Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.424051] ================================================================== [ 15.424174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.424221] Write of size 1 at addr fff00000c4600eeb by task kunit_try_catch/161 [ 15.424509] [ 15.424590] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.424676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.424703] Hardware name: linux,dummy-virt (DT) [ 15.424778] Call trace: [ 15.424803] show_stack+0x20/0x38 (C) [ 15.424992] dump_stack_lvl+0x8c/0xd0 [ 15.425047] print_report+0x118/0x608 [ 15.425091] kasan_report+0xdc/0x128 [ 15.425173] __asan_report_store1_noabort+0x20/0x30 [ 15.425224] krealloc_less_oob_helper+0xa58/0xc50 [ 15.425270] krealloc_less_oob+0x20/0x38 [ 15.425312] kunit_try_run_case+0x170/0x3f0 [ 15.425780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.425857] kthread+0x328/0x630 [ 15.425903] ret_from_fork+0x10/0x20 [ 15.426177] [ 15.426369] Allocated by task 161: [ 15.426415] kasan_save_stack+0x3c/0x68 [ 15.426476] kasan_save_track+0x20/0x40 [ 15.426523] kasan_save_alloc_info+0x40/0x58 [ 15.426580] __kasan_krealloc+0x118/0x178 [ 15.426901] krealloc_noprof+0x128/0x360 [ 15.427147] krealloc_less_oob_helper+0x168/0xc50 [ 15.427308] krealloc_less_oob+0x20/0x38 [ 15.427426] kunit_try_run_case+0x170/0x3f0 [ 15.427472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.427897] kthread+0x328/0x630 [ 15.428177] ret_from_fork+0x10/0x20 [ 15.428312] [ 15.428352] The buggy address belongs to the object at fff00000c4600e00 [ 15.428352] which belongs to the cache kmalloc-256 of size 256 [ 15.428407] The buggy address is located 34 bytes to the right of [ 15.428407] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.428479] [ 15.428499] The buggy address belongs to the physical page: [ 15.428535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.428588] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.428644] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.428694] page_type: f5(slab) [ 15.428731] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.428779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.428836] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.428892] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.428939] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.429006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.429049] page dumped because: kasan: bad access detected [ 15.429089] [ 15.429106] Memory state around the buggy address: [ 15.429142] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429193] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.429238] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.429280] ^ [ 15.429333] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429394] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429439] ================================================================== [ 15.464810] ================================================================== [ 15.464895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.465263] Write of size 1 at addr fff00000c786e0c9 by task kunit_try_catch/165 [ 15.465331] [ 15.465367] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.465447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.465474] Hardware name: linux,dummy-virt (DT) [ 15.465505] Call trace: [ 15.465527] show_stack+0x20/0x38 (C) [ 15.465601] dump_stack_lvl+0x8c/0xd0 [ 15.465660] print_report+0x118/0x608 [ 15.465705] kasan_report+0xdc/0x128 [ 15.465747] __asan_report_store1_noabort+0x20/0x30 [ 15.465812] krealloc_less_oob_helper+0xa48/0xc50 [ 15.465858] krealloc_large_less_oob+0x20/0x38 [ 15.465903] kunit_try_run_case+0x170/0x3f0 [ 15.465989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.466051] kthread+0x328/0x630 [ 15.466097] ret_from_fork+0x10/0x20 [ 15.466364] [ 15.466401] The buggy address belongs to the physical page: [ 15.466638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.466697] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.466744] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.467228] page_type: f8(unknown) [ 15.467323] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.467574] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.467904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.468065] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.468453] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.468552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.468816] page dumped because: kasan: bad access detected [ 15.468880] [ 15.468980] Memory state around the buggy address: [ 15.469072] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.469399] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.469487] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.469571] ^ [ 15.469894] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.470099] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.470144] ================================================================== [ 15.472049] ================================================================== [ 15.472114] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.472162] Write of size 1 at addr fff00000c786e0d0 by task kunit_try_catch/165 [ 15.472209] [ 15.472239] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.472583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.472741] Hardware name: linux,dummy-virt (DT) [ 15.472859] Call trace: [ 15.472884] show_stack+0x20/0x38 (C) [ 15.472961] dump_stack_lvl+0x8c/0xd0 [ 15.473040] print_report+0x118/0x608 [ 15.473112] kasan_report+0xdc/0x128 [ 15.473158] __asan_report_store1_noabort+0x20/0x30 [ 15.473251] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.473441] krealloc_large_less_oob+0x20/0x38 [ 15.473599] kunit_try_run_case+0x170/0x3f0 [ 15.473722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.474001] kthread+0x328/0x630 [ 15.474064] ret_from_fork+0x10/0x20 [ 15.474112] [ 15.474131] The buggy address belongs to the physical page: [ 15.474173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.474516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.474597] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.474697] page_type: f8(unknown) [ 15.474736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.474881] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.475091] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.475460] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.475566] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.476016] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.476104] page dumped because: kasan: bad access detected [ 15.476156] [ 15.476326] Memory state around the buggy address: [ 15.476544] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.476694] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.476741] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.476778] ^ [ 15.476813] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.477233] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.477403] ================================================================== [ 15.392742] ================================================================== [ 15.393058] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.393185] Write of size 1 at addr fff00000c4600ed0 by task kunit_try_catch/161 [ 15.393279] [ 15.393317] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.393433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.393460] Hardware name: linux,dummy-virt (DT) [ 15.393489] Call trace: [ 15.393516] show_stack+0x20/0x38 (C) [ 15.393661] dump_stack_lvl+0x8c/0xd0 [ 15.393713] print_report+0x118/0x608 [ 15.393782] kasan_report+0xdc/0x128 [ 15.394147] __asan_report_store1_noabort+0x20/0x30 [ 15.394306] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.394412] krealloc_less_oob+0x20/0x38 [ 15.394743] kunit_try_run_case+0x170/0x3f0 [ 15.394895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.395482] kthread+0x328/0x630 [ 15.395554] ret_from_fork+0x10/0x20 [ 15.395856] [ 15.395956] Allocated by task 161: [ 15.396102] kasan_save_stack+0x3c/0x68 [ 15.396329] kasan_save_track+0x20/0x40 [ 15.396523] kasan_save_alloc_info+0x40/0x58 [ 15.396586] __kasan_krealloc+0x118/0x178 [ 15.396621] krealloc_noprof+0x128/0x360 [ 15.396903] krealloc_less_oob_helper+0x168/0xc50 [ 15.397172] krealloc_less_oob+0x20/0x38 [ 15.397686] kunit_try_run_case+0x170/0x3f0 [ 15.397811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.398019] kthread+0x328/0x630 [ 15.398208] ret_from_fork+0x10/0x20 [ 15.398336] [ 15.398370] The buggy address belongs to the object at fff00000c4600e00 [ 15.398370] which belongs to the cache kmalloc-256 of size 256 [ 15.398433] The buggy address is located 7 bytes to the right of [ 15.398433] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.398651] [ 15.398797] The buggy address belongs to the physical page: [ 15.399070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.399127] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.399229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.399537] page_type: f5(slab) [ 15.399698] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.400053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.400363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.400444] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.400909] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.400987] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.401355] page dumped because: kasan: bad access detected [ 15.401441] [ 15.401459] Memory state around the buggy address: [ 15.401733] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402011] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.402162] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.402203] ^ [ 15.402238] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402440] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402686] ================================================================== [ 15.479030] ================================================================== [ 15.479083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.479128] Write of size 1 at addr fff00000c786e0da by task kunit_try_catch/165 [ 15.479478] [ 15.479545] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.479729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.479802] Hardware name: linux,dummy-virt (DT) [ 15.479835] Call trace: [ 15.479861] show_stack+0x20/0x38 (C) [ 15.479909] dump_stack_lvl+0x8c/0xd0 [ 15.479966] print_report+0x118/0x608 [ 15.480009] kasan_report+0xdc/0x128 [ 15.480052] __asan_report_store1_noabort+0x20/0x30 [ 15.480100] krealloc_less_oob_helper+0xa80/0xc50 [ 15.480145] krealloc_large_less_oob+0x20/0x38 [ 15.480189] kunit_try_run_case+0x170/0x3f0 [ 15.480236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.480296] kthread+0x328/0x630 [ 15.480340] ret_from_fork+0x10/0x20 [ 15.480394] [ 15.480414] The buggy address belongs to the physical page: [ 15.480448] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.480499] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.480546] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.480606] page_type: f8(unknown) [ 15.480648] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.480696] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.480748] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.480796] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.480843] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.480889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.480936] page dumped because: kasan: bad access detected [ 15.480984] [ 15.481002] Memory state around the buggy address: [ 15.481146] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.481199] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.481854] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.481920] ^ [ 15.482194] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.482255] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.482293] ================================================================== [ 15.413370] ================================================================== [ 15.413488] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.413741] Write of size 1 at addr fff00000c4600eea by task kunit_try_catch/161 [ 15.413803] [ 15.413900] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.414006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.414032] Hardware name: linux,dummy-virt (DT) [ 15.414196] Call trace: [ 15.414375] show_stack+0x20/0x38 (C) [ 15.414438] dump_stack_lvl+0x8c/0xd0 [ 15.414485] print_report+0x118/0x608 [ 15.415000] kasan_report+0xdc/0x128 [ 15.415482] __asan_report_store1_noabort+0x20/0x30 [ 15.415834] krealloc_less_oob_helper+0xae4/0xc50 [ 15.416012] krealloc_less_oob+0x20/0x38 [ 15.416059] kunit_try_run_case+0x170/0x3f0 [ 15.416443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.416643] kthread+0x328/0x630 [ 15.416931] ret_from_fork+0x10/0x20 [ 15.417041] [ 15.417060] Allocated by task 161: [ 15.417575] kasan_save_stack+0x3c/0x68 [ 15.417748] kasan_save_track+0x20/0x40 [ 15.417980] kasan_save_alloc_info+0x40/0x58 [ 15.418377] __kasan_krealloc+0x118/0x178 [ 15.418585] krealloc_noprof+0x128/0x360 [ 15.418865] krealloc_less_oob_helper+0x168/0xc50 [ 15.419085] krealloc_less_oob+0x20/0x38 [ 15.419128] kunit_try_run_case+0x170/0x3f0 [ 15.419166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.419208] kthread+0x328/0x630 [ 15.419241] ret_from_fork+0x10/0x20 [ 15.419457] [ 15.419731] The buggy address belongs to the object at fff00000c4600e00 [ 15.419731] which belongs to the cache kmalloc-256 of size 256 [ 15.419893] The buggy address is located 33 bytes to the right of [ 15.419893] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.420028] [ 15.420183] The buggy address belongs to the physical page: [ 15.420215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.420513] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.420701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.421101] page_type: f5(slab) [ 15.421213] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.421684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.421768] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.422078] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.422142] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.422189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.422227] page dumped because: kasan: bad access detected [ 15.422257] [ 15.422275] Memory state around the buggy address: [ 15.422315] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422358] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.422399] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.422440] ^ [ 15.422480] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422522] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422558] ================================================================== [ 15.490717] ================================================================== [ 15.490770] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.490981] Write of size 1 at addr fff00000c786e0eb by task kunit_try_catch/165 [ 15.491169] [ 15.491223] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.491353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.491624] Hardware name: linux,dummy-virt (DT) [ 15.491672] Call trace: [ 15.491716] show_stack+0x20/0x38 (C) [ 15.491928] dump_stack_lvl+0x8c/0xd0 [ 15.492272] print_report+0x118/0x608 [ 15.492360] kasan_report+0xdc/0x128 [ 15.492405] __asan_report_store1_noabort+0x20/0x30 [ 15.492456] krealloc_less_oob_helper+0xa58/0xc50 [ 15.492503] krealloc_large_less_oob+0x20/0x38 [ 15.492547] kunit_try_run_case+0x170/0x3f0 [ 15.492593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.492647] kthread+0x328/0x630 [ 15.492694] ret_from_fork+0x10/0x20 [ 15.492739] [ 15.492874] The buggy address belongs to the physical page: [ 15.492913] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.492976] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.493022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.493070] page_type: f8(unknown) [ 15.493107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.493154] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.493201] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.493256] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.493303] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.493349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.493387] page dumped because: kasan: bad access detected [ 15.493416] [ 15.493433] Memory state around the buggy address: [ 15.493462] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.493503] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.493542] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.493578] ^ [ 15.493615] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.493655] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.493690] ================================================================== [ 15.404631] ================================================================== [ 15.404686] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.404926] Write of size 1 at addr fff00000c4600eda by task kunit_try_catch/161 [ 15.404988] [ 15.405018] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.405219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.405493] Hardware name: linux,dummy-virt (DT) [ 15.405537] Call trace: [ 15.405797] show_stack+0x20/0x38 (C) [ 15.406004] dump_stack_lvl+0x8c/0xd0 [ 15.406134] print_report+0x118/0x608 [ 15.406197] kasan_report+0xdc/0x128 [ 15.406270] __asan_report_store1_noabort+0x20/0x30 [ 15.406613] krealloc_less_oob_helper+0xa80/0xc50 [ 15.406794] krealloc_less_oob+0x20/0x38 [ 15.407060] kunit_try_run_case+0x170/0x3f0 [ 15.407150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.407323] kthread+0x328/0x630 [ 15.407577] ret_from_fork+0x10/0x20 [ 15.407807] [ 15.407912] Allocated by task 161: [ 15.408126] kasan_save_stack+0x3c/0x68 [ 15.408312] kasan_save_track+0x20/0x40 [ 15.408379] kasan_save_alloc_info+0x40/0x58 [ 15.408772] __kasan_krealloc+0x118/0x178 [ 15.408854] krealloc_noprof+0x128/0x360 [ 15.409042] krealloc_less_oob_helper+0x168/0xc50 [ 15.409083] krealloc_less_oob+0x20/0x38 [ 15.409188] kunit_try_run_case+0x170/0x3f0 [ 15.409228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.409280] kthread+0x328/0x630 [ 15.409315] ret_from_fork+0x10/0x20 [ 15.409359] [ 15.409392] The buggy address belongs to the object at fff00000c4600e00 [ 15.409392] which belongs to the cache kmalloc-256 of size 256 [ 15.409449] The buggy address is located 17 bytes to the right of [ 15.409449] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.409510] [ 15.409529] The buggy address belongs to the physical page: [ 15.409561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.409632] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.409684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.409734] page_type: f5(slab) [ 15.409777] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.409834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.409881] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.409935] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.410002] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.410057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.410109] page dumped because: kasan: bad access detected [ 15.410423] [ 15.410465] Memory state around the buggy address: [ 15.410703] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410766] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.410807] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.411162] ^ [ 15.411282] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411553] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411911] ================================================================== [ 15.483500] ================================================================== [ 15.483552] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.483834] Write of size 1 at addr fff00000c786e0ea by task kunit_try_catch/165 [ 15.483909] [ 15.483940] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.484400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.484443] Hardware name: linux,dummy-virt (DT) [ 15.484672] Call trace: [ 15.484720] show_stack+0x20/0x38 (C) [ 15.484889] dump_stack_lvl+0x8c/0xd0 [ 15.484941] print_report+0x118/0x608 [ 15.485059] kasan_report+0xdc/0x128 [ 15.485104] __asan_report_store1_noabort+0x20/0x30 [ 15.485191] krealloc_less_oob_helper+0xae4/0xc50 [ 15.485329] krealloc_large_less_oob+0x20/0x38 [ 15.485394] kunit_try_run_case+0x170/0x3f0 [ 15.485650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.485722] kthread+0x328/0x630 [ 15.485804] ret_from_fork+0x10/0x20 [ 15.485919] [ 15.486162] The buggy address belongs to the physical page: [ 15.486233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.486319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.486413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.486593] page_type: f8(unknown) [ 15.487050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.487282] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.487506] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.487614] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.488032] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.488130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.488337] page dumped because: kasan: bad access detected [ 15.488384] [ 15.488412] Memory state around the buggy address: [ 15.488625] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.488757] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.488880] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.489377] ^ [ 15.489470] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.489569] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.489679] ================================================================== [ 15.384584] ================================================================== [ 15.384644] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.384905] Write of size 1 at addr fff00000c4600ec9 by task kunit_try_catch/161 [ 15.385203] [ 15.385258] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.385423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.385500] Hardware name: linux,dummy-virt (DT) [ 15.385532] Call trace: [ 15.385553] show_stack+0x20/0x38 (C) [ 15.385782] dump_stack_lvl+0x8c/0xd0 [ 15.386101] print_report+0x118/0x608 [ 15.386192] kasan_report+0xdc/0x128 [ 15.386402] __asan_report_store1_noabort+0x20/0x30 [ 15.386645] krealloc_less_oob_helper+0xa48/0xc50 [ 15.386895] krealloc_less_oob+0x20/0x38 [ 15.387124] kunit_try_run_case+0x170/0x3f0 [ 15.387255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.387310] kthread+0x328/0x630 [ 15.387355] ret_from_fork+0x10/0x20 [ 15.387403] [ 15.387421] Allocated by task 161: [ 15.387450] kasan_save_stack+0x3c/0x68 [ 15.387505] kasan_save_track+0x20/0x40 [ 15.387549] kasan_save_alloc_info+0x40/0x58 [ 15.387592] __kasan_krealloc+0x118/0x178 [ 15.387643] krealloc_noprof+0x128/0x360 [ 15.387680] krealloc_less_oob_helper+0x168/0xc50 [ 15.387716] krealloc_less_oob+0x20/0x38 [ 15.387749] kunit_try_run_case+0x170/0x3f0 [ 15.387797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.387840] kthread+0x328/0x630 [ 15.387874] ret_from_fork+0x10/0x20 [ 15.387918] [ 15.387937] The buggy address belongs to the object at fff00000c4600e00 [ 15.387937] which belongs to the cache kmalloc-256 of size 256 [ 15.388002] The buggy address is located 0 bytes to the right of [ 15.388002] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.388072] [ 15.388092] The buggy address belongs to the physical page: [ 15.388124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.388185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.388242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.388295] page_type: f5(slab) [ 15.388332] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.388391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.388454] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.388506] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.388563] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.388609] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.388666] page dumped because: kasan: bad access detected [ 15.388708] [ 15.388726] Memory state around the buggy address: [ 15.388766] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.388814] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.388854] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.388890] ^ [ 15.388934] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389239] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389289] ==================================================================
[ 11.013102] ================================================================== [ 11.013700] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.014082] Write of size 1 at addr ffff8881039120c9 by task kunit_try_catch/181 [ 11.014446] [ 11.014645] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 11.014689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.014713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.014734] Call Trace: [ 11.014746] <TASK> [ 11.014760] dump_stack_lvl+0x73/0xb0 [ 11.014784] print_report+0xd1/0x650 [ 11.014806] ? __virt_addr_valid+0x1db/0x2d0 [ 11.014826] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.014846] ? kasan_addr_to_slab+0x11/0xa0 [ 11.014866] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.014896] kasan_report+0x141/0x180 [ 11.014919] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.014944] __asan_report_store1_noabort+0x1b/0x30 [ 11.014976] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.014999] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.015019] ? finish_task_switch.isra.0+0x153/0x700 [ 11.015042] ? __switch_to+0x5d9/0xf60 [ 11.015062] ? dequeue_task_fair+0x166/0x4e0 [ 11.015084] ? __schedule+0x10cc/0x2b60 [ 11.015106] ? __pfx_read_tsc+0x10/0x10 [ 11.015129] krealloc_large_less_oob+0x1c/0x30 [ 11.015148] kunit_try_run_case+0x1a5/0x480 [ 11.015179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.015201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.015224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.015262] ? __kthread_parkme+0x82/0x180 [ 11.015297] ? preempt_count_sub+0x50/0x80 [ 11.015321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.015345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.015367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.015435] kthread+0x337/0x6f0 [ 11.015465] ? trace_preempt_on+0x20/0xc0 [ 11.015489] ? __pfx_kthread+0x10/0x10 [ 11.015506] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.015528] ? calculate_sigpending+0x7b/0xa0 [ 11.015549] ? __pfx_kthread+0x10/0x10 [ 11.015567] ret_from_fork+0x41/0x80 [ 11.015587] ? __pfx_kthread+0x10/0x10 [ 11.015605] ret_from_fork_asm+0x1a/0x30 [ 11.015635] </TASK> [ 11.015645] [ 11.024700] The buggy address belongs to the physical page: [ 11.024977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103910 [ 11.025307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.025863] flags: 0x200000000000040(head|node=0|zone=2) [ 11.026105] page_type: f8(unknown) [ 11.026432] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.026795] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.027126] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.027554] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.027964] head: 0200000000000002 ffffea00040e4401 00000000ffffffff 00000000ffffffff [ 11.028321] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.028926] page dumped because: kasan: bad access detected [ 11.029105] [ 11.029176] Memory state around the buggy address: [ 11.029510] ffff888103911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.029957] ffff888103912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.030174] >ffff888103912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.030618] ^ [ 11.031016] ffff888103912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.031334] ffff888103912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.031686] ================================================================== [ 10.861020] ================================================================== [ 10.861691] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 10.862181] Write of size 1 at addr ffff888100a2bac9 by task kunit_try_catch/177 [ 10.862642] [ 10.862786] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.862832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.862844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.862877] Call Trace: [ 10.862889] <TASK> [ 10.862905] dump_stack_lvl+0x73/0xb0 [ 10.862932] print_report+0xd1/0x650 [ 10.862955] ? __virt_addr_valid+0x1db/0x2d0 [ 10.862987] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.863007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.863030] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.863061] kasan_report+0x141/0x180 [ 10.863083] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.863109] __asan_report_store1_noabort+0x1b/0x30 [ 10.863130] krealloc_less_oob_helper+0xd70/0x11d0 [ 10.863152] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.863172] ? __schedule+0x207f/0x2b60 [ 10.863194] ? schedule+0x7c/0x2e0 [ 10.863214] ? trace_hardirqs_on+0x37/0xe0 [ 10.863248] ? __schedule+0x207f/0x2b60 [ 10.863270] ? __pfx_read_tsc+0x10/0x10 [ 10.863332] krealloc_less_oob+0x1c/0x30 [ 10.863352] kunit_try_run_case+0x1a5/0x480 [ 10.863377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.863399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.863422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.863445] ? __kthread_parkme+0x82/0x180 [ 10.863467] ? preempt_count_sub+0x50/0x80 [ 10.863493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.863516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.863538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.863561] kthread+0x337/0x6f0 [ 10.863578] ? trace_preempt_on+0x20/0xc0 [ 10.863600] ? __pfx_kthread+0x10/0x10 [ 10.863617] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.863639] ? calculate_sigpending+0x7b/0xa0 [ 10.863660] ? __pfx_kthread+0x10/0x10 [ 10.863678] ret_from_fork+0x41/0x80 [ 10.863699] ? __pfx_kthread+0x10/0x10 [ 10.863716] ret_from_fork_asm+0x1a/0x30 [ 10.863747] </TASK> [ 10.863757] [ 10.872583] Allocated by task 177: [ 10.872882] kasan_save_stack+0x45/0x70 [ 10.873169] kasan_save_track+0x18/0x40 [ 10.873334] kasan_save_alloc_info+0x3b/0x50 [ 10.873619] __kasan_krealloc+0x190/0x1f0 [ 10.873854] krealloc_noprof+0xf3/0x340 [ 10.874082] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.874306] krealloc_less_oob+0x1c/0x30 [ 10.874509] kunit_try_run_case+0x1a5/0x480 [ 10.874769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.875008] kthread+0x337/0x6f0 [ 10.875179] ret_from_fork+0x41/0x80 [ 10.875401] ret_from_fork_asm+0x1a/0x30 [ 10.875624] [ 10.875750] The buggy address belongs to the object at ffff888100a2ba00 [ 10.875750] which belongs to the cache kmalloc-256 of size 256 [ 10.876278] The buggy address is located 0 bytes to the right of [ 10.876278] allocated 201-byte region [ffff888100a2ba00, ffff888100a2bac9) [ 10.877105] [ 10.877216] The buggy address belongs to the physical page: [ 10.877563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a [ 10.878049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.878305] flags: 0x200000000000040(head|node=0|zone=2) [ 10.878532] page_type: f5(slab) [ 10.878742] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.879113] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.879388] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.879618] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.880210] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff [ 10.880564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.880956] page dumped because: kasan: bad access detected [ 10.881233] [ 10.881435] Memory state around the buggy address: [ 10.881642] ffff888100a2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.881950] ffff888100a2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.882274] >ffff888100a2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.882596] ^ [ 10.882984] ffff888100a2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.883247] ffff888100a2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.883686] ================================================================== [ 10.928619] ================================================================== [ 10.928912] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 10.929136] Write of size 1 at addr ffff888100a2baea by task kunit_try_catch/177 [ 10.929815] [ 10.929949] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.929992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.930004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.930024] Call Trace: [ 10.930039] <TASK> [ 10.930053] dump_stack_lvl+0x73/0xb0 [ 10.930076] print_report+0xd1/0x650 [ 10.930098] ? __virt_addr_valid+0x1db/0x2d0 [ 10.930118] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.930138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.930160] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.930180] kasan_report+0x141/0x180 [ 10.930203] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.930230] __asan_report_store1_noabort+0x1b/0x30 [ 10.930273] krealloc_less_oob_helper+0xe90/0x11d0 [ 10.930295] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.930316] ? __schedule+0x207f/0x2b60 [ 10.930336] ? schedule+0x7c/0x2e0 [ 10.930367] ? trace_hardirqs_on+0x37/0xe0 [ 10.930389] ? __schedule+0x207f/0x2b60 [ 10.930411] ? __pfx_read_tsc+0x10/0x10 [ 10.930434] krealloc_less_oob+0x1c/0x30 [ 10.930460] kunit_try_run_case+0x1a5/0x480 [ 10.930484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.930505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.930539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.930562] ? __kthread_parkme+0x82/0x180 [ 10.930583] ? preempt_count_sub+0x50/0x80 [ 10.930606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.930638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.930660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.930683] kthread+0x337/0x6f0 [ 10.930710] ? trace_preempt_on+0x20/0xc0 [ 10.930732] ? __pfx_kthread+0x10/0x10 [ 10.930750] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.930771] ? calculate_sigpending+0x7b/0xa0 [ 10.930792] ? __pfx_kthread+0x10/0x10 [ 10.930810] ret_from_fork+0x41/0x80 [ 10.930830] ? __pfx_kthread+0x10/0x10 [ 10.930848] ret_from_fork_asm+0x1a/0x30 [ 10.930878] </TASK> [ 10.930888] [ 10.938366] Allocated by task 177: [ 10.938551] kasan_save_stack+0x45/0x70 [ 10.938774] kasan_save_track+0x18/0x40 [ 10.939054] kasan_save_alloc_info+0x3b/0x50 [ 10.939297] __kasan_krealloc+0x190/0x1f0 [ 10.939540] krealloc_noprof+0xf3/0x340 [ 10.939831] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.940041] krealloc_less_oob+0x1c/0x30 [ 10.940183] kunit_try_run_case+0x1a5/0x480 [ 10.940413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.940697] kthread+0x337/0x6f0 [ 10.940867] ret_from_fork+0x41/0x80 [ 10.941056] ret_from_fork_asm+0x1a/0x30 [ 10.941267] [ 10.941349] The buggy address belongs to the object at ffff888100a2ba00 [ 10.941349] which belongs to the cache kmalloc-256 of size 256 [ 10.941830] The buggy address is located 33 bytes to the right of [ 10.941830] allocated 201-byte region [ffff888100a2ba00, ffff888100a2bac9) [ 10.942427] [ 10.942526] The buggy address belongs to the physical page: [ 10.942808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a [ 10.943157] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.943506] flags: 0x200000000000040(head|node=0|zone=2) [ 10.943837] page_type: f5(slab) [ 10.943973] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.944206] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.944588] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.944953] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.945187] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff [ 10.945583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.946014] page dumped because: kasan: bad access detected [ 10.946289] [ 10.946413] Memory state around the buggy address: [ 10.946570] ffff888100a2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.947041] ffff888100a2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.947365] >ffff888100a2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.947650] ^ [ 10.947984] ffff888100a2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.948300] ffff888100a2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.948602] ================================================================== [ 10.907684] ================================================================== [ 10.907968] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 10.908600] Write of size 1 at addr ffff888100a2bada by task kunit_try_catch/177 [ 10.909022] [ 10.909162] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.909205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.909216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.909247] Call Trace: [ 10.909258] <TASK> [ 10.909271] dump_stack_lvl+0x73/0xb0 [ 10.909306] print_report+0xd1/0x650 [ 10.909327] ? __virt_addr_valid+0x1db/0x2d0 [ 10.909348] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.909379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.909401] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.909421] kasan_report+0x141/0x180 [ 10.909444] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.909477] __asan_report_store1_noabort+0x1b/0x30 [ 10.909498] krealloc_less_oob_helper+0xec6/0x11d0 [ 10.909521] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.909552] ? __schedule+0x207f/0x2b60 [ 10.909577] ? schedule+0x7c/0x2e0 [ 10.909597] ? trace_hardirqs_on+0x37/0xe0 [ 10.909620] ? __schedule+0x207f/0x2b60 [ 10.909650] ? __pfx_read_tsc+0x10/0x10 [ 10.909674] krealloc_less_oob+0x1c/0x30 [ 10.909692] kunit_try_run_case+0x1a5/0x480 [ 10.909735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.909757] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.909780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.909804] ? __kthread_parkme+0x82/0x180 [ 10.909825] ? preempt_count_sub+0x50/0x80 [ 10.909849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.909872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.909894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.909917] kthread+0x337/0x6f0 [ 10.909934] ? trace_preempt_on+0x20/0xc0 [ 10.909955] ? __pfx_kthread+0x10/0x10 [ 10.909973] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.909994] ? calculate_sigpending+0x7b/0xa0 [ 10.910015] ? __pfx_kthread+0x10/0x10 [ 10.910033] ret_from_fork+0x41/0x80 [ 10.910053] ? __pfx_kthread+0x10/0x10 [ 10.910079] ret_from_fork_asm+0x1a/0x30 [ 10.910109] </TASK> [ 10.910119] [ 10.918199] Allocated by task 177: [ 10.918375] kasan_save_stack+0x45/0x70 [ 10.918567] kasan_save_track+0x18/0x40 [ 10.918784] kasan_save_alloc_info+0x3b/0x50 [ 10.918932] __kasan_krealloc+0x190/0x1f0 [ 10.919077] krealloc_noprof+0xf3/0x340 [ 10.919230] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.919491] krealloc_less_oob+0x1c/0x30 [ 10.919684] kunit_try_run_case+0x1a5/0x480 [ 10.919891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.920147] kthread+0x337/0x6f0 [ 10.920340] ret_from_fork+0x41/0x80 [ 10.920471] ret_from_fork_asm+0x1a/0x30 [ 10.920671] [ 10.920768] The buggy address belongs to the object at ffff888100a2ba00 [ 10.920768] which belongs to the cache kmalloc-256 of size 256 [ 10.921301] The buggy address is located 17 bytes to the right of [ 10.921301] allocated 201-byte region [ffff888100a2ba00, ffff888100a2bac9) [ 10.921875] [ 10.921946] The buggy address belongs to the physical page: [ 10.922118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a [ 10.922369] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.922699] flags: 0x200000000000040(head|node=0|zone=2) [ 10.922951] page_type: f5(slab) [ 10.923125] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.923673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.923951] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.924182] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.924521] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff [ 10.924909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.925352] page dumped because: kasan: bad access detected [ 10.925625] [ 10.925784] Memory state around the buggy address: [ 10.926030] ffff888100a2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.926269] ffff888100a2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.926484] >ffff888100a2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.926845] ^ [ 10.927121] ffff888100a2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.927481] ffff888100a2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.928008] ================================================================== [ 10.949090] ================================================================== [ 10.949514] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 10.949987] Write of size 1 at addr ffff888100a2baeb by task kunit_try_catch/177 [ 10.950421] [ 10.950522] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.950564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.950575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.950594] Call Trace: [ 10.950609] <TASK> [ 10.950624] dump_stack_lvl+0x73/0xb0 [ 10.950647] print_report+0xd1/0x650 [ 10.950669] ? __virt_addr_valid+0x1db/0x2d0 [ 10.950690] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.950710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.950732] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.950753] kasan_report+0x141/0x180 [ 10.950776] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.950801] __asan_report_store1_noabort+0x1b/0x30 [ 10.950822] krealloc_less_oob_helper+0xd47/0x11d0 [ 10.950858] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.950879] ? __schedule+0x207f/0x2b60 [ 10.950900] ? schedule+0x7c/0x2e0 [ 10.950932] ? trace_hardirqs_on+0x37/0xe0 [ 10.950955] ? __schedule+0x207f/0x2b60 [ 10.950977] ? __pfx_read_tsc+0x10/0x10 [ 10.951000] krealloc_less_oob+0x1c/0x30 [ 10.951018] kunit_try_run_case+0x1a5/0x480 [ 10.951041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.951063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.951087] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.951111] ? __kthread_parkme+0x82/0x180 [ 10.951131] ? preempt_count_sub+0x50/0x80 [ 10.951156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.951181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.951205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.951230] kthread+0x337/0x6f0 [ 10.951257] ? trace_preempt_on+0x20/0xc0 [ 10.951279] ? __pfx_kthread+0x10/0x10 [ 10.951297] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.951319] ? calculate_sigpending+0x7b/0xa0 [ 10.951340] ? __pfx_kthread+0x10/0x10 [ 10.951359] ret_from_fork+0x41/0x80 [ 10.951379] ? __pfx_kthread+0x10/0x10 [ 10.951397] ret_from_fork_asm+0x1a/0x30 [ 10.951426] </TASK> [ 10.951436] [ 10.958953] Allocated by task 177: [ 10.959200] kasan_save_stack+0x45/0x70 [ 10.959422] kasan_save_track+0x18/0x40 [ 10.959618] kasan_save_alloc_info+0x3b/0x50 [ 10.959926] __kasan_krealloc+0x190/0x1f0 [ 10.960067] krealloc_noprof+0xf3/0x340 [ 10.960216] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.960474] krealloc_less_oob+0x1c/0x30 [ 10.960687] kunit_try_run_case+0x1a5/0x480 [ 10.960922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.961178] kthread+0x337/0x6f0 [ 10.961335] ret_from_fork+0x41/0x80 [ 10.961536] ret_from_fork_asm+0x1a/0x30 [ 10.961755] [ 10.961826] The buggy address belongs to the object at ffff888100a2ba00 [ 10.961826] which belongs to the cache kmalloc-256 of size 256 [ 10.962281] The buggy address is located 34 bytes to the right of [ 10.962281] allocated 201-byte region [ffff888100a2ba00, ffff888100a2bac9) [ 10.962791] [ 10.962865] The buggy address belongs to the physical page: [ 10.963102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a [ 10.963473] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.963930] flags: 0x200000000000040(head|node=0|zone=2) [ 10.964195] page_type: f5(slab) [ 10.964331] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.964686] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.965006] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.965343] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.965681] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff [ 10.965984] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.966211] page dumped because: kasan: bad access detected [ 10.966393] [ 10.966462] Memory state around the buggy address: [ 10.966618] ffff888100a2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.966918] ffff888100a2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.967244] >ffff888100a2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.967558] ^ [ 10.967857] ffff888100a2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.968116] ffff888100a2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.968337] ================================================================== [ 10.884746] ================================================================== [ 10.885100] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 10.885867] Write of size 1 at addr ffff888100a2bad0 by task kunit_try_catch/177 [ 10.886293] [ 10.886594] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.886645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.886657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.886676] Call Trace: [ 10.886700] <TASK> [ 10.886715] dump_stack_lvl+0x73/0xb0 [ 10.886741] print_report+0xd1/0x650 [ 10.886775] ? __virt_addr_valid+0x1db/0x2d0 [ 10.886796] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.886816] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.886838] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.886859] kasan_report+0x141/0x180 [ 10.886881] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.886906] __asan_report_store1_noabort+0x1b/0x30 [ 10.886927] krealloc_less_oob_helper+0xe23/0x11d0 [ 10.886950] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.886970] ? __schedule+0x207f/0x2b60 [ 10.887000] ? schedule+0x7c/0x2e0 [ 10.887020] ? trace_hardirqs_on+0x37/0xe0 [ 10.887043] ? __schedule+0x207f/0x2b60 [ 10.887075] ? __pfx_read_tsc+0x10/0x10 [ 10.887098] krealloc_less_oob+0x1c/0x30 [ 10.887116] kunit_try_run_case+0x1a5/0x480 [ 10.887140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.887171] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.887194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.887218] ? __kthread_parkme+0x82/0x180 [ 10.887262] ? preempt_count_sub+0x50/0x80 [ 10.887287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.887310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.887333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.887356] kthread+0x337/0x6f0 [ 10.887372] ? trace_preempt_on+0x20/0xc0 [ 10.887394] ? __pfx_kthread+0x10/0x10 [ 10.887412] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.887433] ? calculate_sigpending+0x7b/0xa0 [ 10.887455] ? __pfx_kthread+0x10/0x10 [ 10.887473] ret_from_fork+0x41/0x80 [ 10.887494] ? __pfx_kthread+0x10/0x10 [ 10.887512] ret_from_fork_asm+0x1a/0x30 [ 10.887541] </TASK> [ 10.887551] [ 10.895946] Allocated by task 177: [ 10.896101] kasan_save_stack+0x45/0x70 [ 10.896266] kasan_save_track+0x18/0x40 [ 10.896517] kasan_save_alloc_info+0x3b/0x50 [ 10.896819] __kasan_krealloc+0x190/0x1f0 [ 10.896990] krealloc_noprof+0xf3/0x340 [ 10.897183] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.897613] krealloc_less_oob+0x1c/0x30 [ 10.897905] kunit_try_run_case+0x1a5/0x480 [ 10.898091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.898399] kthread+0x337/0x6f0 [ 10.898557] ret_from_fork+0x41/0x80 [ 10.898689] ret_from_fork_asm+0x1a/0x30 [ 10.898827] [ 10.898898] The buggy address belongs to the object at ffff888100a2ba00 [ 10.898898] which belongs to the cache kmalloc-256 of size 256 [ 10.899384] The buggy address is located 7 bytes to the right of [ 10.899384] allocated 201-byte region [ffff888100a2ba00, ffff888100a2bac9) [ 10.900011] [ 10.900108] The buggy address belongs to the physical page: [ 10.900413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a [ 10.900670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.901008] flags: 0x200000000000040(head|node=0|zone=2) [ 10.901376] page_type: f5(slab) [ 10.901617] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.901909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.902140] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.902585] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.903097] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff [ 10.903337] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.903561] page dumped because: kasan: bad access detected [ 10.903920] [ 10.904021] Memory state around the buggy address: [ 10.904287] ffff888100a2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.904638] ffff888100a2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.905166] >ffff888100a2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.905779] ^ [ 10.906044] ffff888100a2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.906420] ffff888100a2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.906810] ================================================================== [ 11.032106] ================================================================== [ 11.032804] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.033185] Write of size 1 at addr ffff8881039120d0 by task kunit_try_catch/181 [ 11.033530] [ 11.033636] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 11.033676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.033688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.033706] Call Trace: [ 11.033717] <TASK> [ 11.033731] dump_stack_lvl+0x73/0xb0 [ 11.033755] print_report+0xd1/0x650 [ 11.033777] ? __virt_addr_valid+0x1db/0x2d0 [ 11.033797] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.033817] ? kasan_addr_to_slab+0x11/0xa0 [ 11.033838] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.033859] kasan_report+0x141/0x180 [ 11.033881] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.033907] __asan_report_store1_noabort+0x1b/0x30 [ 11.033928] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.033950] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.033971] ? finish_task_switch.isra.0+0x153/0x700 [ 11.033994] ? __switch_to+0x5d9/0xf60 [ 11.034014] ? dequeue_task_fair+0x166/0x4e0 [ 11.034037] ? __schedule+0x10cc/0x2b60 [ 11.034060] ? __pfx_read_tsc+0x10/0x10 [ 11.034082] krealloc_large_less_oob+0x1c/0x30 [ 11.034101] kunit_try_run_case+0x1a5/0x480 [ 11.034124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.034146] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.034170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.034193] ? __kthread_parkme+0x82/0x180 [ 11.034213] ? preempt_count_sub+0x50/0x80 [ 11.034257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.034281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.034304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.034339] kthread+0x337/0x6f0 [ 11.034356] ? trace_preempt_on+0x20/0xc0 [ 11.034388] ? __pfx_kthread+0x10/0x10 [ 11.034405] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.034427] ? calculate_sigpending+0x7b/0xa0 [ 11.034458] ? __pfx_kthread+0x10/0x10 [ 11.034476] ret_from_fork+0x41/0x80 [ 11.034496] ? __pfx_kthread+0x10/0x10 [ 11.034514] ret_from_fork_asm+0x1a/0x30 [ 11.034544] </TASK> [ 11.034553] [ 11.042517] The buggy address belongs to the physical page: [ 11.042796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103910 [ 11.043147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.043488] flags: 0x200000000000040(head|node=0|zone=2) [ 11.043769] page_type: f8(unknown) [ 11.043949] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.044243] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.044475] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.044711] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.045041] head: 0200000000000002 ffffea00040e4401 00000000ffffffff 00000000ffffffff [ 11.045392] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.045979] page dumped because: kasan: bad access detected [ 11.046266] [ 11.046360] Memory state around the buggy address: [ 11.046573] ffff888103911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.046927] ffff888103912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.047230] >ffff888103912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.047456] ^ [ 11.047636] ffff888103912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.047920] ffff888103912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.048277] ================================================================== [ 11.048951] ================================================================== [ 11.049821] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.050303] Write of size 1 at addr ffff8881039120da by task kunit_try_catch/181 [ 11.050625] [ 11.050845] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 11.050889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.050900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.050920] Call Trace: [ 11.050935] <TASK> [ 11.050949] dump_stack_lvl+0x73/0xb0 [ 11.050972] print_report+0xd1/0x650 [ 11.051007] ? __virt_addr_valid+0x1db/0x2d0 [ 11.051028] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.051048] ? kasan_addr_to_slab+0x11/0xa0 [ 11.051081] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.051101] kasan_report+0x141/0x180 [ 11.051124] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.051149] __asan_report_store1_noabort+0x1b/0x30 [ 11.051170] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.051193] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.051213] ? finish_task_switch.isra.0+0x153/0x700 [ 11.051245] ? __switch_to+0x5d9/0xf60 [ 11.051265] ? dequeue_task_fair+0x166/0x4e0 [ 11.051289] ? __schedule+0x10cc/0x2b60 [ 11.051311] ? __pfx_read_tsc+0x10/0x10 [ 11.051333] krealloc_large_less_oob+0x1c/0x30 [ 11.051352] kunit_try_run_case+0x1a5/0x480 [ 11.051375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.051397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.051420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.051443] ? __kthread_parkme+0x82/0x180 [ 11.051464] ? preempt_count_sub+0x50/0x80 [ 11.051488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.051511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.051534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.051557] kthread+0x337/0x6f0 [ 11.051573] ? trace_preempt_on+0x20/0xc0 [ 11.051606] ? __pfx_kthread+0x10/0x10 [ 11.051624] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.051645] ? calculate_sigpending+0x7b/0xa0 [ 11.051677] ? __pfx_kthread+0x10/0x10 [ 11.051695] ret_from_fork+0x41/0x80 [ 11.051715] ? __pfx_kthread+0x10/0x10 [ 11.051733] ret_from_fork_asm+0x1a/0x30 [ 11.051763] </TASK> [ 11.051773] [ 11.059428] The buggy address belongs to the physical page: [ 11.059695] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103910 [ 11.059955] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.060315] flags: 0x200000000000040(head|node=0|zone=2) [ 11.060568] page_type: f8(unknown) [ 11.060738] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.060968] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.061198] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.061580] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.063866] head: 0200000000000002 ffffea00040e4401 00000000ffffffff 00000000ffffffff [ 11.064120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.064361] page dumped because: kasan: bad access detected [ 11.064532] [ 11.064603] Memory state around the buggy address: [ 11.064769] ffff888103911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.064987] ffff888103912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.065204] >ffff888103912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.066930] ^ [ 11.068026] ffff888103912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.069181] ffff888103912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.070342] ================================================================== [ 11.071264] ================================================================== [ 11.071786] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.072136] Write of size 1 at addr ffff8881039120ea by task kunit_try_catch/181 [ 11.072672] [ 11.072828] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 11.072872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.072902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.072936] Call Trace: [ 11.072948] <TASK> [ 11.072962] dump_stack_lvl+0x73/0xb0 [ 11.072987] print_report+0xd1/0x650 [ 11.073008] ? __virt_addr_valid+0x1db/0x2d0 [ 11.073030] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.073050] ? kasan_addr_to_slab+0x11/0xa0 [ 11.073070] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.073090] kasan_report+0x141/0x180 [ 11.073112] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.073137] __asan_report_store1_noabort+0x1b/0x30 [ 11.073157] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.073179] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.073199] ? finish_task_switch.isra.0+0x153/0x700 [ 11.073222] ? __switch_to+0x5d9/0xf60 [ 11.073253] ? dequeue_task_fair+0x166/0x4e0 [ 11.073276] ? __schedule+0x10cc/0x2b60 [ 11.073298] ? __pfx_read_tsc+0x10/0x10 [ 11.073321] krealloc_large_less_oob+0x1c/0x30 [ 11.073339] kunit_try_run_case+0x1a5/0x480 [ 11.073363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.073385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.073407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.073430] ? __kthread_parkme+0x82/0x180 [ 11.073451] ? preempt_count_sub+0x50/0x80 [ 11.073475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.073497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.073520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.073542] kthread+0x337/0x6f0 [ 11.073563] ? trace_preempt_on+0x20/0xc0 [ 11.073585] ? __pfx_kthread+0x10/0x10 [ 11.073603] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.073623] ? calculate_sigpending+0x7b/0xa0 [ 11.073644] ? __pfx_kthread+0x10/0x10 [ 11.073673] ret_from_fork+0x41/0x80 [ 11.073694] ? __pfx_kthread+0x10/0x10 [ 11.073711] ret_from_fork_asm+0x1a/0x30 [ 11.073740] </TASK> [ 11.073750] [ 11.082133] The buggy address belongs to the physical page: [ 11.082514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103910 [ 11.083680] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.083922] flags: 0x200000000000040(head|node=0|zone=2) [ 11.084104] page_type: f8(unknown) [ 11.084234] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.084592] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.084939] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.085361] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.085776] head: 0200000000000002 ffffea00040e4401 00000000ffffffff 00000000ffffffff [ 11.086422] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.086854] page dumped because: kasan: bad access detected [ 11.087033] [ 11.087106] Memory state around the buggy address: [ 11.087298] ffff888103911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.088024] ffff888103912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.088696] >ffff888103912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.089342] ^ [ 11.089947] ffff888103912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.090585] ffff888103912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.091013] ================================================================== [ 11.092009] ================================================================== [ 11.092904] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.093799] Write of size 1 at addr ffff8881039120eb by task kunit_try_catch/181 [ 11.094145] [ 11.094250] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 11.094295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.094307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.094329] Call Trace: [ 11.094347] <TASK> [ 11.094366] dump_stack_lvl+0x73/0xb0 [ 11.094392] print_report+0xd1/0x650 [ 11.094415] ? __virt_addr_valid+0x1db/0x2d0 [ 11.094435] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.094455] ? kasan_addr_to_slab+0x11/0xa0 [ 11.094476] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.094496] kasan_report+0x141/0x180 [ 11.094518] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.094545] __asan_report_store1_noabort+0x1b/0x30 [ 11.094566] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.094588] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.094609] ? finish_task_switch.isra.0+0x153/0x700 [ 11.094632] ? __switch_to+0x5d9/0xf60 [ 11.094682] ? dequeue_task_fair+0x166/0x4e0 [ 11.094706] ? __schedule+0x10cc/0x2b60 [ 11.094728] ? __pfx_read_tsc+0x10/0x10 [ 11.094751] krealloc_large_less_oob+0x1c/0x30 [ 11.094780] kunit_try_run_case+0x1a5/0x480 [ 11.094805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.094827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.094862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.094885] ? __kthread_parkme+0x82/0x180 [ 11.094907] ? preempt_count_sub+0x50/0x80 [ 11.094939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.094963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.094985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.095018] kthread+0x337/0x6f0 [ 11.095034] ? trace_preempt_on+0x20/0xc0 [ 11.095057] ? __pfx_kthread+0x10/0x10 [ 11.095075] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.095096] ? calculate_sigpending+0x7b/0xa0 [ 11.095117] ? __pfx_kthread+0x10/0x10 [ 11.095135] ret_from_fork+0x41/0x80 [ 11.095155] ? __pfx_kthread+0x10/0x10 [ 11.095173] ret_from_fork_asm+0x1a/0x30 [ 11.095203] </TASK> [ 11.095212] [ 11.108377] The buggy address belongs to the physical page: [ 11.108584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103910 [ 11.109315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.109844] flags: 0x200000000000040(head|node=0|zone=2) [ 11.110023] page_type: f8(unknown) [ 11.110151] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.110729] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.111410] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.112083] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.112754] head: 0200000000000002 ffffea00040e4401 00000000ffffffff 00000000ffffffff [ 11.112985] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.113212] page dumped because: kasan: bad access detected [ 11.113747] [ 11.113905] Memory state around the buggy address: [ 11.114358] ffff888103911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.114990] ffff888103912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.115606] >ffff888103912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.116066] ^ [ 11.116279] ffff888103912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.116495] ffff888103912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.116859] ==================================================================