Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.505849] ================================================================== [ 18.507010] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 18.508041] Write of size 1 at addr fff00000c65f20ea by task kunit_try_catch/152 [ 18.508826] [ 18.509116] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.509487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.509534] Hardware name: linux,dummy-virt (DT) [ 18.509574] Call trace: [ 18.509601] show_stack+0x20/0x38 (C) [ 18.509669] dump_stack_lvl+0x8c/0xd0 [ 18.509724] print_report+0x118/0x608 [ 18.509778] kasan_report+0xdc/0x128 [ 18.509830] __asan_report_store1_noabort+0x20/0x30 [ 18.509884] krealloc_less_oob_helper+0xae4/0xc50 [ 18.509937] krealloc_large_less_oob+0x20/0x38 [ 18.509990] kunit_try_run_case+0x170/0x3f0 [ 18.510043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.510249] kthread+0x318/0x620 [ 18.510350] ret_from_fork+0x10/0x20 [ 18.510440] [ 18.512983] The buggy address belongs to the physical page: [ 18.513228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f0 [ 18.514064] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.514851] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.516943] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.517769] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.518719] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.519450] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.519878] head: 0bfffe0000000002 ffffc1ffc3197c01 ffffffffffffffff 0000000000000000 [ 18.520672] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.521358] page dumped because: kasan: bad access detected [ 18.521804] [ 18.521978] Memory state around the buggy address: [ 18.523316] fff00000c65f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.524039] fff00000c65f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.524640] >fff00000c65f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.524977] ^ [ 18.525414] fff00000c65f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.525932] fff00000c65f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.527829] ================================================================== [ 18.479887] ================================================================== [ 18.481597] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 18.483040] Write of size 1 at addr fff00000c65f20da by task kunit_try_catch/152 [ 18.483620] [ 18.483918] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.484143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.484224] Hardware name: linux,dummy-virt (DT) [ 18.484299] Call trace: [ 18.484349] show_stack+0x20/0x38 (C) [ 18.484419] dump_stack_lvl+0x8c/0xd0 [ 18.484473] print_report+0x118/0x608 [ 18.484525] kasan_report+0xdc/0x128 [ 18.484575] __asan_report_store1_noabort+0x20/0x30 [ 18.484627] krealloc_less_oob_helper+0xa80/0xc50 [ 18.484681] krealloc_large_less_oob+0x20/0x38 [ 18.484733] kunit_try_run_case+0x170/0x3f0 [ 18.484784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.484840] kthread+0x318/0x620 [ 18.484890] ret_from_fork+0x10/0x20 [ 18.484944] [ 18.488646] The buggy address belongs to the physical page: [ 18.488930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f0 [ 18.491391] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.491904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.492599] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.493351] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.494013] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.495343] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.496392] head: 0bfffe0000000002 ffffc1ffc3197c01 ffffffffffffffff 0000000000000000 [ 18.497393] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.498520] page dumped because: kasan: bad access detected [ 18.499178] [ 18.499602] Memory state around the buggy address: [ 18.500014] fff00000c65f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.500621] fff00000c65f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.501534] >fff00000c65f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.502057] ^ [ 18.502765] fff00000c65f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.503297] fff00000c65f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.503795] ================================================================== [ 18.429202] ================================================================== [ 18.430477] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 18.430997] Write of size 1 at addr fff00000c65f20c9 by task kunit_try_catch/152 [ 18.431369] [ 18.431531] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.431631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.431661] Hardware name: linux,dummy-virt (DT) [ 18.431698] Call trace: [ 18.431725] show_stack+0x20/0x38 (C) [ 18.431785] dump_stack_lvl+0x8c/0xd0 [ 18.431840] print_report+0x118/0x608 [ 18.431892] kasan_report+0xdc/0x128 [ 18.431941] __asan_report_store1_noabort+0x20/0x30 [ 18.431993] krealloc_less_oob_helper+0xa48/0xc50 [ 18.432046] krealloc_large_less_oob+0x20/0x38 [ 18.432097] kunit_try_run_case+0x170/0x3f0 [ 18.432149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.433115] kthread+0x318/0x620 [ 18.433449] ret_from_fork+0x10/0x20 [ 18.433532] [ 18.439796] The buggy address belongs to the physical page: [ 18.440088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f0 [ 18.440500] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.440832] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.441232] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.441987] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.443102] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.443663] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.444364] head: 0bfffe0000000002 ffffc1ffc3197c01 ffffffffffffffff 0000000000000000 [ 18.445106] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.445868] page dumped because: kasan: bad access detected [ 18.447002] [ 18.447213] Memory state around the buggy address: [ 18.447493] fff00000c65f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.448392] fff00000c65f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.448927] >fff00000c65f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.449791] ^ [ 18.450419] fff00000c65f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.451313] fff00000c65f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.452013] ================================================================== [ 18.327603] ================================================================== [ 18.327859] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 18.328116] Write of size 1 at addr fff00000c1789ceb by task kunit_try_catch/148 [ 18.328892] [ 18.330099] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.330346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.330414] Hardware name: linux,dummy-virt (DT) [ 18.330495] Call trace: [ 18.330550] show_stack+0x20/0x38 (C) [ 18.330683] dump_stack_lvl+0x8c/0xd0 [ 18.330766] print_report+0x118/0x608 [ 18.330826] kasan_report+0xdc/0x128 [ 18.330905] __asan_report_store1_noabort+0x20/0x30 [ 18.330957] krealloc_less_oob_helper+0xa58/0xc50 [ 18.331011] krealloc_less_oob+0x20/0x38 [ 18.331060] kunit_try_run_case+0x170/0x3f0 [ 18.331115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.331196] kthread+0x318/0x620 [ 18.331252] ret_from_fork+0x10/0x20 [ 18.331311] [ 18.335148] Allocated by task 148: [ 18.337475] kasan_save_stack+0x3c/0x68 [ 18.337887] kasan_save_track+0x20/0x40 [ 18.338537] kasan_save_alloc_info+0x40/0x58 [ 18.338972] __kasan_krealloc+0x118/0x178 [ 18.339380] krealloc_noprof+0x128/0x360 [ 18.339756] krealloc_less_oob_helper+0x168/0xc50 [ 18.340143] krealloc_less_oob+0x20/0x38 [ 18.341664] kunit_try_run_case+0x170/0x3f0 [ 18.342085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.342534] kthread+0x318/0x620 [ 18.342837] ret_from_fork+0x10/0x20 [ 18.343256] [ 18.343561] The buggy address belongs to the object at fff00000c1789c00 [ 18.343561] which belongs to the cache kmalloc-256 of size 256 [ 18.344675] The buggy address is located 34 bytes to the right of [ 18.344675] allocated 201-byte region [fff00000c1789c00, fff00000c1789cc9) [ 18.345724] [ 18.346165] The buggy address belongs to the physical page: [ 18.346620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101788 [ 18.347372] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.347896] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.349361] page_type: f5(slab) [ 18.349571] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.349807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.350035] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.351239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.352006] head: 0bfffe0000000001 ffffc1ffc305e201 ffffffffffffffff 0000000000000000 [ 18.352702] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.353524] page dumped because: kasan: bad access detected [ 18.354211] [ 18.354617] Memory state around the buggy address: [ 18.354992] fff00000c1789b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.355725] fff00000c1789c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.356768] >fff00000c1789c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.357111] ^ [ 18.357633] fff00000c1789d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.358901] fff00000c1789d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.359537] ================================================================== [ 18.189880] ================================================================== [ 18.190854] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 18.191348] Write of size 1 at addr fff00000c1789cc9 by task kunit_try_catch/148 [ 18.191595] [ 18.191715] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.191814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.191843] Hardware name: linux,dummy-virt (DT) [ 18.191881] Call trace: [ 18.191907] show_stack+0x20/0x38 (C) [ 18.191968] dump_stack_lvl+0x8c/0xd0 [ 18.192024] print_report+0x118/0x608 [ 18.192077] kasan_report+0xdc/0x128 [ 18.192127] __asan_report_store1_noabort+0x20/0x30 [ 18.192239] krealloc_less_oob_helper+0xa48/0xc50 [ 18.192334] krealloc_less_oob+0x20/0x38 [ 18.192429] kunit_try_run_case+0x170/0x3f0 [ 18.192537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.192672] kthread+0x318/0x620 [ 18.192785] ret_from_fork+0x10/0x20 [ 18.192894] [ 18.200167] Allocated by task 148: [ 18.200558] kasan_save_stack+0x3c/0x68 [ 18.201072] kasan_save_track+0x20/0x40 [ 18.201538] kasan_save_alloc_info+0x40/0x58 [ 18.202013] __kasan_krealloc+0x118/0x178 [ 18.202790] krealloc_noprof+0x128/0x360 [ 18.202986] krealloc_less_oob_helper+0x168/0xc50 [ 18.203149] krealloc_less_oob+0x20/0x38 [ 18.203316] kunit_try_run_case+0x170/0x3f0 [ 18.203466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.203636] kthread+0x318/0x620 [ 18.203769] ret_from_fork+0x10/0x20 [ 18.203906] [ 18.204002] The buggy address belongs to the object at fff00000c1789c00 [ 18.204002] which belongs to the cache kmalloc-256 of size 256 [ 18.204790] The buggy address is located 0 bytes to the right of [ 18.204790] allocated 201-byte region [fff00000c1789c00, fff00000c1789cc9) [ 18.206005] [ 18.206308] The buggy address belongs to the physical page: [ 18.207299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101788 [ 18.208956] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.209751] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.210499] page_type: f5(slab) [ 18.211131] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.211867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.212673] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.213459] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.215128] head: 0bfffe0000000001 ffffc1ffc305e201 ffffffffffffffff 0000000000000000 [ 18.215727] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.216460] page dumped because: kasan: bad access detected [ 18.216798] [ 18.216986] Memory state around the buggy address: [ 18.217296] fff00000c1789b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.217684] fff00000c1789c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.218069] >fff00000c1789c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.218516] ^ [ 18.218990] fff00000c1789d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.220088] fff00000c1789d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.220521] ================================================================== [ 18.296557] ================================================================== [ 18.297142] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 18.297741] Write of size 1 at addr fff00000c1789cea by task kunit_try_catch/148 [ 18.298427] [ 18.298992] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.299110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.299142] Hardware name: linux,dummy-virt (DT) [ 18.299205] Call trace: [ 18.299232] show_stack+0x20/0x38 (C) [ 18.299302] dump_stack_lvl+0x8c/0xd0 [ 18.299357] print_report+0x118/0x608 [ 18.299411] kasan_report+0xdc/0x128 [ 18.299462] __asan_report_store1_noabort+0x20/0x30 [ 18.299516] krealloc_less_oob_helper+0xae4/0xc50 [ 18.299570] krealloc_less_oob+0x20/0x38 [ 18.299621] kunit_try_run_case+0x170/0x3f0 [ 18.299673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.299730] kthread+0x318/0x620 [ 18.299780] ret_from_fork+0x10/0x20 [ 18.299835] [ 18.304540] Allocated by task 148: [ 18.304760] kasan_save_stack+0x3c/0x68 [ 18.305017] kasan_save_track+0x20/0x40 [ 18.305306] kasan_save_alloc_info+0x40/0x58 [ 18.305682] __kasan_krealloc+0x118/0x178 [ 18.308052] krealloc_noprof+0x128/0x360 [ 18.308450] krealloc_less_oob_helper+0x168/0xc50 [ 18.308885] krealloc_less_oob+0x20/0x38 [ 18.309325] kunit_try_run_case+0x170/0x3f0 [ 18.309723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.310770] kthread+0x318/0x620 [ 18.311203] ret_from_fork+0x10/0x20 [ 18.311441] [ 18.311582] The buggy address belongs to the object at fff00000c1789c00 [ 18.311582] which belongs to the cache kmalloc-256 of size 256 [ 18.312094] The buggy address is located 33 bytes to the right of [ 18.312094] allocated 201-byte region [fff00000c1789c00, fff00000c1789cc9) [ 18.312640] [ 18.312779] The buggy address belongs to the physical page: [ 18.313050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101788 [ 18.315225] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.316373] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.316990] page_type: f5(slab) [ 18.317350] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.318315] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.318574] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.318802] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.319029] head: 0bfffe0000000001 ffffc1ffc305e201 ffffffffffffffff 0000000000000000 [ 18.319361] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.320063] page dumped because: kasan: bad access detected [ 18.321269] [ 18.321700] Memory state around the buggy address: [ 18.322533] fff00000c1789b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.323071] fff00000c1789c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.323668] >fff00000c1789c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.325561] ^ [ 18.326366] fff00000c1789d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.326682] fff00000c1789d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.326896] ================================================================== [ 18.224076] ================================================================== [ 18.224915] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 18.225668] Write of size 1 at addr fff00000c1789cd0 by task kunit_try_catch/148 [ 18.227226] [ 18.227455] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.227562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.227596] Hardware name: linux,dummy-virt (DT) [ 18.227635] Call trace: [ 18.227661] show_stack+0x20/0x38 (C) [ 18.227733] dump_stack_lvl+0x8c/0xd0 [ 18.227788] print_report+0x118/0x608 [ 18.227843] kasan_report+0xdc/0x128 [ 18.227894] __asan_report_store1_noabort+0x20/0x30 [ 18.227948] krealloc_less_oob_helper+0xb9c/0xc50 [ 18.228002] krealloc_less_oob+0x20/0x38 [ 18.228052] kunit_try_run_case+0x170/0x3f0 [ 18.228106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.229425] kthread+0x318/0x620 [ 18.229575] ret_from_fork+0x10/0x20 [ 18.229641] [ 18.236738] Allocated by task 148: [ 18.237118] kasan_save_stack+0x3c/0x68 [ 18.237769] kasan_save_track+0x20/0x40 [ 18.238395] kasan_save_alloc_info+0x40/0x58 [ 18.239644] __kasan_krealloc+0x118/0x178 [ 18.240100] krealloc_noprof+0x128/0x360 [ 18.240752] krealloc_less_oob_helper+0x168/0xc50 [ 18.241218] krealloc_less_oob+0x20/0x38 [ 18.241858] kunit_try_run_case+0x170/0x3f0 [ 18.242474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.243373] kthread+0x318/0x620 [ 18.243931] ret_from_fork+0x10/0x20 [ 18.244343] [ 18.244578] The buggy address belongs to the object at fff00000c1789c00 [ 18.244578] which belongs to the cache kmalloc-256 of size 256 [ 18.245795] The buggy address is located 7 bytes to the right of [ 18.245795] allocated 201-byte region [fff00000c1789c00, fff00000c1789cc9) [ 18.246865] [ 18.247064] The buggy address belongs to the physical page: [ 18.248244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101788 [ 18.249178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.250099] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.250921] page_type: f5(slab) [ 18.251412] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.252109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.252679] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.252924] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.253169] head: 0bfffe0000000001 ffffc1ffc305e201 ffffffffffffffff 0000000000000000 [ 18.253405] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.253635] page dumped because: kasan: bad access detected [ 18.253814] [ 18.253915] Memory state around the buggy address: [ 18.254136] fff00000c1789b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.254581] fff00000c1789c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.256314] >fff00000c1789c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.256961] ^ [ 18.257429] fff00000c1789d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.257953] fff00000c1789d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.259234] ================================================================== [ 18.261554] ================================================================== [ 18.262101] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 18.262904] Write of size 1 at addr fff00000c1789cda by task kunit_try_catch/148 [ 18.264710] [ 18.265031] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.265237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.265284] Hardware name: linux,dummy-virt (DT) [ 18.265324] Call trace: [ 18.265369] show_stack+0x20/0x38 (C) [ 18.265449] dump_stack_lvl+0x8c/0xd0 [ 18.265513] print_report+0x118/0x608 [ 18.265581] kasan_report+0xdc/0x128 [ 18.265633] __asan_report_store1_noabort+0x20/0x30 [ 18.265686] krealloc_less_oob_helper+0xa80/0xc50 [ 18.265741] krealloc_less_oob+0x20/0x38 [ 18.265792] kunit_try_run_case+0x170/0x3f0 [ 18.265845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.265902] kthread+0x318/0x620 [ 18.265953] ret_from_fork+0x10/0x20 [ 18.266009] [ 18.271805] Allocated by task 148: [ 18.272479] kasan_save_stack+0x3c/0x68 [ 18.272903] kasan_save_track+0x20/0x40 [ 18.273285] kasan_save_alloc_info+0x40/0x58 [ 18.273814] __kasan_krealloc+0x118/0x178 [ 18.274701] krealloc_noprof+0x128/0x360 [ 18.275108] krealloc_less_oob_helper+0x168/0xc50 [ 18.275525] krealloc_less_oob+0x20/0x38 [ 18.275969] kunit_try_run_case+0x170/0x3f0 [ 18.276407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.276893] kthread+0x318/0x620 [ 18.277321] ret_from_fork+0x10/0x20 [ 18.277799] [ 18.278352] The buggy address belongs to the object at fff00000c1789c00 [ 18.278352] which belongs to the cache kmalloc-256 of size 256 [ 18.279239] The buggy address is located 17 bytes to the right of [ 18.279239] allocated 201-byte region [fff00000c1789c00, fff00000c1789cc9) [ 18.281017] [ 18.281229] The buggy address belongs to the physical page: [ 18.281558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101788 [ 18.282694] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.283218] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.283893] page_type: f5(slab) [ 18.284268] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.284945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.285635] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.287201] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.287793] head: 0bfffe0000000001 ffffc1ffc305e201 ffffffffffffffff 0000000000000000 [ 18.288468] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.289063] page dumped because: kasan: bad access detected [ 18.289642] [ 18.289879] Memory state around the buggy address: [ 18.290648] fff00000c1789b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.291325] fff00000c1789c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.291950] >fff00000c1789c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.292961] ^ [ 18.293441] fff00000c1789d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.294063] fff00000c1789d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.295437] ================================================================== [ 18.529010] ================================================================== [ 18.529953] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 18.530737] Write of size 1 at addr fff00000c65f20eb by task kunit_try_catch/152 [ 18.531183] [ 18.531501] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.531614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.531645] Hardware name: linux,dummy-virt (DT) [ 18.531710] Call trace: [ 18.531736] show_stack+0x20/0x38 (C) [ 18.531800] dump_stack_lvl+0x8c/0xd0 [ 18.531853] print_report+0x118/0x608 [ 18.531903] kasan_report+0xdc/0x128 [ 18.531950] __asan_report_store1_noabort+0x20/0x30 [ 18.532000] krealloc_less_oob_helper+0xa58/0xc50 [ 18.532049] krealloc_large_less_oob+0x20/0x38 [ 18.532097] kunit_try_run_case+0x170/0x3f0 [ 18.532145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.533240] kthread+0x318/0x620 [ 18.533295] ret_from_fork+0x10/0x20 [ 18.533354] [ 18.537812] The buggy address belongs to the physical page: [ 18.538203] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f0 [ 18.538948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.540036] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.540819] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.541607] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.542739] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.543471] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.544558] head: 0bfffe0000000002 ffffc1ffc3197c01 ffffffffffffffff 0000000000000000 [ 18.545360] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.546102] page dumped because: kasan: bad access detected [ 18.546906] [ 18.547161] Memory state around the buggy address: [ 18.547565] fff00000c65f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.548031] fff00000c65f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.548523] >fff00000c65f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.549296] ^ [ 18.549846] fff00000c65f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.551312] fff00000c65f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.552044] ================================================================== [ 18.454118] ================================================================== [ 18.455285] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 18.455658] Write of size 1 at addr fff00000c65f20d0 by task kunit_try_catch/152 [ 18.455997] [ 18.456147] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 18.456262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.456294] Hardware name: linux,dummy-virt (DT) [ 18.456332] Call trace: [ 18.456358] show_stack+0x20/0x38 (C) [ 18.456418] dump_stack_lvl+0x8c/0xd0 [ 18.456471] print_report+0x118/0x608 [ 18.456524] kasan_report+0xdc/0x128 [ 18.456574] __asan_report_store1_noabort+0x20/0x30 [ 18.456626] krealloc_less_oob_helper+0xb9c/0xc50 [ 18.456679] krealloc_large_less_oob+0x20/0x38 [ 18.456730] kunit_try_run_case+0x170/0x3f0 [ 18.456782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.456838] kthread+0x318/0x620 [ 18.456886] ret_from_fork+0x10/0x20 [ 18.456941] [ 18.464887] The buggy address belongs to the physical page: [ 18.465361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f0 [ 18.465962] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.467069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.467793] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.468511] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.469255] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.470029] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.470938] head: 0bfffe0000000002 ffffc1ffc3197c01 ffffffffffffffff 0000000000000000 [ 18.471509] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.472072] page dumped because: kasan: bad access detected [ 18.473316] [ 18.473737] Memory state around the buggy address: [ 18.474549] fff00000c65f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.475140] fff00000c65f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.475939] >fff00000c65f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.476619] ^ [ 18.477328] fff00000c65f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.478110] fff00000c65f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.479011] ==================================================================
[ 12.594150] ================================================================== [ 12.594427] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 [ 12.594684] Write of size 1 at addr ffff8881028860eb by task kunit_try_catch/170 [ 12.594906] [ 12.594987] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.595036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.595047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.595068] Call Trace: [ 12.595084] <TASK> [ 12.595098] dump_stack_lvl+0x73/0xb0 [ 12.595121] print_report+0xd1/0x650 [ 12.595142] ? __virt_addr_valid+0x1db/0x2d0 [ 12.595163] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 12.595185] ? kasan_addr_to_slab+0x11/0xa0 [ 12.595204] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 12.595227] kasan_report+0x140/0x180 [ 12.595248] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 12.595275] __asan_report_store1_noabort+0x1b/0x30 [ 12.595297] krealloc_less_oob_helper+0xd49/0x11d0 [ 12.595321] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.595345] ? finish_task_switch.isra.0+0x153/0x700 [ 12.595368] ? __switch_to+0x5d9/0xf60 [ 12.595392] ? __schedule+0xce8/0x2840 [ 12.595414] ? __pfx_read_tsc+0x10/0x10 [ 12.595438] krealloc_large_less_oob+0x1c/0x30 [ 12.595459] kunit_try_run_case+0x1a6/0x480 [ 12.595482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.595504] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.595527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.595550] ? __kthread_parkme+0x82/0x160 [ 12.595571] ? preempt_count_sub+0x50/0x80 [ 12.595595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.595616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.595642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.595667] kthread+0x324/0x6e0 [ 12.595687] ? trace_preempt_on+0x20/0xc0 [ 12.595710] ? __pfx_kthread+0x10/0x10 [ 12.595731] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.595752] ? calculate_sigpending+0x7b/0xa0 [ 12.595772] ? __pfx_kthread+0x10/0x10 [ 12.595794] ret_from_fork+0x41/0x80 [ 12.595811] ? __pfx_kthread+0x10/0x10 [ 12.595832] ret_from_fork_asm+0x1a/0x30 [ 12.595863] </TASK> [ 12.595874] [ 12.607308] The buggy address belongs to the physical page: [ 12.607496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102884 [ 12.608230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.608951] flags: 0x200000000000040(head|node=0|zone=2) [ 12.609477] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.610194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.611065] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.611796] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.612494] head: 0200000000000002 ffffea00040a2101 ffffffffffffffff 0000000000000000 [ 12.613072] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 12.613296] page dumped because: kasan: bad access detected [ 12.613466] [ 12.613535] Memory state around the buggy address: [ 12.613736] ffff888102885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.614188] ffff888102886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.614542] >ffff888102886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.614752] ^ [ 12.615068] ffff888102886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.615430] ffff888102886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.615760] ================================================================== [ 12.459349] ================================================================== [ 12.459737] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0 [ 12.459978] Write of size 1 at addr ffff888100ad2aeb by task kunit_try_catch/166 [ 12.460525] [ 12.460910] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.460954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.460975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.460994] Call Trace: [ 12.461011] <TASK> [ 12.461037] dump_stack_lvl+0x73/0xb0 [ 12.461064] print_report+0xd1/0x650 [ 12.461084] ? __virt_addr_valid+0x1db/0x2d0 [ 12.461105] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 12.461128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.461152] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 12.461174] kasan_report+0x140/0x180 [ 12.461197] ? krealloc_less_oob_helper+0xd49/0x11d0 [ 12.461225] __asan_report_store1_noabort+0x1b/0x30 [ 12.461248] krealloc_less_oob_helper+0xd49/0x11d0 [ 12.461273] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.461295] ? finish_task_switch.isra.0+0x153/0x700 [ 12.461317] ? __switch_to+0x5d9/0xf60 [ 12.461341] ? __schedule+0xce8/0x2840 [ 12.461362] ? __pfx_read_tsc+0x10/0x10 [ 12.461386] krealloc_less_oob+0x1c/0x30 [ 12.461406] kunit_try_run_case+0x1a6/0x480 [ 12.461428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.461448] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.461470] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.461493] ? __kthread_parkme+0x82/0x160 [ 12.461514] ? preempt_count_sub+0x50/0x80 [ 12.461538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.461746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.461775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.461801] kthread+0x324/0x6e0 [ 12.461859] ? trace_preempt_on+0x20/0xc0 [ 12.461883] ? __pfx_kthread+0x10/0x10 [ 12.461904] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.461926] ? calculate_sigpending+0x7b/0xa0 [ 12.461946] ? __pfx_kthread+0x10/0x10 [ 12.461968] ret_from_fork+0x41/0x80 [ 12.461986] ? __pfx_kthread+0x10/0x10 [ 12.462007] ret_from_fork_asm+0x1a/0x30 [ 12.462052] </TASK> [ 12.462062] [ 12.471865] Allocated by task 166: [ 12.472068] kasan_save_stack+0x45/0x70 [ 12.472249] kasan_save_track+0x18/0x40 [ 12.472382] kasan_save_alloc_info+0x3b/0x50 [ 12.472555] __kasan_krealloc+0x190/0x1f0 [ 12.472813] krealloc_noprof+0xf3/0x340 [ 12.473004] krealloc_less_oob_helper+0x1ab/0x11d0 [ 12.473212] krealloc_less_oob+0x1c/0x30 [ 12.473385] kunit_try_run_case+0x1a6/0x480 [ 12.473653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.473880] kthread+0x324/0x6e0 [ 12.474055] ret_from_fork+0x41/0x80 [ 12.474238] ret_from_fork_asm+0x1a/0x30 [ 12.474401] [ 12.474494] The buggy address belongs to the object at ffff888100ad2a00 [ 12.474494] which belongs to the cache kmalloc-256 of size 256 [ 12.474918] The buggy address is located 34 bytes to the right of [ 12.474918] allocated 201-byte region [ffff888100ad2a00, ffff888100ad2ac9) [ 12.475394] [ 12.475492] The buggy address belongs to the physical page: [ 12.475736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ad2 [ 12.476031] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.476303] flags: 0x200000000000040(head|node=0|zone=2) [ 12.476556] page_type: f5(slab) [ 12.476723] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.477114] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.477407] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.477929] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.478245] head: 0200000000000001 ffffea000402b481 ffffffffffffffff 0000000000000000 [ 12.478539] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 12.478914] page dumped because: kasan: bad access detected [ 12.479131] [ 12.479203] Memory state around the buggy address: [ 12.479408] ffff888100ad2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.479789] ffff888100ad2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.480082] >ffff888100ad2a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.480370] ^ [ 12.480704] ffff888100ad2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.480920] ffff888100ad2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.481208] ================================================================== [ 12.524679] ================================================================== [ 12.525190] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 [ 12.525526] Write of size 1 at addr ffff8881028860c9 by task kunit_try_catch/170 [ 12.525862] [ 12.525944] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.525982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.525993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.526045] Call Trace: [ 12.526059] <TASK> [ 12.526074] dump_stack_lvl+0x73/0xb0 [ 12.526099] print_report+0xd1/0x650 [ 12.526138] ? __virt_addr_valid+0x1db/0x2d0 [ 12.526159] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 12.526182] ? kasan_addr_to_slab+0x11/0xa0 [ 12.526201] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 12.526224] kasan_report+0x140/0x180 [ 12.526245] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 12.526272] __asan_report_store1_noabort+0x1b/0x30 [ 12.526295] krealloc_less_oob_helper+0xd72/0x11d0 [ 12.526336] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.526358] ? finish_task_switch.isra.0+0x153/0x700 [ 12.526395] ? __switch_to+0x5d9/0xf60 [ 12.526421] ? __schedule+0xce8/0x2840 [ 12.526442] ? __pfx_read_tsc+0x10/0x10 [ 12.526466] krealloc_large_less_oob+0x1c/0x30 [ 12.526487] kunit_try_run_case+0x1a6/0x480 [ 12.526510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.526530] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.526553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.526575] ? __kthread_parkme+0x82/0x160 [ 12.526596] ? preempt_count_sub+0x50/0x80 [ 12.526619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.526641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.526666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.526691] kthread+0x324/0x6e0 [ 12.526712] ? trace_preempt_on+0x20/0xc0 [ 12.526734] ? __pfx_kthread+0x10/0x10 [ 12.526755] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.526776] ? calculate_sigpending+0x7b/0xa0 [ 12.526798] ? __pfx_kthread+0x10/0x10 [ 12.526820] ret_from_fork+0x41/0x80 [ 12.526838] ? __pfx_kthread+0x10/0x10 [ 12.526859] ret_from_fork_asm+0x1a/0x30 [ 12.526890] </TASK> [ 12.526900] [ 12.534379] The buggy address belongs to the physical page: [ 12.534657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102884 [ 12.535064] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.535346] flags: 0x200000000000040(head|node=0|zone=2) [ 12.535557] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.535807] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.536057] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.536388] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.536714] head: 0200000000000002 ffffea00040a2101 ffffffffffffffff 0000000000000000 [ 12.537073] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 12.537291] page dumped because: kasan: bad access detected [ 12.537454] [ 12.537562] Memory state around the buggy address: [ 12.537792] ffff888102885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.538234] ffff888102886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.538579] >ffff888102886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.538889] ^ [ 12.539191] ffff888102886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.539514] ffff888102886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.539817] ================================================================== [ 12.381211] ================================================================== [ 12.381537] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 [ 12.382108] Write of size 1 at addr ffff888100ad2ad0 by task kunit_try_catch/166 [ 12.382415] [ 12.382497] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.382534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.382545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.382565] Call Trace: [ 12.382577] <TASK> [ 12.382591] dump_stack_lvl+0x73/0xb0 [ 12.382616] print_report+0xd1/0x650 [ 12.382636] ? __virt_addr_valid+0x1db/0x2d0 [ 12.382658] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 12.382680] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.382704] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 12.382727] kasan_report+0x140/0x180 [ 12.382747] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 12.382775] __asan_report_store1_noabort+0x1b/0x30 [ 12.382851] krealloc_less_oob_helper+0xe25/0x11d0 [ 12.382877] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.382900] ? finish_task_switch.isra.0+0x153/0x700 [ 12.382922] ? __switch_to+0x5d9/0xf60 [ 12.382948] ? __schedule+0xce8/0x2840 [ 12.382970] ? __pfx_read_tsc+0x10/0x10 [ 12.382994] krealloc_less_oob+0x1c/0x30 [ 12.383014] kunit_try_run_case+0x1a6/0x480 [ 12.383049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.383070] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.383093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.383115] ? __kthread_parkme+0x82/0x160 [ 12.383136] ? preempt_count_sub+0x50/0x80 [ 12.383159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.383181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.383207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.383232] kthread+0x324/0x6e0 [ 12.383252] ? trace_preempt_on+0x20/0xc0 [ 12.383275] ? __pfx_kthread+0x10/0x10 [ 12.383296] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.383318] ? calculate_sigpending+0x7b/0xa0 [ 12.383339] ? __pfx_kthread+0x10/0x10 [ 12.383361] ret_from_fork+0x41/0x80 [ 12.383379] ? __pfx_kthread+0x10/0x10 [ 12.383400] ret_from_fork_asm+0x1a/0x30 [ 12.383431] </TASK> [ 12.383440] [ 12.393302] Allocated by task 166: [ 12.393469] kasan_save_stack+0x45/0x70 [ 12.393930] kasan_save_track+0x18/0x40 [ 12.394107] kasan_save_alloc_info+0x3b/0x50 [ 12.394321] __kasan_krealloc+0x190/0x1f0 [ 12.394500] krealloc_noprof+0xf3/0x340 [ 12.395133] krealloc_less_oob_helper+0x1ab/0x11d0 [ 12.395352] krealloc_less_oob+0x1c/0x30 [ 12.395507] kunit_try_run_case+0x1a6/0x480 [ 12.395703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.396163] kthread+0x324/0x6e0 [ 12.396327] ret_from_fork+0x41/0x80 [ 12.396487] ret_from_fork_asm+0x1a/0x30 [ 12.396912] [ 12.397039] The buggy address belongs to the object at ffff888100ad2a00 [ 12.397039] which belongs to the cache kmalloc-256 of size 256 [ 12.397556] The buggy address is located 7 bytes to the right of [ 12.397556] allocated 201-byte region [ffff888100ad2a00, ffff888100ad2ac9) [ 12.398438] [ 12.398526] The buggy address belongs to the physical page: [ 12.399126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ad2 [ 12.399457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.399915] flags: 0x200000000000040(head|node=0|zone=2) [ 12.400254] page_type: f5(slab) [ 12.400391] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.400903] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.401206] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.401628] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.401986] head: 0200000000000001 ffffea000402b481 ffffffffffffffff 0000000000000000 [ 12.402327] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 12.402858] page dumped because: kasan: bad access detected [ 12.403195] [ 12.403286] Memory state around the buggy address: [ 12.403464] ffff888100ad2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.404086] ffff888100ad2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.404367] >ffff888100ad2a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.404927] ^ [ 12.405141] ffff888100ad2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.405554] ffff888100ad2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.406072] ================================================================== [ 12.572539] ================================================================== [ 12.572865] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 [ 12.573380] Write of size 1 at addr ffff8881028860ea by task kunit_try_catch/170 [ 12.573876] [ 12.573953] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.573987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.573998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.574303] Call Trace: [ 12.574325] <TASK> [ 12.574341] dump_stack_lvl+0x73/0xb0 [ 12.574370] print_report+0xd1/0x650 [ 12.574392] ? __virt_addr_valid+0x1db/0x2d0 [ 12.574414] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 12.574470] ? kasan_addr_to_slab+0x11/0xa0 [ 12.574490] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 12.574525] kasan_report+0x140/0x180 [ 12.574559] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 12.574586] __asan_report_store1_noabort+0x1b/0x30 [ 12.574624] krealloc_less_oob_helper+0xe92/0x11d0 [ 12.574661] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.574683] ? finish_task_switch.isra.0+0x153/0x700 [ 12.574718] ? __switch_to+0x5d9/0xf60 [ 12.574756] ? __schedule+0xce8/0x2840 [ 12.574790] ? __pfx_read_tsc+0x10/0x10 [ 12.574813] krealloc_large_less_oob+0x1c/0x30 [ 12.574835] kunit_try_run_case+0x1a6/0x480 [ 12.574858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.574878] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.574900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.574923] ? __kthread_parkme+0x82/0x160 [ 12.574944] ? preempt_count_sub+0x50/0x80 [ 12.574967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.574989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.575014] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.575049] kthread+0x324/0x6e0 [ 12.575069] ? trace_preempt_on+0x20/0xc0 [ 12.575092] ? __pfx_kthread+0x10/0x10 [ 12.575113] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.575134] ? calculate_sigpending+0x7b/0xa0 [ 12.575155] ? __pfx_kthread+0x10/0x10 [ 12.575176] ret_from_fork+0x41/0x80 [ 12.575194] ? __pfx_kthread+0x10/0x10 [ 12.575215] ret_from_fork_asm+0x1a/0x30 [ 12.575246] </TASK> [ 12.575256] [ 12.585679] The buggy address belongs to the physical page: [ 12.585931] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102884 [ 12.586450] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.586907] flags: 0x200000000000040(head|node=0|zone=2) [ 12.587266] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.587603] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.588046] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.588456] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.588937] head: 0200000000000002 ffffea00040a2101 ffffffffffffffff 0000000000000000 [ 12.589372] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 12.589805] page dumped because: kasan: bad access detected [ 12.590097] [ 12.590203] Memory state around the buggy address: [ 12.590449] ffff888102885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.590986] ffff888102886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.591301] >ffff888102886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.591808] ^ [ 12.592194] ffff888102886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.592583] ffff888102886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.592898] ================================================================== [ 12.406768] ================================================================== [ 12.407130] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 [ 12.407457] Write of size 1 at addr ffff888100ad2ada by task kunit_try_catch/166 [ 12.408468] [ 12.408784] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.408834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.408846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.408867] Call Trace: [ 12.408878] <TASK> [ 12.408893] dump_stack_lvl+0x73/0xb0 [ 12.408920] print_report+0xd1/0x650 [ 12.408943] ? __virt_addr_valid+0x1db/0x2d0 [ 12.408965] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 12.408986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.409011] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 12.409049] kasan_report+0x140/0x180 [ 12.409072] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 12.409100] __asan_report_store1_noabort+0x1b/0x30 [ 12.409123] krealloc_less_oob_helper+0xec8/0x11d0 [ 12.409147] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.409170] ? finish_task_switch.isra.0+0x153/0x700 [ 12.409192] ? __switch_to+0x5d9/0xf60 [ 12.409217] ? __schedule+0xce8/0x2840 [ 12.409238] ? __pfx_read_tsc+0x10/0x10 [ 12.409262] krealloc_less_oob+0x1c/0x30 [ 12.409282] kunit_try_run_case+0x1a6/0x480 [ 12.409304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.409324] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.409346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.409369] ? __kthread_parkme+0x82/0x160 [ 12.409390] ? preempt_count_sub+0x50/0x80 [ 12.409413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.409434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.409459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.409484] kthread+0x324/0x6e0 [ 12.409505] ? trace_preempt_on+0x20/0xc0 [ 12.409527] ? __pfx_kthread+0x10/0x10 [ 12.409548] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.409569] ? calculate_sigpending+0x7b/0xa0 [ 12.409590] ? __pfx_kthread+0x10/0x10 [ 12.409612] ret_from_fork+0x41/0x80 [ 12.409630] ? __pfx_kthread+0x10/0x10 [ 12.409651] ret_from_fork_asm+0x1a/0x30 [ 12.409681] </TASK> [ 12.409692] [ 12.419325] Allocated by task 166: [ 12.419515] kasan_save_stack+0x45/0x70 [ 12.419693] kasan_save_track+0x18/0x40 [ 12.420625] kasan_save_alloc_info+0x3b/0x50 [ 12.420835] __kasan_krealloc+0x190/0x1f0 [ 12.420985] krealloc_noprof+0xf3/0x340 [ 12.421314] krealloc_less_oob_helper+0x1ab/0x11d0 [ 12.421574] krealloc_less_oob+0x1c/0x30 [ 12.421883] kunit_try_run_case+0x1a6/0x480 [ 12.422081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.422414] kthread+0x324/0x6e0 [ 12.422718] ret_from_fork+0x41/0x80 [ 12.422862] ret_from_fork_asm+0x1a/0x30 [ 12.423180] [ 12.423282] The buggy address belongs to the object at ffff888100ad2a00 [ 12.423282] which belongs to the cache kmalloc-256 of size 256 [ 12.424264] The buggy address is located 17 bytes to the right of [ 12.424264] allocated 201-byte region [ffff888100ad2a00, ffff888100ad2ac9) [ 12.424919] [ 12.424998] The buggy address belongs to the physical page: [ 12.425269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ad2 [ 12.425578] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.425900] flags: 0x200000000000040(head|node=0|zone=2) [ 12.426143] page_type: f5(slab) [ 12.426291] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.426575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.426896] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.427761] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.428208] head: 0200000000000001 ffffea000402b481 ffffffffffffffff 0000000000000000 [ 12.428518] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 12.429003] page dumped because: kasan: bad access detected [ 12.429342] [ 12.429418] Memory state around the buggy address: [ 12.429640] ffff888100ad2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.430239] ffff888100ad2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.430907] >ffff888100ad2a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.431309] ^ [ 12.431635] ffff888100ad2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.432087] ffff888100ad2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.432455] ================================================================== [ 12.351167] ================================================================== [ 12.351799] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0 [ 12.352182] Write of size 1 at addr ffff888100ad2ac9 by task kunit_try_catch/166 [ 12.352477] [ 12.352659] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.352699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.352710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.352729] Call Trace: [ 12.352741] <TASK> [ 12.352754] dump_stack_lvl+0x73/0xb0 [ 12.352778] print_report+0xd1/0x650 [ 12.352799] ? __virt_addr_valid+0x1db/0x2d0 [ 12.352821] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 12.352843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.352868] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 12.352890] kasan_report+0x140/0x180 [ 12.352911] ? krealloc_less_oob_helper+0xd72/0x11d0 [ 12.352938] __asan_report_store1_noabort+0x1b/0x30 [ 12.352961] krealloc_less_oob_helper+0xd72/0x11d0 [ 12.352985] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.353008] ? finish_task_switch.isra.0+0x153/0x700 [ 12.353044] ? __switch_to+0x5d9/0xf60 [ 12.353071] ? __schedule+0xce8/0x2840 [ 12.353093] ? __pfx_read_tsc+0x10/0x10 [ 12.353117] krealloc_less_oob+0x1c/0x30 [ 12.353138] kunit_try_run_case+0x1a6/0x480 [ 12.353160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.353180] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.353203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.353225] ? __kthread_parkme+0x82/0x160 [ 12.353246] ? preempt_count_sub+0x50/0x80 [ 12.353270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.353292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.353316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.353341] kthread+0x324/0x6e0 [ 12.353362] ? trace_preempt_on+0x20/0xc0 [ 12.353384] ? __pfx_kthread+0x10/0x10 [ 12.353405] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.353426] ? calculate_sigpending+0x7b/0xa0 [ 12.353448] ? __pfx_kthread+0x10/0x10 [ 12.353470] ret_from_fork+0x41/0x80 [ 12.353487] ? __pfx_kthread+0x10/0x10 [ 12.353509] ret_from_fork_asm+0x1a/0x30 [ 12.353539] </TASK> [ 12.353550] [ 12.362394] Allocated by task 166: [ 12.362538] kasan_save_stack+0x45/0x70 [ 12.365533] kasan_save_track+0x18/0x40 [ 12.367030] kasan_save_alloc_info+0x3b/0x50 [ 12.367696] __kasan_krealloc+0x190/0x1f0 [ 12.367972] krealloc_noprof+0xf3/0x340 [ 12.368391] krealloc_less_oob_helper+0x1ab/0x11d0 [ 12.368753] krealloc_less_oob+0x1c/0x30 [ 12.368944] kunit_try_run_case+0x1a6/0x480 [ 12.369297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.369723] kthread+0x324/0x6e0 [ 12.369879] ret_from_fork+0x41/0x80 [ 12.370110] ret_from_fork_asm+0x1a/0x30 [ 12.370444] [ 12.370537] The buggy address belongs to the object at ffff888100ad2a00 [ 12.370537] which belongs to the cache kmalloc-256 of size 256 [ 12.371410] The buggy address is located 0 bytes to the right of [ 12.371410] allocated 201-byte region [ffff888100ad2a00, ffff888100ad2ac9) [ 12.372456] [ 12.372553] The buggy address belongs to the physical page: [ 12.372963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ad2 [ 12.373425] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.373968] flags: 0x200000000000040(head|node=0|zone=2) [ 12.374392] page_type: f5(slab) [ 12.374535] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.375114] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.375417] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.376095] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.376416] head: 0200000000000001 ffffea000402b481 ffffffffffffffff 0000000000000000 [ 12.377055] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 12.377509] page dumped because: kasan: bad access detected [ 12.377851] [ 12.377928] Memory state around the buggy address: [ 12.378365] ffff888100ad2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.378915] ffff888100ad2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.379245] >ffff888100ad2a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.379646] ^ [ 12.379946] ffff888100ad2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.380271] ffff888100ad2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.380567] ================================================================== [ 12.433112] ================================================================== [ 12.433684] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0 [ 12.434166] Write of size 1 at addr ffff888100ad2aea by task kunit_try_catch/166 [ 12.434522] [ 12.434711] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.434751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.434762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.434780] Call Trace: [ 12.434794] <TASK> [ 12.434809] dump_stack_lvl+0x73/0xb0 [ 12.434833] print_report+0xd1/0x650 [ 12.435075] ? __virt_addr_valid+0x1db/0x2d0 [ 12.435104] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 12.435127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.435152] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 12.435174] kasan_report+0x140/0x180 [ 12.435195] ? krealloc_less_oob_helper+0xe92/0x11d0 [ 12.435222] __asan_report_store1_noabort+0x1b/0x30 [ 12.435245] krealloc_less_oob_helper+0xe92/0x11d0 [ 12.435269] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.435291] ? finish_task_switch.isra.0+0x153/0x700 [ 12.435313] ? __switch_to+0x5d9/0xf60 [ 12.435338] ? __schedule+0xce8/0x2840 [ 12.435359] ? __pfx_read_tsc+0x10/0x10 [ 12.435383] krealloc_less_oob+0x1c/0x30 [ 12.435403] kunit_try_run_case+0x1a6/0x480 [ 12.435425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.435445] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.435468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.435491] ? __kthread_parkme+0x82/0x160 [ 12.435512] ? preempt_count_sub+0x50/0x80 [ 12.435535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.435557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.435582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.435607] kthread+0x324/0x6e0 [ 12.435627] ? trace_preempt_on+0x20/0xc0 [ 12.435649] ? __pfx_kthread+0x10/0x10 [ 12.435671] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.435691] ? calculate_sigpending+0x7b/0xa0 [ 12.435712] ? __pfx_kthread+0x10/0x10 [ 12.435734] ret_from_fork+0x41/0x80 [ 12.435752] ? __pfx_kthread+0x10/0x10 [ 12.435773] ret_from_fork_asm+0x1a/0x30 [ 12.435804] </TASK> [ 12.435813] [ 12.445848] Allocated by task 166: [ 12.446111] kasan_save_stack+0x45/0x70 [ 12.446266] kasan_save_track+0x18/0x40 [ 12.446527] kasan_save_alloc_info+0x3b/0x50 [ 12.446944] __kasan_krealloc+0x190/0x1f0 [ 12.447117] krealloc_noprof+0xf3/0x340 [ 12.447451] krealloc_less_oob_helper+0x1ab/0x11d0 [ 12.447801] krealloc_less_oob+0x1c/0x30 [ 12.447972] kunit_try_run_case+0x1a6/0x480 [ 12.448312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.448549] kthread+0x324/0x6e0 [ 12.448689] ret_from_fork+0x41/0x80 [ 12.448869] ret_from_fork_asm+0x1a/0x30 [ 12.449045] [ 12.449146] The buggy address belongs to the object at ffff888100ad2a00 [ 12.449146] which belongs to the cache kmalloc-256 of size 256 [ 12.449613] The buggy address is located 33 bytes to the right of [ 12.449613] allocated 201-byte region [ffff888100ad2a00, ffff888100ad2ac9) [ 12.450730] [ 12.450815] The buggy address belongs to the physical page: [ 12.451210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ad2 [ 12.451596] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.452032] flags: 0x200000000000040(head|node=0|zone=2) [ 12.452276] page_type: f5(slab) [ 12.452428] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.452953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.453280] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.453777] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.454148] head: 0200000000000001 ffffea000402b481 ffffffffffffffff 0000000000000000 [ 12.454515] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 12.454926] page dumped because: kasan: bad access detected [ 12.455164] [ 12.455669] Memory state around the buggy address: [ 12.455839] ffff888100ad2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.456336] ffff888100ad2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.456768] >ffff888100ad2a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 12.457186] ^ [ 12.457473] ffff888100ad2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.458033] ffff888100ad2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.458401] ================================================================== [ 12.556651] ================================================================== [ 12.556994] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0 [ 12.557506] Write of size 1 at addr ffff8881028860da by task kunit_try_catch/170 [ 12.557881] [ 12.558027] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.558065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.558076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.558111] Call Trace: [ 12.558125] <TASK> [ 12.558138] dump_stack_lvl+0x73/0xb0 [ 12.558163] print_report+0xd1/0x650 [ 12.558184] ? __virt_addr_valid+0x1db/0x2d0 [ 12.558206] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 12.558228] ? kasan_addr_to_slab+0x11/0xa0 [ 12.558247] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 12.558269] kasan_report+0x140/0x180 [ 12.558290] ? krealloc_less_oob_helper+0xec8/0x11d0 [ 12.558317] __asan_report_store1_noabort+0x1b/0x30 [ 12.558341] krealloc_less_oob_helper+0xec8/0x11d0 [ 12.558365] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.558388] ? finish_task_switch.isra.0+0x153/0x700 [ 12.558411] ? __switch_to+0x5d9/0xf60 [ 12.558435] ? __schedule+0xce8/0x2840 [ 12.558457] ? __pfx_read_tsc+0x10/0x10 [ 12.558481] krealloc_large_less_oob+0x1c/0x30 [ 12.558503] kunit_try_run_case+0x1a6/0x480 [ 12.558526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.558547] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.558570] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.558592] ? __kthread_parkme+0x82/0x160 [ 12.558614] ? preempt_count_sub+0x50/0x80 [ 12.558637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.558659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.558684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.558709] kthread+0x324/0x6e0 [ 12.558730] ? trace_preempt_on+0x20/0xc0 [ 12.558752] ? __pfx_kthread+0x10/0x10 [ 12.558773] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.558795] ? calculate_sigpending+0x7b/0xa0 [ 12.558815] ? __pfx_kthread+0x10/0x10 [ 12.558837] ret_from_fork+0x41/0x80 [ 12.558855] ? __pfx_kthread+0x10/0x10 [ 12.558876] ret_from_fork_asm+0x1a/0x30 [ 12.558908] </TASK> [ 12.558918] [ 12.566218] The buggy address belongs to the physical page: [ 12.566387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102884 [ 12.566617] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.567199] flags: 0x200000000000040(head|node=0|zone=2) [ 12.567478] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.567856] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.568245] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.568832] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.569192] head: 0200000000000002 ffffea00040a2101 ffffffffffffffff 0000000000000000 [ 12.569556] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 12.569899] page dumped because: kasan: bad access detected [ 12.570156] [ 12.570272] Memory state around the buggy address: [ 12.570494] ffff888102885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.570806] ffff888102886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.571104] >ffff888102886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.571404] ^ [ 12.571719] ffff888102886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.571959] ffff888102886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.572181] ================================================================== [ 12.540353] ================================================================== [ 12.541067] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0 [ 12.541382] Write of size 1 at addr ffff8881028860d0 by task kunit_try_catch/170 [ 12.541643] [ 12.541807] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.541843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.541854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.541872] Call Trace: [ 12.541905] <TASK> [ 12.541917] dump_stack_lvl+0x73/0xb0 [ 12.541954] print_report+0xd1/0x650 [ 12.541988] ? __virt_addr_valid+0x1db/0x2d0 [ 12.542010] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 12.542056] ? kasan_addr_to_slab+0x11/0xa0 [ 12.542075] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 12.542098] kasan_report+0x140/0x180 [ 12.542133] ? krealloc_less_oob_helper+0xe25/0x11d0 [ 12.542173] __asan_report_store1_noabort+0x1b/0x30 [ 12.542209] krealloc_less_oob_helper+0xe25/0x11d0 [ 12.542234] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 12.542256] ? finish_task_switch.isra.0+0x153/0x700 [ 12.542278] ? __switch_to+0x5d9/0xf60 [ 12.542303] ? __schedule+0xce8/0x2840 [ 12.542325] ? __pfx_read_tsc+0x10/0x10 [ 12.542348] krealloc_large_less_oob+0x1c/0x30 [ 12.542370] kunit_try_run_case+0x1a6/0x480 [ 12.542392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.542412] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.542434] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.542457] ? __kthread_parkme+0x82/0x160 [ 12.542478] ? preempt_count_sub+0x50/0x80 [ 12.542501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.542523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.542548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.542573] kthread+0x324/0x6e0 [ 12.542593] ? trace_preempt_on+0x20/0xc0 [ 12.542615] ? __pfx_kthread+0x10/0x10 [ 12.542637] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.542674] ? calculate_sigpending+0x7b/0xa0 [ 12.542708] ? __pfx_kthread+0x10/0x10 [ 12.542730] ret_from_fork+0x41/0x80 [ 12.542748] ? __pfx_kthread+0x10/0x10 [ 12.542769] ret_from_fork_asm+0x1a/0x30 [ 12.542799] </TASK> [ 12.542809] [ 12.550153] The buggy address belongs to the physical page: [ 12.550380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102884 [ 12.550760] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.551092] flags: 0x200000000000040(head|node=0|zone=2) [ 12.551338] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.551659] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.551950] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.552286] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.552610] head: 0200000000000002 ffffea00040a2101 ffffffffffffffff 0000000000000000 [ 12.552962] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 12.553256] page dumped because: kasan: bad access detected [ 12.553501] [ 12.553621] Memory state around the buggy address: [ 12.553785] ffff888102885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.554110] ffff888102886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.554425] >ffff888102886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 12.554763] ^ [ 12.555001] ffff888102886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.555302] ffff888102886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.555596] ==================================================================