Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.801744] ================================================================== [ 33.802080] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 33.802227] Write of size 1 at addr fff00000c4a4a6da by task kunit_try_catch/160 [ 33.802684] [ 33.802955] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.803475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.803557] Hardware name: linux,dummy-virt (DT) [ 33.803687] Call trace: [ 33.803753] show_stack+0x20/0x38 (C) [ 33.804007] dump_stack_lvl+0x8c/0xd0 [ 33.804178] print_report+0x118/0x5f0 [ 33.804439] kasan_report+0xc8/0x118 [ 33.804651] __asan_report_store1_noabort+0x20/0x30 [ 33.804898] krealloc_less_oob_helper+0xa80/0xc50 [ 33.805085] krealloc_less_oob+0x20/0x38 [ 33.805255] kunit_try_run_case+0x14c/0x3d0 [ 33.805476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.805686] kthread+0x318/0x618 [ 33.805865] ret_from_fork+0x10/0x20 [ 33.806016] [ 33.806124] Allocated by task 160: [ 33.806218] kasan_save_stack+0x3c/0x68 [ 33.806339] kasan_save_track+0x20/0x40 [ 33.806453] kasan_save_alloc_info+0x40/0x58 [ 33.806573] __kasan_krealloc+0x118/0x178 [ 33.806687] krealloc_noprof+0x128/0x360 [ 33.806795] krealloc_less_oob_helper+0x168/0xc50 [ 33.806932] krealloc_less_oob+0x20/0x38 [ 33.807075] kunit_try_run_case+0x14c/0x3d0 [ 33.807202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.807338] kthread+0x318/0x618 [ 33.807449] ret_from_fork+0x10/0x20 [ 33.807564] [ 33.807624] The buggy address belongs to the object at fff00000c4a4a600 [ 33.807624] which belongs to the cache kmalloc-256 of size 256 [ 33.807808] The buggy address is located 17 bytes to the right of [ 33.807808] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.808014] [ 33.808098] The buggy address belongs to the physical page: [ 33.808191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.808574] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.808724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.808885] page_type: f5(slab) [ 33.808997] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.809241] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.809459] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.809678] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.809889] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.810048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.810190] page dumped because: kasan: bad access detected [ 33.810323] [ 33.810381] Memory state around the buggy address: [ 33.810582] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.810722] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.810859] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.811120] ^ [ 33.811257] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811398] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811526] ================================================================== [ 33.813265] ================================================================== [ 33.813391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 33.813639] Write of size 1 at addr fff00000c4a4a6ea by task kunit_try_catch/160 [ 33.813787] [ 33.813876] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.814209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.814469] Hardware name: linux,dummy-virt (DT) [ 33.814737] Call trace: [ 33.814849] show_stack+0x20/0x38 (C) [ 33.815034] dump_stack_lvl+0x8c/0xd0 [ 33.815195] print_report+0x118/0x5f0 [ 33.815467] kasan_report+0xc8/0x118 [ 33.815608] __asan_report_store1_noabort+0x20/0x30 [ 33.815793] krealloc_less_oob_helper+0xae4/0xc50 [ 33.815987] krealloc_less_oob+0x20/0x38 [ 33.816185] kunit_try_run_case+0x14c/0x3d0 [ 33.816417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.816795] kthread+0x318/0x618 [ 33.817550] ret_from_fork+0x10/0x20 [ 33.817742] [ 33.817877] Allocated by task 160: [ 33.817975] kasan_save_stack+0x3c/0x68 [ 33.818118] kasan_save_track+0x20/0x40 [ 33.820109] kasan_save_alloc_info+0x40/0x58 [ 33.820219] __kasan_krealloc+0x118/0x178 [ 33.820282] krealloc_noprof+0x128/0x360 [ 33.820387] krealloc_less_oob_helper+0x168/0xc50 [ 33.820516] krealloc_less_oob+0x20/0x38 [ 33.820639] kunit_try_run_case+0x14c/0x3d0 [ 33.820763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.820951] kthread+0x318/0x618 [ 33.821196] ret_from_fork+0x10/0x20 [ 33.821455] [ 33.821535] The buggy address belongs to the object at fff00000c4a4a600 [ 33.821535] which belongs to the cache kmalloc-256 of size 256 [ 33.822030] The buggy address is located 33 bytes to the right of [ 33.822030] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.823575] [ 33.823640] The buggy address belongs to the physical page: [ 33.824287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.824520] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.824661] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.824812] page_type: f5(slab) [ 33.824921] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.827035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.827899] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.828638] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.828840] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.828988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.829963] page dumped because: kasan: bad access detected [ 33.830144] [ 33.830202] Memory state around the buggy address: [ 33.831688] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.831916] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.832441] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.833360] ^ [ 33.833503] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.833642] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.833905] ================================================================== [ 33.978871] ================================================================== [ 33.979013] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 33.979173] Write of size 1 at addr fff00000c774e0eb by task kunit_try_catch/164 [ 33.979329] [ 33.979416] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.980524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.980659] Hardware name: linux,dummy-virt (DT) [ 33.980874] Call trace: [ 33.981535] show_stack+0x20/0x38 (C) [ 33.981706] dump_stack_lvl+0x8c/0xd0 [ 33.981858] print_report+0x118/0x5f0 [ 33.982000] kasan_report+0xc8/0x118 [ 33.982160] __asan_report_store1_noabort+0x20/0x30 [ 33.984250] krealloc_less_oob_helper+0xa58/0xc50 [ 33.985300] krealloc_large_less_oob+0x20/0x38 [ 33.985675] kunit_try_run_case+0x14c/0x3d0 [ 33.986612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.987027] kthread+0x318/0x618 [ 33.987207] ret_from_fork+0x10/0x20 [ 33.987356] [ 33.987416] The buggy address belongs to the physical page: [ 33.988704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.990194] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.990547] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.991079] page_type: f8(unknown) [ 33.991421] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.991971] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.992694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.992971] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.993657] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.994457] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.994599] page dumped because: kasan: bad access detected [ 33.994694] [ 33.994749] Memory state around the buggy address: [ 33.994849] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.995003] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.996877] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.997266] ^ [ 33.997652] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.997856] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.997971] ================================================================== [ 33.931629] ================================================================== [ 33.931776] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 33.931914] Write of size 1 at addr fff00000c774e0d0 by task kunit_try_catch/164 [ 33.932108] [ 33.932196] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.932951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.933045] Hardware name: linux,dummy-virt (DT) [ 33.933168] Call trace: [ 33.933235] show_stack+0x20/0x38 (C) [ 33.933412] dump_stack_lvl+0x8c/0xd0 [ 33.933645] print_report+0x118/0x5f0 [ 33.933796] kasan_report+0xc8/0x118 [ 33.933966] __asan_report_store1_noabort+0x20/0x30 [ 33.934143] krealloc_less_oob_helper+0xb9c/0xc50 [ 33.934461] krealloc_large_less_oob+0x20/0x38 [ 33.934939] kunit_try_run_case+0x14c/0x3d0 [ 33.935229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.935467] kthread+0x318/0x618 [ 33.935671] ret_from_fork+0x10/0x20 [ 33.935887] [ 33.935960] The buggy address belongs to the physical page: [ 33.936141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.936423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.936588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.936743] page_type: f8(unknown) [ 33.936852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.937461] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.937637] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.937883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.938164] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.938409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.938556] page dumped because: kasan: bad access detected [ 33.938651] [ 33.938707] Memory state around the buggy address: [ 33.938805] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.938954] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.939112] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.939243] ^ [ 33.939357] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.939499] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.939637] ================================================================== [ 33.957712] ================================================================== [ 33.957835] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 33.957972] Write of size 1 at addr fff00000c774e0ea by task kunit_try_catch/164 [ 33.960352] [ 33.960487] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.960736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.960821] Hardware name: linux,dummy-virt (DT) [ 33.960916] Call trace: [ 33.960980] show_stack+0x20/0x38 (C) [ 33.961463] dump_stack_lvl+0x8c/0xd0 [ 33.961648] print_report+0x118/0x5f0 [ 33.962785] kasan_report+0xc8/0x118 [ 33.962960] __asan_report_store1_noabort+0x20/0x30 [ 33.963543] krealloc_less_oob_helper+0xae4/0xc50 [ 33.964500] krealloc_large_less_oob+0x20/0x38 [ 33.964657] kunit_try_run_case+0x14c/0x3d0 [ 33.964808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.964978] kthread+0x318/0x618 [ 33.966302] ret_from_fork+0x10/0x20 [ 33.966545] [ 33.966646] The buggy address belongs to the physical page: [ 33.966832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.967025] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.967190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.967351] page_type: f8(unknown) [ 33.967466] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.967985] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.968981] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.969217] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.969636] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.970136] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.970797] page dumped because: kasan: bad access detected [ 33.970909] [ 33.971433] Memory state around the buggy address: [ 33.971640] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.971880] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.972569] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.972714] ^ [ 33.973370] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.973633] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.973791] ================================================================== [ 33.763945] ================================================================== [ 33.764045] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 33.764503] Write of size 1 at addr fff00000c4a4a6c9 by task kunit_try_catch/160 [ 33.764678] [ 33.764776] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.765044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.765149] Hardware name: linux,dummy-virt (DT) [ 33.765240] Call trace: [ 33.765300] show_stack+0x20/0x38 (C) [ 33.765493] dump_stack_lvl+0x8c/0xd0 [ 33.765640] print_report+0x118/0x5f0 [ 33.765783] kasan_report+0xc8/0x118 [ 33.765916] __asan_report_store1_noabort+0x20/0x30 [ 33.766371] krealloc_less_oob_helper+0xa48/0xc50 [ 33.766605] krealloc_less_oob+0x20/0x38 [ 33.766811] kunit_try_run_case+0x14c/0x3d0 [ 33.767028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.767265] kthread+0x318/0x618 [ 33.767447] ret_from_fork+0x10/0x20 [ 33.767684] [ 33.767787] Allocated by task 160: [ 33.767880] kasan_save_stack+0x3c/0x68 [ 33.767998] kasan_save_track+0x20/0x40 [ 33.768128] kasan_save_alloc_info+0x40/0x58 [ 33.768249] __kasan_krealloc+0x118/0x178 [ 33.768422] krealloc_noprof+0x128/0x360 [ 33.768534] krealloc_less_oob_helper+0x168/0xc50 [ 33.768662] krealloc_less_oob+0x20/0x38 [ 33.769080] kunit_try_run_case+0x14c/0x3d0 [ 33.769250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.769416] kthread+0x318/0x618 [ 33.769579] ret_from_fork+0x10/0x20 [ 33.769712] [ 33.769775] The buggy address belongs to the object at fff00000c4a4a600 [ 33.769775] which belongs to the cache kmalloc-256 of size 256 [ 33.769962] The buggy address is located 0 bytes to the right of [ 33.769962] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.770178] [ 33.770238] The buggy address belongs to the physical page: [ 33.770369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.770722] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.770912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.771150] page_type: f5(slab) [ 33.771312] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.771467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.771627] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.771789] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.771950] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.772144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.772272] page dumped because: kasan: bad access detected [ 33.772411] [ 33.772474] Memory state around the buggy address: [ 33.772885] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.773082] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.773219] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.773335] ^ [ 33.773450] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.773581] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.773986] ================================================================== [ 33.778390] ================================================================== [ 33.778520] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 33.778659] Write of size 1 at addr fff00000c4a4a6d0 by task kunit_try_catch/160 [ 33.778816] [ 33.778902] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.779905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.779998] Hardware name: linux,dummy-virt (DT) [ 33.780803] Call trace: [ 33.781214] show_stack+0x20/0x38 (C) [ 33.781614] dump_stack_lvl+0x8c/0xd0 [ 33.782242] print_report+0x118/0x5f0 [ 33.782419] kasan_report+0xc8/0x118 [ 33.782564] __asan_report_store1_noabort+0x20/0x30 [ 33.782725] krealloc_less_oob_helper+0xb9c/0xc50 [ 33.782901] krealloc_less_oob+0x20/0x38 [ 33.784404] kunit_try_run_case+0x14c/0x3d0 [ 33.784593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.784769] kthread+0x318/0x618 [ 33.784911] ret_from_fork+0x10/0x20 [ 33.785075] [ 33.785131] Allocated by task 160: [ 33.785213] kasan_save_stack+0x3c/0x68 [ 33.785324] kasan_save_track+0x20/0x40 [ 33.785427] kasan_save_alloc_info+0x40/0x58 [ 33.785536] __kasan_krealloc+0x118/0x178 [ 33.785638] krealloc_noprof+0x128/0x360 [ 33.785734] krealloc_less_oob_helper+0x168/0xc50 [ 33.785857] krealloc_less_oob+0x20/0x38 [ 33.785975] kunit_try_run_case+0x14c/0x3d0 [ 33.789398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.789579] kthread+0x318/0x618 [ 33.789692] ret_from_fork+0x10/0x20 [ 33.789803] [ 33.789862] The buggy address belongs to the object at fff00000c4a4a600 [ 33.789862] which belongs to the cache kmalloc-256 of size 256 [ 33.790031] The buggy address is located 7 bytes to the right of [ 33.790031] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.790224] [ 33.790276] The buggy address belongs to the physical page: [ 33.790357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.790495] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.790629] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.790776] page_type: f5(slab) [ 33.790887] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.794003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.794724] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.794906] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.795100] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.795253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.795380] page dumped because: kasan: bad access detected [ 33.795480] [ 33.795536] Memory state around the buggy address: [ 33.795631] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.795762] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.795893] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.796018] ^ [ 33.796144] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796284] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796414] ================================================================== [ 33.921551] ================================================================== [ 33.921695] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 33.921874] Write of size 1 at addr fff00000c774e0c9 by task kunit_try_catch/164 [ 33.922027] [ 33.922143] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.922917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.923087] Hardware name: linux,dummy-virt (DT) [ 33.923248] Call trace: [ 33.923355] show_stack+0x20/0x38 (C) [ 33.923603] dump_stack_lvl+0x8c/0xd0 [ 33.923748] print_report+0x118/0x5f0 [ 33.923888] kasan_report+0xc8/0x118 [ 33.924028] __asan_report_store1_noabort+0x20/0x30 [ 33.924201] krealloc_less_oob_helper+0xa48/0xc50 [ 33.924463] krealloc_large_less_oob+0x20/0x38 [ 33.925130] kunit_try_run_case+0x14c/0x3d0 [ 33.925410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.925584] kthread+0x318/0x618 [ 33.925762] ret_from_fork+0x10/0x20 [ 33.926031] [ 33.926121] The buggy address belongs to the physical page: [ 33.926457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.926685] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.926863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.927034] page_type: f8(unknown) [ 33.927234] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.927431] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.927634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.927881] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.928085] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.928236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.928457] page dumped because: kasan: bad access detected [ 33.928883] [ 33.929018] Memory state around the buggy address: [ 33.929180] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.929312] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.929477] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.929655] ^ [ 33.929784] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.929924] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.930048] ================================================================== [ 33.837027] ================================================================== [ 33.837209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 33.837354] Write of size 1 at addr fff00000c4a4a6eb by task kunit_try_catch/160 [ 33.837497] [ 33.837579] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.837811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.837892] Hardware name: linux,dummy-virt (DT) [ 33.837978] Call trace: [ 33.838041] show_stack+0x20/0x38 (C) [ 33.838244] dump_stack_lvl+0x8c/0xd0 [ 33.838481] print_report+0x118/0x5f0 [ 33.838634] kasan_report+0xc8/0x118 [ 33.838774] __asan_report_store1_noabort+0x20/0x30 [ 33.838942] krealloc_less_oob_helper+0xa58/0xc50 [ 33.839115] krealloc_less_oob+0x20/0x38 [ 33.839265] kunit_try_run_case+0x14c/0x3d0 [ 33.839415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.839582] kthread+0x318/0x618 [ 33.839728] ret_from_fork+0x10/0x20 [ 33.839876] [ 33.839934] Allocated by task 160: [ 33.840020] kasan_save_stack+0x3c/0x68 [ 33.840166] kasan_save_track+0x20/0x40 [ 33.840316] kasan_save_alloc_info+0x40/0x58 [ 33.840446] __kasan_krealloc+0x118/0x178 [ 33.840578] krealloc_noprof+0x128/0x360 [ 33.840697] krealloc_less_oob_helper+0x168/0xc50 [ 33.840863] krealloc_less_oob+0x20/0x38 [ 33.841032] kunit_try_run_case+0x14c/0x3d0 [ 33.841201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.841347] kthread+0x318/0x618 [ 33.841469] ret_from_fork+0x10/0x20 [ 33.841585] [ 33.841677] The buggy address belongs to the object at fff00000c4a4a600 [ 33.841677] which belongs to the cache kmalloc-256 of size 256 [ 33.841855] The buggy address is located 34 bytes to the right of [ 33.841855] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.842048] [ 33.842130] The buggy address belongs to the physical page: [ 33.842216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.842373] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.842523] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.842681] page_type: f5(slab) [ 33.842786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.843007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.843241] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.843393] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.843546] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.843698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.843876] page dumped because: kasan: bad access detected [ 33.843979] [ 33.844037] Memory state around the buggy address: [ 33.844201] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.844483] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.844591] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.844708] ^ [ 33.845010] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.845405] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.845732] ================================================================== [ 33.943313] ================================================================== [ 33.943497] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 33.943956] Write of size 1 at addr fff00000c774e0da by task kunit_try_catch/164 [ 33.944146] [ 33.944235] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.945197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.945798] Hardware name: linux,dummy-virt (DT) [ 33.945916] Call trace: [ 33.945981] show_stack+0x20/0x38 (C) [ 33.946227] dump_stack_lvl+0x8c/0xd0 [ 33.946521] print_report+0x118/0x5f0 [ 33.946805] kasan_report+0xc8/0x118 [ 33.947028] __asan_report_store1_noabort+0x20/0x30 [ 33.947216] krealloc_less_oob_helper+0xa80/0xc50 [ 33.947975] krealloc_large_less_oob+0x20/0x38 [ 33.948335] kunit_try_run_case+0x14c/0x3d0 [ 33.948666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.948909] kthread+0x318/0x618 [ 33.949377] ret_from_fork+0x10/0x20 [ 33.949546] [ 33.949605] The buggy address belongs to the physical page: [ 33.949697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.949852] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.950448] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.950758] page_type: f8(unknown) [ 33.951014] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.951315] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.951995] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.952481] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.953110] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.953306] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.953441] page dumped because: kasan: bad access detected [ 33.954237] [ 33.954300] Memory state around the buggy address: [ 33.954395] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.954538] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.954678] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.954843] ^ [ 33.955144] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.955453] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.955610] ==================================================================
[ 21.080884] ================================================================== [ 21.081773] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 21.082209] Write of size 1 at addr ffff888100abc4da by task kunit_try_catch/179 [ 21.083364] [ 21.083743] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.084057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.084104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.084181] Call Trace: [ 21.084216] <TASK> [ 21.084301] dump_stack_lvl+0x73/0xb0 [ 21.084416] print_report+0xd1/0x660 [ 21.084485] ? __virt_addr_valid+0x1db/0x2d0 [ 21.084604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.084678] kasan_report+0x104/0x140 [ 21.084758] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.084836] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.084920] __asan_report_store1_noabort+0x1b/0x30 [ 21.084980] krealloc_less_oob_helper+0xec6/0x11d0 [ 21.085602] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.085656] ? finish_task_switch.isra.0+0x153/0x730 [ 21.085740] ? __switch_to+0x5d9/0xf70 [ 21.085849] ? __schedule+0xd46/0x29c0 [ 21.085890] ? __pfx_read_tsc+0x10/0x10 [ 21.085928] krealloc_less_oob+0x1c/0x30 [ 21.085962] kunit_try_run_case+0x1b2/0x490 [ 21.085997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.086028] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.086059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.086091] ? __kthread_parkme+0x82/0x160 [ 21.086146] ? preempt_count_sub+0x50/0x80 [ 21.086182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.086216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.086249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.086282] kthread+0x323/0x710 [ 21.086311] ? trace_preempt_on+0x20/0xc0 [ 21.086346] ? __pfx_kthread+0x10/0x10 [ 21.086378] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.086406] ? calculate_sigpending+0x7b/0xa0 [ 21.086437] ? __pfx_kthread+0x10/0x10 [ 21.086469] ret_from_fork+0x41/0x80 [ 21.086500] ? __pfx_kthread+0x10/0x10 [ 21.086531] ret_from_fork_asm+0x1a/0x30 [ 21.086578] </TASK> [ 21.086593] [ 21.104982] Allocated by task 179: [ 21.105961] kasan_save_stack+0x3d/0x60 [ 21.106421] kasan_save_track+0x18/0x40 [ 21.107056] kasan_save_alloc_info+0x3b/0x50 [ 21.107376] __kasan_krealloc+0x190/0x1f0 [ 21.108205] krealloc_noprof+0xf4/0x370 [ 21.108624] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.109660] krealloc_less_oob+0x1c/0x30 [ 21.110092] kunit_try_run_case+0x1b2/0x490 [ 21.110459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.111017] kthread+0x323/0x710 [ 21.111395] ret_from_fork+0x41/0x80 [ 21.111839] ret_from_fork_asm+0x1a/0x30 [ 21.112445] [ 21.112667] The buggy address belongs to the object at ffff888100abc400 [ 21.112667] which belongs to the cache kmalloc-256 of size 256 [ 21.113639] The buggy address is located 17 bytes to the right of [ 21.113639] allocated 201-byte region [ffff888100abc400, ffff888100abc4c9) [ 21.114839] [ 21.115179] The buggy address belongs to the physical page: [ 21.116183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100abc [ 21.116904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.117852] flags: 0x200000000000040(head|node=0|zone=2) [ 21.118356] page_type: f5(slab) [ 21.118853] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.119586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.120440] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.121881] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.122976] head: 0200000000000001 ffffea000402af01 00000000ffffffff 00000000ffffffff [ 21.123524] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.124423] page dumped because: kasan: bad access detected [ 21.125085] [ 21.125326] Memory state around the buggy address: [ 21.126174] ffff888100abc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.126909] ffff888100abc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.127566] >ffff888100abc480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.128433] ^ [ 21.129148] ffff888100abc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.129932] ffff888100abc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.130577] ================================================================== [ 21.424606] ================================================================== [ 21.425929] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 21.426537] Write of size 1 at addr ffff8881026920da by task kunit_try_catch/183 [ 21.427221] [ 21.427506] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.427945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.427991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.428046] Call Trace: [ 21.428077] <TASK> [ 21.428135] dump_stack_lvl+0x73/0xb0 [ 21.428214] print_report+0xd1/0x660 [ 21.428279] ? __virt_addr_valid+0x1db/0x2d0 [ 21.428400] ? kasan_addr_to_slab+0x11/0xa0 [ 21.428467] kasan_report+0x104/0x140 [ 21.428524] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.428597] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.429098] __asan_report_store1_noabort+0x1b/0x30 [ 21.429218] krealloc_less_oob_helper+0xec6/0x11d0 [ 21.429301] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.429371] ? finish_task_switch.isra.0+0x153/0x730 [ 21.429416] ? __switch_to+0x5d9/0xf70 [ 21.429455] ? __schedule+0xd46/0x29c0 [ 21.429486] ? __pfx_read_tsc+0x10/0x10 [ 21.429522] krealloc_large_less_oob+0x1c/0x30 [ 21.429556] kunit_try_run_case+0x1b2/0x490 [ 21.429590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.429621] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.429653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.429752] ? __kthread_parkme+0x82/0x160 [ 21.429843] ? preempt_count_sub+0x50/0x80 [ 21.429922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.429988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.430037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.430071] kthread+0x323/0x710 [ 21.430131] ? trace_preempt_on+0x20/0xc0 [ 21.430176] ? __pfx_kthread+0x10/0x10 [ 21.430211] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.430241] ? calculate_sigpending+0x7b/0xa0 [ 21.430282] ? __pfx_kthread+0x10/0x10 [ 21.430314] ret_from_fork+0x41/0x80 [ 21.430356] ? __pfx_kthread+0x10/0x10 [ 21.430387] ret_from_fork_asm+0x1a/0x30 [ 21.430444] </TASK> [ 21.430460] [ 21.449840] The buggy address belongs to the physical page: [ 21.451719] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102690 [ 21.452514] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.452927] flags: 0x200000000000040(head|node=0|zone=2) [ 21.454030] page_type: f8(unknown) [ 21.454501] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.456145] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.456663] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.457740] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.458622] head: 0200000000000002 ffffea000409a401 00000000ffffffff 00000000ffffffff [ 21.459482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.460047] page dumped because: kasan: bad access detected [ 21.460571] [ 21.460769] Memory state around the buggy address: [ 21.462140] ffff888102691f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.462539] ffff888102692000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.463554] >ffff888102692080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.464429] ^ [ 21.465445] ffff888102692100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.466861] ffff888102692180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.467321] ================================================================== [ 21.384825] ================================================================== [ 21.385343] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 21.385755] Write of size 1 at addr ffff8881026920d0 by task kunit_try_catch/183 [ 21.386569] [ 21.386876] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.387000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.387033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.387087] Call Trace: [ 21.387140] <TASK> [ 21.387176] dump_stack_lvl+0x73/0xb0 [ 21.387251] print_report+0xd1/0x660 [ 21.387315] ? __virt_addr_valid+0x1db/0x2d0 [ 21.387581] ? kasan_addr_to_slab+0x11/0xa0 [ 21.387851] kasan_report+0x104/0x140 [ 21.387922] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.388001] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.388081] __asan_report_store1_noabort+0x1b/0x30 [ 21.388171] krealloc_less_oob_helper+0xe23/0x11d0 [ 21.388220] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.388256] ? finish_task_switch.isra.0+0x153/0x730 [ 21.388295] ? __switch_to+0x5d9/0xf70 [ 21.388333] ? __schedule+0xd46/0x29c0 [ 21.388364] ? __pfx_read_tsc+0x10/0x10 [ 21.388400] krealloc_large_less_oob+0x1c/0x30 [ 21.388433] kunit_try_run_case+0x1b2/0x490 [ 21.388468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.388499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.388529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.388560] ? __kthread_parkme+0x82/0x160 [ 21.388590] ? preempt_count_sub+0x50/0x80 [ 21.388625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.388658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.388902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.388996] kthread+0x323/0x710 [ 21.389059] ? trace_preempt_on+0x20/0xc0 [ 21.389151] ? __pfx_kthread+0x10/0x10 [ 21.389212] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.389269] ? calculate_sigpending+0x7b/0xa0 [ 21.389326] ? __pfx_kthread+0x10/0x10 [ 21.389386] ret_from_fork+0x41/0x80 [ 21.389450] ? __pfx_kthread+0x10/0x10 [ 21.389511] ret_from_fork_asm+0x1a/0x30 [ 21.389592] </TASK> [ 21.389620] [ 21.408556] The buggy address belongs to the physical page: [ 21.409613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102690 [ 21.410416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.411314] flags: 0x200000000000040(head|node=0|zone=2) [ 21.412154] page_type: f8(unknown) [ 21.412542] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.413554] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.414022] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.414731] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.415438] head: 0200000000000002 ffffea000409a401 00000000ffffffff 00000000ffffffff [ 21.416450] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.417443] page dumped because: kasan: bad access detected [ 21.418133] [ 21.418353] Memory state around the buggy address: [ 21.419095] ffff888102691f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.419904] ffff888102692000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.420659] >ffff888102692080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.421803] ^ [ 21.422102] ffff888102692100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.422972] ffff888102692180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.423586] ================================================================== [ 20.969623] ================================================================== [ 20.970392] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 20.971141] Write of size 1 at addr ffff888100abc4c9 by task kunit_try_catch/179 [ 20.971740] [ 20.972083] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 20.972237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.972271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.972327] Call Trace: [ 20.972357] <TASK> [ 20.972390] dump_stack_lvl+0x73/0xb0 [ 20.972468] print_report+0xd1/0x660 [ 20.972534] ? __virt_addr_valid+0x1db/0x2d0 [ 20.972649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.972847] kasan_report+0x104/0x140 [ 20.972922] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 20.972994] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 20.973072] __asan_report_store1_noabort+0x1b/0x30 [ 20.973164] krealloc_less_oob_helper+0xd70/0x11d0 [ 20.973242] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.973305] ? finish_task_switch.isra.0+0x153/0x730 [ 20.973369] ? __switch_to+0x5d9/0xf70 [ 20.973445] ? __schedule+0xd46/0x29c0 [ 20.973506] ? __pfx_read_tsc+0x10/0x10 [ 20.973574] krealloc_less_oob+0x1c/0x30 [ 20.973638] kunit_try_run_case+0x1b2/0x490 [ 20.973734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.973799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.973861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.973921] ? __kthread_parkme+0x82/0x160 [ 20.973982] ? preempt_count_sub+0x50/0x80 [ 20.974050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.974136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.974237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.974279] kthread+0x323/0x710 [ 20.974310] ? trace_preempt_on+0x20/0xc0 [ 20.974345] ? __pfx_kthread+0x10/0x10 [ 20.974376] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.974407] ? calculate_sigpending+0x7b/0xa0 [ 20.974437] ? __pfx_kthread+0x10/0x10 [ 20.974469] ret_from_fork+0x41/0x80 [ 20.974502] ? __pfx_kthread+0x10/0x10 [ 20.974533] ret_from_fork_asm+0x1a/0x30 [ 20.974579] </TASK> [ 20.974594] [ 21.001916] Allocated by task 179: [ 21.002316] kasan_save_stack+0x3d/0x60 [ 21.002747] kasan_save_track+0x18/0x40 [ 21.004144] kasan_save_alloc_info+0x3b/0x50 [ 21.004499] __kasan_krealloc+0x190/0x1f0 [ 21.004800] krealloc_noprof+0xf4/0x370 [ 21.005238] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.005912] krealloc_less_oob+0x1c/0x30 [ 21.006405] kunit_try_run_case+0x1b2/0x490 [ 21.007018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.007662] kthread+0x323/0x710 [ 21.008534] ret_from_fork+0x41/0x80 [ 21.009082] ret_from_fork_asm+0x1a/0x30 [ 21.009511] [ 21.009880] The buggy address belongs to the object at ffff888100abc400 [ 21.009880] which belongs to the cache kmalloc-256 of size 256 [ 21.010928] The buggy address is located 0 bytes to the right of [ 21.010928] allocated 201-byte region [ffff888100abc400, ffff888100abc4c9) [ 21.011896] [ 21.012155] The buggy address belongs to the physical page: [ 21.012660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100abc [ 21.013561] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.014235] flags: 0x200000000000040(head|node=0|zone=2) [ 21.014752] page_type: f5(slab) [ 21.015016] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.016357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.017212] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.017866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.018487] head: 0200000000000001 ffffea000402af01 00000000ffffffff 00000000ffffffff [ 21.019608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.020370] page dumped because: kasan: bad access detected [ 21.021077] [ 21.021288] Memory state around the buggy address: [ 21.021884] ffff888100abc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.022395] ffff888100abc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.023137] >ffff888100abc480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.024176] ^ [ 21.024882] ffff888100abc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.025440] ffff888100abc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.026014] ================================================================== [ 21.132458] ================================================================== [ 21.132989] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 21.133666] Write of size 1 at addr ffff888100abc4ea by task kunit_try_catch/179 [ 21.134284] [ 21.134532] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.134657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.134860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.134927] Call Trace: [ 21.134960] <TASK> [ 21.134993] dump_stack_lvl+0x73/0xb0 [ 21.135070] print_report+0xd1/0x660 [ 21.135154] ? __virt_addr_valid+0x1db/0x2d0 [ 21.135278] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.135348] kasan_report+0x104/0x140 [ 21.135405] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 21.135474] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 21.135552] __asan_report_store1_noabort+0x1b/0x30 [ 21.135641] krealloc_less_oob_helper+0xe90/0x11d0 [ 21.135908] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.136004] ? finish_task_switch.isra.0+0x153/0x730 [ 21.136070] ? __switch_to+0x5d9/0xf70 [ 21.136165] ? __schedule+0xd46/0x29c0 [ 21.136226] ? __pfx_read_tsc+0x10/0x10 [ 21.136292] krealloc_less_oob+0x1c/0x30 [ 21.136360] kunit_try_run_case+0x1b2/0x490 [ 21.136425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.136484] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.136541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.136599] ? __kthread_parkme+0x82/0x160 [ 21.136654] ? preempt_count_sub+0x50/0x80 [ 21.136915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.136987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.137054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.137138] kthread+0x323/0x710 [ 21.137198] ? trace_preempt_on+0x20/0xc0 [ 21.137262] ? __pfx_kthread+0x10/0x10 [ 21.137318] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.137359] ? calculate_sigpending+0x7b/0xa0 [ 21.137391] ? __pfx_kthread+0x10/0x10 [ 21.137423] ret_from_fork+0x41/0x80 [ 21.137458] ? __pfx_kthread+0x10/0x10 [ 21.137489] ret_from_fork_asm+0x1a/0x30 [ 21.137538] </TASK> [ 21.137554] [ 21.153327] Allocated by task 179: [ 21.153639] kasan_save_stack+0x3d/0x60 [ 21.156080] kasan_save_track+0x18/0x40 [ 21.156508] kasan_save_alloc_info+0x3b/0x50 [ 21.158234] __kasan_krealloc+0x190/0x1f0 [ 21.158607] krealloc_noprof+0xf4/0x370 [ 21.160016] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.160769] krealloc_less_oob+0x1c/0x30 [ 21.161154] kunit_try_run_case+0x1b2/0x490 [ 21.161539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.163042] kthread+0x323/0x710 [ 21.163358] ret_from_fork+0x41/0x80 [ 21.163656] ret_from_fork_asm+0x1a/0x30 [ 21.164290] [ 21.164510] The buggy address belongs to the object at ffff888100abc400 [ 21.164510] which belongs to the cache kmalloc-256 of size 256 [ 21.165388] The buggy address is located 33 bytes to the right of [ 21.165388] allocated 201-byte region [ffff888100abc400, ffff888100abc4c9) [ 21.167483] [ 21.168010] The buggy address belongs to the physical page: [ 21.168442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100abc [ 21.169635] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.170506] flags: 0x200000000000040(head|node=0|zone=2) [ 21.171072] page_type: f5(slab) [ 21.172027] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.172588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.174163] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.175333] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.175913] head: 0200000000000001 ffffea000402af01 00000000ffffffff 00000000ffffffff [ 21.177215] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.177723] page dumped because: kasan: bad access detected [ 21.178604] [ 21.178835] Memory state around the buggy address: [ 21.179713] ffff888100abc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.180524] ffff888100abc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.181297] >ffff888100abc480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.182323] ^ [ 21.183468] ffff888100abc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.184594] ffff888100abc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.185158] ================================================================== [ 21.514590] ================================================================== [ 21.515226] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 21.515670] Write of size 1 at addr ffff8881026920eb by task kunit_try_catch/183 [ 21.516256] [ 21.516633] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.516923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.516959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.517010] Call Trace: [ 21.517039] <TASK> [ 21.517071] dump_stack_lvl+0x73/0xb0 [ 21.517212] print_report+0xd1/0x660 [ 21.517285] ? __virt_addr_valid+0x1db/0x2d0 [ 21.517406] ? kasan_addr_to_slab+0x11/0xa0 [ 21.517473] kasan_report+0x104/0x140 [ 21.517532] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 21.517603] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 21.519215] __asan_report_store1_noabort+0x1b/0x30 [ 21.519311] krealloc_less_oob_helper+0xd47/0x11d0 [ 21.519399] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.519486] ? finish_task_switch.isra.0+0x153/0x730 [ 21.519551] ? __switch_to+0x5d9/0xf70 [ 21.519648] ? __schedule+0xd46/0x29c0 [ 21.519725] ? __pfx_read_tsc+0x10/0x10 [ 21.519801] krealloc_large_less_oob+0x1c/0x30 [ 21.519871] kunit_try_run_case+0x1b2/0x490 [ 21.519952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.520014] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.520073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.520165] ? __kthread_parkme+0x82/0x160 [ 21.520231] ? preempt_count_sub+0x50/0x80 [ 21.520296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.520356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.520417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.520477] kthread+0x323/0x710 [ 21.520530] ? trace_preempt_on+0x20/0xc0 [ 21.520588] ? __pfx_kthread+0x10/0x10 [ 21.520643] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.520694] ? calculate_sigpending+0x7b/0xa0 [ 21.520753] ? __pfx_kthread+0x10/0x10 [ 21.520818] ret_from_fork+0x41/0x80 [ 21.520873] ? __pfx_kthread+0x10/0x10 [ 21.520929] ret_from_fork_asm+0x1a/0x30 [ 21.521018] </TASK> [ 21.521047] [ 21.541004] The buggy address belongs to the physical page: [ 21.541553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102690 [ 21.543215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.544239] flags: 0x200000000000040(head|node=0|zone=2) [ 21.545516] page_type: f8(unknown) [ 21.546277] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.547219] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.548130] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.548848] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.549915] head: 0200000000000002 ffffea000409a401 00000000ffffffff 00000000ffffffff [ 21.550554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.551565] page dumped because: kasan: bad access detected [ 21.552174] [ 21.552570] Memory state around the buggy address: [ 21.553436] ffff888102691f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.554799] ffff888102692000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.555538] >ffff888102692080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.556134] ^ [ 21.556706] ffff888102692100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.557366] ffff888102692180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.558042] ================================================================== [ 21.468923] ================================================================== [ 21.469710] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 21.471572] Write of size 1 at addr ffff8881026920ea by task kunit_try_catch/183 [ 21.472513] [ 21.472991] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.473154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.473192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.473246] Call Trace: [ 21.473278] <TASK> [ 21.473314] dump_stack_lvl+0x73/0xb0 [ 21.473388] print_report+0xd1/0x660 [ 21.473427] ? __virt_addr_valid+0x1db/0x2d0 [ 21.473491] ? kasan_addr_to_slab+0x11/0xa0 [ 21.473525] kasan_report+0x104/0x140 [ 21.473554] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 21.473591] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 21.473633] __asan_report_store1_noabort+0x1b/0x30 [ 21.473664] krealloc_less_oob_helper+0xe90/0x11d0 [ 21.473777] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.473861] ? finish_task_switch.isra.0+0x153/0x730 [ 21.473904] ? __switch_to+0x5d9/0xf70 [ 21.473942] ? __schedule+0xd46/0x29c0 [ 21.473973] ? __pfx_read_tsc+0x10/0x10 [ 21.474008] krealloc_large_less_oob+0x1c/0x30 [ 21.474042] kunit_try_run_case+0x1b2/0x490 [ 21.474077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.474128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.474162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.474194] ? __kthread_parkme+0x82/0x160 [ 21.474225] ? preempt_count_sub+0x50/0x80 [ 21.474259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.474293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.474326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.474359] kthread+0x323/0x710 [ 21.474388] ? trace_preempt_on+0x20/0xc0 [ 21.474422] ? __pfx_kthread+0x10/0x10 [ 21.474453] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.474482] ? calculate_sigpending+0x7b/0xa0 [ 21.474512] ? __pfx_kthread+0x10/0x10 [ 21.474543] ret_from_fork+0x41/0x80 [ 21.474574] ? __pfx_kthread+0x10/0x10 [ 21.474606] ret_from_fork_asm+0x1a/0x30 [ 21.474652] </TASK> [ 21.474667] [ 21.493612] The buggy address belongs to the physical page: [ 21.494497] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102690 [ 21.495483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.496520] flags: 0x200000000000040(head|node=0|zone=2) [ 21.497545] page_type: f8(unknown) [ 21.498281] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.498989] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.499984] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.500619] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.501963] head: 0200000000000002 ffffea000409a401 00000000ffffffff 00000000ffffffff [ 21.502641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.504182] page dumped because: kasan: bad access detected [ 21.504964] [ 21.505861] Memory state around the buggy address: [ 21.506232] ffff888102691f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.507428] ffff888102692000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.508191] >ffff888102692080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.508816] ^ [ 21.509877] ffff888102692100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.510523] ffff888102692180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.511071] ================================================================== [ 21.345420] ================================================================== [ 21.346682] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 21.347289] Write of size 1 at addr ffff8881026920c9 by task kunit_try_catch/183 [ 21.348066] [ 21.348334] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.348456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.348493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.348553] Call Trace: [ 21.348586] <TASK> [ 21.348626] dump_stack_lvl+0x73/0xb0 [ 21.349173] print_report+0xd1/0x660 [ 21.349261] ? __virt_addr_valid+0x1db/0x2d0 [ 21.349385] ? kasan_addr_to_slab+0x11/0xa0 [ 21.349454] kasan_report+0x104/0x140 [ 21.349515] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.349586] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.349665] __asan_report_store1_noabort+0x1b/0x30 [ 21.349981] krealloc_less_oob_helper+0xd70/0x11d0 [ 21.350029] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.350066] ? finish_task_switch.isra.0+0x153/0x730 [ 21.350102] ? __switch_to+0x5d9/0xf70 [ 21.350187] ? __schedule+0xd46/0x29c0 [ 21.350221] ? __pfx_read_tsc+0x10/0x10 [ 21.350258] krealloc_large_less_oob+0x1c/0x30 [ 21.350292] kunit_try_run_case+0x1b2/0x490 [ 21.350330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.350361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.350392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.350423] ? __kthread_parkme+0x82/0x160 [ 21.350454] ? preempt_count_sub+0x50/0x80 [ 21.350489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.350522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.350555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.350588] kthread+0x323/0x710 [ 21.350617] ? trace_preempt_on+0x20/0xc0 [ 21.350651] ? __pfx_kthread+0x10/0x10 [ 21.350762] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.350854] ? calculate_sigpending+0x7b/0xa0 [ 21.350895] ? __pfx_kthread+0x10/0x10 [ 21.350928] ret_from_fork+0x41/0x80 [ 21.350962] ? __pfx_kthread+0x10/0x10 [ 21.350993] ret_from_fork_asm+0x1a/0x30 [ 21.351042] </TASK> [ 21.351060] [ 21.368088] The buggy address belongs to the physical page: [ 21.368454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102690 [ 21.369066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.369928] flags: 0x200000000000040(head|node=0|zone=2) [ 21.370473] page_type: f8(unknown) [ 21.371353] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.372194] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.372923] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.373565] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.374342] head: 0200000000000002 ffffea000409a401 00000000ffffffff 00000000ffffffff [ 21.375012] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.377994] page dumped because: kasan: bad access detected [ 21.378460] [ 21.378687] Memory state around the buggy address: [ 21.379576] ffff888102691f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.379992] ffff888102692000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.381067] >ffff888102692080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.381534] ^ [ 21.382141] ffff888102692100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.382609] ffff888102692180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.384030] ================================================================== [ 21.186170] ================================================================== [ 21.186651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 21.187069] Write of size 1 at addr ffff888100abc4eb by task kunit_try_catch/179 [ 21.189222] [ 21.189491] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.189613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.189646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.189695] Call Trace: [ 21.189777] <TASK> [ 21.189815] dump_stack_lvl+0x73/0xb0 [ 21.189889] print_report+0xd1/0x660 [ 21.189950] ? __virt_addr_valid+0x1db/0x2d0 [ 21.190071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.190172] kasan_report+0x104/0x140 [ 21.190214] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 21.190254] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 21.190298] __asan_report_store1_noabort+0x1b/0x30 [ 21.190330] krealloc_less_oob_helper+0xd47/0x11d0 [ 21.190369] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.190404] ? finish_task_switch.isra.0+0x153/0x730 [ 21.190437] ? __switch_to+0x5d9/0xf70 [ 21.190475] ? __schedule+0xd46/0x29c0 [ 21.190505] ? __pfx_read_tsc+0x10/0x10 [ 21.190541] krealloc_less_oob+0x1c/0x30 [ 21.190573] kunit_try_run_case+0x1b2/0x490 [ 21.190608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.190639] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.190670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.190701] ? __kthread_parkme+0x82/0x160 [ 21.190758] ? preempt_count_sub+0x50/0x80 [ 21.190796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.190831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.190865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.190898] kthread+0x323/0x710 [ 21.190928] ? trace_preempt_on+0x20/0xc0 [ 21.190964] ? __pfx_kthread+0x10/0x10 [ 21.190996] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.191025] ? calculate_sigpending+0x7b/0xa0 [ 21.191056] ? __pfx_kthread+0x10/0x10 [ 21.191088] ret_from_fork+0x41/0x80 [ 21.191149] ? __pfx_kthread+0x10/0x10 [ 21.191204] ret_from_fork_asm+0x1a/0x30 [ 21.191253] </TASK> [ 21.191269] [ 21.207772] Allocated by task 179: [ 21.208174] kasan_save_stack+0x3d/0x60 [ 21.208604] kasan_save_track+0x18/0x40 [ 21.209296] kasan_save_alloc_info+0x3b/0x50 [ 21.210254] __kasan_krealloc+0x190/0x1f0 [ 21.211001] krealloc_noprof+0xf4/0x370 [ 21.211664] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.212247] krealloc_less_oob+0x1c/0x30 [ 21.212677] kunit_try_run_case+0x1b2/0x490 [ 21.213398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.213871] kthread+0x323/0x710 [ 21.215155] ret_from_fork+0x41/0x80 [ 21.216174] ret_from_fork_asm+0x1a/0x30 [ 21.216731] [ 21.216974] The buggy address belongs to the object at ffff888100abc400 [ 21.216974] which belongs to the cache kmalloc-256 of size 256 [ 21.217574] The buggy address is located 34 bytes to the right of [ 21.217574] allocated 201-byte region [ffff888100abc400, ffff888100abc4c9) [ 21.218962] [ 21.219301] The buggy address belongs to the physical page: [ 21.220018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100abc [ 21.221084] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.222141] flags: 0x200000000000040(head|node=0|zone=2) [ 21.223308] page_type: f5(slab) [ 21.223605] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.224331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.225201] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.225599] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.225987] head: 0200000000000001 ffffea000402af01 00000000ffffffff 00000000ffffffff [ 21.226527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.227799] page dumped because: kasan: bad access detected [ 21.228739] [ 21.229839] Memory state around the buggy address: [ 21.230330] ffff888100abc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.231169] ffff888100abc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.232164] >ffff888100abc480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.232869] ^ [ 21.233569] ffff888100abc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.234776] ffff888100abc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235425] ================================================================== [ 21.028235] ================================================================== [ 21.028853] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 21.030654] Write of size 1 at addr ffff888100abc4d0 by task kunit_try_catch/179 [ 21.031503] [ 21.031897] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 21.032037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.032072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.032145] Call Trace: [ 21.032179] <TASK> [ 21.032216] dump_stack_lvl+0x73/0xb0 [ 21.032291] print_report+0xd1/0x660 [ 21.032354] ? __virt_addr_valid+0x1db/0x2d0 [ 21.032471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.032540] kasan_report+0x104/0x140 [ 21.032593] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.032662] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.032935] __asan_report_store1_noabort+0x1b/0x30 [ 21.033007] krealloc_less_oob_helper+0xe23/0x11d0 [ 21.033082] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.033178] ? finish_task_switch.isra.0+0x153/0x730 [ 21.033218] ? __switch_to+0x5d9/0xf70 [ 21.033258] ? __schedule+0xd46/0x29c0 [ 21.033289] ? __pfx_read_tsc+0x10/0x10 [ 21.033324] krealloc_less_oob+0x1c/0x30 [ 21.033357] kunit_try_run_case+0x1b2/0x490 [ 21.033393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.033424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.033454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.033485] ? __kthread_parkme+0x82/0x160 [ 21.033515] ? preempt_count_sub+0x50/0x80 [ 21.033550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.033583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.033615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.033647] kthread+0x323/0x710 [ 21.033693] ? trace_preempt_on+0x20/0xc0 [ 21.034055] ? __pfx_kthread+0x10/0x10 [ 21.034090] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.034145] ? calculate_sigpending+0x7b/0xa0 [ 21.034178] ? __pfx_kthread+0x10/0x10 [ 21.034210] ret_from_fork+0x41/0x80 [ 21.034243] ? __pfx_kthread+0x10/0x10 [ 21.034275] ret_from_fork_asm+0x1a/0x30 [ 21.034322] </TASK> [ 21.034337] [ 21.052884] Allocated by task 179: [ 21.053481] kasan_save_stack+0x3d/0x60 [ 21.054367] kasan_save_track+0x18/0x40 [ 21.055033] kasan_save_alloc_info+0x3b/0x50 [ 21.055625] __kasan_krealloc+0x190/0x1f0 [ 21.056350] krealloc_noprof+0xf4/0x370 [ 21.056887] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.057290] krealloc_less_oob+0x1c/0x30 [ 21.057942] kunit_try_run_case+0x1b2/0x490 [ 21.058425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.059474] kthread+0x323/0x710 [ 21.060206] ret_from_fork+0x41/0x80 [ 21.060542] ret_from_fork_asm+0x1a/0x30 [ 21.061278] [ 21.061506] The buggy address belongs to the object at ffff888100abc400 [ 21.061506] which belongs to the cache kmalloc-256 of size 256 [ 21.062655] The buggy address is located 7 bytes to the right of [ 21.062655] allocated 201-byte region [ffff888100abc400, ffff888100abc4c9) [ 21.063461] [ 21.064258] The buggy address belongs to the physical page: [ 21.065028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100abc [ 21.065987] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.066660] flags: 0x200000000000040(head|node=0|zone=2) [ 21.067450] page_type: f5(slab) [ 21.068062] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.069367] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.070147] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.070687] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.071427] head: 0200000000000001 ffffea000402af01 00000000ffffffff 00000000ffffffff [ 21.072068] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.072766] page dumped because: kasan: bad access detected [ 21.073443] [ 21.073600] Memory state around the buggy address: [ 21.074229] ffff888100abc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.075168] ffff888100abc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.075636] >ffff888100abc480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.076811] ^ [ 21.077453] ffff888100abc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.078288] ffff888100abc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.078787] ==================================================================