Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 22.781909] ================================================================== [ 22.789020] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.796571] Write of size 1 at addr ffff0008032360d0 by task kunit_try_catch/209 [ 22.803949] [ 22.805432] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 22.805479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.805496] Hardware name: WinLink E850-96 board (DT) [ 22.805517] Call trace: [ 22.805528] show_stack+0x20/0x38 (C) [ 22.805559] dump_stack_lvl+0x8c/0xd0 [ 22.805592] print_report+0x118/0x608 [ 22.805620] kasan_report+0xdc/0x128 [ 22.805645] __asan_report_store1_noabort+0x20/0x30 [ 22.805678] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.805712] krealloc_large_less_oob+0x20/0x38 [ 22.805748] kunit_try_run_case+0x170/0x3f0 [ 22.805784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.805821] kthread+0x328/0x630 [ 22.805855] ret_from_fork+0x10/0x20 [ 22.805890] [ 22.873306] The buggy address belongs to the physical page: [ 22.878865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 22.886850] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.894489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.901430] page_type: f8(unknown) [ 22.904825] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.912548] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.920274] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.928085] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.935899] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 22.943711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.951516] page dumped because: kasan: bad access detected [ 22.957072] [ 22.958547] Memory state around the buggy address: [ 22.963327] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.970530] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.977735] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.984936] ^ [ 22.990755] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.997960] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.005162] ================================================================== [ 21.466255] ================================================================== [ 21.473245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.480792] Write of size 1 at addr ffff0008030fcaea by task kunit_try_catch/205 [ 21.488170] [ 21.489655] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 21.489706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.489722] Hardware name: WinLink E850-96 board (DT) [ 21.489742] Call trace: [ 21.489754] show_stack+0x20/0x38 (C) [ 21.489787] dump_stack_lvl+0x8c/0xd0 [ 21.489821] print_report+0x118/0x608 [ 21.489848] kasan_report+0xdc/0x128 [ 21.489875] __asan_report_store1_noabort+0x20/0x30 [ 21.489907] krealloc_less_oob_helper+0xae4/0xc50 [ 21.489941] krealloc_less_oob+0x20/0x38 [ 21.489973] kunit_try_run_case+0x170/0x3f0 [ 21.490009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.490044] kthread+0x328/0x630 [ 21.490078] ret_from_fork+0x10/0x20 [ 21.490111] [ 21.557006] Allocated by task 205: [ 21.560394] kasan_save_stack+0x3c/0x68 [ 21.564211] kasan_save_track+0x20/0x40 [ 21.568030] kasan_save_alloc_info+0x40/0x58 [ 21.572284] __kasan_krealloc+0x118/0x178 [ 21.576276] krealloc_noprof+0x128/0x360 [ 21.580183] krealloc_less_oob_helper+0x168/0xc50 [ 21.584872] krealloc_less_oob+0x20/0x38 [ 21.588777] kunit_try_run_case+0x170/0x3f0 [ 21.592943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.598412] kthread+0x328/0x630 [ 21.601624] ret_from_fork+0x10/0x20 [ 21.605183] [ 21.606658] The buggy address belongs to the object at ffff0008030fca00 [ 21.606658] which belongs to the cache kmalloc-256 of size 256 [ 21.619160] The buggy address is located 33 bytes to the right of [ 21.619160] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.632179] [ 21.633656] The buggy address belongs to the physical page: [ 21.639214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.647198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.654835] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.661779] page_type: f5(slab) [ 21.664913] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.672636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.680362] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.688174] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.695987] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 21.703799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.711604] page dumped because: kasan: bad access detected [ 21.717160] [ 21.718634] Memory state around the buggy address: [ 21.723414] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.730618] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.737823] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.745024] ^ [ 21.751625] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.758829] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.766031] ================================================================== [ 21.159529] ================================================================== [ 21.166567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.174115] Write of size 1 at addr ffff0008030fcada by task kunit_try_catch/205 [ 21.181491] [ 21.182977] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 21.183032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.183047] Hardware name: WinLink E850-96 board (DT) [ 21.183069] Call trace: [ 21.183081] show_stack+0x20/0x38 (C) [ 21.183115] dump_stack_lvl+0x8c/0xd0 [ 21.183147] print_report+0x118/0x608 [ 21.183175] kasan_report+0xdc/0x128 [ 21.183201] __asan_report_store1_noabort+0x20/0x30 [ 21.183231] krealloc_less_oob_helper+0xa80/0xc50 [ 21.183264] krealloc_less_oob+0x20/0x38 [ 21.183297] kunit_try_run_case+0x170/0x3f0 [ 21.183334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183372] kthread+0x328/0x630 [ 21.183405] ret_from_fork+0x10/0x20 [ 21.183440] [ 21.250326] Allocated by task 205: [ 21.253715] kasan_save_stack+0x3c/0x68 [ 21.257531] kasan_save_track+0x20/0x40 [ 21.261351] kasan_save_alloc_info+0x40/0x58 [ 21.265604] __kasan_krealloc+0x118/0x178 [ 21.269597] krealloc_noprof+0x128/0x360 [ 21.273503] krealloc_less_oob_helper+0x168/0xc50 [ 21.278192] krealloc_less_oob+0x20/0x38 [ 21.282097] kunit_try_run_case+0x170/0x3f0 [ 21.286264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.291732] kthread+0x328/0x630 [ 21.294944] ret_from_fork+0x10/0x20 [ 21.298503] [ 21.299981] The buggy address belongs to the object at ffff0008030fca00 [ 21.299981] which belongs to the cache kmalloc-256 of size 256 [ 21.312480] The buggy address is located 17 bytes to the right of [ 21.312480] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.325499] [ 21.326977] The buggy address belongs to the physical page: [ 21.332535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.340519] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.348157] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.355101] page_type: f5(slab) [ 21.358235] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.365956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.373683] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.381494] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.389307] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 21.397119] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.404925] page dumped because: kasan: bad access detected [ 21.410480] [ 21.411956] Memory state around the buggy address: [ 21.416736] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.423939] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.431143] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.438345] ^ [ 21.444424] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.451629] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.458831] ================================================================== [ 20.544885] ================================================================== [ 20.554163] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 20.561709] Write of size 1 at addr ffff0008030fcac9 by task kunit_try_catch/205 [ 20.569087] [ 20.570572] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 20.570621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.570637] Hardware name: WinLink E850-96 board (DT) [ 20.570659] Call trace: [ 20.570670] show_stack+0x20/0x38 (C) [ 20.570706] dump_stack_lvl+0x8c/0xd0 [ 20.570742] print_report+0x118/0x608 [ 20.570772] kasan_report+0xdc/0x128 [ 20.570801] __asan_report_store1_noabort+0x20/0x30 [ 20.570836] krealloc_less_oob_helper+0xa48/0xc50 [ 20.570870] krealloc_less_oob+0x20/0x38 [ 20.570900] kunit_try_run_case+0x170/0x3f0 [ 20.570935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.570971] kthread+0x328/0x630 [ 20.571006] ret_from_fork+0x10/0x20 [ 20.571041] [ 20.637924] Allocated by task 205: [ 20.641311] kasan_save_stack+0x3c/0x68 [ 20.645128] kasan_save_track+0x20/0x40 [ 20.648947] kasan_save_alloc_info+0x40/0x58 [ 20.653201] __kasan_krealloc+0x118/0x178 [ 20.657193] krealloc_noprof+0x128/0x360 [ 20.661099] krealloc_less_oob_helper+0x168/0xc50 [ 20.665786] krealloc_less_oob+0x20/0x38 [ 20.669693] kunit_try_run_case+0x170/0x3f0 [ 20.673860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.679328] kthread+0x328/0x630 [ 20.682540] ret_from_fork+0x10/0x20 [ 20.686099] [ 20.687577] The buggy address belongs to the object at ffff0008030fca00 [ 20.687577] which belongs to the cache kmalloc-256 of size 256 [ 20.700076] The buggy address is located 0 bytes to the right of [ 20.700076] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 20.713008] [ 20.714487] The buggy address belongs to the physical page: [ 20.720044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 20.728029] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.735668] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.742610] page_type: f5(slab) [ 20.745748] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.753466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.761192] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.769003] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.776817] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 20.784628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.792434] page dumped because: kasan: bad access detected [ 20.797989] [ 20.799465] Memory state around the buggy address: [ 20.804247] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.811448] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.818654] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.825853] ^ [ 20.831413] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.838618] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.845820] ================================================================== [ 22.548747] ================================================================== [ 22.558729] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.566281] Write of size 1 at addr ffff0008032360c9 by task kunit_try_catch/209 [ 22.573657] [ 22.575142] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 22.575195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.575211] Hardware name: WinLink E850-96 board (DT) [ 22.575234] Call trace: [ 22.575250] show_stack+0x20/0x38 (C) [ 22.575282] dump_stack_lvl+0x8c/0xd0 [ 22.575314] print_report+0x118/0x608 [ 22.575343] kasan_report+0xdc/0x128 [ 22.575370] __asan_report_store1_noabort+0x20/0x30 [ 22.575403] krealloc_less_oob_helper+0xa48/0xc50 [ 22.575442] krealloc_large_less_oob+0x20/0x38 [ 22.575475] kunit_try_run_case+0x170/0x3f0 [ 22.575514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.575553] kthread+0x328/0x630 [ 22.575589] ret_from_fork+0x10/0x20 [ 22.575623] [ 22.643017] The buggy address belongs to the physical page: [ 22.648573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 22.656559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.664198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.671139] page_type: f8(unknown) [ 22.674536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.682256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.689982] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.697794] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.705607] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 22.713419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.721224] page dumped because: kasan: bad access detected [ 22.726780] [ 22.728255] Memory state around the buggy address: [ 22.733035] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.740238] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.747443] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.754644] ^ [ 22.760203] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.767408] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.774611] ================================================================== [ 23.474648] ================================================================== [ 23.481720] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.489272] Write of size 1 at addr ffff0008032360eb by task kunit_try_catch/209 [ 23.496648] [ 23.498131] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 23.498181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.498196] Hardware name: WinLink E850-96 board (DT) [ 23.498215] Call trace: [ 23.498229] show_stack+0x20/0x38 (C) [ 23.498262] dump_stack_lvl+0x8c/0xd0 [ 23.498295] print_report+0x118/0x608 [ 23.498325] kasan_report+0xdc/0x128 [ 23.498351] __asan_report_store1_noabort+0x20/0x30 [ 23.498385] krealloc_less_oob_helper+0xa58/0xc50 [ 23.498423] krealloc_large_less_oob+0x20/0x38 [ 23.498459] kunit_try_run_case+0x170/0x3f0 [ 23.498494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.498534] kthread+0x328/0x630 [ 23.498567] ret_from_fork+0x10/0x20 [ 23.498600] [ 23.566007] The buggy address belongs to the physical page: [ 23.571563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 23.579545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.587186] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.594128] page_type: f8(unknown) [ 23.597524] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.605246] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.612971] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.620783] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.628597] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 23.636409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.644214] page dumped because: kasan: bad access detected [ 23.649771] [ 23.651245] Memory state around the buggy address: [ 23.656025] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.663228] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.670432] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.677634] ^ [ 23.684235] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.691440] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.698642] ================================================================== [ 23.012480] ================================================================== [ 23.019575] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.027125] Write of size 1 at addr ffff0008032360da by task kunit_try_catch/209 [ 23.034501] [ 23.035985] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 23.036031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.036046] Hardware name: WinLink E850-96 board (DT) [ 23.036066] Call trace: [ 23.036077] show_stack+0x20/0x38 (C) [ 23.036109] dump_stack_lvl+0x8c/0xd0 [ 23.036140] print_report+0x118/0x608 [ 23.036167] kasan_report+0xdc/0x128 [ 23.036195] __asan_report_store1_noabort+0x20/0x30 [ 23.036231] krealloc_less_oob_helper+0xa80/0xc50 [ 23.036266] krealloc_large_less_oob+0x20/0x38 [ 23.036303] kunit_try_run_case+0x170/0x3f0 [ 23.036338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.036376] kthread+0x328/0x630 [ 23.036410] ret_from_fork+0x10/0x20 [ 23.036444] [ 23.103859] The buggy address belongs to the physical page: [ 23.109416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 23.117401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.125038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.131983] page_type: f8(unknown) [ 23.135378] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.143100] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.150826] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.158637] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.166451] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 23.174263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.182068] page dumped because: kasan: bad access detected [ 23.187624] [ 23.189100] Memory state around the buggy address: [ 23.193879] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.201083] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.208287] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.215488] ^ [ 23.221568] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.228773] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.235974] ================================================================== [ 21.773353] ================================================================== [ 21.780443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.787992] Write of size 1 at addr ffff0008030fcaeb by task kunit_try_catch/205 [ 21.795371] [ 21.796856] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 21.796902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.796917] Hardware name: WinLink E850-96 board (DT) [ 21.796935] Call trace: [ 21.796946] show_stack+0x20/0x38 (C) [ 21.796978] dump_stack_lvl+0x8c/0xd0 [ 21.797011] print_report+0x118/0x608 [ 21.797042] kasan_report+0xdc/0x128 [ 21.797068] __asan_report_store1_noabort+0x20/0x30 [ 21.797100] krealloc_less_oob_helper+0xa58/0xc50 [ 21.797136] krealloc_less_oob+0x20/0x38 [ 21.797167] kunit_try_run_case+0x170/0x3f0 [ 21.797202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.797241] kthread+0x328/0x630 [ 21.797272] ret_from_fork+0x10/0x20 [ 21.797305] [ 21.864206] Allocated by task 205: [ 21.867593] kasan_save_stack+0x3c/0x68 [ 21.871411] kasan_save_track+0x20/0x40 [ 21.875231] kasan_save_alloc_info+0x40/0x58 [ 21.879484] __kasan_krealloc+0x118/0x178 [ 21.883477] krealloc_noprof+0x128/0x360 [ 21.887383] krealloc_less_oob_helper+0x168/0xc50 [ 21.892072] krealloc_less_oob+0x20/0x38 [ 21.895977] kunit_try_run_case+0x170/0x3f0 [ 21.900143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.905612] kthread+0x328/0x630 [ 21.908824] ret_from_fork+0x10/0x20 [ 21.912382] [ 21.913859] The buggy address belongs to the object at ffff0008030fca00 [ 21.913859] which belongs to the cache kmalloc-256 of size 256 [ 21.926360] The buggy address is located 34 bytes to the right of [ 21.926360] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.939379] [ 21.940855] The buggy address belongs to the physical page: [ 21.946413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.954397] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.962035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.968979] page_type: f5(slab) [ 21.972114] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.979836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.987563] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.995374] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.003187] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 22.010999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.018805] page dumped because: kasan: bad access detected [ 22.024360] [ 22.025836] Memory state around the buggy address: [ 22.030616] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.037818] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.045023] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.052224] ^ [ 22.058825] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.066030] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.073232] ================================================================== [ 23.243259] ================================================================== [ 23.250386] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.257936] Write of size 1 at addr ffff0008032360ea by task kunit_try_catch/209 [ 23.265314] [ 23.266796] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 23.266841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.266857] Hardware name: WinLink E850-96 board (DT) [ 23.266873] Call trace: [ 23.266882] show_stack+0x20/0x38 (C) [ 23.266914] dump_stack_lvl+0x8c/0xd0 [ 23.266944] print_report+0x118/0x608 [ 23.266972] kasan_report+0xdc/0x128 [ 23.267000] __asan_report_store1_noabort+0x20/0x30 [ 23.267033] krealloc_less_oob_helper+0xae4/0xc50 [ 23.267068] krealloc_large_less_oob+0x20/0x38 [ 23.267101] kunit_try_run_case+0x170/0x3f0 [ 23.267134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.267173] kthread+0x328/0x630 [ 23.267205] ret_from_fork+0x10/0x20 [ 23.267237] [ 23.334671] The buggy address belongs to the physical page: [ 23.340228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 23.348212] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.355850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.362795] page_type: f8(unknown) [ 23.366189] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.373912] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.381638] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.389450] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.397263] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 23.405075] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.412881] page dumped because: kasan: bad access detected [ 23.418437] [ 23.419912] Memory state around the buggy address: [ 23.424690] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.431895] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.439100] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.446301] ^ [ 23.452901] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.460106] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.467307] ================================================================== [ 20.853212] ================================================================== [ 20.860234] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 20.867780] Write of size 1 at addr ffff0008030fcad0 by task kunit_try_catch/205 [ 20.875159] [ 20.876644] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 20.876690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.876705] Hardware name: WinLink E850-96 board (DT) [ 20.876724] Call trace: [ 20.876738] show_stack+0x20/0x38 (C) [ 20.876772] dump_stack_lvl+0x8c/0xd0 [ 20.876804] print_report+0x118/0x608 [ 20.876830] kasan_report+0xdc/0x128 [ 20.876857] __asan_report_store1_noabort+0x20/0x30 [ 20.876888] krealloc_less_oob_helper+0xb9c/0xc50 [ 20.876922] krealloc_less_oob+0x20/0x38 [ 20.876953] kunit_try_run_case+0x170/0x3f0 [ 20.876989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.877025] kthread+0x328/0x630 [ 20.877059] ret_from_fork+0x10/0x20 [ 20.877091] [ 20.943994] Allocated by task 205: [ 20.947381] kasan_save_stack+0x3c/0x68 [ 20.951199] kasan_save_track+0x20/0x40 [ 20.955018] kasan_save_alloc_info+0x40/0x58 [ 20.959272] __kasan_krealloc+0x118/0x178 [ 20.963265] krealloc_noprof+0x128/0x360 [ 20.967171] krealloc_less_oob_helper+0x168/0xc50 [ 20.971860] krealloc_less_oob+0x20/0x38 [ 20.975765] kunit_try_run_case+0x170/0x3f0 [ 20.979932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.985400] kthread+0x328/0x630 [ 20.988612] ret_from_fork+0x10/0x20 [ 20.992171] [ 20.993648] The buggy address belongs to the object at ffff0008030fca00 [ 20.993648] which belongs to the cache kmalloc-256 of size 256 [ 21.006148] The buggy address is located 7 bytes to the right of [ 21.006148] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.019080] [ 21.020559] The buggy address belongs to the physical page: [ 21.026115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.034100] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.041739] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.048682] page_type: f5(slab) [ 21.051816] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.059537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.067264] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.075075] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.082888] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 21.090700] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.098506] page dumped because: kasan: bad access detected [ 21.104061] [ 21.105537] Memory state around the buggy address: [ 21.110319] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.117520] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.124725] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.131926] ^ [ 21.137745] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.144950] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.152151] ==================================================================
[ 17.600032] ================================================================== [ 17.600083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.600139] Write of size 1 at addr fff00000c5ade8ea by task kunit_try_catch/161 [ 17.600188] [ 17.600220] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.600299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.600325] Hardware name: linux,dummy-virt (DT) [ 17.602081] Call trace: [ 17.602113] show_stack+0x20/0x38 (C) [ 17.602168] dump_stack_lvl+0x8c/0xd0 [ 17.602523] print_report+0x118/0x608 [ 17.602574] kasan_report+0xdc/0x128 [ 17.602876] __asan_report_store1_noabort+0x20/0x30 [ 17.602933] krealloc_less_oob_helper+0xae4/0xc50 [ 17.603282] krealloc_less_oob+0x20/0x38 [ 17.603768] kunit_try_run_case+0x170/0x3f0 [ 17.603999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.604242] kthread+0x328/0x630 [ 17.604293] ret_from_fork+0x10/0x20 [ 17.604344] [ 17.605016] Allocated by task 161: [ 17.605054] kasan_save_stack+0x3c/0x68 [ 17.605101] kasan_save_track+0x20/0x40 [ 17.605138] kasan_save_alloc_info+0x40/0x58 [ 17.605177] __kasan_krealloc+0x118/0x178 [ 17.605213] krealloc_noprof+0x128/0x360 [ 17.605249] krealloc_less_oob_helper+0x168/0xc50 [ 17.605291] krealloc_less_oob+0x20/0x38 [ 17.605331] kunit_try_run_case+0x170/0x3f0 [ 17.605382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.605428] kthread+0x328/0x630 [ 17.606214] ret_from_fork+0x10/0x20 [ 17.606744] [ 17.606771] The buggy address belongs to the object at fff00000c5ade800 [ 17.606771] which belongs to the cache kmalloc-256 of size 256 [ 17.606830] The buggy address is located 33 bytes to the right of [ 17.606830] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.607619] [ 17.607642] The buggy address belongs to the physical page: [ 17.607675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.607731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.607777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.607831] page_type: f5(slab) [ 17.607870] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.607920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.607969] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.608016] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.608065] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.608113] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.608152] page dumped because: kasan: bad access detected [ 17.608183] [ 17.608202] Memory state around the buggy address: [ 17.608233] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.608276] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.608317] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.609382] ^ [ 17.609425] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.609492] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.609528] ================================================================== [ 17.575613] ================================================================== [ 17.575663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.575716] Write of size 1 at addr fff00000c5ade8d0 by task kunit_try_catch/161 [ 17.575764] [ 17.575795] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.575874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.575900] Hardware name: linux,dummy-virt (DT) [ 17.575930] Call trace: [ 17.575952] show_stack+0x20/0x38 (C) [ 17.576001] dump_stack_lvl+0x8c/0xd0 [ 17.576049] print_report+0x118/0x608 [ 17.576095] kasan_report+0xdc/0x128 [ 17.576139] __asan_report_store1_noabort+0x20/0x30 [ 17.576190] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.576241] krealloc_less_oob+0x20/0x38 [ 17.576289] kunit_try_run_case+0x170/0x3f0 [ 17.576338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.578884] kthread+0x328/0x630 [ 17.578976] ret_from_fork+0x10/0x20 [ 17.579549] [ 17.579584] Allocated by task 161: [ 17.579615] kasan_save_stack+0x3c/0x68 [ 17.580481] kasan_save_track+0x20/0x40 [ 17.580535] kasan_save_alloc_info+0x40/0x58 [ 17.580575] __kasan_krealloc+0x118/0x178 [ 17.580612] krealloc_noprof+0x128/0x360 [ 17.580650] krealloc_less_oob_helper+0x168/0xc50 [ 17.580691] krealloc_less_oob+0x20/0x38 [ 17.580729] kunit_try_run_case+0x170/0x3f0 [ 17.580769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.580814] kthread+0x328/0x630 [ 17.580851] ret_from_fork+0x10/0x20 [ 17.580887] [ 17.580908] The buggy address belongs to the object at fff00000c5ade800 [ 17.580908] which belongs to the cache kmalloc-256 of size 256 [ 17.580964] The buggy address is located 7 bytes to the right of [ 17.580964] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.581026] [ 17.581046] The buggy address belongs to the physical page: [ 17.581077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.581129] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.581175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.581228] page_type: f5(slab) [ 17.581269] raw: 0 [ 17.581269] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.581318] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.581383] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.581431] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.581486] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.581532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.581571] page dumped because: kasan: bad access detected [ 17.581601] [ 17.581619] Memory state around the buggy address: [ 17.581649] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.581691] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.581732] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.581768] ^ [ 17.581802] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.581842] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.581878] ================================================================== [ 17.688197] ================================================================== [ 17.688249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.688301] Write of size 1 at addr fff00000c65aa0d0 by task kunit_try_catch/165 [ 17.688386] [ 17.688417] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.688497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.688532] Hardware name: linux,dummy-virt (DT) [ 17.688571] Call trace: [ 17.688593] show_stack+0x20/0x38 (C) [ 17.688643] dump_stack_lvl+0x8c/0xd0 [ 17.688692] print_report+0x118/0x608 [ 17.688737] kasan_report+0xdc/0x128 [ 17.688792] __asan_report_store1_noabort+0x20/0x30 [ 17.688846] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.688907] krealloc_large_less_oob+0x20/0x38 [ 17.688959] kunit_try_run_case+0x170/0x3f0 [ 17.689009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.689064] kthread+0x328/0x630 [ 17.689109] ret_from_fork+0x10/0x20 [ 17.689158] [ 17.689177] The buggy address belongs to the physical page: [ 17.689215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.689276] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.689322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.689383] page_type: f8(unknown) [ 17.689421] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.689495] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.689551] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.689598] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.689645] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.689691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.689844] page dumped because: kasan: bad access detected [ 17.689910] [ 17.690032] Memory state around the buggy address: [ 17.690066] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.690109] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.690150] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.690188] ^ [ 17.690223] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.690263] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.690410] ================================================================== [ 17.587486] ================================================================== [ 17.587543] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.587600] Write of size 1 at addr fff00000c5ade8da by task kunit_try_catch/161 [ 17.587649] [ 17.587681] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.587764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.587790] Hardware name: linux,dummy-virt (DT) [ 17.587821] Call trace: [ 17.587843] show_stack+0x20/0x38 (C) [ 17.587892] dump_stack_lvl+0x8c/0xd0 [ 17.587941] print_report+0x118/0x608 [ 17.587986] kasan_report+0xdc/0x128 [ 17.588030] __asan_report_store1_noabort+0x20/0x30 [ 17.588081] krealloc_less_oob_helper+0xa80/0xc50 [ 17.588132] krealloc_less_oob+0x20/0x38 [ 17.588180] kunit_try_run_case+0x170/0x3f0 [ 17.588229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.588287] kthread+0x328/0x630 [ 17.588334] ret_from_fork+0x10/0x20 [ 17.588401] [ 17.588419] Allocated by task 161: [ 17.588447] kasan_save_stack+0x3c/0x68 [ 17.588486] kasan_save_track+0x20/0x40 [ 17.588521] kasan_save_alloc_info+0x40/0x58 [ 17.588559] __kasan_krealloc+0x118/0x178 [ 17.588595] krealloc_noprof+0x128/0x360 [ 17.588631] krealloc_less_oob_helper+0x168/0xc50 [ 17.588672] krealloc_less_oob+0x20/0x38 [ 17.588710] kunit_try_run_case+0x170/0x3f0 [ 17.588748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.588794] kthread+0x328/0x630 [ 17.588829] ret_from_fork+0x10/0x20 [ 17.588865] [ 17.588886] The buggy address belongs to the object at fff00000c5ade800 [ 17.588886] which belongs to the cache kmalloc-256 of size 256 [ 17.588942] The buggy address is located 17 bytes to the right of [ 17.588942] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.589005] [ 17.589024] The buggy address belongs to the physical page: [ 17.589055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.589107] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.589152] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.589202] page_type: f5(slab) [ 17.589240] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.589290] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.589338] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.593859] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.593913] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.599050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.599101] page dumped because: kasan: bad access detected [ 17.599133] [ 17.599160] Memory state around the buggy address: [ 17.599195] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.599238] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.599280] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.599317] ^ [ 17.599364] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.599406] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.599443] ================================================================== [ 17.682971] ================================================================== [ 17.683051] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.683122] Write of size 1 at addr fff00000c65aa0c9 by task kunit_try_catch/165 [ 17.683952] [ 17.684011] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.684247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.684321] Hardware name: linux,dummy-virt (DT) [ 17.684478] Call trace: [ 17.684555] show_stack+0x20/0x38 (C) [ 17.684661] dump_stack_lvl+0x8c/0xd0 [ 17.684712] print_report+0x118/0x608 [ 17.684759] kasan_report+0xdc/0x128 [ 17.684803] __asan_report_store1_noabort+0x20/0x30 [ 17.684878] krealloc_less_oob_helper+0xa48/0xc50 [ 17.685020] krealloc_large_less_oob+0x20/0x38 [ 17.685166] kunit_try_run_case+0x170/0x3f0 [ 17.685308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.685411] kthread+0x328/0x630 [ 17.685496] ret_from_fork+0x10/0x20 [ 17.685651] [ 17.685673] The buggy address belongs to the physical page: [ 17.685707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.685762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.685816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.685874] page_type: f8(unknown) [ 17.685935] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.685986] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.686034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.686081] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.686128] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.686175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.686213] page dumped because: kasan: bad access detected [ 17.686243] [ 17.686261] Memory state around the buggy address: [ 17.686293] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.686335] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.686396] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.686433] ^ [ 17.686467] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.686671] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.686965] ================================================================== [ 17.614619] ================================================================== [ 17.614670] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.614724] Write of size 1 at addr fff00000c5ade8eb by task kunit_try_catch/161 [ 17.614772] [ 17.614805] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.614884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.614910] Hardware name: linux,dummy-virt (DT) [ 17.614941] Call trace: [ 17.614963] show_stack+0x20/0x38 (C) [ 17.615021] dump_stack_lvl+0x8c/0xd0 [ 17.615070] print_report+0x118/0x608 [ 17.615115] kasan_report+0xdc/0x128 [ 17.615161] __asan_report_store1_noabort+0x20/0x30 [ 17.615214] krealloc_less_oob_helper+0xa58/0xc50 [ 17.615266] krealloc_less_oob+0x20/0x38 [ 17.615314] kunit_try_run_case+0x170/0x3f0 [ 17.619408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.619477] kthread+0x328/0x630 [ 17.619525] ret_from_fork+0x10/0x20 [ 17.619575] [ 17.619593] Allocated by task 161: [ 17.619622] kasan_save_stack+0x3c/0x68 [ 17.619661] kasan_save_track+0x20/0x40 [ 17.619699] kasan_save_alloc_info+0x40/0x58 [ 17.619738] __kasan_krealloc+0x118/0x178 [ 17.619775] krealloc_noprof+0x128/0x360 [ 17.619812] krealloc_less_oob_helper+0x168/0xc50 [ 17.619853] krealloc_less_oob+0x20/0x38 [ 17.619891] kunit_try_run_case+0x170/0x3f0 [ 17.619930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.620024] kthread+0x328/0x630 [ 17.620307] ret_from_fork+0x10/0x20 [ 17.620932] [ 17.620958] The buggy address belongs to the object at fff00000c5ade800 [ 17.620958] which belongs to the cache kmalloc-256 of size 256 [ 17.621187] The buggy address is located 34 bytes to the right of [ 17.621187] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.621334] [ 17.621411] The buggy address belongs to the physical page: [ 17.621534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.621780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.621879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.621945] page_type: f5(slab) [ 17.621986] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.622035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.622441] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.622535] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.622624] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.622691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.622819] page dumped because: kasan: bad access detected [ 17.624201] [ 17.624315] Memory state around the buggy address: [ 17.624490] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.624581] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.624635] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.624964] ^ [ 17.625033] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625106] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625764] ================================================================== [ 17.563146] ================================================================== [ 17.563206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.563266] Write of size 1 at addr fff00000c5ade8c9 by task kunit_try_catch/161 [ 17.563315] [ 17.566610] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.566710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.566737] Hardware name: linux,dummy-virt (DT) [ 17.566769] Call trace: [ 17.566794] show_stack+0x20/0x38 (C) [ 17.566854] dump_stack_lvl+0x8c/0xd0 [ 17.566903] print_report+0x118/0x608 [ 17.566950] kasan_report+0xdc/0x128 [ 17.566995] __asan_report_store1_noabort+0x20/0x30 [ 17.567052] krealloc_less_oob_helper+0xa48/0xc50 [ 17.567105] krealloc_less_oob+0x20/0x38 [ 17.567153] kunit_try_run_case+0x170/0x3f0 [ 17.567206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.567262] kthread+0x328/0x630 [ 17.567310] ret_from_fork+0x10/0x20 [ 17.567375] [ 17.567393] Allocated by task 161: [ 17.567421] kasan_save_stack+0x3c/0x68 [ 17.567461] kasan_save_track+0x20/0x40 [ 17.567498] kasan_save_alloc_info+0x40/0x58 [ 17.567536] __kasan_krealloc+0x118/0x178 [ 17.567573] krealloc_noprof+0x128/0x360 [ 17.567609] krealloc_less_oob_helper+0x168/0xc50 [ 17.567650] krealloc_less_oob+0x20/0x38 [ 17.567688] kunit_try_run_case+0x170/0x3f0 [ 17.567726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.567771] kthread+0x328/0x630 [ 17.567806] ret_from_fork+0x10/0x20 [ 17.567841] [ 17.567861] The buggy address belongs to the object at fff00000c5ade800 [ 17.567861] which belongs to the cache kmalloc-256 of size 256 [ 17.567918] The buggy address is located 0 bytes to the right of [ 17.567918] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.567979] [ 17.567999] The buggy address belongs to the physical page: [ 17.568030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.568083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.568130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.568185] page_type: f5(slab) [ 17.568226] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.568275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.568324] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.571659] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.571974] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.572027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.572067] page dumped because: kasan: bad access detected [ 17.572098] [ 17.572484] Memory state around the buggy address: [ 17.572968] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573089] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.573443] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.573564] ^ [ 17.573913] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573960] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573998] ================================================================== [ 17.691492] ================================================================== [ 17.691740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.691956] Write of size 1 at addr fff00000c65aa0da by task kunit_try_catch/165 [ 17.692014] [ 17.692051] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.692131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.692157] Hardware name: linux,dummy-virt (DT) [ 17.692186] Call trace: [ 17.692208] show_stack+0x20/0x38 (C) [ 17.692259] dump_stack_lvl+0x8c/0xd0 [ 17.692308] print_report+0x118/0x608 [ 17.692370] kasan_report+0xdc/0x128 [ 17.692415] __asan_report_store1_noabort+0x20/0x30 [ 17.692467] krealloc_less_oob_helper+0xa80/0xc50 [ 17.692519] krealloc_large_less_oob+0x20/0x38 [ 17.692569] kunit_try_run_case+0x170/0x3f0 [ 17.692618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.692674] kthread+0x328/0x630 [ 17.692721] ret_from_fork+0x10/0x20 [ 17.692772] [ 17.692791] The buggy address belongs to the physical page: [ 17.692822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.692873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.692919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.692970] page_type: f8(unknown) [ 17.693023] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.693072] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.693120] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.693167] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.693214] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.693260] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.693298] page dumped because: kasan: bad access detected [ 17.693328] [ 17.693345] Memory state around the buggy address: [ 17.694512] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.694584] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.694628] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.694666] ^ [ 17.694704] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.694746] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.694783] ================================================================== [ 17.704749] ================================================================== [ 17.704797] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.704853] Write of size 1 at addr fff00000c65aa0eb by task kunit_try_catch/165 [ 17.704901] [ 17.704936] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.705015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.705040] Hardware name: linux,dummy-virt (DT) [ 17.705071] Call trace: [ 17.705094] show_stack+0x20/0x38 (C) [ 17.705143] dump_stack_lvl+0x8c/0xd0 [ 17.705191] print_report+0x118/0x608 [ 17.705236] kasan_report+0xdc/0x128 [ 17.705280] __asan_report_store1_noabort+0x20/0x30 [ 17.705332] krealloc_less_oob_helper+0xa58/0xc50 [ 17.705402] krealloc_large_less_oob+0x20/0x38 [ 17.705453] kunit_try_run_case+0x170/0x3f0 [ 17.705507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.705562] kthread+0x328/0x630 [ 17.705608] ret_from_fork+0x10/0x20 [ 17.705658] [ 17.705677] The buggy address belongs to the physical page: [ 17.705708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.706149] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.706237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.706292] page_type: f8(unknown) [ 17.706489] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.706545] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.706596] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.706644] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.706693] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.706803] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.707634] page dumped because: kasan: bad access detected [ 17.708413] [ 17.708448] Memory state around the buggy address: [ 17.708497] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.709092] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.709141] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.709178] ^ [ 17.709217] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.711091] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.711140] ================================================================== [ 17.695225] ================================================================== [ 17.695273] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.695555] Write of size 1 at addr fff00000c65aa0ea by task kunit_try_catch/165 [ 17.695618] [ 17.695649] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.696015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.696145] Hardware name: linux,dummy-virt (DT) [ 17.696882] Call trace: [ 17.697167] show_stack+0x20/0x38 (C) [ 17.697342] dump_stack_lvl+0x8c/0xd0 [ 17.697501] print_report+0x118/0x608 [ 17.698782] kasan_report+0xdc/0x128 [ 17.698846] __asan_report_store1_noabort+0x20/0x30 [ 17.698899] krealloc_less_oob_helper+0xae4/0xc50 [ 17.698952] krealloc_large_less_oob+0x20/0x38 [ 17.699003] kunit_try_run_case+0x170/0x3f0 [ 17.699063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.699119] kthread+0x328/0x630 [ 17.699166] ret_from_fork+0x10/0x20 [ 17.699217] [ 17.699238] The buggy address belongs to the physical page: [ 17.699271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.699325] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.699760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.699970] page_type: f8(unknown) [ 17.700071] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.700164] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.700213] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.701203] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.701276] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.701329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.701384] page dumped because: kasan: bad access detected [ 17.702289] [ 17.702317] Memory state around the buggy address: [ 17.702444] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.702490] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.702534] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.702570] ^ [ 17.702609] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.703119] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.704203] ==================================================================
[ 16.005103] ================================================================== [ 16.005508] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 16.006379] Write of size 1 at addr ffff88810099d4d0 by task kunit_try_catch/179 [ 16.007299] [ 16.007945] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.008054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.008078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.008384] Call Trace: [ 16.008453] <TASK> [ 16.008558] dump_stack_lvl+0x73/0xb0 [ 16.008626] print_report+0xd1/0x650 [ 16.008655] ? __virt_addr_valid+0x1db/0x2d0 [ 16.008682] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 16.008708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.008732] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 16.008782] kasan_report+0x141/0x180 [ 16.008809] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 16.008840] __asan_report_store1_noabort+0x1b/0x30 [ 16.008862] krealloc_less_oob_helper+0xe23/0x11d0 [ 16.008886] ? __perf_event_task_sched_in+0x151/0x360 [ 16.008915] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.008940] ? finish_task_switch.isra.0+0x153/0x700 [ 16.008966] ? __switch_to+0x5d9/0xf60 [ 16.008988] ? dequeue_task_fair+0x166/0x4e0 [ 16.009015] ? __schedule+0x10cc/0x2b30 [ 16.009038] ? __pfx_read_tsc+0x10/0x10 [ 16.009064] krealloc_less_oob+0x1c/0x30 [ 16.009088] kunit_try_run_case+0x1a5/0x480 [ 16.009152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.009179] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.009221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.009260] ? __kthread_parkme+0x82/0x180 [ 16.009297] ? preempt_count_sub+0x50/0x80 [ 16.009336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.009360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.009385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.009418] kthread+0x337/0x6f0 [ 16.009443] ? trace_preempt_on+0x20/0xc0 [ 16.009469] ? __pfx_kthread+0x10/0x10 [ 16.009488] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.009510] ? calculate_sigpending+0x7b/0xa0 [ 16.009533] ? __pfx_kthread+0x10/0x10 [ 16.009552] ret_from_fork+0x41/0x80 [ 16.009574] ? __pfx_kthread+0x10/0x10 [ 16.009594] ret_from_fork_asm+0x1a/0x30 [ 16.009628] </TASK> [ 16.009642] [ 16.024439] Allocated by task 179: [ 16.024954] kasan_save_stack+0x45/0x70 [ 16.025238] kasan_save_track+0x18/0x40 [ 16.025439] kasan_save_alloc_info+0x3b/0x50 [ 16.025670] __kasan_krealloc+0x190/0x1f0 [ 16.026599] krealloc_noprof+0xf3/0x340 [ 16.027211] krealloc_less_oob_helper+0x1aa/0x11d0 [ 16.027845] krealloc_less_oob+0x1c/0x30 [ 16.028682] kunit_try_run_case+0x1a5/0x480 [ 16.029229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.029977] kthread+0x337/0x6f0 [ 16.030219] ret_from_fork+0x41/0x80 [ 16.030620] ret_from_fork_asm+0x1a/0x30 [ 16.031150] [ 16.031339] The buggy address belongs to the object at ffff88810099d400 [ 16.031339] which belongs to the cache kmalloc-256 of size 256 [ 16.032083] The buggy address is located 7 bytes to the right of [ 16.032083] allocated 201-byte region [ffff88810099d400, ffff88810099d4c9) [ 16.032685] [ 16.033843] The buggy address belongs to the physical page: [ 16.034109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c [ 16.034796] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.035684] flags: 0x200000000000040(head|node=0|zone=2) [ 16.036001] page_type: f5(slab) [ 16.036580] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.037231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.037513] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.038600] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.038865] head: 0200000000000001 ffffea0004026701 00000000ffffffff 00000000ffffffff [ 16.039094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.040298] page dumped because: kasan: bad access detected [ 16.040793] [ 16.040914] Memory state around the buggy address: [ 16.041610] ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.042370] ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.042858] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.043306] ^ [ 16.043494] ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.044692] ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.045411] ================================================================== [ 16.357513] ================================================================== [ 16.358119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 16.358529] Write of size 1 at addr ffff888103a020eb by task kunit_try_catch/183 [ 16.358852] [ 16.359028] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.359139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.359163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.359203] Call Trace: [ 16.359245] <TASK> [ 16.359283] dump_stack_lvl+0x73/0xb0 [ 16.359349] print_report+0xd1/0x650 [ 16.359396] ? __virt_addr_valid+0x1db/0x2d0 [ 16.359444] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 16.359494] ? kasan_addr_to_slab+0x11/0xa0 [ 16.359536] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 16.359573] kasan_report+0x141/0x180 [ 16.359608] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 16.359665] __asan_report_store1_noabort+0x1b/0x30 [ 16.359696] krealloc_less_oob_helper+0xd47/0x11d0 [ 16.359735] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.359786] ? finish_task_switch.isra.0+0x153/0x700 [ 16.359825] ? __switch_to+0x5d9/0xf60 [ 16.359858] ? dequeue_task_fair+0x166/0x4e0 [ 16.359894] ? __schedule+0x10cc/0x2b30 [ 16.359926] ? __pfx_read_tsc+0x10/0x10 [ 16.359962] krealloc_large_less_oob+0x1c/0x30 [ 16.359998] kunit_try_run_case+0x1a5/0x480 [ 16.360035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.360067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.360102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.360136] ? __kthread_parkme+0x82/0x180 [ 16.360170] ? preempt_count_sub+0x50/0x80 [ 16.360205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.360237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.360269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.360301] kthread+0x337/0x6f0 [ 16.360326] ? trace_preempt_on+0x20/0xc0 [ 16.360362] ? __pfx_kthread+0x10/0x10 [ 16.360390] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.360421] ? calculate_sigpending+0x7b/0xa0 [ 16.360456] ? __pfx_kthread+0x10/0x10 [ 16.360630] ret_from_fork+0x41/0x80 [ 16.360682] ? __pfx_kthread+0x10/0x10 [ 16.360721] ret_from_fork_asm+0x1a/0x30 [ 16.360800] </TASK> [ 16.360827] [ 16.371982] The buggy address belongs to the physical page: [ 16.372667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a00 [ 16.373082] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.373379] flags: 0x200000000000040(head|node=0|zone=2) [ 16.373640] page_type: f8(unknown) [ 16.373907] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.374598] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.375180] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.375780] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.376441] head: 0200000000000002 ffffea00040e8001 00000000ffffffff 00000000ffffffff [ 16.376821] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.377134] page dumped because: kasan: bad access detected [ 16.377565] [ 16.377736] Memory state around the buggy address: [ 16.378140] ffff888103a01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.378615] ffff888103a02000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.379007] >ffff888103a02080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.379677] ^ [ 16.380090] ffff888103a02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.380452] ffff888103a02180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.380736] ================================================================== [ 16.089626] ================================================================== [ 16.090433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 16.091655] Write of size 1 at addr ffff88810099d4ea by task kunit_try_catch/179 [ 16.092224] [ 16.092417] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.092566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.092598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.092673] Call Trace: [ 16.092874] <TASK> [ 16.092918] dump_stack_lvl+0x73/0xb0 [ 16.092993] print_report+0xd1/0x650 [ 16.093032] ? __virt_addr_valid+0x1db/0x2d0 [ 16.093070] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 16.093105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.093155] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 16.093191] kasan_report+0x141/0x180 [ 16.093225] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 16.093268] __asan_report_store1_noabort+0x1b/0x30 [ 16.093300] krealloc_less_oob_helper+0xe90/0x11d0 [ 16.093333] ? __perf_event_task_sched_in+0x151/0x360 [ 16.093374] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.093413] ? finish_task_switch.isra.0+0x153/0x700 [ 16.093450] ? __switch_to+0x5d9/0xf60 [ 16.093485] ? dequeue_task_fair+0x166/0x4e0 [ 16.093525] ? __schedule+0x10cc/0x2b30 [ 16.093560] ? __pfx_read_tsc+0x10/0x10 [ 16.093597] krealloc_less_oob+0x1c/0x30 [ 16.093635] kunit_try_run_case+0x1a5/0x480 [ 16.093675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.093716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.093776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.093819] ? __kthread_parkme+0x82/0x180 [ 16.093861] ? preempt_count_sub+0x50/0x80 [ 16.094089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.094169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.094271] kthread+0x337/0x6f0 [ 16.094305] ? trace_preempt_on+0x20/0xc0 [ 16.094341] ? __pfx_kthread+0x10/0x10 [ 16.094362] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.094386] ? calculate_sigpending+0x7b/0xa0 [ 16.094410] ? __pfx_kthread+0x10/0x10 [ 16.094430] ret_from_fork+0x41/0x80 [ 16.094454] ? __pfx_kthread+0x10/0x10 [ 16.094474] ret_from_fork_asm+0x1a/0x30 [ 16.094508] </TASK> [ 16.094523] [ 16.109135] Allocated by task 179: [ 16.109596] kasan_save_stack+0x45/0x70 [ 16.109894] kasan_save_track+0x18/0x40 [ 16.110091] kasan_save_alloc_info+0x3b/0x50 [ 16.110549] __kasan_krealloc+0x190/0x1f0 [ 16.110891] krealloc_noprof+0xf3/0x340 [ 16.111216] krealloc_less_oob_helper+0x1aa/0x11d0 [ 16.111679] krealloc_less_oob+0x1c/0x30 [ 16.112084] kunit_try_run_case+0x1a5/0x480 [ 16.112538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.112994] kthread+0x337/0x6f0 [ 16.113390] ret_from_fork+0x41/0x80 [ 16.113891] ret_from_fork_asm+0x1a/0x30 [ 16.114359] [ 16.114601] The buggy address belongs to the object at ffff88810099d400 [ 16.114601] which belongs to the cache kmalloc-256 of size 256 [ 16.114956] The buggy address is located 33 bytes to the right of [ 16.114956] allocated 201-byte region [ffff88810099d400, ffff88810099d4c9) [ 16.115775] [ 16.116025] The buggy address belongs to the physical page: [ 16.116529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c [ 16.117252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.118030] flags: 0x200000000000040(head|node=0|zone=2) [ 16.118612] page_type: f5(slab) [ 16.119018] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.119707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.120235] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.120659] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.121286] head: 0200000000000001 ffffea0004026701 00000000ffffffff 00000000ffffffff [ 16.121985] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.122780] page dumped because: kasan: bad access detected [ 16.123141] [ 16.123416] Memory state around the buggy address: [ 16.123880] ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.124605] ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.124848] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.125089] ^ [ 16.125712] ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.126391] ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.127064] ================================================================== [ 16.128282] ================================================================== [ 16.128979] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 16.130458] Write of size 1 at addr ffff88810099d4eb by task kunit_try_catch/179 [ 16.131055] [ 16.131239] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.131348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.131373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.131410] Call Trace: [ 16.131452] <TASK> [ 16.131490] dump_stack_lvl+0x73/0xb0 [ 16.131546] print_report+0xd1/0x650 [ 16.131576] ? __virt_addr_valid+0x1db/0x2d0 [ 16.131603] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 16.131645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.131678] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 16.131703] kasan_report+0x141/0x180 [ 16.131728] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 16.131787] __asan_report_store1_noabort+0x1b/0x30 [ 16.131825] krealloc_less_oob_helper+0xd47/0x11d0 [ 16.131867] ? __perf_event_task_sched_in+0x151/0x360 [ 16.131918] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.131961] ? finish_task_switch.isra.0+0x153/0x700 [ 16.132003] ? __switch_to+0x5d9/0xf60 [ 16.132044] ? dequeue_task_fair+0x166/0x4e0 [ 16.132088] ? __schedule+0x10cc/0x2b30 [ 16.132131] ? __pfx_read_tsc+0x10/0x10 [ 16.132180] krealloc_less_oob+0x1c/0x30 [ 16.132227] kunit_try_run_case+0x1a5/0x480 [ 16.132428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.132470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.132523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.132559] ? __kthread_parkme+0x82/0x180 [ 16.132585] ? preempt_count_sub+0x50/0x80 [ 16.132627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.132666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.132691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.132715] kthread+0x337/0x6f0 [ 16.132734] ? trace_preempt_on+0x20/0xc0 [ 16.132777] ? __pfx_kthread+0x10/0x10 [ 16.132799] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.132821] ? calculate_sigpending+0x7b/0xa0 [ 16.132845] ? __pfx_kthread+0x10/0x10 [ 16.132866] ret_from_fork+0x41/0x80 [ 16.132889] ? __pfx_kthread+0x10/0x10 [ 16.132909] ret_from_fork_asm+0x1a/0x30 [ 16.132944] </TASK> [ 16.132960] [ 16.146876] Allocated by task 179: [ 16.147267] kasan_save_stack+0x45/0x70 [ 16.147554] kasan_save_track+0x18/0x40 [ 16.148366] kasan_save_alloc_info+0x3b/0x50 [ 16.148790] __kasan_krealloc+0x190/0x1f0 [ 16.150130] krealloc_noprof+0xf3/0x340 [ 16.150606] krealloc_less_oob_helper+0x1aa/0x11d0 [ 16.150901] krealloc_less_oob+0x1c/0x30 [ 16.151677] kunit_try_run_case+0x1a5/0x480 [ 16.151897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.152460] kthread+0x337/0x6f0 [ 16.152668] ret_from_fork+0x41/0x80 [ 16.153005] ret_from_fork_asm+0x1a/0x30 [ 16.154041] [ 16.154181] The buggy address belongs to the object at ffff88810099d400 [ 16.154181] which belongs to the cache kmalloc-256 of size 256 [ 16.154834] The buggy address is located 34 bytes to the right of [ 16.154834] allocated 201-byte region [ffff88810099d400, ffff88810099d4c9) [ 16.155491] [ 16.155671] The buggy address belongs to the physical page: [ 16.156363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c [ 16.156960] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.158581] flags: 0x200000000000040(head|node=0|zone=2) [ 16.158756] page_type: f5(slab) [ 16.158870] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.159026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.159550] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.160202] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.161065] head: 0200000000000001 ffffea0004026701 00000000ffffffff 00000000ffffffff [ 16.161671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.162277] page dumped because: kasan: bad access detected [ 16.162877] [ 16.163029] Memory state around the buggy address: [ 16.163277] ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.163495] ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.163788] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.164049] ^ [ 16.164642] ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.165601] ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.166089] ================================================================== [ 15.959787] ================================================================== [ 15.960792] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 15.961169] Write of size 1 at addr ffff88810099d4c9 by task kunit_try_catch/179 [ 15.961578] [ 15.961822] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 15.961933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.961957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.961996] Call Trace: [ 15.962026] <TASK> [ 15.962063] dump_stack_lvl+0x73/0xb0 [ 15.962152] print_report+0xd1/0x650 [ 15.962227] ? __virt_addr_valid+0x1db/0x2d0 [ 15.962279] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 15.962332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.962383] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 15.962437] kasan_report+0x141/0x180 [ 15.962485] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 15.962680] __asan_report_store1_noabort+0x1b/0x30 [ 15.962727] krealloc_less_oob_helper+0xd70/0x11d0 [ 15.962857] ? __perf_event_task_sched_in+0x151/0x360 [ 15.962924] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 15.962976] ? finish_task_switch.isra.0+0x153/0x700 [ 15.963021] ? __switch_to+0x5d9/0xf60 [ 15.963062] ? dequeue_task_fair+0x166/0x4e0 [ 15.963113] ? __schedule+0x10cc/0x2b30 [ 15.963157] ? __pfx_read_tsc+0x10/0x10 [ 15.963243] krealloc_less_oob+0x1c/0x30 [ 15.963309] kunit_try_run_case+0x1a5/0x480 [ 15.963362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.963446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.963486] ? __kthread_parkme+0x82/0x180 [ 15.963520] ? preempt_count_sub+0x50/0x80 [ 15.963558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.963758] kthread+0x337/0x6f0 [ 15.963802] ? trace_preempt_on+0x20/0xc0 [ 15.963857] ? __pfx_kthread+0x10/0x10 [ 15.963902] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.963945] ? calculate_sigpending+0x7b/0xa0 [ 15.963974] ? __pfx_kthread+0x10/0x10 [ 15.963995] ret_from_fork+0x41/0x80 [ 15.964021] ? __pfx_kthread+0x10/0x10 [ 15.964042] ret_from_fork_asm+0x1a/0x30 [ 15.964079] </TASK> [ 15.964095] [ 15.977743] Allocated by task 179: [ 15.978276] kasan_save_stack+0x45/0x70 [ 15.978961] kasan_save_track+0x18/0x40 [ 15.979554] kasan_save_alloc_info+0x3b/0x50 [ 15.979767] __kasan_krealloc+0x190/0x1f0 [ 15.980170] krealloc_noprof+0xf3/0x340 [ 15.981224] krealloc_less_oob_helper+0x1aa/0x11d0 [ 15.981866] krealloc_less_oob+0x1c/0x30 [ 15.982194] kunit_try_run_case+0x1a5/0x480 [ 15.982827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.983374] kthread+0x337/0x6f0 [ 15.983720] ret_from_fork+0x41/0x80 [ 15.983912] ret_from_fork_asm+0x1a/0x30 [ 15.984315] [ 15.984512] The buggy address belongs to the object at ffff88810099d400 [ 15.984512] which belongs to the cache kmalloc-256 of size 256 [ 15.986829] The buggy address is located 0 bytes to the right of [ 15.986829] allocated 201-byte region [ffff88810099d400, ffff88810099d4c9) [ 15.990507] [ 15.990784] The buggy address belongs to the physical page: [ 15.991717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c [ 15.992070] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.992338] flags: 0x200000000000040(head|node=0|zone=2) [ 15.992559] page_type: f5(slab) [ 15.992733] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 15.996598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.997600] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 15.997864] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.998085] head: 0200000000000001 ffffea0004026701 00000000ffffffff 00000000ffffffff [ 15.998651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.999102] page dumped because: kasan: bad access detected [ 15.999438] [ 15.999568] Memory state around the buggy address: [ 16.001045] ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.001650] ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.001887] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.002148] ^ [ 16.002718] ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.003416] ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.004137] ================================================================== [ 16.046455] ================================================================== [ 16.046811] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 16.048119] Write of size 1 at addr ffff88810099d4da by task kunit_try_catch/179 [ 16.048985] [ 16.049425] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.049547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.049577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.049631] Call Trace: [ 16.049689] <TASK> [ 16.049733] dump_stack_lvl+0x73/0xb0 [ 16.049829] print_report+0xd1/0x650 [ 16.049886] ? __virt_addr_valid+0x1db/0x2d0 [ 16.049953] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 16.050008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.050050] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 16.050077] kasan_report+0x141/0x180 [ 16.050117] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 16.050196] __asan_report_store1_noabort+0x1b/0x30 [ 16.050234] krealloc_less_oob_helper+0xec6/0x11d0 [ 16.050695] ? __perf_event_task_sched_in+0x151/0x360 [ 16.050734] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.050792] ? finish_task_switch.isra.0+0x153/0x700 [ 16.050829] ? __switch_to+0x5d9/0xf60 [ 16.050857] ? dequeue_task_fair+0x166/0x4e0 [ 16.050884] ? __schedule+0x10cc/0x2b30 [ 16.050908] ? __pfx_read_tsc+0x10/0x10 [ 16.050935] krealloc_less_oob+0x1c/0x30 [ 16.050958] kunit_try_run_case+0x1a5/0x480 [ 16.050985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.051008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.051033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.051057] ? __kthread_parkme+0x82/0x180 [ 16.051080] ? preempt_count_sub+0x50/0x80 [ 16.051105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.051144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.051170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.051206] kthread+0x337/0x6f0 [ 16.051236] ? trace_preempt_on+0x20/0xc0 [ 16.051277] ? __pfx_kthread+0x10/0x10 [ 16.051309] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.051340] ? calculate_sigpending+0x7b/0xa0 [ 16.051364] ? __pfx_kthread+0x10/0x10 [ 16.051385] ret_from_fork+0x41/0x80 [ 16.051408] ? __pfx_kthread+0x10/0x10 [ 16.051428] ret_from_fork_asm+0x1a/0x30 [ 16.051464] </TASK> [ 16.051480] [ 16.067829] Allocated by task 179: [ 16.068856] kasan_save_stack+0x45/0x70 [ 16.069435] kasan_save_track+0x18/0x40 [ 16.069991] kasan_save_alloc_info+0x3b/0x50 [ 16.070492] __kasan_krealloc+0x190/0x1f0 [ 16.070858] krealloc_noprof+0xf3/0x340 [ 16.071200] krealloc_less_oob_helper+0x1aa/0x11d0 [ 16.071514] krealloc_less_oob+0x1c/0x30 [ 16.072026] kunit_try_run_case+0x1a5/0x480 [ 16.073024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.073500] kthread+0x337/0x6f0 [ 16.073716] ret_from_fork+0x41/0x80 [ 16.073969] ret_from_fork_asm+0x1a/0x30 [ 16.074598] [ 16.074758] The buggy address belongs to the object at ffff88810099d400 [ 16.074758] which belongs to the cache kmalloc-256 of size 256 [ 16.075788] The buggy address is located 17 bytes to the right of [ 16.075788] allocated 201-byte region [ffff88810099d400, ffff88810099d4c9) [ 16.077080] [ 16.077293] The buggy address belongs to the physical page: [ 16.077638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c [ 16.078489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.078927] flags: 0x200000000000040(head|node=0|zone=2) [ 16.079356] page_type: f5(slab) [ 16.079652] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.080111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.080452] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 16.081829] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.082260] head: 0200000000000001 ffffea0004026701 00000000ffffffff 00000000ffffffff [ 16.082765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.083140] page dumped because: kasan: bad access detected [ 16.083501] [ 16.083695] Memory state around the buggy address: [ 16.084784] ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.085719] ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.086138] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.086680] ^ [ 16.087000] ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.087601] ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.088759] ================================================================== [ 16.307761] ================================================================== [ 16.308384] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 16.310061] Write of size 1 at addr ffff888103a020da by task kunit_try_catch/183 [ 16.310952] [ 16.311225] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.311335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.311363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.311406] Call Trace: [ 16.311444] <TASK> [ 16.311482] dump_stack_lvl+0x73/0xb0 [ 16.311556] print_report+0xd1/0x650 [ 16.311599] ? __virt_addr_valid+0x1db/0x2d0 [ 16.311660] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 16.311709] ? kasan_addr_to_slab+0x11/0xa0 [ 16.311737] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 16.311788] kasan_report+0x141/0x180 [ 16.311814] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 16.311845] __asan_report_store1_noabort+0x1b/0x30 [ 16.311868] krealloc_less_oob_helper+0xec6/0x11d0 [ 16.311896] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.311922] ? finish_task_switch.isra.0+0x153/0x700 [ 16.311948] ? __switch_to+0x5d9/0xf60 [ 16.311971] ? dequeue_task_fair+0x166/0x4e0 [ 16.311997] ? __schedule+0x10cc/0x2b30 [ 16.312020] ? __pfx_read_tsc+0x10/0x10 [ 16.312046] krealloc_large_less_oob+0x1c/0x30 [ 16.312071] kunit_try_run_case+0x1a5/0x480 [ 16.312098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.312165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.312189] ? __kthread_parkme+0x82/0x180 [ 16.312213] ? preempt_count_sub+0x50/0x80 [ 16.312239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.312287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.312311] kthread+0x337/0x6f0 [ 16.312330] ? trace_preempt_on+0x20/0xc0 [ 16.312357] ? __pfx_kthread+0x10/0x10 [ 16.312377] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.312399] ? calculate_sigpending+0x7b/0xa0 [ 16.312422] ? __pfx_kthread+0x10/0x10 [ 16.312442] ret_from_fork+0x41/0x80 [ 16.312464] ? __pfx_kthread+0x10/0x10 [ 16.312484] ret_from_fork_asm+0x1a/0x30 [ 16.312519] </TASK> [ 16.312534] [ 16.323096] The buggy address belongs to the physical page: [ 16.323620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a00 [ 16.324083] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.324631] flags: 0x200000000000040(head|node=0|zone=2) [ 16.325194] page_type: f8(unknown) [ 16.325444] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.325812] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.326338] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.326756] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.327481] head: 0200000000000002 ffffea00040e8001 00000000ffffffff 00000000ffffffff [ 16.327815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.328276] page dumped because: kasan: bad access detected [ 16.328506] [ 16.328628] Memory state around the buggy address: [ 16.328863] ffff888103a01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.329150] ffff888103a02000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.329429] >ffff888103a02080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.330005] ^ [ 16.330441] ffff888103a02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.331123] ffff888103a02180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.331903] ================================================================== [ 16.245898] ================================================================== [ 16.246458] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 16.247723] Write of size 1 at addr ffff888103a020c9 by task kunit_try_catch/183 [ 16.249276] [ 16.249472] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.249585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.249610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.249653] Call Trace: [ 16.249685] <TASK> [ 16.249725] dump_stack_lvl+0x73/0xb0 [ 16.249820] print_report+0xd1/0x650 [ 16.249862] ? __virt_addr_valid+0x1db/0x2d0 [ 16.249909] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 16.249954] ? kasan_addr_to_slab+0x11/0xa0 [ 16.249993] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 16.250038] kasan_report+0x141/0x180 [ 16.250079] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 16.250141] __asan_report_store1_noabort+0x1b/0x30 [ 16.250177] krealloc_less_oob_helper+0xd70/0x11d0 [ 16.250217] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.250266] ? finish_task_switch.isra.0+0x153/0x700 [ 16.250318] ? __switch_to+0x5d9/0xf60 [ 16.250357] ? dequeue_task_fair+0x166/0x4e0 [ 16.250396] ? __schedule+0x10cc/0x2b30 [ 16.250435] ? __pfx_read_tsc+0x10/0x10 [ 16.250484] krealloc_large_less_oob+0x1c/0x30 [ 16.250527] kunit_try_run_case+0x1a5/0x480 [ 16.250576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.250618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.250664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.250707] ? __kthread_parkme+0x82/0x180 [ 16.251579] ? preempt_count_sub+0x50/0x80 [ 16.251688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.251735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.251795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.251833] kthread+0x337/0x6f0 [ 16.251865] ? trace_preempt_on+0x20/0xc0 [ 16.251906] ? __pfx_kthread+0x10/0x10 [ 16.251942] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.251984] ? calculate_sigpending+0x7b/0xa0 [ 16.252027] ? __pfx_kthread+0x10/0x10 [ 16.252064] ret_from_fork+0x41/0x80 [ 16.252144] ? __pfx_kthread+0x10/0x10 [ 16.252183] ret_from_fork_asm+0x1a/0x30 [ 16.252246] </TASK> [ 16.252272] [ 16.271854] The buggy address belongs to the physical page: [ 16.272456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a00 [ 16.273074] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.273472] flags: 0x200000000000040(head|node=0|zone=2) [ 16.273796] page_type: f8(unknown) [ 16.274119] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.274512] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.275126] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.275466] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.275795] head: 0200000000000002 ffffea00040e8001 00000000ffffffff 00000000ffffffff [ 16.276536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.277170] page dumped because: kasan: bad access detected [ 16.277479] [ 16.277608] Memory state around the buggy address: [ 16.278061] ffff888103a01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.278720] ffff888103a02000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.279163] >ffff888103a02080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.279619] ^ [ 16.280233] ffff888103a02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.280822] ffff888103a02180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.281236] ================================================================== [ 16.282688] ================================================================== [ 16.283062] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 16.283405] Write of size 1 at addr ffff888103a020d0 by task kunit_try_catch/183 [ 16.284116] [ 16.285180] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.285285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.285307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.285345] Call Trace: [ 16.285579] <TASK> [ 16.285618] dump_stack_lvl+0x73/0xb0 [ 16.285703] print_report+0xd1/0x650 [ 16.285760] ? __virt_addr_valid+0x1db/0x2d0 [ 16.285806] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 16.285844] ? kasan_addr_to_slab+0x11/0xa0 [ 16.285884] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 16.285931] kasan_report+0x141/0x180 [ 16.285969] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 16.286027] __asan_report_store1_noabort+0x1b/0x30 [ 16.286076] krealloc_less_oob_helper+0xe23/0x11d0 [ 16.286173] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.286224] ? finish_task_switch.isra.0+0x153/0x700 [ 16.286259] ? __switch_to+0x5d9/0xf60 [ 16.286282] ? dequeue_task_fair+0x166/0x4e0 [ 16.286309] ? __schedule+0x10cc/0x2b30 [ 16.286333] ? __pfx_read_tsc+0x10/0x10 [ 16.286359] krealloc_large_less_oob+0x1c/0x30 [ 16.286384] kunit_try_run_case+0x1a5/0x480 [ 16.286411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.286459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.286483] ? __kthread_parkme+0x82/0x180 [ 16.286507] ? preempt_count_sub+0x50/0x80 [ 16.286532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.286580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.286604] kthread+0x337/0x6f0 [ 16.286623] ? trace_preempt_on+0x20/0xc0 [ 16.286648] ? __pfx_kthread+0x10/0x10 [ 16.286668] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.286690] ? calculate_sigpending+0x7b/0xa0 [ 16.286713] ? __pfx_kthread+0x10/0x10 [ 16.286733] ret_from_fork+0x41/0x80 [ 16.286781] ? __pfx_kthread+0x10/0x10 [ 16.286804] ret_from_fork_asm+0x1a/0x30 [ 16.286839] </TASK> [ 16.286854] [ 16.296920] The buggy address belongs to the physical page: [ 16.297450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a00 [ 16.297893] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.298330] flags: 0x200000000000040(head|node=0|zone=2) [ 16.298601] page_type: f8(unknown) [ 16.298821] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.299310] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.299912] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.300525] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.300867] head: 0200000000000002 ffffea00040e8001 00000000ffffffff 00000000ffffffff [ 16.301238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.301802] page dumped because: kasan: bad access detected [ 16.302250] [ 16.302435] Memory state around the buggy address: [ 16.302833] ffff888103a01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.303203] ffff888103a02000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.303488] >ffff888103a02080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.303776] ^ [ 16.304028] ffff888103a02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.304564] ffff888103a02180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.305152] ================================================================== [ 16.333180] ================================================================== [ 16.333532] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 16.333817] Write of size 1 at addr ffff888103a020ea by task kunit_try_catch/183 [ 16.334032] [ 16.334160] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.334249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.334272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.334309] Call Trace: [ 16.334347] <TASK> [ 16.334383] dump_stack_lvl+0x73/0xb0 [ 16.334442] print_report+0xd1/0x650 [ 16.334488] ? __virt_addr_valid+0x1db/0x2d0 [ 16.334537] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 16.334589] ? kasan_addr_to_slab+0x11/0xa0 [ 16.334636] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 16.334689] kasan_report+0x141/0x180 [ 16.334741] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 16.334822] __asan_report_store1_noabort+0x1b/0x30 [ 16.334875] krealloc_less_oob_helper+0xe90/0x11d0 [ 16.334934] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 16.334986] ? finish_task_switch.isra.0+0x153/0x700 [ 16.335036] ? __switch_to+0x5d9/0xf60 [ 16.335081] ? dequeue_task_fair+0x166/0x4e0 [ 16.335134] ? __schedule+0x10cc/0x2b30 [ 16.335182] ? __pfx_read_tsc+0x10/0x10 [ 16.335234] krealloc_large_less_oob+0x1c/0x30 [ 16.335274] kunit_try_run_case+0x1a5/0x480 [ 16.335328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.335375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.335428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.335479] ? __kthread_parkme+0x82/0x180 [ 16.335521] ? preempt_count_sub+0x50/0x80 [ 16.335564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.335609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.335664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.335704] kthread+0x337/0x6f0 [ 16.335739] ? trace_preempt_on+0x20/0xc0 [ 16.335801] ? __pfx_kthread+0x10/0x10 [ 16.335843] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.335890] ? calculate_sigpending+0x7b/0xa0 [ 16.335940] ? __pfx_kthread+0x10/0x10 [ 16.335984] ret_from_fork+0x41/0x80 [ 16.336032] ? __pfx_kthread+0x10/0x10 [ 16.336074] ret_from_fork_asm+0x1a/0x30 [ 16.336148] </TASK> [ 16.336178] [ 16.347290] The buggy address belongs to the physical page: [ 16.347851] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a00 [ 16.348633] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.348952] flags: 0x200000000000040(head|node=0|zone=2) [ 16.349413] page_type: f8(unknown) [ 16.349766] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.350402] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.350726] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.351040] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.351850] head: 0200000000000002 ffffea00040e8001 00000000ffffffff 00000000ffffffff [ 16.352561] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.352952] page dumped because: kasan: bad access detected [ 16.353310] [ 16.353484] Memory state around the buggy address: [ 16.353869] ffff888103a01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.354396] ffff888103a02000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.354839] >ffff888103a02080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.355164] ^ [ 16.355572] ffff888103a02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.356072] ffff888103a02180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.356475] ==================================================================