] dump_stack_lvl+0x8c/0xd0 [ 27.303867] print_report+0x118/0x608 [ 27.304197] kasan_report+0xdc/0x128 [ 27.304361] __asan_report_store1_noabort+0x20/0x30 [ 27.304508] krealloc_less_oob_helper+0xae4/0xc50 [ 27.304646] krealloc_large_less_oob+0x20/0x38 [ 27.304776] kunit_try_run_case+0x170/0x3f0 [ 27.304977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.305218] kthread+0x328/0x630 [ 27.305401] ret_from_fork+0x10/0x20 [ 27.305607] [ 27.305665] The buggy address belongs to the physical page: [ 27.305978] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d8 [ 27.306336] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.306537] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.306902] page_type: f8(unknown) [ 27.307061] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.307229] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.307389] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.307923] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.308184] head: 0bfffe0000000002 ffffc1ffc31df601 00000000ffffffff 00000000ffffffff [ 27.308489] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.308867] page dumped because: kasan: bad access detected [ 27.308960] [ 27.309017] Memory state around the buggy address: [ 27.309102] fff00000c77d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.309198] fff00000c77da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.309305] >fff00000c77da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 27.309406] ^ [ 27.309612] fff00000c77da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.309826] fff00000c77da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.310084] ================================================================== [ 27.268287] ================================================================== [ 27.268432] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 27.270305] Write of size 1 at addr fff00000c77da0d0 by task kunit_try_catch/164 [ 27.270536] [ 27.270653] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 27.270889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.270964] Hardware name: linux,dummy-virt (DT) [ 27.271053] Call trace: [ 27.271136] show_stack+0x20/0x38 (C) [ 27.271331] dump_stack_lvl+0x8c/0xd0 [ 27.271558] print_report+0x118/0x608 [ 27.271695] kasan_report+0xdc/0x128 [ 27.271829] __asan_report_store1_noabort+0x20/0x30 [ 27.271984] krealloc_less_oob_helper+0xb9c/0xc50 [ 27.272120] krealloc_large_less_oob+0x20/0x38 [ 27.272604] kunit_try_run_case+0x170/0x3f0 [ 27.272781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.272940] kthread+0x328/0x630 [ 27.273061] ret_from_fork+0x10/0x20 [ 27.273442] [ 27.273528] The buggy address belongs to the physical page: [ 27.273673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d8 [ 27.273824] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.273971] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.274235] page_type: f8(unknown) [ 27.274367] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.274558] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.274771] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.275068] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.275820] head: 0bfffe0000000002 ffffc1ffc31df601 00000000ffffffff 00000000ffffffff [ 27.276022] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.276138] page dumped because: kasan: bad access detected [ 27.276358] [ 27.276416] Memory state around the buggy address: [ 27.276631] fff00000c77d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.276882] fff00000c77da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.276989] >fff00000c77da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 27.277672] ^ [ 27.277992] fff00000c77da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.278219] fff00000c77da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.278510] ==================================================================
[ 12.331619] ================================================================== [ 12.332066] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 12.332362] Write of size 1 at addr ffff8881003478da by task kunit_try_catch/177 [ 12.332586] [ 12.332670] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.332713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.332725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.332744] Call Trace: [ 12.332759] <TASK> [ 12.332772] dump_stack_lvl+0x73/0xb0 [ 12.332797] print_report+0xd1/0x650 [ 12.332819] ? __virt_addr_valid+0x1db/0x2d0 [ 12.332839] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.332862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.332883] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.332908] kasan_report+0x141/0x180 [ 12.332930] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.332958] __asan_report_store1_noabort+0x1b/0x30 [ 12.332979] krealloc_less_oob_helper+0xec6/0x11d0 [ 12.333004] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.333028] ? finish_task_switch.isra.0+0x153/0x700 [ 12.333050] ? __switch_to+0x5d9/0xf60 [ 12.333069] ? dequeue_task_fair+0x156/0x4e0 [ 12.333092] ? __schedule+0x10cc/0x2b30 [ 12.333114] ? __pfx_read_tsc+0x10/0x10 [ 12.333136] krealloc_less_oob+0x1c/0x30 [ 12.333157] kunit_try_run_case+0x1a5/0x480 [ 12.333180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.333201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.333222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.333244] ? __kthread_parkme+0x82/0x180 [ 12.333265] ? preempt_count_sub+0x50/0x80 [ 12.333299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.333322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.333343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.333365] kthread+0x337/0x6f0 [ 12.333383] ? trace_preempt_on+0x20/0xc0 [ 12.333405] ? __pfx_kthread+0x10/0x10 [ 12.333423] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.333443] ? calculate_sigpending+0x7b/0xa0 [ 12.333464] ? __pfx_kthread+0x10/0x10 [ 12.333482] ret_from_fork+0x41/0x80 [ 12.333502] ? __pfx_kthread+0x10/0x10 [ 12.333520] ret_from_fork_asm+0x1a/0x30 [ 12.333549] </TASK> [ 12.333559] [ 12.342245] Allocated by task 177: [ 12.342434] kasan_save_stack+0x45/0x70 [ 12.342591] kasan_save_track+0x18/0x40 [ 12.342734] kasan_save_alloc_info+0x3b/0x50 [ 12.342879] __kasan_krealloc+0x190/0x1f0 [ 12.343019] krealloc_noprof+0xf3/0x340 [ 12.343156] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.343394] krealloc_less_oob+0x1c/0x30 [ 12.343979] kunit_try_run_case+0x1a5/0x480 [ 12.344202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.344448] kthread+0x337/0x6f0 [ 12.344575] ret_from_fork+0x41/0x80 [ 12.344707] ret_from_fork_asm+0x1a/0x30 [ 12.344847] [ 12.344918] The buggy address belongs to the object at ffff888100347800 [ 12.344918] which belongs to the cache kmalloc-256 of size 256 [ 12.345436] The buggy address is located 17 bytes to the right of [ 12.345436] allocated 201-byte region [ffff888100347800, ffff8881003478c9) [ 12.346001] [ 12.346103] The buggy address belongs to the physical page: [ 12.346471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346 [ 12.346851] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.347397] flags: 0x200000000000040(head|node=0|zone=2) [ 12.347629] page_type: f5(slab) [ 12.347799] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.348269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.348663] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.348907] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.349270] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff [ 12.349757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.350254] page dumped because: kasan: bad access detected [ 12.350556] [ 12.350656] Memory state around the buggy address: [ 12.350828] ffff888100347780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.351043] ffff888100347800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.351258] >ffff888100347880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.351928] ^ [ 12.352430] ffff888100347900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.352734] ffff888100347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.353083] ================================================================== [ 12.374872] ================================================================== [ 12.375231] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 12.375645] Write of size 1 at addr ffff8881003478eb by task kunit_try_catch/177 [ 12.375875] [ 12.376129] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.376176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.376188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.376208] Call Trace: [ 12.376220] <TASK> [ 12.376234] dump_stack_lvl+0x73/0xb0 [ 12.376260] print_report+0xd1/0x650 [ 12.376282] ? __virt_addr_valid+0x1db/0x2d0 [ 12.376315] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.376338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.376360] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.376383] kasan_report+0x141/0x180 [ 12.376405] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.376442] __asan_report_store1_noabort+0x1b/0x30 [ 12.376463] krealloc_less_oob_helper+0xd47/0x11d0 [ 12.376488] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.376512] ? finish_task_switch.isra.0+0x153/0x700 [ 12.376534] ? __switch_to+0x5d9/0xf60 [ 12.376553] ? dequeue_task_fair+0x156/0x4e0 [ 12.376577] ? __schedule+0x10cc/0x2b30 [ 12.376598] ? __pfx_read_tsc+0x10/0x10 [ 12.376621] krealloc_less_oob+0x1c/0x30 [ 12.376642] kunit_try_run_case+0x1a5/0x480 [ 12.376664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.376685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.376707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.376729] ? __kthread_parkme+0x82/0x180 [ 12.376749] ? preempt_count_sub+0x50/0x80 [ 12.376773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.376795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.376816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.376838] kthread+0x337/0x6f0 [ 12.376854] ? trace_preempt_on+0x20/0xc0 [ 12.376876] ? __pfx_kthread+0x10/0x10 [ 12.376944] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.376967] ? calculate_sigpending+0x7b/0xa0 [ 12.376988] ? __pfx_kthread+0x10/0x10 [ 12.377006] ret_from_fork+0x41/0x80 [ 12.377026] ? __pfx_kthread+0x10/0x10 [ 12.377044] ret_from_fork_asm+0x1a/0x30 [ 12.377074] </TASK> [ 12.377084] [ 12.385409] Allocated by task 177: [ 12.385592] kasan_save_stack+0x45/0x70 [ 12.385797] kasan_save_track+0x18/0x40 [ 12.386039] kasan_save_alloc_info+0x3b/0x50 [ 12.386190] __kasan_krealloc+0x190/0x1f0 [ 12.386383] krealloc_noprof+0xf3/0x340 [ 12.386613] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.386943] krealloc_less_oob+0x1c/0x30 [ 12.387111] kunit_try_run_case+0x1a5/0x480 [ 12.387341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.387569] kthread+0x337/0x6f0 [ 12.387739] ret_from_fork+0x41/0x80 [ 12.388122] ret_from_fork_asm+0x1a/0x30 [ 12.388316] [ 12.388413] The buggy address belongs to the object at ffff888100347800 [ 12.388413] which belongs to the cache kmalloc-256 of size 256 [ 12.388836] The buggy address is located 34 bytes to the right of [ 12.388836] allocated 201-byte region [ffff888100347800, ffff8881003478c9) [ 12.389204] [ 12.389274] The buggy address belongs to the physical page: [ 12.389525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346 [ 12.390343] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.390762] flags: 0x200000000000040(head|node=0|zone=2) [ 12.390935] page_type: f5(slab) [ 12.391055] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.391286] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.391866] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.392223] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.392578] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff [ 12.392917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.393151] page dumped because: kasan: bad access detected [ 12.393409] [ 12.393504] Memory state around the buggy address: [ 12.393843] ffff888100347780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.394131] ffff888100347800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.394556] >ffff888100347880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.395103] ^ [ 12.395421] ffff888100347900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.395711] ffff888100347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.395965] ================================================================== [ 12.309750] ================================================================== [ 12.310550] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 12.311086] Write of size 1 at addr ffff8881003478d0 by task kunit_try_catch/177 [ 12.311407] [ 12.311505] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.311547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.311560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.311579] Call Trace: [ 12.311591] <TASK> [ 12.311605] dump_stack_lvl+0x73/0xb0 [ 12.311630] print_report+0xd1/0x650 [ 12.311652] ? __virt_addr_valid+0x1db/0x2d0 [ 12.311672] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.311695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.311717] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.311740] kasan_report+0x141/0x180 [ 12.311762] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.311790] __asan_report_store1_noabort+0x1b/0x30 [ 12.311812] krealloc_less_oob_helper+0xe23/0x11d0 [ 12.311838] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.311862] ? finish_task_switch.isra.0+0x153/0x700 [ 12.311883] ? __switch_to+0x5d9/0xf60 [ 12.311902] ? dequeue_task_fair+0x156/0x4e0 [ 12.311925] ? __schedule+0x10cc/0x2b30 [ 12.311947] ? __pfx_read_tsc+0x10/0x10 [ 12.311969] krealloc_less_oob+0x1c/0x30 [ 12.311990] kunit_try_run_case+0x1a5/0x480 [ 12.312015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.312036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.312058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.312080] ? __kthread_parkme+0x82/0x180 [ 12.312101] ? preempt_count_sub+0x50/0x80 [ 12.312125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.312147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.312169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.312191] kthread+0x337/0x6f0 [ 12.312208] ? trace_preempt_on+0x20/0xc0 [ 12.312230] ? __pfx_kthread+0x10/0x10 [ 12.312248] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.312268] ? calculate_sigpending+0x7b/0xa0 [ 12.312299] ? __pfx_kthread+0x10/0x10 [ 12.312317] ret_from_fork+0x41/0x80 [ 12.312337] ? __pfx_kthread+0x10/0x10 [ 12.312355] ret_from_fork_asm+0x1a/0x30 [ 12.312386] </TASK> [ 12.312396] [ 12.320352] Allocated by task 177: [ 12.320595] kasan_save_stack+0x45/0x70 [ 12.320805] kasan_save_track+0x18/0x40 [ 12.320944] kasan_save_alloc_info+0x3b/0x50 [ 12.321091] __kasan_krealloc+0x190/0x1f0 [ 12.321232] krealloc_noprof+0xf3/0x340 [ 12.321489] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.321851] krealloc_less_oob+0x1c/0x30 [ 12.322048] kunit_try_run_case+0x1a5/0x480 [ 12.322321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.322693] kthread+0x337/0x6f0 [ 12.322843] ret_from_fork+0x41/0x80 [ 12.323233] ret_from_fork_asm+0x1a/0x30 [ 12.323452] [ 12.323537] The buggy address belongs to the object at ffff888100347800 [ 12.323537] which belongs to the cache kmalloc-256 of size 256 [ 12.323893] The buggy address is located 7 bytes to the right of [ 12.323893] allocated 201-byte region [ffff888100347800, ffff8881003478c9) [ 12.324340] [ 12.324434] The buggy address belongs to the physical page: [ 12.324685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346 [ 12.325204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.325446] flags: 0x200000000000040(head|node=0|zone=2) [ 12.325622] page_type: f5(slab) [ 12.325743] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.326131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.326496] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.327048] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.327487] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff [ 12.328239] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.328601] page dumped because: kasan: bad access detected [ 12.328833] [ 12.329005] Memory state around the buggy address: [ 12.329175] ffff888100347780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.329459] ffff888100347800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.329787] >ffff888100347880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.330168] ^ [ 12.330462] ffff888100347900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.330754] ffff888100347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.331189] ================================================================== [ 12.353529] ================================================================== [ 12.353768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 12.354116] Write of size 1 at addr ffff8881003478ea by task kunit_try_catch/177 [ 12.354525] [ 12.354632] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.354681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.354693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.354712] Call Trace: [ 12.354728] <TASK> [ 12.354744] dump_stack_lvl+0x73/0xb0 [ 12.354768] print_report+0xd1/0x650 [ 12.354789] ? __virt_addr_valid+0x1db/0x2d0 [ 12.354809] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.354832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.354854] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.354877] kasan_report+0x141/0x180 [ 12.354899] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.354927] __asan_report_store1_noabort+0x1b/0x30 [ 12.354947] krealloc_less_oob_helper+0xe90/0x11d0 [ 12.354973] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.354996] ? finish_task_switch.isra.0+0x153/0x700 [ 12.355018] ? __switch_to+0x5d9/0xf60 [ 12.355037] ? dequeue_task_fair+0x156/0x4e0 [ 12.355060] ? __schedule+0x10cc/0x2b30 [ 12.355082] ? __pfx_read_tsc+0x10/0x10 [ 12.355104] krealloc_less_oob+0x1c/0x30 [ 12.355125] kunit_try_run_case+0x1a5/0x480 [ 12.355148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.355169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.355190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.355212] ? __kthread_parkme+0x82/0x180 [ 12.355233] ? preempt_count_sub+0x50/0x80 [ 12.355256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.355279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.355311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.355332] kthread+0x337/0x6f0 [ 12.355349] ? trace_preempt_on+0x20/0xc0 [ 12.355371] ? __pfx_kthread+0x10/0x10 [ 12.355389] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.355409] ? calculate_sigpending+0x7b/0xa0 [ 12.355429] ? __pfx_kthread+0x10/0x10 [ 12.355447] ret_from_fork+0x41/0x80 [ 12.355467] ? __pfx_kthread+0x10/0x10 [ 12.355636] ret_from_fork_asm+0x1a/0x30 [ 12.355677] </TASK> [ 12.355689] [ 12.364328] Allocated by task 177: [ 12.364458] kasan_save_stack+0x45/0x70 [ 12.364605] kasan_save_track+0x18/0x40 [ 12.364812] kasan_save_alloc_info+0x3b/0x50 [ 12.365025] __kasan_krealloc+0x190/0x1f0 [ 12.365237] krealloc_noprof+0xf3/0x340 [ 12.365563] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.365857] krealloc_less_oob+0x1c/0x30 [ 12.366051] kunit_try_run_case+0x1a5/0x480 [ 12.366249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.366525] kthread+0x337/0x6f0 [ 12.366702] ret_from_fork+0x41/0x80 [ 12.366837] ret_from_fork_asm+0x1a/0x30 [ 12.366975] [ 12.367070] The buggy address belongs to the object at ffff888100347800 [ 12.367070] which belongs to the cache kmalloc-256 of size 256 [ 12.367645] The buggy address is located 33 bytes to the right of [ 12.367645] allocated 201-byte region [ffff888100347800, ffff8881003478c9) [ 12.368010] [ 12.368082] The buggy address belongs to the physical page: [ 12.368322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346 [ 12.368853] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.369245] flags: 0x200000000000040(head|node=0|zone=2) [ 12.369525] page_type: f5(slab) [ 12.369676] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.370049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.370307] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.370540] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.370792] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff [ 12.371362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.371706] page dumped because: kasan: bad access detected [ 12.371960] [ 12.372072] Memory state around the buggy address: [ 12.372305] ffff888100347780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.372823] ffff888100347800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.373179] >ffff888100347880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.373466] ^ [ 12.373726] ffff888100347900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.374136] ffff888100347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.374493] ================================================================== [ 12.436187] ================================================================== [ 12.436682] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 12.436998] Write of size 1 at addr ffff888102ad60c9 by task kunit_try_catch/181 [ 12.437414] [ 12.437522] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.437571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.437583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.437606] Call Trace: [ 12.437619] <TASK> [ 12.437636] dump_stack_lvl+0x73/0xb0 [ 12.437665] print_report+0xd1/0x650 [ 12.437687] ? __virt_addr_valid+0x1db/0x2d0 [ 12.437709] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.437733] ? kasan_addr_to_slab+0x11/0xa0 [ 12.437754] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.437778] kasan_report+0x141/0x180 [ 12.437801] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.437830] __asan_report_store1_noabort+0x1b/0x30 [ 12.437851] krealloc_less_oob_helper+0xd70/0x11d0 [ 12.437929] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.437958] ? finish_task_switch.isra.0+0x153/0x700 [ 12.437983] ? __switch_to+0x5d9/0xf60 [ 12.438003] ? dequeue_task_fair+0x166/0x4e0 [ 12.438027] ? __schedule+0x10cc/0x2b30 [ 12.438050] ? __pfx_read_tsc+0x10/0x10 [ 12.438073] krealloc_large_less_oob+0x1c/0x30 [ 12.438097] kunit_try_run_case+0x1a5/0x480 [ 12.438122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.438143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.438167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.438190] ? __kthread_parkme+0x82/0x180 [ 12.438212] ? preempt_count_sub+0x50/0x80 [ 12.438236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.438259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.438281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.438316] kthread+0x337/0x6f0 [ 12.438333] ? trace_preempt_on+0x20/0xc0 [ 12.438357] ? __pfx_kthread+0x10/0x10 [ 12.438375] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.438396] ? calculate_sigpending+0x7b/0xa0 [ 12.438418] ? __pfx_kthread+0x10/0x10 [ 12.438437] ret_from_fork+0x41/0x80 [ 12.438458] ? __pfx_kthread+0x10/0x10 [ 12.438476] ret_from_fork_asm+0x1a/0x30 [ 12.438520] </TASK> [ 12.438532] [ 12.446632] The buggy address belongs to the physical page: [ 12.446944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 12.447192] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.447814] flags: 0x200000000000040(head|node=0|zone=2) [ 12.448256] page_type: f8(unknown) [ 12.448446] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.448736] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.449249] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.449619] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.449993] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff [ 12.450284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.450593] page dumped because: kasan: bad access detected [ 12.450771] [ 12.450842] Memory state around the buggy address: [ 12.451053] ffff888102ad5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.451584] ffff888102ad6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.451813] >ffff888102ad6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.452022] ^ [ 12.452415] ffff888102ad6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.452750] ffff888102ad6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.453066] ================================================================== [ 12.453639] ================================================================== [ 12.454244] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 12.454586] Write of size 1 at addr ffff888102ad60d0 by task kunit_try_catch/181 [ 12.454820] [ 12.454907] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.454995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.455009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.455031] Call Trace: [ 12.455042] <TASK> [ 12.455057] dump_stack_lvl+0x73/0xb0 [ 12.455085] print_report+0xd1/0x650 [ 12.455107] ? __virt_addr_valid+0x1db/0x2d0 [ 12.455129] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.455152] ? kasan_addr_to_slab+0x11/0xa0 [ 12.455173] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.455196] kasan_report+0x141/0x180 [ 12.455218] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 12.455247] __asan_report_store1_noabort+0x1b/0x30 [ 12.455267] krealloc_less_oob_helper+0xe23/0x11d0 [ 12.455305] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.455329] ? finish_task_switch.isra.0+0x153/0x700 [ 12.455352] ? __switch_to+0x5d9/0xf60 [ 12.455372] ? dequeue_task_fair+0x166/0x4e0 [ 12.455396] ? __schedule+0x10cc/0x2b30 [ 12.455418] ? __pfx_read_tsc+0x10/0x10 [ 12.455451] krealloc_large_less_oob+0x1c/0x30 [ 12.455473] kunit_try_run_case+0x1a5/0x480 [ 12.455497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.455518] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.455542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.455564] ? __kthread_parkme+0x82/0x180 [ 12.455585] ? preempt_count_sub+0x50/0x80 [ 12.455609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.455631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.455653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.455675] kthread+0x337/0x6f0 [ 12.455691] ? trace_preempt_on+0x20/0xc0 [ 12.455715] ? __pfx_kthread+0x10/0x10 [ 12.455732] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.455753] ? calculate_sigpending+0x7b/0xa0 [ 12.455774] ? __pfx_kthread+0x10/0x10 [ 12.455792] ret_from_fork+0x41/0x80 [ 12.455812] ? __pfx_kthread+0x10/0x10 [ 12.455830] ret_from_fork_asm+0x1a/0x30 [ 12.455861] </TASK> [ 12.455872] [ 12.464111] The buggy address belongs to the physical page: [ 12.464398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 12.464761] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.465143] flags: 0x200000000000040(head|node=0|zone=2) [ 12.465340] page_type: f8(unknown) [ 12.465477] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.465825] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.466172] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.466469] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.466708] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff [ 12.466981] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.467336] page dumped because: kasan: bad access detected [ 12.467740] [ 12.467833] Memory state around the buggy address: [ 12.468111] ffff888102ad5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.468374] ffff888102ad6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.468830] >ffff888102ad6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.469205] ^ [ 12.469491] ffff888102ad6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.469732] ffff888102ad6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.469945] ================================================================== [ 12.503812] ================================================================== [ 12.504342] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 12.504695] Write of size 1 at addr ffff888102ad60eb by task kunit_try_catch/181 [ 12.504938] [ 12.505047] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.505089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.505101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.505121] Call Trace: [ 12.505135] <TASK> [ 12.505168] dump_stack_lvl+0x73/0xb0 [ 12.505194] print_report+0xd1/0x650 [ 12.505216] ? __virt_addr_valid+0x1db/0x2d0 [ 12.505236] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.505259] ? kasan_addr_to_slab+0x11/0xa0 [ 12.505280] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.505315] kasan_report+0x141/0x180 [ 12.505337] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 12.505365] __asan_report_store1_noabort+0x1b/0x30 [ 12.505385] krealloc_less_oob_helper+0xd47/0x11d0 [ 12.505411] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.505435] ? finish_task_switch.isra.0+0x153/0x700 [ 12.505457] ? __switch_to+0x5d9/0xf60 [ 12.505476] ? dequeue_task_fair+0x166/0x4e0 [ 12.505499] ? __schedule+0x10cc/0x2b30 [ 12.505521] ? __pfx_read_tsc+0x10/0x10 [ 12.505543] krealloc_large_less_oob+0x1c/0x30 [ 12.505566] kunit_try_run_case+0x1a5/0x480 [ 12.505589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.505610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.505633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.505655] ? __kthread_parkme+0x82/0x180 [ 12.505676] ? preempt_count_sub+0x50/0x80 [ 12.505700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.505722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.505744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.505766] kthread+0x337/0x6f0 [ 12.505782] ? trace_preempt_on+0x20/0xc0 [ 12.505804] ? __pfx_kthread+0x10/0x10 [ 12.505822] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.505842] ? calculate_sigpending+0x7b/0xa0 [ 12.505863] ? __pfx_kthread+0x10/0x10 [ 12.505881] ret_from_fork+0x41/0x80 [ 12.505901] ? __pfx_kthread+0x10/0x10 [ 12.505918] ret_from_fork_asm+0x1a/0x30 [ 12.505949] </TASK> [ 12.505959] [ 12.514323] The buggy address belongs to the physical page: [ 12.514564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 12.514867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.515199] flags: 0x200000000000040(head|node=0|zone=2) [ 12.515419] page_type: f8(unknown) [ 12.515598] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.515842] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.516073] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.516367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.516717] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff [ 12.517374] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.517964] page dumped because: kasan: bad access detected [ 12.518143] [ 12.518214] Memory state around the buggy address: [ 12.518381] ffff888102ad5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.518710] ffff888102ad6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.519287] >ffff888102ad6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.519516] ^ [ 12.519717] ffff888102ad6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.519931] ffff888102ad6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.520187] ================================================================== [ 12.486488] ================================================================== [ 12.487090] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 12.487489] Write of size 1 at addr ffff888102ad60ea by task kunit_try_catch/181 [ 12.487820] [ 12.487923] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.487964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.487975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.487993] Call Trace: [ 12.488007] <TASK> [ 12.488020] dump_stack_lvl+0x73/0xb0 [ 12.488045] print_report+0xd1/0x650 [ 12.488066] ? __virt_addr_valid+0x1db/0x2d0 [ 12.488086] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.488109] ? kasan_addr_to_slab+0x11/0xa0 [ 12.488129] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.488153] kasan_report+0x141/0x180 [ 12.488175] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 12.488205] __asan_report_store1_noabort+0x1b/0x30 [ 12.488225] krealloc_less_oob_helper+0xe90/0x11d0 [ 12.488251] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.488275] ? finish_task_switch.isra.0+0x153/0x700 [ 12.488320] ? __switch_to+0x5d9/0xf60 [ 12.488379] ? dequeue_task_fair+0x166/0x4e0 [ 12.488403] ? __schedule+0x10cc/0x2b30 [ 12.488437] ? __pfx_read_tsc+0x10/0x10 [ 12.488460] krealloc_large_less_oob+0x1c/0x30 [ 12.488482] kunit_try_run_case+0x1a5/0x480 [ 12.488507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.488528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.488550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.488572] ? __kthread_parkme+0x82/0x180 [ 12.488593] ? preempt_count_sub+0x50/0x80 [ 12.488616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.488639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.488660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.488682] kthread+0x337/0x6f0 [ 12.488699] ? trace_preempt_on+0x20/0xc0 [ 12.488721] ? __pfx_kthread+0x10/0x10 [ 12.488738] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.488758] ? calculate_sigpending+0x7b/0xa0 [ 12.488778] ? __pfx_kthread+0x10/0x10 [ 12.488797] ret_from_fork+0x41/0x80 [ 12.488816] ? __pfx_kthread+0x10/0x10 [ 12.488834] ret_from_fork_asm+0x1a/0x30 [ 12.488864] </TASK> [ 12.488874] [ 12.497082] The buggy address belongs to the physical page: [ 12.497306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 12.497711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.498198] flags: 0x200000000000040(head|node=0|zone=2) [ 12.498418] page_type: f8(unknown) [ 12.498602] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.498918] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.499195] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.499802] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.500159] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff [ 12.500527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.500757] page dumped because: kasan: bad access detected [ 12.500927] [ 12.500997] Memory state around the buggy address: [ 12.501153] ffff888102ad5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.501411] ffff888102ad6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.501871] >ffff888102ad6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.502582] ^ [ 12.502926] ffff888102ad6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.503203] ffff888102ad6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.503436] ================================================================== [ 12.470327] ================================================================== [ 12.470671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 12.471168] Write of size 1 at addr ffff888102ad60da by task kunit_try_catch/181 [ 12.471420] [ 12.471504] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.471565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.471577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.471595] Call Trace: [ 12.471608] <TASK> [ 12.471621] dump_stack_lvl+0x73/0xb0 [ 12.471647] print_report+0xd1/0x650 [ 12.471668] ? __virt_addr_valid+0x1db/0x2d0 [ 12.471688] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.471711] ? kasan_addr_to_slab+0x11/0xa0 [ 12.471732] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.471755] kasan_report+0x141/0x180 [ 12.471777] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 12.471805] __asan_report_store1_noabort+0x1b/0x30 [ 12.471826] krealloc_less_oob_helper+0xec6/0x11d0 [ 12.471851] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.471875] ? finish_task_switch.isra.0+0x153/0x700 [ 12.471896] ? __switch_to+0x5d9/0xf60 [ 12.471915] ? dequeue_task_fair+0x166/0x4e0 [ 12.471938] ? __schedule+0x10cc/0x2b30 [ 12.471960] ? __pfx_read_tsc+0x10/0x10 [ 12.471982] krealloc_large_less_oob+0x1c/0x30 [ 12.472004] kunit_try_run_case+0x1a5/0x480 [ 12.472027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.472048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.472070] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.472092] ? __kthread_parkme+0x82/0x180 [ 12.472112] ? preempt_count_sub+0x50/0x80 [ 12.472136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.472158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.472180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.472202] kthread+0x337/0x6f0 [ 12.472218] ? trace_preempt_on+0x20/0xc0 [ 12.472240] ? __pfx_kthread+0x10/0x10 [ 12.472257] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.472278] ? calculate_sigpending+0x7b/0xa0 [ 12.472310] ? __pfx_kthread+0x10/0x10 [ 12.472328] ret_from_fork+0x41/0x80 [ 12.472348] ? __pfx_kthread+0x10/0x10 [ 12.472366] ret_from_fork_asm+0x1a/0x30 [ 12.472396] </TASK> [ 12.472406] [ 12.479895] The buggy address belongs to the physical page: [ 12.480234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 12.480669] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.480950] flags: 0x200000000000040(head|node=0|zone=2) [ 12.481207] page_type: f8(unknown) [ 12.481402] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.481709] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.482099] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.482508] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.482812] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff [ 12.483180] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.483533] page dumped because: kasan: bad access detected [ 12.483720] [ 12.483791] Memory state around the buggy address: [ 12.484327] ffff888102ad5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.484771] ffff888102ad6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.485142] >ffff888102ad6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.485404] ^ [ 12.485736] ffff888102ad6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.485994] ffff888102ad6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.486205] ================================================================== [ 12.287816] ================================================================== [ 12.288414] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 12.288719] Write of size 1 at addr ffff8881003478c9 by task kunit_try_catch/177 [ 12.289077] [ 12.289198] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 12.289247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.289259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.289280] Call Trace: [ 12.289305] <TASK> [ 12.289323] dump_stack_lvl+0x73/0xb0 [ 12.289352] print_report+0xd1/0x650 [ 12.289374] ? __virt_addr_valid+0x1db/0x2d0 [ 12.289395] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.289419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.289441] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.289465] kasan_report+0x141/0x180 [ 12.289487] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 12.289515] __asan_report_store1_noabort+0x1b/0x30 [ 12.289537] krealloc_less_oob_helper+0xd70/0x11d0 [ 12.289563] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.289587] ? finish_task_switch.isra.0+0x153/0x700 [ 12.289610] ? __switch_to+0x5d9/0xf60 [ 12.289630] ? dequeue_task_fair+0x156/0x4e0 [ 12.289654] ? __schedule+0x10cc/0x2b30 [ 12.289676] ? __pfx_read_tsc+0x10/0x10 [ 12.289699] krealloc_less_oob+0x1c/0x30 [ 12.289721] kunit_try_run_case+0x1a5/0x480 [ 12.289744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.289765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.289788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.289810] ? __kthread_parkme+0x82/0x180 [ 12.289831] ? preempt_count_sub+0x50/0x80 [ 12.289854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.289877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.289898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.289920] kthread+0x337/0x6f0 [ 12.289937] ? trace_preempt_on+0x20/0xc0 [ 12.289960] ? __pfx_kthread+0x10/0x10 [ 12.289977] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.289997] ? calculate_sigpending+0x7b/0xa0 [ 12.290018] ? __pfx_kthread+0x10/0x10 [ 12.290036] ret_from_fork+0x41/0x80 [ 12.290056] ? __pfx_kthread+0x10/0x10 [ 12.290130] ret_from_fork_asm+0x1a/0x30 [ 12.290161] </TASK> [ 12.290173] [ 12.298339] Allocated by task 177: [ 12.298618] kasan_save_stack+0x45/0x70 [ 12.298829] kasan_save_track+0x18/0x40 [ 12.299202] kasan_save_alloc_info+0x3b/0x50 [ 12.299394] __kasan_krealloc+0x190/0x1f0 [ 12.299537] krealloc_noprof+0xf3/0x340 [ 12.299675] krealloc_less_oob_helper+0x1aa/0x11d0 [ 12.299987] krealloc_less_oob+0x1c/0x30 [ 12.300200] kunit_try_run_case+0x1a5/0x480 [ 12.300424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.300649] kthread+0x337/0x6f0 [ 12.300802] ret_from_fork+0x41/0x80 [ 12.301026] ret_from_fork_asm+0x1a/0x30 [ 12.301208] [ 12.301327] The buggy address belongs to the object at ffff888100347800 [ 12.301327] which belongs to the cache kmalloc-256 of size 256 [ 12.301749] The buggy address is located 0 bytes to the right of [ 12.301749] allocated 201-byte region [ffff888100347800, ffff8881003478c9) [ 12.302268] [ 12.302380] The buggy address belongs to the physical page: [ 12.302834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346 [ 12.303323] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.303679] flags: 0x200000000000040(head|node=0|zone=2) [ 12.303960] page_type: f5(slab) [ 12.304116] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.304423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.304737] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.305144] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.305394] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff [ 12.305625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.306043] page dumped because: kasan: bad access detected [ 12.306303] [ 12.306402] Memory state around the buggy address: [ 12.306687] ffff888100347780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.307159] ffff888100347800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.307466] >ffff888100347880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.307727] ^ [ 12.307909] ffff888100347900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.308409] ffff888100347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.308689] ==================================================================