Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.838981] ================================================================== [ 30.839646] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.840594] Write of size 1 at addr fff00000c62220eb by task kunit_try_catch/151 [ 30.841407] [ 30.841843] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.843147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.843810] Hardware name: linux,dummy-virt (DT) [ 30.844406] Call trace: [ 30.844892] show_stack+0x20/0x38 (C) [ 30.845450] dump_stack_lvl+0x8c/0xd0 [ 30.846142] print_report+0x118/0x5e0 [ 30.846825] kasan_report+0xc8/0x118 [ 30.847496] __asan_report_store1_noabort+0x20/0x30 [ 30.848264] krealloc_less_oob_helper+0xa58/0xc50 [ 30.848906] krealloc_large_less_oob+0x20/0x38 [ 30.849677] kunit_try_run_case+0x14c/0x3d0 [ 30.850348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.851125] kthread+0x24c/0x2d0 [ 30.851790] ret_from_fork+0x10/0x20 [ 30.852438] [ 30.852832] The buggy address belongs to the physical page: [ 30.853447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.854481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.855397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.856308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.857221] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.858159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.859115] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.860089] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.861008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.861906] page dumped because: kasan: bad access detected [ 30.862592] [ 30.862987] Memory state around the buggy address: [ 30.863706] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.864477] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.865395] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.866233] ^ [ 30.867051] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.867910] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.868755] ================================================================== [ 30.423809] ================================================================== [ 30.424661] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.425545] Write of size 1 at addr fff00000c0c136d0 by task kunit_try_catch/147 [ 30.426773] [ 30.427161] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.428323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.428886] Hardware name: linux,dummy-virt (DT) [ 30.429544] Call trace: [ 30.430063] show_stack+0x20/0x38 (C) [ 30.431045] dump_stack_lvl+0x8c/0xd0 [ 30.431726] print_report+0x118/0x5e0 [ 30.432340] kasan_report+0xc8/0x118 [ 30.432950] __asan_report_store1_noabort+0x20/0x30 [ 30.433752] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.434788] krealloc_less_oob+0x20/0x38 [ 30.435406] kunit_try_run_case+0x14c/0x3d0 [ 30.436150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.436870] kthread+0x24c/0x2d0 [ 30.437503] ret_from_fork+0x10/0x20 [ 30.438137] [ 30.438804] Allocated by task 147: [ 30.439356] kasan_save_stack+0x3c/0x68 [ 30.440049] kasan_save_track+0x20/0x40 [ 30.440695] kasan_save_alloc_info+0x40/0x58 [ 30.441322] __kasan_krealloc+0x118/0x178 [ 30.442014] krealloc_noprof+0x128/0x360 [ 30.443576] krealloc_less_oob_helper+0x168/0xc50 [ 30.444238] krealloc_less_oob+0x20/0x38 [ 30.444922] kunit_try_run_case+0x14c/0x3d0 [ 30.445589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.446582] kthread+0x24c/0x2d0 [ 30.447155] ret_from_fork+0x10/0x20 [ 30.447838] [ 30.448239] The buggy address belongs to the object at fff00000c0c13600 [ 30.448239] which belongs to the cache kmalloc-256 of size 256 [ 30.449570] The buggy address is located 7 bytes to the right of [ 30.449570] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.451211] [ 30.451639] The buggy address belongs to the physical page: [ 30.452248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.453241] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.454112] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.455324] page_type: f5(slab) [ 30.455856] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.456787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.457724] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.459064] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.460037] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.460910] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.461817] page dumped because: kasan: bad access detected [ 30.462877] [ 30.463179] Memory state around the buggy address: [ 30.464289] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.465040] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.466208] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.467465] ^ [ 30.468202] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.469158] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.470074] ================================================================== [ 30.564173] ================================================================== [ 30.565156] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.567060] Write of size 1 at addr fff00000c0c136eb by task kunit_try_catch/147 [ 30.568017] [ 30.568484] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.570038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.570589] Hardware name: linux,dummy-virt (DT) [ 30.571182] Call trace: [ 30.571605] show_stack+0x20/0x38 (C) [ 30.572207] dump_stack_lvl+0x8c/0xd0 [ 30.572825] print_report+0x118/0x5e0 [ 30.573367] kasan_report+0xc8/0x118 [ 30.574012] __asan_report_store1_noabort+0x20/0x30 [ 30.574698] krealloc_less_oob_helper+0xa58/0xc50 [ 30.575374] krealloc_less_oob+0x20/0x38 [ 30.575929] kunit_try_run_case+0x14c/0x3d0 [ 30.576638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.577369] kthread+0x24c/0x2d0 [ 30.577976] ret_from_fork+0x10/0x20 [ 30.578613] [ 30.578998] Allocated by task 147: [ 30.579562] kasan_save_stack+0x3c/0x68 [ 30.580068] kasan_save_track+0x20/0x40 [ 30.580715] kasan_save_alloc_info+0x40/0x58 [ 30.581303] __kasan_krealloc+0x118/0x178 [ 30.581833] krealloc_noprof+0x128/0x360 [ 30.582457] krealloc_less_oob_helper+0x168/0xc50 [ 30.583135] krealloc_less_oob+0x20/0x38 [ 30.583657] kunit_try_run_case+0x14c/0x3d0 [ 30.584314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.585022] kthread+0x24c/0x2d0 [ 30.585584] ret_from_fork+0x10/0x20 [ 30.586256] [ 30.586675] The buggy address belongs to the object at fff00000c0c13600 [ 30.586675] which belongs to the cache kmalloc-256 of size 256 [ 30.587962] The buggy address is located 34 bytes to the right of [ 30.587962] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.589107] [ 30.589414] The buggy address belongs to the physical page: [ 30.590070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.591010] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.591805] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.592677] page_type: f5(slab) [ 30.593178] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.594099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.594973] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.595901] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.596740] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.597611] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.598457] page dumped because: kasan: bad access detected [ 30.599193] [ 30.599572] Memory state around the buggy address: [ 30.600148] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.601075] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.601786] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.602700] ^ [ 30.603409] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.604275] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.605058] ================================================================== [ 30.731681] ================================================================== [ 30.732504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.734388] Write of size 1 at addr fff00000c62220d0 by task kunit_try_catch/151 [ 30.736144] [ 30.736499] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.737691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.738439] Hardware name: linux,dummy-virt (DT) [ 30.739774] Call trace: [ 30.740128] show_stack+0x20/0x38 (C) [ 30.740785] dump_stack_lvl+0x8c/0xd0 [ 30.741360] print_report+0x118/0x5e0 [ 30.742004] kasan_report+0xc8/0x118 [ 30.743018] __asan_report_store1_noabort+0x20/0x30 [ 30.743603] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.744245] krealloc_large_less_oob+0x20/0x38 [ 30.744958] kunit_try_run_case+0x14c/0x3d0 [ 30.745689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.746735] kthread+0x24c/0x2d0 [ 30.747227] ret_from_fork+0x10/0x20 [ 30.748566] [ 30.749068] The buggy address belongs to the physical page: [ 30.749875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.751140] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.752003] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.753114] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.754006] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.755054] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.755959] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.757138] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.758257] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.759657] page dumped because: kasan: bad access detected [ 30.760192] [ 30.760364] Memory state around the buggy address: [ 30.760752] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.761741] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.762738] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.764472] ^ [ 30.765154] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.766037] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.767237] ================================================================== [ 30.517983] ================================================================== [ 30.519339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.520181] Write of size 1 at addr fff00000c0c136ea by task kunit_try_catch/147 [ 30.520958] [ 30.521358] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.523174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.523436] Hardware name: linux,dummy-virt (DT) [ 30.523899] Call trace: [ 30.524358] show_stack+0x20/0x38 (C) [ 30.525106] dump_stack_lvl+0x8c/0xd0 [ 30.525804] print_report+0x118/0x5e0 [ 30.526434] kasan_report+0xc8/0x118 [ 30.527240] __asan_report_store1_noabort+0x20/0x30 [ 30.528037] krealloc_less_oob_helper+0xae4/0xc50 [ 30.528816] krealloc_less_oob+0x20/0x38 [ 30.529560] kunit_try_run_case+0x14c/0x3d0 [ 30.530600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.531391] kthread+0x24c/0x2d0 [ 30.531912] ret_from_fork+0x10/0x20 [ 30.532452] [ 30.532887] Allocated by task 147: [ 30.533442] kasan_save_stack+0x3c/0x68 [ 30.534220] kasan_save_track+0x20/0x40 [ 30.534943] kasan_save_alloc_info+0x40/0x58 [ 30.535889] __kasan_krealloc+0x118/0x178 [ 30.536956] krealloc_noprof+0x128/0x360 [ 30.537874] krealloc_less_oob_helper+0x168/0xc50 [ 30.538748] krealloc_less_oob+0x20/0x38 [ 30.539476] kunit_try_run_case+0x14c/0x3d0 [ 30.540098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.540805] kthread+0x24c/0x2d0 [ 30.541300] ret_from_fork+0x10/0x20 [ 30.541839] [ 30.542221] The buggy address belongs to the object at fff00000c0c13600 [ 30.542221] which belongs to the cache kmalloc-256 of size 256 [ 30.543899] The buggy address is located 33 bytes to the right of [ 30.543899] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.545274] [ 30.545697] The buggy address belongs to the physical page: [ 30.546371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.547306] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.548114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.548891] page_type: f5(slab) [ 30.549456] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.550432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.551585] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.552397] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.553263] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.554224] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.555091] page dumped because: kasan: bad access detected [ 30.556021] [ 30.556306] Memory state around the buggy address: [ 30.557153] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.558082] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.559297] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.560036] ^ [ 30.560849] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.561589] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.562663] ================================================================== [ 30.472136] ================================================================== [ 30.472969] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.473771] Write of size 1 at addr fff00000c0c136da by task kunit_try_catch/147 [ 30.474975] [ 30.475389] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.476749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.477559] Hardware name: linux,dummy-virt (DT) [ 30.478543] Call trace: [ 30.479426] show_stack+0x20/0x38 (C) [ 30.479929] dump_stack_lvl+0x8c/0xd0 [ 30.480444] print_report+0x118/0x5e0 [ 30.481028] kasan_report+0xc8/0x118 [ 30.481560] __asan_report_store1_noabort+0x20/0x30 [ 30.482287] krealloc_less_oob_helper+0xa80/0xc50 [ 30.483178] krealloc_less_oob+0x20/0x38 [ 30.483844] kunit_try_run_case+0x14c/0x3d0 [ 30.484482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.485205] kthread+0x24c/0x2d0 [ 30.485779] ret_from_fork+0x10/0x20 [ 30.486386] [ 30.486920] Allocated by task 147: [ 30.487407] kasan_save_stack+0x3c/0x68 [ 30.488134] kasan_save_track+0x20/0x40 [ 30.488635] kasan_save_alloc_info+0x40/0x58 [ 30.489301] __kasan_krealloc+0x118/0x178 [ 30.489965] krealloc_noprof+0x128/0x360 [ 30.491030] krealloc_less_oob_helper+0x168/0xc50 [ 30.491700] krealloc_less_oob+0x20/0x38 [ 30.492216] kunit_try_run_case+0x14c/0x3d0 [ 30.492875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.493607] kthread+0x24c/0x2d0 [ 30.494081] ret_from_fork+0x10/0x20 [ 30.495342] [ 30.495751] The buggy address belongs to the object at fff00000c0c13600 [ 30.495751] which belongs to the cache kmalloc-256 of size 256 [ 30.496974] The buggy address is located 17 bytes to the right of [ 30.496974] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.498255] [ 30.499101] The buggy address belongs to the physical page: [ 30.499865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.500659] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.501635] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.502386] page_type: f5(slab) [ 30.503185] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.504087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.504993] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.505995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.507101] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.508003] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.508848] page dumped because: kasan: bad access detected [ 30.509499] [ 30.509844] Memory state around the buggy address: [ 30.510393] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.511581] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.512430] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.513222] ^ [ 30.513933] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.515341] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.516133] ================================================================== [ 30.376154] ================================================================== [ 30.377177] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.378092] Write of size 1 at addr fff00000c0c136c9 by task kunit_try_catch/147 [ 30.379045] [ 30.379392] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.381055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.381555] Hardware name: linux,dummy-virt (DT) [ 30.382498] Call trace: [ 30.382939] show_stack+0x20/0x38 (C) [ 30.383604] dump_stack_lvl+0x8c/0xd0 [ 30.384243] print_report+0x118/0x5e0 [ 30.384904] kasan_report+0xc8/0x118 [ 30.385476] __asan_report_store1_noabort+0x20/0x30 [ 30.386143] krealloc_less_oob_helper+0xa48/0xc50 [ 30.387195] krealloc_less_oob+0x20/0x38 [ 30.387863] kunit_try_run_case+0x14c/0x3d0 [ 30.388567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.389354] kthread+0x24c/0x2d0 [ 30.389878] ret_from_fork+0x10/0x20 [ 30.390802] [ 30.391186] Allocated by task 147: [ 30.391685] kasan_save_stack+0x3c/0x68 [ 30.392283] kasan_save_track+0x20/0x40 [ 30.392931] kasan_save_alloc_info+0x40/0x58 [ 30.393616] __kasan_krealloc+0x118/0x178 [ 30.394155] krealloc_noprof+0x128/0x360 [ 30.395090] krealloc_less_oob_helper+0x168/0xc50 [ 30.395796] krealloc_less_oob+0x20/0x38 [ 30.396391] kunit_try_run_case+0x14c/0x3d0 [ 30.397018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.397628] kthread+0x24c/0x2d0 [ 30.399069] ret_from_fork+0x10/0x20 [ 30.399684] [ 30.400056] The buggy address belongs to the object at fff00000c0c13600 [ 30.400056] which belongs to the cache kmalloc-256 of size 256 [ 30.401278] The buggy address is located 0 bytes to the right of [ 30.401278] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.403043] [ 30.403463] The buggy address belongs to the physical page: [ 30.404281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.405366] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.406360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.407216] page_type: f5(slab) [ 30.407698] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.408994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.409924] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.411101] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.412026] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.412966] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.413769] page dumped because: kasan: bad access detected [ 30.414827] [ 30.415385] Memory state around the buggy address: [ 30.416051] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.416891] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.417754] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.418683] ^ [ 30.419573] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.420204] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.421131] ================================================================== [ 30.769904] ================================================================== [ 30.770893] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.771713] Write of size 1 at addr fff00000c62220da by task kunit_try_catch/151 [ 30.772724] [ 30.773140] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.774647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.775529] Hardware name: linux,dummy-virt (DT) [ 30.776216] Call trace: [ 30.776697] show_stack+0x20/0x38 (C) [ 30.777365] dump_stack_lvl+0x8c/0xd0 [ 30.778088] print_report+0x118/0x5e0 [ 30.778931] kasan_report+0xc8/0x118 [ 30.779411] __asan_report_store1_noabort+0x20/0x30 [ 30.780379] krealloc_less_oob_helper+0xa80/0xc50 [ 30.781343] krealloc_large_less_oob+0x20/0x38 [ 30.782157] kunit_try_run_case+0x14c/0x3d0 [ 30.783168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.783906] kthread+0x24c/0x2d0 [ 30.784427] ret_from_fork+0x10/0x20 [ 30.785340] [ 30.785941] The buggy address belongs to the physical page: [ 30.787164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.787957] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.788535] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.789482] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.790940] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.791752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.792680] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.793572] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.794741] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.795908] page dumped because: kasan: bad access detected [ 30.796558] [ 30.796930] Memory state around the buggy address: [ 30.797501] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.798504] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.799561] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.800453] ^ [ 30.801210] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.802052] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.803330] ================================================================== [ 30.697188] ================================================================== [ 30.698333] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.699598] Write of size 1 at addr fff00000c62220c9 by task kunit_try_catch/151 [ 30.701318] [ 30.701773] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.703304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.703939] Hardware name: linux,dummy-virt (DT) [ 30.704672] Call trace: [ 30.705219] show_stack+0x20/0x38 (C) [ 30.705981] dump_stack_lvl+0x8c/0xd0 [ 30.707110] print_report+0x118/0x5e0 [ 30.707749] kasan_report+0xc8/0x118 [ 30.708354] __asan_report_store1_noabort+0x20/0x30 [ 30.709075] krealloc_less_oob_helper+0xa48/0xc50 [ 30.709798] krealloc_large_less_oob+0x20/0x38 [ 30.710503] kunit_try_run_case+0x14c/0x3d0 [ 30.711530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.712311] kthread+0x24c/0x2d0 [ 30.712893] ret_from_fork+0x10/0x20 [ 30.713370] [ 30.713829] The buggy address belongs to the physical page: [ 30.714980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.715939] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.716804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.717610] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.718577] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.719712] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.720582] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.721434] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.722349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.723119] page dumped because: kasan: bad access detected [ 30.723868] [ 30.724178] Memory state around the buggy address: [ 30.724865] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.725634] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.726425] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.727480] ^ [ 30.728419] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.729273] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.729992] ================================================================== [ 30.804596] ================================================================== [ 30.805473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.806221] Write of size 1 at addr fff00000c62220ea by task kunit_try_catch/151 [ 30.807232] [ 30.807655] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.808765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.809371] Hardware name: linux,dummy-virt (DT) [ 30.810007] Call trace: [ 30.810989] show_stack+0x20/0x38 (C) [ 30.811499] dump_stack_lvl+0x8c/0xd0 [ 30.812186] print_report+0x118/0x5e0 [ 30.812874] kasan_report+0xc8/0x118 [ 30.813555] __asan_report_store1_noabort+0x20/0x30 [ 30.814345] krealloc_less_oob_helper+0xae4/0xc50 [ 30.815178] krealloc_large_less_oob+0x20/0x38 [ 30.815924] kunit_try_run_case+0x14c/0x3d0 [ 30.816722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.817608] kthread+0x24c/0x2d0 [ 30.818229] ret_from_fork+0x10/0x20 [ 30.818943] [ 30.819471] The buggy address belongs to the physical page: [ 30.820289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.821330] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.822162] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.823180] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.823973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.824963] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.825900] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.826845] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.827776] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.828690] page dumped because: kasan: bad access detected [ 30.829397] [ 30.829837] Memory state around the buggy address: [ 30.830428] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.831402] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.832252] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.833172] ^ [ 30.833974] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.834807] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.835697] ==================================================================
[ 23.130462] ================================================================== [ 23.131665] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 [ 23.133581] Write of size 1 at addr ffff888102aba0d0 by task kunit_try_catch/170 [ 23.134638] [ 23.134782] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 23.135302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.135558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.136052] Call Trace: [ 23.137177] <TASK> [ 23.137848] dump_stack_lvl+0x73/0xb0 [ 23.138488] print_report+0xd1/0x640 [ 23.138718] ? __virt_addr_valid+0x1db/0x2d0 [ 23.138924] ? kasan_addr_to_slab+0x11/0xa0 [ 23.139245] kasan_report+0x102/0x140 [ 23.139970] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 23.140419] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 23.141759] __asan_report_store1_noabort+0x1b/0x30 [ 23.142268] krealloc_less_oob_helper+0xe25/0x11d0 [ 23.142802] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.143808] ? finish_task_switch.isra.0+0x153/0x700 [ 23.144352] ? __switch_to+0x5d9/0xf60 [ 23.144742] ? __schedule+0xc70/0x27e0 [ 23.145052] ? __pfx_read_tsc+0x10/0x10 [ 23.146845] krealloc_large_less_oob+0x1c/0x30 [ 23.147406] kunit_try_run_case+0x1b3/0x490 [ 23.148296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.149034] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.149558] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.150076] ? __kthread_parkme+0x82/0x160 [ 23.151193] ? preempt_count_sub+0x50/0x80 [ 23.151638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.152323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.153015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.153586] kthread+0x257/0x310 [ 23.154059] ? __pfx_kthread+0x10/0x10 [ 23.154410] ret_from_fork+0x41/0x80 [ 23.154817] ? __pfx_kthread+0x10/0x10 [ 23.155341] ret_from_fork_asm+0x1a/0x30 [ 23.155710] </TASK> [ 23.156048] [ 23.157232] The buggy address belongs to the physical page: [ 23.157911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8 [ 23.158760] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.159752] flags: 0x200000000000040(head|node=0|zone=2) [ 23.160276] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.162033] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.163014] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.163874] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.164572] head: 0200000000000002 ffffea00040aae01 ffffffffffffffff 0000000000000000 [ 23.166160] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.166829] page dumped because: kasan: bad access detected [ 23.167360] [ 23.167533] Memory state around the buggy address: [ 23.168087] ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.169211] ffff888102aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.169912] >ffff888102aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.170535] ^ [ 23.172049] ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.172684] ffff888102aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.173399] ================================================================== [ 22.617182] ================================================================== [ 22.618750] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 [ 22.620582] Write of size 1 at addr ffff8881003978c9 by task kunit_try_catch/166 [ 22.621239] [ 22.621486] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 22.623788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.624234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.626436] Call Trace: [ 22.627319] <TASK> [ 22.627484] dump_stack_lvl+0x73/0xb0 [ 22.628740] print_report+0xd1/0x640 [ 22.629199] ? __virt_addr_valid+0x1db/0x2d0 [ 22.630312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.631815] kasan_report+0x102/0x140 [ 22.632222] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 22.633584] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 22.635071] __asan_report_store1_noabort+0x1b/0x30 [ 22.635592] krealloc_less_oob_helper+0xd72/0x11d0 [ 22.636119] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.636618] ? finish_task_switch.isra.0+0x153/0x700 [ 22.638690] ? __switch_to+0x5d9/0xf60 [ 22.639223] ? __schedule+0xc70/0x27e0 [ 22.640168] ? __pfx_read_tsc+0x10/0x10 [ 22.640916] krealloc_less_oob+0x1c/0x30 [ 22.642310] kunit_try_run_case+0x1b3/0x490 [ 22.642667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.643878] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.644924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.646544] ? __kthread_parkme+0x82/0x160 [ 22.647023] ? preempt_count_sub+0x50/0x80 [ 22.648257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.649492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.650156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.651290] kthread+0x257/0x310 [ 22.651968] ? __pfx_kthread+0x10/0x10 [ 22.653450] ret_from_fork+0x41/0x80 [ 22.653861] ? __pfx_kthread+0x10/0x10 [ 22.654319] ret_from_fork_asm+0x1a/0x30 [ 22.655789] </TASK> [ 22.656174] [ 22.656438] Allocated by task 166: [ 22.656796] kasan_save_stack+0x3d/0x60 [ 22.658161] kasan_save_track+0x18/0x40 [ 22.659043] kasan_save_alloc_info+0x3b/0x50 [ 22.660418] __kasan_krealloc+0x190/0x1f0 [ 22.661300] krealloc_noprof+0xf3/0x340 [ 22.662198] krealloc_less_oob_helper+0x1ab/0x11d0 [ 22.663233] krealloc_less_oob+0x1c/0x30 [ 22.663523] kunit_try_run_case+0x1b3/0x490 [ 22.664424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.665882] kthread+0x257/0x310 [ 22.666988] ret_from_fork+0x41/0x80 [ 22.667860] ret_from_fork_asm+0x1a/0x30 [ 22.668152] [ 22.668329] The buggy address belongs to the object at ffff888100397800 [ 22.668329] which belongs to the cache kmalloc-256 of size 256 [ 22.671132] The buggy address is located 0 bytes to the right of [ 22.671132] allocated 201-byte region [ffff888100397800, ffff8881003978c9) [ 22.673350] [ 22.673554] The buggy address belongs to the physical page: [ 22.674267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396 [ 22.674887] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.677021] flags: 0x200000000000040(head|node=0|zone=2) [ 22.677551] page_type: f5(slab) [ 22.678155] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.679803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.680612] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.681454] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.684010] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000 [ 22.685322] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 22.686790] page dumped because: kasan: bad access detected [ 22.688060] [ 22.688258] Memory state around the buggy address: [ 22.688540] ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.690072] ffff888100397800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.690919] >ffff888100397880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.693012] ^ [ 22.693719] ffff888100397900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695165] ffff888100397980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.696421] ================================================================== [ 22.698189] ================================================================== [ 22.699002] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 [ 22.699659] Write of size 1 at addr ffff8881003978d0 by task kunit_try_catch/166 [ 22.700378] [ 22.700568] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 22.702508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.702992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.705851] Call Trace: [ 22.706114] <TASK> [ 22.706789] dump_stack_lvl+0x73/0xb0 [ 22.707477] print_report+0xd1/0x640 [ 22.708520] ? __virt_addr_valid+0x1db/0x2d0 [ 22.708973] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.709924] kasan_report+0x102/0x140 [ 22.711231] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 22.712446] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 22.713643] __asan_report_store1_noabort+0x1b/0x30 [ 22.715025] krealloc_less_oob_helper+0xe25/0x11d0 [ 22.716057] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.716473] ? finish_task_switch.isra.0+0x153/0x700 [ 22.717027] ? __switch_to+0x5d9/0xf60 [ 22.717815] ? __schedule+0xc70/0x27e0 [ 22.718195] ? __pfx_read_tsc+0x10/0x10 [ 22.718818] krealloc_less_oob+0x1c/0x30 [ 22.719151] kunit_try_run_case+0x1b3/0x490 [ 22.720582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.721287] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.721690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.722865] ? __kthread_parkme+0x82/0x160 [ 22.723265] ? preempt_count_sub+0x50/0x80 [ 22.724583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.725273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.726020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.726752] kthread+0x257/0x310 [ 22.728168] ? __pfx_kthread+0x10/0x10 [ 22.728614] ret_from_fork+0x41/0x80 [ 22.729407] ? __pfx_kthread+0x10/0x10 [ 22.729756] ret_from_fork_asm+0x1a/0x30 [ 22.730514] </TASK> [ 22.730749] [ 22.731432] Allocated by task 166: [ 22.731993] kasan_save_stack+0x3d/0x60 [ 22.732466] kasan_save_track+0x18/0x40 [ 22.732920] kasan_save_alloc_info+0x3b/0x50 [ 22.734377] __kasan_krealloc+0x190/0x1f0 [ 22.735263] krealloc_noprof+0xf3/0x340 [ 22.735718] krealloc_less_oob_helper+0x1ab/0x11d0 [ 22.736573] krealloc_less_oob+0x1c/0x30 [ 22.736912] kunit_try_run_case+0x1b3/0x490 [ 22.738082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.738608] kthread+0x257/0x310 [ 22.739482] ret_from_fork+0x41/0x80 [ 22.739793] ret_from_fork_asm+0x1a/0x30 [ 22.740765] [ 22.741099] The buggy address belongs to the object at ffff888100397800 [ 22.741099] which belongs to the cache kmalloc-256 of size 256 [ 22.742134] The buggy address is located 7 bytes to the right of [ 22.742134] allocated 201-byte region [ffff888100397800, ffff8881003978c9) [ 22.744849] [ 22.745466] The buggy address belongs to the physical page: [ 22.746254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396 [ 22.747031] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.748497] flags: 0x200000000000040(head|node=0|zone=2) [ 22.750128] page_type: f5(slab) [ 22.750862] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.751603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.753504] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.754561] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.755581] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000 [ 22.756037] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 22.756433] page dumped because: kasan: bad access detected [ 22.756654] [ 22.756748] Memory state around the buggy address: [ 22.757052] ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.758816] ffff888100397800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.759848] >ffff888100397880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.761011] ^ [ 22.761370] ffff888100397900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.761801] ffff888100397980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.762638] ================================================================== [ 23.174334] ================================================================== [ 23.175070] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 [ 23.175984] Write of size 1 at addr ffff888102aba0da by task kunit_try_catch/170 [ 23.177497] [ 23.177802] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 23.179680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.180013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.181027] Call Trace: [ 23.182365] <TASK> [ 23.182649] dump_stack_lvl+0x73/0xb0 [ 23.182995] print_report+0xd1/0x640 [ 23.183723] ? __virt_addr_valid+0x1db/0x2d0 [ 23.184690] ? kasan_addr_to_slab+0x11/0xa0 [ 23.185305] kasan_report+0x102/0x140 [ 23.186489] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 23.186984] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 23.187680] __asan_report_store1_noabort+0x1b/0x30 [ 23.188304] krealloc_less_oob_helper+0xec8/0x11d0 [ 23.188819] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.189383] ? finish_task_switch.isra.0+0x153/0x700 [ 23.189880] ? __switch_to+0x5d9/0xf60 [ 23.190363] ? __schedule+0xc70/0x27e0 [ 23.190819] ? __pfx_read_tsc+0x10/0x10 [ 23.191347] krealloc_large_less_oob+0x1c/0x30 [ 23.191710] kunit_try_run_case+0x1b3/0x490 [ 23.192335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.192793] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.193178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.193822] ? __kthread_parkme+0x82/0x160 [ 23.195331] ? preempt_count_sub+0x50/0x80 [ 23.196051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.196406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.196800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.197845] kthread+0x257/0x310 [ 23.198415] ? __pfx_kthread+0x10/0x10 [ 23.198731] ret_from_fork+0x41/0x80 [ 23.199269] ? __pfx_kthread+0x10/0x10 [ 23.200744] ret_from_fork_asm+0x1a/0x30 [ 23.201292] </TASK> [ 23.201701] [ 23.201984] The buggy address belongs to the physical page: [ 23.202331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8 [ 23.203313] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.205338] flags: 0x200000000000040(head|node=0|zone=2) [ 23.206244] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.206995] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.208035] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.209297] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.210145] head: 0200000000000002 ffffea00040aae01 ffffffffffffffff 0000000000000000 [ 23.211803] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.212583] page dumped because: kasan: bad access detected [ 23.213640] [ 23.213885] Memory state around the buggy address: [ 23.215356] ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.216334] ffff888102aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.216910] >ffff888102aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.217751] ^ [ 23.219359] ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.219817] ffff888102aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.220718] ================================================================== [ 23.222244] ================================================================== [ 23.223780] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 [ 23.225059] Write of size 1 at addr ffff888102aba0ea by task kunit_try_catch/170 [ 23.226302] [ 23.226594] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 23.227895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.229140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.230467] Call Trace: [ 23.231066] <TASK> [ 23.231471] dump_stack_lvl+0x73/0xb0 [ 23.232298] print_report+0xd1/0x640 [ 23.233406] ? __virt_addr_valid+0x1db/0x2d0 [ 23.234271] ? kasan_addr_to_slab+0x11/0xa0 [ 23.234782] kasan_report+0x102/0x140 [ 23.235104] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 23.236141] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 23.236573] __asan_report_store1_noabort+0x1b/0x30 [ 23.238409] krealloc_less_oob_helper+0xe92/0x11d0 [ 23.239298] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.240233] ? finish_task_switch.isra.0+0x153/0x700 [ 23.240763] ? __switch_to+0x5d9/0xf60 [ 23.242280] ? __schedule+0xc70/0x27e0 [ 23.243071] ? __pfx_read_tsc+0x10/0x10 [ 23.243761] krealloc_large_less_oob+0x1c/0x30 [ 23.244222] kunit_try_run_case+0x1b3/0x490 [ 23.245386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.245997] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.247296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.248278] ? __kthread_parkme+0x82/0x160 [ 23.248588] ? preempt_count_sub+0x50/0x80 [ 23.249262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.249710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.251280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.252069] kthread+0x257/0x310 [ 23.252454] ? __pfx_kthread+0x10/0x10 [ 23.253494] ret_from_fork+0x41/0x80 [ 23.254070] ? __pfx_kthread+0x10/0x10 [ 23.254706] ret_from_fork_asm+0x1a/0x30 [ 23.255461] </TASK> [ 23.255792] [ 23.256094] The buggy address belongs to the physical page: [ 23.256501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8 [ 23.257861] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.259203] flags: 0x200000000000040(head|node=0|zone=2) [ 23.260253] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.261284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.261692] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.264332] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.265765] head: 0200000000000002 ffffea00040aae01 ffffffffffffffff 0000000000000000 [ 23.266765] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.267537] page dumped because: kasan: bad access detected [ 23.268434] [ 23.268680] Memory state around the buggy address: [ 23.270072] ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.270813] ffff888102aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.272204] >ffff888102aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.273545] ^ [ 23.274635] ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.275592] ffff888102aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.276656] ================================================================== [ 22.892338] ================================================================== [ 22.893213] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 [ 22.894034] Write of size 1 at addr ffff8881003978eb by task kunit_try_catch/166 [ 22.894904] [ 22.895238] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 22.896696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.897225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.898441] Call Trace: [ 22.898770] <TASK> [ 22.899022] dump_stack_lvl+0x73/0xb0 [ 22.899350] print_report+0xd1/0x640 [ 22.900518] ? __virt_addr_valid+0x1db/0x2d0 [ 22.901212] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.902226] kasan_report+0x102/0x140 [ 22.902845] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 22.903318] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 22.904393] __asan_report_store1_noabort+0x1b/0x30 [ 22.904757] krealloc_less_oob_helper+0xd49/0x11d0 [ 22.905387] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.907023] ? finish_task_switch.isra.0+0x153/0x700 [ 22.907854] ? __switch_to+0x5d9/0xf60 [ 22.908355] ? __schedule+0xc70/0x27e0 [ 22.909275] ? __pfx_read_tsc+0x10/0x10 [ 22.910281] krealloc_less_oob+0x1c/0x30 [ 22.910820] kunit_try_run_case+0x1b3/0x490 [ 22.911295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.912245] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.912921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.913556] ? __kthread_parkme+0x82/0x160 [ 22.914841] ? preempt_count_sub+0x50/0x80 [ 22.915336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.916018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.916732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.917743] kthread+0x257/0x310 [ 22.918148] ? __pfx_kthread+0x10/0x10 [ 22.919117] ret_from_fork+0x41/0x80 [ 22.919540] ? __pfx_kthread+0x10/0x10 [ 22.920091] ret_from_fork_asm+0x1a/0x30 [ 22.920960] </TASK> [ 22.921260] [ 22.921740] Allocated by task 166: [ 22.922539] kasan_save_stack+0x3d/0x60 [ 22.923661] kasan_save_track+0x18/0x40 [ 22.923993] kasan_save_alloc_info+0x3b/0x50 [ 22.924550] __kasan_krealloc+0x190/0x1f0 [ 22.925434] krealloc_noprof+0xf3/0x340 [ 22.925742] krealloc_less_oob_helper+0x1ab/0x11d0 [ 22.927355] krealloc_less_oob+0x1c/0x30 [ 22.927969] kunit_try_run_case+0x1b3/0x490 [ 22.928552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.929307] kthread+0x257/0x310 [ 22.929904] ret_from_fork+0x41/0x80 [ 22.930365] ret_from_fork_asm+0x1a/0x30 [ 22.930824] [ 22.931061] The buggy address belongs to the object at ffff888100397800 [ 22.931061] which belongs to the cache kmalloc-256 of size 256 [ 22.932178] The buggy address is located 34 bytes to the right of [ 22.932178] allocated 201-byte region [ffff888100397800, ffff8881003978c9) [ 22.934213] [ 22.934536] The buggy address belongs to the physical page: [ 22.935091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396 [ 22.936002] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.936680] flags: 0x200000000000040(head|node=0|zone=2) [ 22.937401] page_type: f5(slab) [ 22.937802] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.939657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.940854] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.942581] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.943498] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000 [ 22.944139] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 22.945234] page dumped because: kasan: bad access detected [ 22.946257] [ 22.946610] Memory state around the buggy address: [ 22.947856] ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.948867] ffff888100397800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.950164] >ffff888100397880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.950794] ^ [ 22.953050] ffff888100397900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.953858] ffff888100397980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.954636] ================================================================== [ 23.278462] ================================================================== [ 23.279388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 [ 23.280830] Write of size 1 at addr ffff888102aba0eb by task kunit_try_catch/170 [ 23.281716] [ 23.282180] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 23.284161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.284645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.286869] Call Trace: [ 23.287500] <TASK> [ 23.287864] dump_stack_lvl+0x73/0xb0 [ 23.288975] print_report+0xd1/0x640 [ 23.289438] ? __virt_addr_valid+0x1db/0x2d0 [ 23.290092] ? kasan_addr_to_slab+0x11/0xa0 [ 23.290981] kasan_report+0x102/0x140 [ 23.291630] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 23.292879] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 23.293552] __asan_report_store1_noabort+0x1b/0x30 [ 23.294557] krealloc_less_oob_helper+0xd49/0x11d0 [ 23.295347] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.296471] ? finish_task_switch.isra.0+0x153/0x700 [ 23.297521] ? __switch_to+0x5d9/0xf60 [ 23.298357] ? __schedule+0xc70/0x27e0 [ 23.298874] ? __pfx_read_tsc+0x10/0x10 [ 23.299534] krealloc_large_less_oob+0x1c/0x30 [ 23.300887] kunit_try_run_case+0x1b3/0x490 [ 23.301304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.302008] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.302313] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.302622] ? __kthread_parkme+0x82/0x160 [ 23.302818] ? preempt_count_sub+0x50/0x80 [ 23.303093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.303578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.305873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.306570] kthread+0x257/0x310 [ 23.307263] ? __pfx_kthread+0x10/0x10 [ 23.307908] ret_from_fork+0x41/0x80 [ 23.309419] ? __pfx_kthread+0x10/0x10 [ 23.310196] ret_from_fork_asm+0x1a/0x30 [ 23.310545] </TASK> [ 23.310837] [ 23.311056] The buggy address belongs to the physical page: [ 23.311899] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8 [ 23.312507] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.313875] flags: 0x200000000000040(head|node=0|zone=2) [ 23.314640] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.315294] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.316265] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.316884] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.318989] head: 0200000000000002 ffffea00040aae01 ffffffffffffffff 0000000000000000 [ 23.321062] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.321878] page dumped because: kasan: bad access detected [ 23.322395] [ 23.322995] Memory state around the buggy address: [ 23.323925] ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.325195] ffff888102aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.325849] >ffff888102aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.326739] ^ [ 23.327265] ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.327791] ffff888102aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.328530] ================================================================== [ 22.829356] ================================================================== [ 22.830381] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 [ 22.831066] Write of size 1 at addr ffff8881003978ea by task kunit_try_catch/166 [ 22.831791] [ 22.832434] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 22.834043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.834573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.835259] Call Trace: [ 22.836018] <TASK> [ 22.836406] dump_stack_lvl+0x73/0xb0 [ 22.837010] print_report+0xd1/0x640 [ 22.838048] ? __virt_addr_valid+0x1db/0x2d0 [ 22.838591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.839512] kasan_report+0x102/0x140 [ 22.840369] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 22.841743] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 22.842337] __asan_report_store1_noabort+0x1b/0x30 [ 22.842966] krealloc_less_oob_helper+0xe92/0x11d0 [ 22.843995] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.844372] ? finish_task_switch.isra.0+0x153/0x700 [ 22.845635] ? __switch_to+0x5d9/0xf60 [ 22.846349] ? __schedule+0xc70/0x27e0 [ 22.846830] ? __pfx_read_tsc+0x10/0x10 [ 22.847393] krealloc_less_oob+0x1c/0x30 [ 22.847846] kunit_try_run_case+0x1b3/0x490 [ 22.848671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.849074] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.850545] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.851299] ? __kthread_parkme+0x82/0x160 [ 22.851867] ? preempt_count_sub+0x50/0x80 [ 22.852474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.853293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.853925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.855082] kthread+0x257/0x310 [ 22.855467] ? __pfx_kthread+0x10/0x10 [ 22.855860] ret_from_fork+0x41/0x80 [ 22.856742] ? __pfx_kthread+0x10/0x10 [ 22.857063] ret_from_fork_asm+0x1a/0x30 [ 22.857983] </TASK> [ 22.858797] [ 22.859049] Allocated by task 166: [ 22.859289] kasan_save_stack+0x3d/0x60 [ 22.860432] kasan_save_track+0x18/0x40 [ 22.861222] kasan_save_alloc_info+0x3b/0x50 [ 22.861647] __kasan_krealloc+0x190/0x1f0 [ 22.861990] krealloc_noprof+0xf3/0x340 [ 22.862887] krealloc_less_oob_helper+0x1ab/0x11d0 [ 22.863704] krealloc_less_oob+0x1c/0x30 [ 22.864384] kunit_try_run_case+0x1b3/0x490 [ 22.864746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.865474] kthread+0x257/0x310 [ 22.865899] ret_from_fork+0x41/0x80 [ 22.867407] ret_from_fork_asm+0x1a/0x30 [ 22.868089] [ 22.868294] The buggy address belongs to the object at ffff888100397800 [ 22.868294] which belongs to the cache kmalloc-256 of size 256 [ 22.869981] The buggy address is located 33 bytes to the right of [ 22.869981] allocated 201-byte region [ffff888100397800, ffff8881003978c9) [ 22.870804] [ 22.872110] The buggy address belongs to the physical page: [ 22.872497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396 [ 22.873757] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.874702] flags: 0x200000000000040(head|node=0|zone=2) [ 22.875920] page_type: f5(slab) [ 22.877105] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.878071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.878695] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.879754] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.880764] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000 [ 22.882099] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 22.883245] page dumped because: kasan: bad access detected [ 22.884108] [ 22.884301] Memory state around the buggy address: [ 22.885017] ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.886602] ffff888100397800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.887280] >ffff888100397880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.887973] ^ [ 22.889022] ffff888100397900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.889562] ffff888100397980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.890377] ================================================================== [ 23.079029] ================================================================== [ 23.079992] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 [ 23.082408] Write of size 1 at addr ffff888102aba0c9 by task kunit_try_catch/170 [ 23.083249] [ 23.083594] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 23.085277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.086422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.087499] Call Trace: [ 23.087653] <TASK> [ 23.087786] dump_stack_lvl+0x73/0xb0 [ 23.088099] print_report+0xd1/0x640 [ 23.088397] ? __virt_addr_valid+0x1db/0x2d0 [ 23.089161] ? kasan_addr_to_slab+0x11/0xa0 [ 23.090467] kasan_report+0x102/0x140 [ 23.090889] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 23.091739] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 23.092868] __asan_report_store1_noabort+0x1b/0x30 [ 23.093360] krealloc_less_oob_helper+0xd72/0x11d0 [ 23.094318] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.095675] ? finish_task_switch.isra.0+0x153/0x700 [ 23.096513] ? __switch_to+0x5d9/0xf60 [ 23.097121] ? __schedule+0xc70/0x27e0 [ 23.097767] ? __pfx_read_tsc+0x10/0x10 [ 23.098516] krealloc_large_less_oob+0x1c/0x30 [ 23.099699] kunit_try_run_case+0x1b3/0x490 [ 23.100193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.100671] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.102037] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.102565] ? __kthread_parkme+0x82/0x160 [ 23.102998] ? preempt_count_sub+0x50/0x80 [ 23.103363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.103773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.105094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.106171] kthread+0x257/0x310 [ 23.106582] ? __pfx_kthread+0x10/0x10 [ 23.107200] ret_from_fork+0x41/0x80 [ 23.107764] ? __pfx_kthread+0x10/0x10 [ 23.108120] ret_from_fork_asm+0x1a/0x30 [ 23.108658] </TASK> [ 23.109610] [ 23.110505] The buggy address belongs to the physical page: [ 23.110999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8 [ 23.111729] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.112903] flags: 0x200000000000040(head|node=0|zone=2) [ 23.113559] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.114371] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.115424] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.116384] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.118089] head: 0200000000000002 ffffea00040aae01 ffffffffffffffff 0000000000000000 [ 23.119378] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.120089] page dumped because: kasan: bad access detected [ 23.120619] [ 23.120981] Memory state around the buggy address: [ 23.121986] ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.122405] ffff888102aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.124217] >ffff888102aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.124732] ^ [ 23.125232] ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.126097] ffff888102aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.127345] ================================================================== [ 22.764718] ================================================================== [ 22.766154] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 [ 22.767146] Write of size 1 at addr ffff8881003978da by task kunit_try_catch/166 [ 22.768398] [ 22.768584] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 22.769369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.770635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.771528] Call Trace: [ 22.771832] <TASK> [ 22.772089] dump_stack_lvl+0x73/0xb0 [ 22.772576] print_report+0xd1/0x640 [ 22.772891] ? __virt_addr_valid+0x1db/0x2d0 [ 22.773641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.774082] kasan_report+0x102/0x140 [ 22.775307] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 22.776222] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 22.776866] __asan_report_store1_noabort+0x1b/0x30 [ 22.777821] krealloc_less_oob_helper+0xec8/0x11d0 [ 22.778381] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.779037] ? finish_task_switch.isra.0+0x153/0x700 [ 22.779465] ? __switch_to+0x5d9/0xf60 [ 22.779923] ? __schedule+0xc70/0x27e0 [ 22.781331] ? __pfx_read_tsc+0x10/0x10 [ 22.781745] krealloc_less_oob+0x1c/0x30 [ 22.782520] kunit_try_run_case+0x1b3/0x490 [ 22.782907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.783471] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.784029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.785171] ? __kthread_parkme+0x82/0x160 [ 22.785958] ? preempt_count_sub+0x50/0x80 [ 22.786682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.787338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.788438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.790064] kthread+0x257/0x310 [ 22.790514] ? __pfx_kthread+0x10/0x10 [ 22.791551] ret_from_fork+0x41/0x80 [ 22.792356] ? __pfx_kthread+0x10/0x10 [ 22.792999] ret_from_fork_asm+0x1a/0x30 [ 22.794466] </TASK> [ 22.794737] [ 22.794956] Allocated by task 166: [ 22.795206] kasan_save_stack+0x3d/0x60 [ 22.795712] kasan_save_track+0x18/0x40 [ 22.796276] kasan_save_alloc_info+0x3b/0x50 [ 22.796738] __kasan_krealloc+0x190/0x1f0 [ 22.798155] krealloc_noprof+0xf3/0x340 [ 22.798771] krealloc_less_oob_helper+0x1ab/0x11d0 [ 22.799780] krealloc_less_oob+0x1c/0x30 [ 22.801072] kunit_try_run_case+0x1b3/0x490 [ 22.801611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.803251] kthread+0x257/0x310 [ 22.803659] ret_from_fork+0x41/0x80 [ 22.803923] ret_from_fork_asm+0x1a/0x30 [ 22.804774] [ 22.805006] The buggy address belongs to the object at ffff888100397800 [ 22.805006] which belongs to the cache kmalloc-256 of size 256 [ 22.806329] The buggy address is located 17 bytes to the right of [ 22.806329] allocated 201-byte region [ffff888100397800, ffff8881003978c9) [ 22.808343] [ 22.808639] The buggy address belongs to the physical page: [ 22.809116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396 [ 22.810359] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.811907] flags: 0x200000000000040(head|node=0|zone=2) [ 22.812483] page_type: f5(slab) [ 22.812834] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.813971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.815689] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.816423] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.817425] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000 [ 22.818403] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 22.820028] page dumped because: kasan: bad access detected [ 22.820619] [ 22.820791] Memory state around the buggy address: [ 22.821430] ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.822464] ffff888100397800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.823863] >ffff888100397880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.824695] ^ [ 22.825823] ffff888100397900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.826483] ffff888100397980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.827784] ==================================================================