Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 22.974400] ================================================================== [ 22.981410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.988956] Write of size 1 at addr ffff000803310ad0 by task kunit_try_catch/207 [ 22.996334] [ 22.997821] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.997877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.997892] Hardware name: WinLink E850-96 board (DT) [ 22.997912] Call trace: [ 22.997926] show_stack+0x20/0x38 (C) [ 22.997958] dump_stack_lvl+0x8c/0xd0 [ 22.997997] print_report+0x118/0x608 [ 22.998028] kasan_report+0xdc/0x128 [ 22.998058] __asan_report_store1_noabort+0x20/0x30 [ 22.998094] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.998123] krealloc_less_oob+0x20/0x38 [ 22.998150] kunit_try_run_case+0x170/0x3f0 [ 22.998188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.998225] kthread+0x328/0x630 [ 22.998259] ret_from_fork+0x10/0x20 [ 22.998295] [ 23.065170] Allocated by task 207: [ 23.068559] kasan_save_stack+0x3c/0x68 [ 23.072375] kasan_save_track+0x20/0x40 [ 23.076194] kasan_save_alloc_info+0x40/0x58 [ 23.080448] __kasan_krealloc+0x118/0x178 [ 23.084441] krealloc_noprof+0x128/0x360 [ 23.088347] krealloc_less_oob_helper+0x168/0xc50 [ 23.093034] krealloc_less_oob+0x20/0x38 [ 23.096940] kunit_try_run_case+0x170/0x3f0 [ 23.101108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.106576] kthread+0x328/0x630 [ 23.109788] ret_from_fork+0x10/0x20 [ 23.113346] [ 23.114824] The buggy address belongs to the object at ffff000803310a00 [ 23.114824] which belongs to the cache kmalloc-256 of size 256 [ 23.127324] The buggy address is located 7 bytes to the right of [ 23.127324] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 23.140256] [ 23.141733] The buggy address belongs to the physical page: [ 23.147292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 23.155274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.162912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.169856] page_type: f5(slab) [ 23.172995] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.180713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.188440] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.196251] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.204065] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 23.211876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.219682] page dumped because: kasan: bad access detected [ 23.225237] [ 23.226712] Memory state around the buggy address: [ 23.231494] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.238696] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.245901] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.253103] ^ [ 23.258921] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.266126] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.273327] ================================================================== [ 25.133653] ================================================================== [ 25.140749] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 25.148299] Write of size 1 at addr ffff0008033260da by task kunit_try_catch/211 [ 25.155677] [ 25.157161] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 25.157205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.157218] Hardware name: WinLink E850-96 board (DT) [ 25.157236] Call trace: [ 25.157249] show_stack+0x20/0x38 (C) [ 25.157280] dump_stack_lvl+0x8c/0xd0 [ 25.157315] print_report+0x118/0x608 [ 25.157346] kasan_report+0xdc/0x128 [ 25.157373] __asan_report_store1_noabort+0x20/0x30 [ 25.157405] krealloc_less_oob_helper+0xa80/0xc50 [ 25.157433] krealloc_large_less_oob+0x20/0x38 [ 25.157461] kunit_try_run_case+0x170/0x3f0 [ 25.157497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.157535] kthread+0x328/0x630 [ 25.157569] ret_from_fork+0x10/0x20 [ 25.157603] [ 25.225035] The buggy address belongs to the physical page: [ 25.230592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.238575] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.246214] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.253158] page_type: f8(unknown) [ 25.256554] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.264276] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.272002] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.279814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.287627] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.295438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.303244] page dumped because: kasan: bad access detected [ 25.308799] [ 25.310275] Memory state around the buggy address: [ 25.315056] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.322258] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.329463] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.336664] ^ [ 25.342744] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.349949] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.357150] ================================================================== [ 23.894760] ================================================================== [ 23.901620] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.909168] Write of size 1 at addr ffff000803310aeb by task kunit_try_catch/207 [ 23.916546] [ 23.918031] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.918080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.918097] Hardware name: WinLink E850-96 board (DT) [ 23.918115] Call trace: [ 23.918127] show_stack+0x20/0x38 (C) [ 23.918160] dump_stack_lvl+0x8c/0xd0 [ 23.918197] print_report+0x118/0x608 [ 23.918226] kasan_report+0xdc/0x128 [ 23.918254] __asan_report_store1_noabort+0x20/0x30 [ 23.918287] krealloc_less_oob_helper+0xa58/0xc50 [ 23.918316] krealloc_less_oob+0x20/0x38 [ 23.918343] kunit_try_run_case+0x170/0x3f0 [ 23.918379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.918417] kthread+0x328/0x630 [ 23.918448] ret_from_fork+0x10/0x20 [ 23.918481] [ 23.985382] Allocated by task 207: [ 23.988769] kasan_save_stack+0x3c/0x68 [ 23.992586] kasan_save_track+0x20/0x40 [ 23.996406] kasan_save_alloc_info+0x40/0x58 [ 24.000659] __kasan_krealloc+0x118/0x178 [ 24.004653] krealloc_noprof+0x128/0x360 [ 24.008559] krealloc_less_oob_helper+0x168/0xc50 [ 24.013246] krealloc_less_oob+0x20/0x38 [ 24.017153] kunit_try_run_case+0x170/0x3f0 [ 24.021321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.026788] kthread+0x328/0x630 [ 24.029999] ret_from_fork+0x10/0x20 [ 24.033558] [ 24.035036] The buggy address belongs to the object at ffff000803310a00 [ 24.035036] which belongs to the cache kmalloc-256 of size 256 [ 24.047537] The buggy address is located 34 bytes to the right of [ 24.047537] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 24.060555] [ 24.062033] The buggy address belongs to the physical page: [ 24.067590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 24.075573] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.083211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.090155] page_type: f5(slab) [ 24.093291] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.101012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.108739] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.116550] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.124363] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 24.132175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.139980] page dumped because: kasan: bad access detected [ 24.145535] [ 24.147011] Memory state around the buggy address: [ 24.151793] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.158994] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.166199] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.173400] ^ [ 24.180001] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.187206] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.194407] ================================================================== [ 25.364435] ================================================================== [ 25.371561] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 25.379111] Write of size 1 at addr ffff0008033260ea by task kunit_try_catch/211 [ 25.386489] [ 25.387974] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 25.388017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.388031] Hardware name: WinLink E850-96 board (DT) [ 25.388048] Call trace: [ 25.388057] show_stack+0x20/0x38 (C) [ 25.388091] dump_stack_lvl+0x8c/0xd0 [ 25.388127] print_report+0x118/0x608 [ 25.388156] kasan_report+0xdc/0x128 [ 25.388186] __asan_report_store1_noabort+0x20/0x30 [ 25.388219] krealloc_less_oob_helper+0xae4/0xc50 [ 25.388248] krealloc_large_less_oob+0x20/0x38 [ 25.388278] kunit_try_run_case+0x170/0x3f0 [ 25.388312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.388350] kthread+0x328/0x630 [ 25.388383] ret_from_fork+0x10/0x20 [ 25.388415] [ 25.455848] The buggy address belongs to the physical page: [ 25.461404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.469388] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.477026] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.483971] page_type: f8(unknown) [ 25.487367] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.495089] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.502814] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.510626] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.518441] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.526251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.534057] page dumped because: kasan: bad access detected [ 25.539612] [ 25.541088] Memory state around the buggy address: [ 25.545868] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.553071] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.560275] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.567476] ^ [ 25.574077] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.581282] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.588483] ================================================================== [ 24.903303] ================================================================== [ 24.910200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.917747] Write of size 1 at addr ffff0008033260d0 by task kunit_try_catch/211 [ 24.925125] [ 24.926612] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.926663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.926679] Hardware name: WinLink E850-96 board (DT) [ 24.926697] Call trace: [ 24.926710] show_stack+0x20/0x38 (C) [ 24.926743] dump_stack_lvl+0x8c/0xd0 [ 24.926782] print_report+0x118/0x608 [ 24.926812] kasan_report+0xdc/0x128 [ 24.926842] __asan_report_store1_noabort+0x20/0x30 [ 24.926877] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.926906] krealloc_large_less_oob+0x20/0x38 [ 24.926934] kunit_try_run_case+0x170/0x3f0 [ 24.926972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.927010] kthread+0x328/0x630 [ 24.927044] ret_from_fork+0x10/0x20 [ 24.927079] [ 24.994484] The buggy address belongs to the physical page: [ 25.000042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.008023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.015664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.022606] page_type: f8(unknown) [ 25.026003] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.033724] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.041450] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.049262] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.057075] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.064886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.072692] page dumped because: kasan: bad access detected [ 25.078247] [ 25.079723] Memory state around the buggy address: [ 25.084503] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.091706] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.098911] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.106112] ^ [ 25.111931] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.119136] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.126337] ================================================================== [ 23.587323] ================================================================== [ 23.594422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.601968] Write of size 1 at addr ffff000803310aea by task kunit_try_catch/207 [ 23.609346] [ 23.610831] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.610878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.610892] Hardware name: WinLink E850-96 board (DT) [ 23.610909] Call trace: [ 23.610920] show_stack+0x20/0x38 (C) [ 23.610954] dump_stack_lvl+0x8c/0xd0 [ 23.610991] print_report+0x118/0x608 [ 23.611022] kasan_report+0xdc/0x128 [ 23.611050] __asan_report_store1_noabort+0x20/0x30 [ 23.611088] krealloc_less_oob_helper+0xae4/0xc50 [ 23.611116] krealloc_less_oob+0x20/0x38 [ 23.611144] kunit_try_run_case+0x170/0x3f0 [ 23.611182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.611219] kthread+0x328/0x630 [ 23.611254] ret_from_fork+0x10/0x20 [ 23.611289] [ 23.678181] Allocated by task 207: [ 23.681569] kasan_save_stack+0x3c/0x68 [ 23.685386] kasan_save_track+0x20/0x40 [ 23.689206] kasan_save_alloc_info+0x40/0x58 [ 23.693459] __kasan_krealloc+0x118/0x178 [ 23.697452] krealloc_noprof+0x128/0x360 [ 23.701359] krealloc_less_oob_helper+0x168/0xc50 [ 23.706046] krealloc_less_oob+0x20/0x38 [ 23.709952] kunit_try_run_case+0x170/0x3f0 [ 23.714119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.719587] kthread+0x328/0x630 [ 23.722799] ret_from_fork+0x10/0x20 [ 23.726358] [ 23.727835] The buggy address belongs to the object at ffff000803310a00 [ 23.727835] which belongs to the cache kmalloc-256 of size 256 [ 23.740335] The buggy address is located 33 bytes to the right of [ 23.740335] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 23.753354] [ 23.754831] The buggy address belongs to the physical page: [ 23.760390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 23.768372] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.776010] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.782957] page_type: f5(slab) [ 23.786092] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.793812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.801543] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.809350] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.817163] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 23.824974] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.832780] page dumped because: kasan: bad access detected [ 23.838335] [ 23.839811] Memory state around the buggy address: [ 23.844591] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.851794] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.858999] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.866200] ^ [ 23.872801] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.880005] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.887206] ================================================================== [ 22.666013] ================================================================== [ 22.675336] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.682887] Write of size 1 at addr ffff000803310ac9 by task kunit_try_catch/207 [ 22.690262] [ 22.691749] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.691802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.691819] Hardware name: WinLink E850-96 board (DT) [ 22.691840] Call trace: [ 22.691855] show_stack+0x20/0x38 (C) [ 22.691889] dump_stack_lvl+0x8c/0xd0 [ 22.691927] print_report+0x118/0x608 [ 22.691961] kasan_report+0xdc/0x128 [ 22.691990] __asan_report_store1_noabort+0x20/0x30 [ 22.692028] krealloc_less_oob_helper+0xa48/0xc50 [ 22.692057] krealloc_less_oob+0x20/0x38 [ 22.692086] kunit_try_run_case+0x170/0x3f0 [ 22.692124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.692161] kthread+0x328/0x630 [ 22.692197] ret_from_fork+0x10/0x20 [ 22.692234] [ 22.759098] Allocated by task 207: [ 22.762487] kasan_save_stack+0x3c/0x68 [ 22.766304] kasan_save_track+0x20/0x40 [ 22.770122] kasan_save_alloc_info+0x40/0x58 [ 22.774376] __kasan_krealloc+0x118/0x178 [ 22.778369] krealloc_noprof+0x128/0x360 [ 22.782275] krealloc_less_oob_helper+0x168/0xc50 [ 22.786963] krealloc_less_oob+0x20/0x38 [ 22.790869] kunit_try_run_case+0x170/0x3f0 [ 22.795037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.800504] kthread+0x328/0x630 [ 22.803716] ret_from_fork+0x10/0x20 [ 22.807275] [ 22.808754] The buggy address belongs to the object at ffff000803310a00 [ 22.808754] which belongs to the cache kmalloc-256 of size 256 [ 22.821253] The buggy address is located 0 bytes to the right of [ 22.821253] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 22.834184] [ 22.835664] The buggy address belongs to the physical page: [ 22.841220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 22.849205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.856842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.863786] page_type: f5(slab) [ 22.866925] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.874642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.882368] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.890180] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.897992] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 22.905804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.913610] page dumped because: kasan: bad access detected [ 22.919167] [ 22.920641] Memory state around the buggy address: [ 22.925420] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.932624] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.939829] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.947030] ^ [ 22.952589] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.959793] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.966996] ================================================================== [ 25.595796] ================================================================== [ 25.602895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 25.610445] Write of size 1 at addr ffff0008033260eb by task kunit_try_catch/211 [ 25.617823] [ 25.619308] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 25.619356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.619371] Hardware name: WinLink E850-96 board (DT) [ 25.619387] Call trace: [ 25.619400] show_stack+0x20/0x38 (C) [ 25.619435] dump_stack_lvl+0x8c/0xd0 [ 25.619470] print_report+0x118/0x608 [ 25.619500] kasan_report+0xdc/0x128 [ 25.619530] __asan_report_store1_noabort+0x20/0x30 [ 25.619563] krealloc_less_oob_helper+0xa58/0xc50 [ 25.619593] krealloc_large_less_oob+0x20/0x38 [ 25.619622] kunit_try_run_case+0x170/0x3f0 [ 25.619660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.619698] kthread+0x328/0x630 [ 25.619730] ret_from_fork+0x10/0x20 [ 25.619762] [ 25.687181] The buggy address belongs to the physical page: [ 25.692739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.700721] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.708360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.715305] page_type: f8(unknown) [ 25.718703] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.726423] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.734149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.741959] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.749773] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.757584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.765390] page dumped because: kasan: bad access detected [ 25.770945] [ 25.772421] Memory state around the buggy address: [ 25.777203] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.784404] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.791609] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.798810] ^ [ 25.805411] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.812615] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.819816] ================================================================== [ 23.280653] ================================================================== [ 23.287740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.295288] Write of size 1 at addr ffff000803310ada by task kunit_try_catch/207 [ 23.302667] [ 23.304151] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.304198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.304212] Hardware name: WinLink E850-96 board (DT) [ 23.304228] Call trace: [ 23.304242] show_stack+0x20/0x38 (C) [ 23.304278] dump_stack_lvl+0x8c/0xd0 [ 23.304315] print_report+0x118/0x608 [ 23.304343] kasan_report+0xdc/0x128 [ 23.304371] __asan_report_store1_noabort+0x20/0x30 [ 23.304403] krealloc_less_oob_helper+0xa80/0xc50 [ 23.304432] krealloc_less_oob+0x20/0x38 [ 23.304459] kunit_try_run_case+0x170/0x3f0 [ 23.304495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.304535] kthread+0x328/0x630 [ 23.304569] ret_from_fork+0x10/0x20 [ 23.304600] [ 23.371502] Allocated by task 207: [ 23.374890] kasan_save_stack+0x3c/0x68 [ 23.378707] kasan_save_track+0x20/0x40 [ 23.382526] kasan_save_alloc_info+0x40/0x58 [ 23.386780] __kasan_krealloc+0x118/0x178 [ 23.390773] krealloc_noprof+0x128/0x360 [ 23.394679] krealloc_less_oob_helper+0x168/0xc50 [ 23.399367] krealloc_less_oob+0x20/0x38 [ 23.403273] kunit_try_run_case+0x170/0x3f0 [ 23.407439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.412908] kthread+0x328/0x630 [ 23.416120] ret_from_fork+0x10/0x20 [ 23.419679] [ 23.421156] The buggy address belongs to the object at ffff000803310a00 [ 23.421156] which belongs to the cache kmalloc-256 of size 256 [ 23.433654] The buggy address is located 17 bytes to the right of [ 23.433654] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 23.446675] [ 23.448152] The buggy address belongs to the physical page: [ 23.453710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 23.461692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.469331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.476275] page_type: f5(slab) [ 23.479410] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.487132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.494859] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.502670] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.510484] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 23.518295] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.526101] page dumped because: kasan: bad access detected [ 23.531656] [ 23.533132] Memory state around the buggy address: [ 23.537913] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.545115] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.552319] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.559520] ^ [ 23.565600] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.572805] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.580006] ================================================================== [ 24.670060] ================================================================== [ 24.679908] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.687456] Write of size 1 at addr ffff0008033260c9 by task kunit_try_catch/211 [ 24.694834] [ 24.696319] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.696376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.696392] Hardware name: WinLink E850-96 board (DT) [ 24.696412] Call trace: [ 24.696426] show_stack+0x20/0x38 (C) [ 24.696459] dump_stack_lvl+0x8c/0xd0 [ 24.696501] print_report+0x118/0x608 [ 24.696535] kasan_report+0xdc/0x128 [ 24.696565] __asan_report_store1_noabort+0x20/0x30 [ 24.696603] krealloc_less_oob_helper+0xa48/0xc50 [ 24.696633] krealloc_large_less_oob+0x20/0x38 [ 24.696661] kunit_try_run_case+0x170/0x3f0 [ 24.696699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.696737] kthread+0x328/0x630 [ 24.696773] ret_from_fork+0x10/0x20 [ 24.696807] [ 24.764194] The buggy address belongs to the physical page: [ 24.769752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 24.777734] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.785372] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.792316] page_type: f8(unknown) [ 24.795711] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.803432] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.811159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.818970] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.826783] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 24.834595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.842400] page dumped because: kasan: bad access detected [ 24.847956] [ 24.849434] Memory state around the buggy address: [ 24.854211] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.861414] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.868620] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.875820] ^ [ 24.881379] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.888584] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.895785] ==================================================================
[ 17.864446] ================================================================== [ 17.864491] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.864538] Write of size 1 at addr fff00000c79160ea by task kunit_try_catch/164 [ 17.864773] [ 17.864957] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.865047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.865082] Hardware name: linux,dummy-virt (DT) [ 17.865206] Call trace: [ 17.865255] show_stack+0x20/0x38 (C) [ 17.865373] dump_stack_lvl+0x8c/0xd0 [ 17.865660] print_report+0x118/0x608 [ 17.865795] kasan_report+0xdc/0x128 [ 17.865880] __asan_report_store1_noabort+0x20/0x30 [ 17.865988] krealloc_less_oob_helper+0xae4/0xc50 [ 17.866038] krealloc_large_less_oob+0x20/0x38 [ 17.866084] kunit_try_run_case+0x170/0x3f0 [ 17.866131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.866184] kthread+0x328/0x630 [ 17.866235] ret_from_fork+0x10/0x20 [ 17.866291] [ 17.866320] The buggy address belongs to the physical page: [ 17.866358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.866409] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.866455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.866504] page_type: f8(unknown) [ 17.866542] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.866603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.866663] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.866714] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.866764] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.866814] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.866866] page dumped because: kasan: bad access detected [ 17.866908] [ 17.867137] Memory state around the buggy address: [ 17.867327] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.867470] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.867530] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.867705] ^ [ 17.867748] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.867926] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.868062] ================================================================== [ 17.847845] ================================================================== [ 17.847984] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.848134] Write of size 1 at addr fff00000c79160c9 by task kunit_try_catch/164 [ 17.848397] [ 17.848560] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.848667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.848815] Hardware name: linux,dummy-virt (DT) [ 17.848944] Call trace: [ 17.849020] show_stack+0x20/0x38 (C) [ 17.849100] dump_stack_lvl+0x8c/0xd0 [ 17.849229] print_report+0x118/0x608 [ 17.849275] kasan_report+0xdc/0x128 [ 17.849319] __asan_report_store1_noabort+0x20/0x30 [ 17.849547] krealloc_less_oob_helper+0xa48/0xc50 [ 17.849682] krealloc_large_less_oob+0x20/0x38 [ 17.849730] kunit_try_run_case+0x170/0x3f0 [ 17.850126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.850202] kthread+0x328/0x630 [ 17.850279] ret_from_fork+0x10/0x20 [ 17.850441] [ 17.850519] The buggy address belongs to the physical page: [ 17.850776] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.850886] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.850949] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.851075] page_type: f8(unknown) [ 17.851163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.851330] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.851485] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.851603] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.851792] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.851910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.851986] page dumped because: kasan: bad access detected [ 17.852032] [ 17.852088] Memory state around the buggy address: [ 17.852130] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.852175] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.852221] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.852261] ^ [ 17.852304] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.852357] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.852397] ================================================================== [ 17.853494] ================================================================== [ 17.853543] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.853783] Write of size 1 at addr fff00000c79160d0 by task kunit_try_catch/164 [ 17.853924] [ 17.853963] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.854046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.854080] Hardware name: linux,dummy-virt (DT) [ 17.854226] Call trace: [ 17.854277] show_stack+0x20/0x38 (C) [ 17.854361] dump_stack_lvl+0x8c/0xd0 [ 17.854442] print_report+0x118/0x608 [ 17.854487] kasan_report+0xdc/0x128 [ 17.854531] __asan_report_store1_noabort+0x20/0x30 [ 17.854614] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.854720] krealloc_large_less_oob+0x20/0x38 [ 17.854915] kunit_try_run_case+0x170/0x3f0 [ 17.854968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.855021] kthread+0x328/0x630 [ 17.855072] ret_from_fork+0x10/0x20 [ 17.855119] [ 17.855140] The buggy address belongs to the physical page: [ 17.855383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.855518] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.855615] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.855736] page_type: f8(unknown) [ 17.855849] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.856126] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.856188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.856568] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.856740] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.857004] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.857155] page dumped because: kasan: bad access detected [ 17.857309] [ 17.857366] Memory state around the buggy address: [ 17.857400] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.857445] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.857495] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.857580] ^ [ 17.857638] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.857690] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.857744] ================================================================== [ 17.790769] ================================================================== [ 17.790822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.791058] Write of size 1 at addr fff00000c4775ed0 by task kunit_try_catch/160 [ 17.791112] [ 17.791327] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.791545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.791601] Hardware name: linux,dummy-virt (DT) [ 17.791635] Call trace: [ 17.791656] show_stack+0x20/0x38 (C) [ 17.792023] dump_stack_lvl+0x8c/0xd0 [ 17.792145] print_report+0x118/0x608 [ 17.792548] kasan_report+0xdc/0x128 [ 17.792733] __asan_report_store1_noabort+0x20/0x30 [ 17.792797] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.793022] krealloc_less_oob+0x20/0x38 [ 17.793099] kunit_try_run_case+0x170/0x3f0 [ 17.793275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.793468] kthread+0x328/0x630 [ 17.793610] ret_from_fork+0x10/0x20 [ 17.793765] [ 17.793959] Allocated by task 160: [ 17.794023] kasan_save_stack+0x3c/0x68 [ 17.794166] kasan_save_track+0x20/0x40 [ 17.794241] kasan_save_alloc_info+0x40/0x58 [ 17.794339] __kasan_krealloc+0x118/0x178 [ 17.794428] krealloc_noprof+0x128/0x360 [ 17.794570] krealloc_less_oob_helper+0x168/0xc50 [ 17.794686] krealloc_less_oob+0x20/0x38 [ 17.794721] kunit_try_run_case+0x170/0x3f0 [ 17.794915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.795104] kthread+0x328/0x630 [ 17.795154] ret_from_fork+0x10/0x20 [ 17.795189] [ 17.795463] The buggy address belongs to the object at fff00000c4775e00 [ 17.795463] which belongs to the cache kmalloc-256 of size 256 [ 17.795695] The buggy address is located 7 bytes to the right of [ 17.795695] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.795801] [ 17.795958] The buggy address belongs to the physical page: [ 17.796138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.796204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.796249] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.796323] page_type: f5(slab) [ 17.796636] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.796723] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.796864] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.796966] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.797118] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.797282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.797631] page dumped because: kasan: bad access detected [ 17.797739] [ 17.797813] Memory state around the buggy address: [ 17.797970] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798042] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.798124] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.798575] ^ [ 17.798656] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798712] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798922] ================================================================== [ 17.782758] ================================================================== [ 17.782815] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.783419] Write of size 1 at addr fff00000c4775ec9 by task kunit_try_catch/160 [ 17.783601] [ 17.783673] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.783761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.783789] Hardware name: linux,dummy-virt (DT) [ 17.783822] Call trace: [ 17.783844] show_stack+0x20/0x38 (C) [ 17.784070] dump_stack_lvl+0x8c/0xd0 [ 17.784119] print_report+0x118/0x608 [ 17.784164] kasan_report+0xdc/0x128 [ 17.784590] __asan_report_store1_noabort+0x20/0x30 [ 17.784750] krealloc_less_oob_helper+0xa48/0xc50 [ 17.784909] krealloc_less_oob+0x20/0x38 [ 17.785245] kunit_try_run_case+0x170/0x3f0 [ 17.785312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.785697] kthread+0x328/0x630 [ 17.785789] ret_from_fork+0x10/0x20 [ 17.785838] [ 17.785893] Allocated by task 160: [ 17.785923] kasan_save_stack+0x3c/0x68 [ 17.785983] kasan_save_track+0x20/0x40 [ 17.786032] kasan_save_alloc_info+0x40/0x58 [ 17.786080] __kasan_krealloc+0x118/0x178 [ 17.786127] krealloc_noprof+0x128/0x360 [ 17.786164] krealloc_less_oob_helper+0x168/0xc50 [ 17.786201] krealloc_less_oob+0x20/0x38 [ 17.786235] kunit_try_run_case+0x170/0x3f0 [ 17.786278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.786327] kthread+0x328/0x630 [ 17.786377] ret_from_fork+0x10/0x20 [ 17.786422] [ 17.786441] The buggy address belongs to the object at fff00000c4775e00 [ 17.786441] which belongs to the cache kmalloc-256 of size 256 [ 17.786508] The buggy address is located 0 bytes to the right of [ 17.786508] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.786587] [ 17.786607] The buggy address belongs to the physical page: [ 17.786638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.786690] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.786737] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.786798] page_type: f5(slab) [ 17.786869] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.786922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.786975] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.787583] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.787651] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.787728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.787935] page dumped because: kasan: bad access detected [ 17.787974] [ 17.788009] Memory state around the buggy address: [ 17.788042] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.788399] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788452] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.788621] ^ [ 17.788790] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.789008] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.789122] ================================================================== [ 17.817228] ================================================================== [ 17.817441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.817513] Write of size 1 at addr fff00000c4775eeb by task kunit_try_catch/160 [ 17.817698] [ 17.817930] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.818029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.818206] Hardware name: linux,dummy-virt (DT) [ 17.818274] Call trace: [ 17.818322] show_stack+0x20/0x38 (C) [ 17.818545] dump_stack_lvl+0x8c/0xd0 [ 17.818608] print_report+0x118/0x608 [ 17.818653] kasan_report+0xdc/0x128 [ 17.818705] __asan_report_store1_noabort+0x20/0x30 [ 17.818946] krealloc_less_oob_helper+0xa58/0xc50 [ 17.819028] krealloc_less_oob+0x20/0x38 [ 17.819079] kunit_try_run_case+0x170/0x3f0 [ 17.819127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.819185] kthread+0x328/0x630 [ 17.819441] ret_from_fork+0x10/0x20 [ 17.819626] [ 17.819665] Allocated by task 160: [ 17.819712] kasan_save_stack+0x3c/0x68 [ 17.819907] kasan_save_track+0x20/0x40 [ 17.819953] kasan_save_alloc_info+0x40/0x58 [ 17.820119] __kasan_krealloc+0x118/0x178 [ 17.820210] krealloc_noprof+0x128/0x360 [ 17.820390] krealloc_less_oob_helper+0x168/0xc50 [ 17.820479] krealloc_less_oob+0x20/0x38 [ 17.820515] kunit_try_run_case+0x170/0x3f0 [ 17.820805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.821044] kthread+0x328/0x630 [ 17.821088] ret_from_fork+0x10/0x20 [ 17.821420] [ 17.821473] The buggy address belongs to the object at fff00000c4775e00 [ 17.821473] which belongs to the cache kmalloc-256 of size 256 [ 17.821673] The buggy address is located 34 bytes to the right of [ 17.821673] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.821759] [ 17.822142] The buggy address belongs to the physical page: [ 17.822263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.822387] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.822516] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.822677] page_type: f5(slab) [ 17.822786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.822931] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.823006] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.823096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.823426] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.823498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.823655] page dumped because: kasan: bad access detected [ 17.823707] [ 17.823933] Memory state around the buggy address: [ 17.824180] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824237] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.824303] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.824453] ^ [ 17.824659] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824773] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824891] ================================================================== [ 17.868415] ================================================================== [ 17.868460] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.868517] Write of size 1 at addr fff00000c79160eb by task kunit_try_catch/164 [ 17.868884] [ 17.869159] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.869426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.869494] Hardware name: linux,dummy-virt (DT) [ 17.869555] Call trace: [ 17.869732] show_stack+0x20/0x38 (C) [ 17.869795] dump_stack_lvl+0x8c/0xd0 [ 17.869895] print_report+0x118/0x608 [ 17.870072] kasan_report+0xdc/0x128 [ 17.870248] __asan_report_store1_noabort+0x20/0x30 [ 17.870382] krealloc_less_oob_helper+0xa58/0xc50 [ 17.870487] krealloc_large_less_oob+0x20/0x38 [ 17.870671] kunit_try_run_case+0x170/0x3f0 [ 17.870730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.870816] kthread+0x328/0x630 [ 17.870974] ret_from_fork+0x10/0x20 [ 17.871289] [ 17.871345] The buggy address belongs to the physical page: [ 17.871377] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.871463] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.871610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.871730] page_type: f8(unknown) [ 17.871770] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.872039] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.872562] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.872744] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.872910] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.873013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.873056] page dumped because: kasan: bad access detected [ 17.873119] [ 17.873138] Memory state around the buggy address: [ 17.873170] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.873339] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.873428] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.873475] ^ [ 17.873745] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.873951] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.874165] ================================================================== [ 17.859078] ================================================================== [ 17.859179] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.859375] Write of size 1 at addr fff00000c79160da by task kunit_try_catch/164 [ 17.859451] [ 17.859599] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.859719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.859747] Hardware name: linux,dummy-virt (DT) [ 17.859841] Call trace: [ 17.859966] show_stack+0x20/0x38 (C) [ 17.860124] dump_stack_lvl+0x8c/0xd0 [ 17.860358] print_report+0x118/0x608 [ 17.860409] kasan_report+0xdc/0x128 [ 17.860471] __asan_report_store1_noabort+0x20/0x30 [ 17.860528] krealloc_less_oob_helper+0xa80/0xc50 [ 17.860576] krealloc_large_less_oob+0x20/0x38 [ 17.860801] kunit_try_run_case+0x170/0x3f0 [ 17.861013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.861126] kthread+0x328/0x630 [ 17.861287] ret_from_fork+0x10/0x20 [ 17.861383] [ 17.861555] The buggy address belongs to the physical page: [ 17.861749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.861825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.862145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.862226] page_type: f8(unknown) [ 17.862418] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.862480] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.862723] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.862789] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.862850] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.863020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.863151] page dumped because: kasan: bad access detected [ 17.863250] [ 17.863344] Memory state around the buggy address: [ 17.863376] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.863588] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.863669] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.863711] ^ [ 17.863779] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.863846] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.863958] ================================================================== [ 17.800653] ================================================================== [ 17.800705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.801133] Write of size 1 at addr fff00000c4775eda by task kunit_try_catch/160 [ 17.801203] [ 17.801261] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.801509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.801728] Hardware name: linux,dummy-virt (DT) [ 17.801801] Call trace: [ 17.801824] show_stack+0x20/0x38 (C) [ 17.801949] dump_stack_lvl+0x8c/0xd0 [ 17.801998] print_report+0x118/0x608 [ 17.802043] kasan_report+0xdc/0x128 [ 17.802086] __asan_report_store1_noabort+0x20/0x30 [ 17.802136] krealloc_less_oob_helper+0xa80/0xc50 [ 17.802182] krealloc_less_oob+0x20/0x38 [ 17.802235] kunit_try_run_case+0x170/0x3f0 [ 17.802285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.802339] kthread+0x328/0x630 [ 17.802398] ret_from_fork+0x10/0x20 [ 17.802446] [ 17.802464] Allocated by task 160: [ 17.802491] kasan_save_stack+0x3c/0x68 [ 17.802537] kasan_save_track+0x20/0x40 [ 17.802573] kasan_save_alloc_info+0x40/0x58 [ 17.802610] __kasan_krealloc+0x118/0x178 [ 17.802653] krealloc_noprof+0x128/0x360 [ 17.802695] krealloc_less_oob_helper+0x168/0xc50 [ 17.802740] krealloc_less_oob+0x20/0x38 [ 17.802779] kunit_try_run_case+0x170/0x3f0 [ 17.802826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.802881] kthread+0x328/0x630 [ 17.802915] ret_from_fork+0x10/0x20 [ 17.802961] [ 17.802980] The buggy address belongs to the object at fff00000c4775e00 [ 17.802980] which belongs to the cache kmalloc-256 of size 256 [ 17.803038] The buggy address is located 17 bytes to the right of [ 17.803038] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.803112] [ 17.803131] The buggy address belongs to the physical page: [ 17.803167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.803217] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.803263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.803313] page_type: f5(slab) [ 17.803350] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.803401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.803463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.803513] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.803564] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.803620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.803670] page dumped because: kasan: bad access detected [ 17.803704] [ 17.803722] Memory state around the buggy address: [ 17.803760] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.803806] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.803850] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.804150] ^ [ 17.804469] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.804675] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.805011] ================================================================== [ 17.807576] ================================================================== [ 17.807667] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.807838] Write of size 1 at addr fff00000c4775eea by task kunit_try_catch/160 [ 17.808058] [ 17.808167] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.808324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.808468] Hardware name: linux,dummy-virt (DT) [ 17.808523] Call trace: [ 17.808545] show_stack+0x20/0x38 (C) [ 17.808890] dump_stack_lvl+0x8c/0xd0 [ 17.808962] print_report+0x118/0x608 [ 17.809069] kasan_report+0xdc/0x128 [ 17.809166] __asan_report_store1_noabort+0x20/0x30 [ 17.809282] krealloc_less_oob_helper+0xae4/0xc50 [ 17.809382] krealloc_less_oob+0x20/0x38 [ 17.809744] kunit_try_run_case+0x170/0x3f0 [ 17.809869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.810118] kthread+0x328/0x630 [ 17.810317] ret_from_fork+0x10/0x20 [ 17.810496] [ 17.810839] Allocated by task 160: [ 17.810910] kasan_save_stack+0x3c/0x68 [ 17.811003] kasan_save_track+0x20/0x40 [ 17.811109] kasan_save_alloc_info+0x40/0x58 [ 17.811155] __kasan_krealloc+0x118/0x178 [ 17.811433] krealloc_noprof+0x128/0x360 [ 17.811580] krealloc_less_oob_helper+0x168/0xc50 [ 17.811661] krealloc_less_oob+0x20/0x38 [ 17.811747] kunit_try_run_case+0x170/0x3f0 [ 17.811982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.812259] kthread+0x328/0x630 [ 17.812440] ret_from_fork+0x10/0x20 [ 17.812496] [ 17.812557] The buggy address belongs to the object at fff00000c4775e00 [ 17.812557] which belongs to the cache kmalloc-256 of size 256 [ 17.812702] The buggy address is located 33 bytes to the right of [ 17.812702] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.812932] [ 17.813137] The buggy address belongs to the physical page: [ 17.813560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.813636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.813707] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.813823] page_type: f5(slab) [ 17.813921] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.814051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.814119] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.814191] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.814537] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.814724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.814787] page dumped because: kasan: bad access detected [ 17.814903] [ 17.814922] Memory state around the buggy address: [ 17.814989] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.815201] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.815383] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.815447] ^ [ 17.815662] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816090] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816190] ==================================================================
[ 10.603872] ================================================================== [ 10.604527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 10.605065] Write of size 1 at addr ffff8881009a2cda by task kunit_try_catch/177 [ 10.605289] [ 10.605376] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.605420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.605430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.605450] Call Trace: [ 10.605463] <TASK> [ 10.605480] dump_stack_lvl+0x73/0xb0 [ 10.605506] print_report+0xd1/0x650 [ 10.605528] ? __virt_addr_valid+0x1db/0x2d0 [ 10.605570] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.605590] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.605612] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.605632] kasan_report+0x141/0x180 [ 10.605656] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.605683] __asan_report_store1_noabort+0x1b/0x30 [ 10.605706] krealloc_less_oob_helper+0xec6/0x11d0 [ 10.605728] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.605748] ? finish_task_switch.isra.0+0x153/0x700 [ 10.605770] ? __switch_to+0x5d9/0xf60 [ 10.605790] ? dequeue_task_fair+0x166/0x4e0 [ 10.605814] ? __schedule+0x10cc/0x2b60 [ 10.605836] ? __pfx_read_tsc+0x10/0x10 [ 10.605859] krealloc_less_oob+0x1c/0x30 [ 10.605894] kunit_try_run_case+0x1a5/0x480 [ 10.605928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.605951] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.605973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.605996] ? __kthread_parkme+0x82/0x180 [ 10.606017] ? preempt_count_sub+0x50/0x80 [ 10.606040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.606063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.606105] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.606133] kthread+0x337/0x6f0 [ 10.606150] ? trace_preempt_on+0x20/0xc0 [ 10.606172] ? __pfx_kthread+0x10/0x10 [ 10.606190] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.606210] ? calculate_sigpending+0x7b/0xa0 [ 10.606231] ? __pfx_kthread+0x10/0x10 [ 10.606249] ret_from_fork+0x41/0x80 [ 10.606269] ? __pfx_kthread+0x10/0x10 [ 10.606286] ret_from_fork_asm+0x1a/0x30 [ 10.606316] </TASK> [ 10.606326] [ 10.613448] Allocated by task 177: [ 10.613640] kasan_save_stack+0x45/0x70 [ 10.613786] kasan_save_track+0x18/0x40 [ 10.613988] kasan_save_alloc_info+0x3b/0x50 [ 10.614200] __kasan_krealloc+0x190/0x1f0 [ 10.614366] krealloc_noprof+0xf3/0x340 [ 10.614501] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.614750] krealloc_less_oob+0x1c/0x30 [ 10.614949] kunit_try_run_case+0x1a5/0x480 [ 10.615129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.615301] kthread+0x337/0x6f0 [ 10.615438] ret_from_fork+0x41/0x80 [ 10.615645] ret_from_fork_asm+0x1a/0x30 [ 10.615840] [ 10.615946] The buggy address belongs to the object at ffff8881009a2c00 [ 10.615946] which belongs to the cache kmalloc-256 of size 256 [ 10.616439] The buggy address is located 17 bytes to the right of [ 10.616439] allocated 201-byte region [ffff8881009a2c00, ffff8881009a2cc9) [ 10.616963] [ 10.617038] The buggy address belongs to the physical page: [ 10.617270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2 [ 10.617515] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.617872] flags: 0x200000000000040(head|node=0|zone=2) [ 10.618135] page_type: f5(slab) [ 10.618286] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.618606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.618858] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.619214] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.619474] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff [ 10.619728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.620020] page dumped because: kasan: bad access detected [ 10.620280] [ 10.620371] Memory state around the buggy address: [ 10.620621] ffff8881009a2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.620949] ffff8881009a2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.621261] >ffff8881009a2c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.621597] ^ [ 10.621835] ffff8881009a2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.622096] ffff8881009a2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.622392] ================================================================== [ 10.724940] ================================================================== [ 10.725274] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 10.725643] Write of size 1 at addr ffff8881028960d0 by task kunit_try_catch/181 [ 10.725934] [ 10.726047] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.726091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.726103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.726122] Call Trace: [ 10.726138] <TASK> [ 10.726155] dump_stack_lvl+0x73/0xb0 [ 10.726178] print_report+0xd1/0x650 [ 10.726200] ? __virt_addr_valid+0x1db/0x2d0 [ 10.726222] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.726241] ? kasan_addr_to_slab+0x11/0xa0 [ 10.726262] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.726282] kasan_report+0x141/0x180 [ 10.726304] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.726328] __asan_report_store1_noabort+0x1b/0x30 [ 10.726348] krealloc_less_oob_helper+0xe23/0x11d0 [ 10.726370] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.726390] ? finish_task_switch.isra.0+0x153/0x700 [ 10.726414] ? __switch_to+0x5d9/0xf60 [ 10.726435] ? dequeue_task_fair+0x156/0x4e0 [ 10.726459] ? __schedule+0x10cc/0x2b60 [ 10.726482] ? __pfx_read_tsc+0x10/0x10 [ 10.726504] krealloc_large_less_oob+0x1c/0x30 [ 10.726523] kunit_try_run_case+0x1a5/0x480 [ 10.726548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.726569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.726592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.726614] ? __kthread_parkme+0x82/0x180 [ 10.726635] ? preempt_count_sub+0x50/0x80 [ 10.726659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.726681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.726703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.726725] kthread+0x337/0x6f0 [ 10.726742] ? trace_preempt_on+0x20/0xc0 [ 10.726764] ? __pfx_kthread+0x10/0x10 [ 10.726781] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.726802] ? calculate_sigpending+0x7b/0xa0 [ 10.726822] ? __pfx_kthread+0x10/0x10 [ 10.726840] ret_from_fork+0x41/0x80 [ 10.726861] ? __pfx_kthread+0x10/0x10 [ 10.726878] ret_from_fork_asm+0x1a/0x30 [ 10.726907] </TASK> [ 10.726927] [ 10.734696] The buggy address belongs to the physical page: [ 10.735002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 10.735304] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.735647] flags: 0x200000000000040(head|node=0|zone=2) [ 10.735910] page_type: f8(unknown) [ 10.736105] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.736412] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.736793] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.737108] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.737365] head: 0200000000000002 ffffea00040a2501 00000000ffffffff 00000000ffffffff [ 10.737619] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.738101] page dumped because: kasan: bad access detected [ 10.738356] [ 10.738449] Memory state around the buggy address: [ 10.738671] ffff888102895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.739048] ffff888102896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.739290] >ffff888102896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.739512] ^ [ 10.739864] ffff888102896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.740198] ffff888102896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.740505] ================================================================== [ 10.740956] ================================================================== [ 10.741233] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 10.741559] Write of size 1 at addr ffff8881028960da by task kunit_try_catch/181 [ 10.741925] [ 10.742039] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.742081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.742091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.742110] Call Trace: [ 10.742124] <TASK> [ 10.742137] dump_stack_lvl+0x73/0xb0 [ 10.742160] print_report+0xd1/0x650 [ 10.742183] ? __virt_addr_valid+0x1db/0x2d0 [ 10.742204] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.742224] ? kasan_addr_to_slab+0x11/0xa0 [ 10.742244] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.742263] kasan_report+0x141/0x180 [ 10.742285] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.742312] __asan_report_store1_noabort+0x1b/0x30 [ 10.742335] krealloc_less_oob_helper+0xec6/0x11d0 [ 10.742357] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.742377] ? finish_task_switch.isra.0+0x153/0x700 [ 10.742400] ? __switch_to+0x5d9/0xf60 [ 10.742421] ? dequeue_task_fair+0x156/0x4e0 [ 10.742444] ? __schedule+0x10cc/0x2b60 [ 10.742467] ? __pfx_read_tsc+0x10/0x10 [ 10.742489] krealloc_large_less_oob+0x1c/0x30 [ 10.742508] kunit_try_run_case+0x1a5/0x480 [ 10.742532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.742553] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.742577] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.742620] ? __kthread_parkme+0x82/0x180 [ 10.742642] ? preempt_count_sub+0x50/0x80 [ 10.742667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.742690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.742773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.742797] kthread+0x337/0x6f0 [ 10.742815] ? trace_preempt_on+0x20/0xc0 [ 10.742838] ? __pfx_kthread+0x10/0x10 [ 10.742856] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.742877] ? calculate_sigpending+0x7b/0xa0 [ 10.742898] ? __pfx_kthread+0x10/0x10 [ 10.742926] ret_from_fork+0x41/0x80 [ 10.742947] ? __pfx_kthread+0x10/0x10 [ 10.742965] ret_from_fork_asm+0x1a/0x30 [ 10.742995] </TASK> [ 10.743005] [ 10.750605] The buggy address belongs to the physical page: [ 10.750851] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 10.751227] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.751519] flags: 0x200000000000040(head|node=0|zone=2) [ 10.751732] page_type: f8(unknown) [ 10.751861] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.752332] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.752758] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.753107] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.753394] head: 0200000000000002 ffffea00040a2501 00000000ffffffff 00000000ffffffff [ 10.753699] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.754329] page dumped because: kasan: bad access detected [ 10.754552] [ 10.754620] Memory state around the buggy address: [ 10.754773] ffff888102895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.755184] ffff888102896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.755508] >ffff888102896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.755889] ^ [ 10.756134] ffff888102896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.756426] ffff888102896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.756775] ================================================================== [ 10.708040] ================================================================== [ 10.708500] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 10.708835] Write of size 1 at addr ffff8881028960c9 by task kunit_try_catch/181 [ 10.709145] [ 10.709249] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.709297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.709308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.709329] Call Trace: [ 10.709341] <TASK> [ 10.709357] dump_stack_lvl+0x73/0xb0 [ 10.709383] print_report+0xd1/0x650 [ 10.709405] ? __virt_addr_valid+0x1db/0x2d0 [ 10.709427] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.709446] ? kasan_addr_to_slab+0x11/0xa0 [ 10.709466] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.709486] kasan_report+0x141/0x180 [ 10.709508] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.709531] __asan_report_store1_noabort+0x1b/0x30 [ 10.709552] krealloc_less_oob_helper+0xd70/0x11d0 [ 10.709573] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.709593] ? finish_task_switch.isra.0+0x153/0x700 [ 10.709616] ? __switch_to+0x5d9/0xf60 [ 10.709637] ? dequeue_task_fair+0x156/0x4e0 [ 10.709661] ? __schedule+0x10cc/0x2b60 [ 10.709683] ? __pfx_read_tsc+0x10/0x10 [ 10.709705] krealloc_large_less_oob+0x1c/0x30 [ 10.709724] kunit_try_run_case+0x1a5/0x480 [ 10.709749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.709770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.709793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.709815] ? __kthread_parkme+0x82/0x180 [ 10.709836] ? preempt_count_sub+0x50/0x80 [ 10.709861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.709883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.709905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.709961] kthread+0x337/0x6f0 [ 10.709978] ? trace_preempt_on+0x20/0xc0 [ 10.710002] ? __pfx_kthread+0x10/0x10 [ 10.710019] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.710040] ? calculate_sigpending+0x7b/0xa0 [ 10.710061] ? __pfx_kthread+0x10/0x10 [ 10.710093] ret_from_fork+0x41/0x80 [ 10.710115] ? __pfx_kthread+0x10/0x10 [ 10.710132] ret_from_fork_asm+0x1a/0x30 [ 10.710174] </TASK> [ 10.710185] [ 10.718173] The buggy address belongs to the physical page: [ 10.718431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 10.719072] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.719359] flags: 0x200000000000040(head|node=0|zone=2) [ 10.719617] page_type: f8(unknown) [ 10.719753] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.720156] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.720477] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.720876] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.721188] head: 0200000000000002 ffffea00040a2501 00000000ffffffff 00000000ffffffff [ 10.721504] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.721891] page dumped because: kasan: bad access detected [ 10.722115] [ 10.722183] Memory state around the buggy address: [ 10.722340] ffff888102895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.722687] ffff888102896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.723071] >ffff888102896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.723378] ^ [ 10.723602] ffff888102896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.724181] ffff888102896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.724474] ================================================================== [ 10.572282] ================================================================== [ 10.572939] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 10.573191] Write of size 1 at addr ffff8881009a2cd0 by task kunit_try_catch/177 [ 10.573413] [ 10.573502] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.573546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.573583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.573603] Call Trace: [ 10.573616] <TASK> [ 10.573633] dump_stack_lvl+0x73/0xb0 [ 10.573657] print_report+0xd1/0x650 [ 10.573679] ? __virt_addr_valid+0x1db/0x2d0 [ 10.573700] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.573737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.573759] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.573780] kasan_report+0x141/0x180 [ 10.573802] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.573826] __asan_report_store1_noabort+0x1b/0x30 [ 10.573845] krealloc_less_oob_helper+0xe23/0x11d0 [ 10.573867] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.573886] ? finish_task_switch.isra.0+0x153/0x700 [ 10.573909] ? __switch_to+0x5d9/0xf60 [ 10.573939] ? dequeue_task_fair+0x166/0x4e0 [ 10.573961] ? __schedule+0x10cc/0x2b60 [ 10.573984] ? __pfx_read_tsc+0x10/0x10 [ 10.574006] krealloc_less_oob+0x1c/0x30 [ 10.574023] kunit_try_run_case+0x1a5/0x480 [ 10.574048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.574069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.574092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.574114] ? __kthread_parkme+0x82/0x180 [ 10.574135] ? preempt_count_sub+0x50/0x80 [ 10.574158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.574181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.574204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.574226] kthread+0x337/0x6f0 [ 10.574242] ? trace_preempt_on+0x20/0xc0 [ 10.574265] ? __pfx_kthread+0x10/0x10 [ 10.574282] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.574303] ? calculate_sigpending+0x7b/0xa0 [ 10.574324] ? __pfx_kthread+0x10/0x10 [ 10.574341] ret_from_fork+0x41/0x80 [ 10.574361] ? __pfx_kthread+0x10/0x10 [ 10.574378] ret_from_fork_asm+0x1a/0x30 [ 10.574407] </TASK> [ 10.574418] [ 10.587723] Allocated by task 177: [ 10.588069] kasan_save_stack+0x45/0x70 [ 10.588346] kasan_save_track+0x18/0x40 [ 10.588480] kasan_save_alloc_info+0x3b/0x50 [ 10.588782] __kasan_krealloc+0x190/0x1f0 [ 10.589149] krealloc_noprof+0xf3/0x340 [ 10.589508] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.589942] krealloc_less_oob+0x1c/0x30 [ 10.590290] kunit_try_run_case+0x1a5/0x480 [ 10.590435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.590724] kthread+0x337/0x6f0 [ 10.591018] ret_from_fork+0x41/0x80 [ 10.591333] ret_from_fork_asm+0x1a/0x30 [ 10.591700] [ 10.591853] The buggy address belongs to the object at ffff8881009a2c00 [ 10.591853] which belongs to the cache kmalloc-256 of size 256 [ 10.592544] The buggy address is located 7 bytes to the right of [ 10.592544] allocated 201-byte region [ffff8881009a2c00, ffff8881009a2cc9) [ 10.593628] [ 10.593784] The buggy address belongs to the physical page: [ 10.594013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2 [ 10.594255] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.594481] flags: 0x200000000000040(head|node=0|zone=2) [ 10.594880] page_type: f5(slab) [ 10.595193] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.595849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.596485] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.597152] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.597813] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff [ 10.598446] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.598942] page dumped because: kasan: bad access detected [ 10.599113] [ 10.599180] Memory state around the buggy address: [ 10.599335] ffff8881009a2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.599570] ffff8881009a2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.600156] >ffff8881009a2c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.600762] ^ [ 10.601246] ffff8881009a2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.601848] ffff8881009a2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.602445] ================================================================== [ 10.757181] ================================================================== [ 10.757454] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 10.757852] Write of size 1 at addr ffff8881028960ea by task kunit_try_catch/181 [ 10.758173] [ 10.758280] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.758322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.758333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.758353] Call Trace: [ 10.758369] <TASK> [ 10.758385] dump_stack_lvl+0x73/0xb0 [ 10.758407] print_report+0xd1/0x650 [ 10.758431] ? __virt_addr_valid+0x1db/0x2d0 [ 10.758452] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.758471] ? kasan_addr_to_slab+0x11/0xa0 [ 10.758491] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.758511] kasan_report+0x141/0x180 [ 10.758532] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.758557] __asan_report_store1_noabort+0x1b/0x30 [ 10.758577] krealloc_less_oob_helper+0xe90/0x11d0 [ 10.758621] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.758640] ? finish_task_switch.isra.0+0x153/0x700 [ 10.758663] ? __switch_to+0x5d9/0xf60 [ 10.758684] ? dequeue_task_fair+0x156/0x4e0 [ 10.758767] ? __schedule+0x10cc/0x2b60 [ 10.758792] ? __pfx_read_tsc+0x10/0x10 [ 10.758815] krealloc_large_less_oob+0x1c/0x30 [ 10.758835] kunit_try_run_case+0x1a5/0x480 [ 10.758859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.758881] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.758904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.758937] ? __kthread_parkme+0x82/0x180 [ 10.758958] ? preempt_count_sub+0x50/0x80 [ 10.758982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.759005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.759027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.759049] kthread+0x337/0x6f0 [ 10.759065] ? trace_preempt_on+0x20/0xc0 [ 10.759087] ? __pfx_kthread+0x10/0x10 [ 10.759105] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.759125] ? calculate_sigpending+0x7b/0xa0 [ 10.759146] ? __pfx_kthread+0x10/0x10 [ 10.759164] ret_from_fork+0x41/0x80 [ 10.759184] ? __pfx_kthread+0x10/0x10 [ 10.759201] ret_from_fork_asm+0x1a/0x30 [ 10.759232] </TASK> [ 10.759242] [ 10.766969] The buggy address belongs to the physical page: [ 10.767195] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 10.767450] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.768061] flags: 0x200000000000040(head|node=0|zone=2) [ 10.768284] page_type: f8(unknown) [ 10.768440] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.768802] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.769057] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.769398] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.769709] head: 0200000000000002 ffffea00040a2501 00000000ffffffff 00000000ffffffff [ 10.770016] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.770247] page dumped because: kasan: bad access detected [ 10.770418] [ 10.770486] Memory state around the buggy address: [ 10.770799] ffff888102895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.771125] ffff888102896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.771439] >ffff888102896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.771753] ^ [ 10.771970] ffff888102896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.772184] ffff888102896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.772404] ================================================================== [ 10.642093] ================================================================== [ 10.642438] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 10.642778] Write of size 1 at addr ffff8881009a2ceb by task kunit_try_catch/177 [ 10.643083] [ 10.643189] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.643231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.643241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.643260] Call Trace: [ 10.643275] <TASK> [ 10.643289] dump_stack_lvl+0x73/0xb0 [ 10.643311] print_report+0xd1/0x650 [ 10.643332] ? __virt_addr_valid+0x1db/0x2d0 [ 10.643352] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.643371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.643393] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.643413] kasan_report+0x141/0x180 [ 10.643434] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.643458] __asan_report_store1_noabort+0x1b/0x30 [ 10.643478] krealloc_less_oob_helper+0xd47/0x11d0 [ 10.643499] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.643519] ? finish_task_switch.isra.0+0x153/0x700 [ 10.643541] ? __switch_to+0x5d9/0xf60 [ 10.643560] ? dequeue_task_fair+0x166/0x4e0 [ 10.643583] ? __schedule+0x10cc/0x2b60 [ 10.643605] ? __pfx_read_tsc+0x10/0x10 [ 10.643626] krealloc_less_oob+0x1c/0x30 [ 10.643643] kunit_try_run_case+0x1a5/0x480 [ 10.643666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.643687] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.643709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.643731] ? __kthread_parkme+0x82/0x180 [ 10.643751] ? preempt_count_sub+0x50/0x80 [ 10.643774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.643796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.643817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.643839] kthread+0x337/0x6f0 [ 10.643856] ? trace_preempt_on+0x20/0xc0 [ 10.643878] ? __pfx_kthread+0x10/0x10 [ 10.643895] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.644322] ? calculate_sigpending+0x7b/0xa0 [ 10.644358] ? __pfx_kthread+0x10/0x10 [ 10.644377] ret_from_fork+0x41/0x80 [ 10.644399] ? __pfx_kthread+0x10/0x10 [ 10.644416] ret_from_fork_asm+0x1a/0x30 [ 10.644445] </TASK> [ 10.644456] [ 10.651566] Allocated by task 177: [ 10.651735] kasan_save_stack+0x45/0x70 [ 10.651902] kasan_save_track+0x18/0x40 [ 10.652093] kasan_save_alloc_info+0x3b/0x50 [ 10.652295] __kasan_krealloc+0x190/0x1f0 [ 10.652479] krealloc_noprof+0xf3/0x340 [ 10.652678] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.652875] krealloc_less_oob+0x1c/0x30 [ 10.653054] kunit_try_run_case+0x1a5/0x480 [ 10.653200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.653443] kthread+0x337/0x6f0 [ 10.653638] ret_from_fork+0x41/0x80 [ 10.653819] ret_from_fork_asm+0x1a/0x30 [ 10.653966] [ 10.654038] The buggy address belongs to the object at ffff8881009a2c00 [ 10.654038] which belongs to the cache kmalloc-256 of size 256 [ 10.654574] The buggy address is located 34 bytes to the right of [ 10.654574] allocated 201-byte region [ffff8881009a2c00, ffff8881009a2cc9) [ 10.655064] [ 10.655158] The buggy address belongs to the physical page: [ 10.655390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2 [ 10.655722] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.656030] flags: 0x200000000000040(head|node=0|zone=2) [ 10.656286] page_type: f5(slab) [ 10.656450] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.656788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.657091] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.657357] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.657610] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff [ 10.657839] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.658076] page dumped because: kasan: bad access detected [ 10.658328] [ 10.658419] Memory state around the buggy address: [ 10.658666] ffff8881009a2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.658990] ffff8881009a2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.659255] >ffff8881009a2c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.659464] ^ [ 10.659685] ffff8881009a2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.659903] ffff8881009a2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.660229] ================================================================== [ 10.622983] ================================================================== [ 10.623339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 10.624023] Write of size 1 at addr ffff8881009a2cea by task kunit_try_catch/177 [ 10.624324] [ 10.624429] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.624473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.624484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.624503] Call Trace: [ 10.624518] <TASK> [ 10.624535] dump_stack_lvl+0x73/0xb0 [ 10.624583] print_report+0xd1/0x650 [ 10.624605] ? __virt_addr_valid+0x1db/0x2d0 [ 10.624627] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.624646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.624668] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.624688] kasan_report+0x141/0x180 [ 10.624710] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.624734] __asan_report_store1_noabort+0x1b/0x30 [ 10.624754] krealloc_less_oob_helper+0xe90/0x11d0 [ 10.624776] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.624797] ? finish_task_switch.isra.0+0x153/0x700 [ 10.624820] ? __switch_to+0x5d9/0xf60 [ 10.624839] ? dequeue_task_fair+0x166/0x4e0 [ 10.624863] ? __schedule+0x10cc/0x2b60 [ 10.624885] ? __pfx_read_tsc+0x10/0x10 [ 10.624907] krealloc_less_oob+0x1c/0x30 [ 10.624934] kunit_try_run_case+0x1a5/0x480 [ 10.624958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.624980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.625002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.625025] ? __kthread_parkme+0x82/0x180 [ 10.625045] ? preempt_count_sub+0x50/0x80 [ 10.625069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.625091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.625113] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.625135] kthread+0x337/0x6f0 [ 10.625151] ? trace_preempt_on+0x20/0xc0 [ 10.625174] ? __pfx_kthread+0x10/0x10 [ 10.625191] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.625211] ? calculate_sigpending+0x7b/0xa0 [ 10.625232] ? __pfx_kthread+0x10/0x10 [ 10.625250] ret_from_fork+0x41/0x80 [ 10.625269] ? __pfx_kthread+0x10/0x10 [ 10.625286] ret_from_fork_asm+0x1a/0x30 [ 10.625316] </TASK> [ 10.625326] [ 10.632249] Allocated by task 177: [ 10.632426] kasan_save_stack+0x45/0x70 [ 10.632650] kasan_save_track+0x18/0x40 [ 10.632845] kasan_save_alloc_info+0x3b/0x50 [ 10.633069] __kasan_krealloc+0x190/0x1f0 [ 10.633283] krealloc_noprof+0xf3/0x340 [ 10.633466] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.633662] krealloc_less_oob+0x1c/0x30 [ 10.633797] kunit_try_run_case+0x1a5/0x480 [ 10.634008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.634263] kthread+0x337/0x6f0 [ 10.634428] ret_from_fork+0x41/0x80 [ 10.634633] ret_from_fork_asm+0x1a/0x30 [ 10.634782] [ 10.634865] The buggy address belongs to the object at ffff8881009a2c00 [ 10.634865] which belongs to the cache kmalloc-256 of size 256 [ 10.635369] The buggy address is located 33 bytes to the right of [ 10.635369] allocated 201-byte region [ffff8881009a2c00, ffff8881009a2cc9) [ 10.635900] [ 10.635979] The buggy address belongs to the physical page: [ 10.636235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2 [ 10.636505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.636753] flags: 0x200000000000040(head|node=0|zone=2) [ 10.636948] page_type: f5(slab) [ 10.637078] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.637394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.637758] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.638109] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.638444] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff [ 10.638817] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.639059] page dumped because: kasan: bad access detected [ 10.639227] [ 10.639294] Memory state around the buggy address: [ 10.639448] ffff8881009a2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.639766] ffff8881009a2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.640097] >ffff8881009a2c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.640424] ^ [ 10.640741] ffff8881009a2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.641076] ffff8881009a2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.641393] ================================================================== [ 10.539656] ================================================================== [ 10.540849] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 10.541597] Write of size 1 at addr ffff8881009a2cc9 by task kunit_try_catch/177 [ 10.542391] [ 10.542489] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.542536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.542555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.542575] Call Trace: [ 10.542588] <TASK> [ 10.542606] dump_stack_lvl+0x73/0xb0 [ 10.542633] print_report+0xd1/0x650 [ 10.542656] ? __virt_addr_valid+0x1db/0x2d0 [ 10.542677] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.542697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.542719] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.542739] kasan_report+0x141/0x180 [ 10.542761] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.542785] __asan_report_store1_noabort+0x1b/0x30 [ 10.542805] krealloc_less_oob_helper+0xd70/0x11d0 [ 10.542827] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.542846] ? finish_task_switch.isra.0+0x153/0x700 [ 10.542869] ? __switch_to+0x5d9/0xf60 [ 10.542889] ? dequeue_task_fair+0x166/0x4e0 [ 10.542912] ? __schedule+0x10cc/0x2b60 [ 10.542946] ? __pfx_read_tsc+0x10/0x10 [ 10.542970] krealloc_less_oob+0x1c/0x30 [ 10.542987] kunit_try_run_case+0x1a5/0x480 [ 10.543012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.543034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.543056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.543079] ? __kthread_parkme+0x82/0x180 [ 10.543100] ? preempt_count_sub+0x50/0x80 [ 10.543123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.543146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.543168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.543190] kthread+0x337/0x6f0 [ 10.543206] ? trace_preempt_on+0x20/0xc0 [ 10.543320] ? __pfx_kthread+0x10/0x10 [ 10.543358] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.543379] ? calculate_sigpending+0x7b/0xa0 [ 10.543400] ? __pfx_kthread+0x10/0x10 [ 10.543417] ret_from_fork+0x41/0x80 [ 10.543438] ? __pfx_kthread+0x10/0x10 [ 10.543455] ret_from_fork_asm+0x1a/0x30 [ 10.543486] </TASK> [ 10.543497] [ 10.555322] Allocated by task 177: [ 10.555500] kasan_save_stack+0x45/0x70 [ 10.556033] kasan_save_track+0x18/0x40 [ 10.556191] kasan_save_alloc_info+0x3b/0x50 [ 10.556409] __kasan_krealloc+0x190/0x1f0 [ 10.556612] krealloc_noprof+0xf3/0x340 [ 10.557126] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.557314] krealloc_less_oob+0x1c/0x30 [ 10.557454] kunit_try_run_case+0x1a5/0x480 [ 10.557611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.557786] kthread+0x337/0x6f0 [ 10.557902] ret_from_fork+0x41/0x80 [ 10.558312] ret_from_fork_asm+0x1a/0x30 [ 10.558674] [ 10.558748] The buggy address belongs to the object at ffff8881009a2c00 [ 10.558748] which belongs to the cache kmalloc-256 of size 256 [ 10.560099] The buggy address is located 0 bytes to the right of [ 10.560099] allocated 201-byte region [ffff8881009a2c00, ffff8881009a2cc9) [ 10.561061] [ 10.561231] The buggy address belongs to the physical page: [ 10.561765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2 [ 10.562198] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.562778] flags: 0x200000000000040(head|node=0|zone=2) [ 10.562968] page_type: f5(slab) [ 10.563094] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.563323] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.563552] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.563782] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.564313] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff [ 10.565135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.565861] page dumped because: kasan: bad access detected [ 10.566444] [ 10.566627] Memory state around the buggy address: [ 10.567200] ffff8881009a2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.567867] ffff8881009a2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.568482] >ffff8881009a2c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.569218] ^ [ 10.569739] ffff8881009a2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.570349] ffff8881009a2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.571044] ================================================================== [ 10.772930] ================================================================== [ 10.773277] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 10.773663] Write of size 1 at addr ffff8881028960eb by task kunit_try_catch/181 [ 10.774262] [ 10.774385] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.774430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.774442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.774462] Call Trace: [ 10.774479] <TASK> [ 10.774496] dump_stack_lvl+0x73/0xb0 [ 10.774521] print_report+0xd1/0x650 [ 10.774544] ? __virt_addr_valid+0x1db/0x2d0 [ 10.774565] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.774585] ? kasan_addr_to_slab+0x11/0xa0 [ 10.774605] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.774625] kasan_report+0x141/0x180 [ 10.774646] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.774670] __asan_report_store1_noabort+0x1b/0x30 [ 10.774691] krealloc_less_oob_helper+0xd47/0x11d0 [ 10.774713] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.774733] ? finish_task_switch.isra.0+0x153/0x700 [ 10.774757] ? __switch_to+0x5d9/0xf60 [ 10.774854] ? dequeue_task_fair+0x156/0x4e0 [ 10.774880] ? __schedule+0x10cc/0x2b60 [ 10.774903] ? __pfx_read_tsc+0x10/0x10 [ 10.775491] krealloc_large_less_oob+0x1c/0x30 [ 10.775524] kunit_try_run_case+0x1a5/0x480 [ 10.775553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.775575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.775645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.775671] ? __kthread_parkme+0x82/0x180 [ 10.775694] ? preempt_count_sub+0x50/0x80 [ 10.775753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.775778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.775801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.775823] kthread+0x337/0x6f0 [ 10.775840] ? trace_preempt_on+0x20/0xc0 [ 10.775864] ? __pfx_kthread+0x10/0x10 [ 10.775881] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.775902] ? calculate_sigpending+0x7b/0xa0 [ 10.775934] ? __pfx_kthread+0x10/0x10 [ 10.775952] ret_from_fork+0x41/0x80 [ 10.775973] ? __pfx_kthread+0x10/0x10 [ 10.775990] ret_from_fork_asm+0x1a/0x30 [ 10.776020] </TASK> [ 10.776031] [ 10.787335] The buggy address belongs to the physical page: [ 10.787605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 10.788156] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.788488] flags: 0x200000000000040(head|node=0|zone=2) [ 10.788929] page_type: f8(unknown) [ 10.789121] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.789555] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.790070] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.790506] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.791009] head: 0200000000000002 ffffea00040a2501 00000000ffffffff 00000000ffffffff [ 10.791420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.791902] page dumped because: kasan: bad access detected [ 10.792128] [ 10.792350] Memory state around the buggy address: [ 10.792536] ffff888102895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.792904] ffff888102896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.793396] >ffff888102896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.793905] ^ [ 10.794268] ffff888102896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.794568] ffff888102896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.795039] ==================================================================