Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 20.896757] ================================================================== [ 20.903745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 20.911291] Write of size 1 at addr ffff000803bc64d0 by task kunit_try_catch/207 [ 20.918668] [ 20.920154] CPU: 2 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 20.920206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.920222] Hardware name: WinLink E850-96 board (DT) [ 20.920241] Call trace: [ 20.920253] show_stack+0x20/0x38 (C) [ 20.920287] dump_stack_lvl+0x8c/0xd0 [ 20.920324] print_report+0x118/0x608 [ 20.920355] kasan_report+0xdc/0x128 [ 20.920385] __asan_report_store1_noabort+0x20/0x30 [ 20.920422] krealloc_less_oob_helper+0xb9c/0xc50 [ 20.920449] krealloc_less_oob+0x20/0x38 [ 20.920473] kunit_try_run_case+0x170/0x3f0 [ 20.920508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.920544] kthread+0x328/0x630 [ 20.920578] ret_from_fork+0x10/0x20 [ 20.920611] [ 20.987504] Allocated by task 207: [ 20.990892] kasan_save_stack+0x3c/0x68 [ 20.994709] kasan_save_track+0x20/0x40 [ 20.998529] kasan_save_alloc_info+0x40/0x58 [ 21.002782] __kasan_krealloc+0x118/0x178 [ 21.006775] krealloc_noprof+0x128/0x360 [ 21.010681] krealloc_less_oob_helper+0x168/0xc50 [ 21.015369] krealloc_less_oob+0x20/0x38 [ 21.019274] kunit_try_run_case+0x170/0x3f0 [ 21.023441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.028910] kthread+0x328/0x630 [ 21.032121] ret_from_fork+0x10/0x20 [ 21.035680] [ 21.037159] The buggy address belongs to the object at ffff000803bc6400 [ 21.037159] which belongs to the cache kmalloc-256 of size 256 [ 21.049656] The buggy address is located 7 bytes to the right of [ 21.049656] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.062590] [ 21.064067] The buggy address belongs to the physical page: [ 21.069624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.077609] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.085248] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.092190] page_type: f5(slab) [ 21.095328] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.103048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.110774] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.118585] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.126398] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 21.134210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.142017] page dumped because: kasan: bad access detected [ 21.147571] [ 21.149046] Memory state around the buggy address: [ 21.153829] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.161030] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.168236] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.175436] ^ [ 21.181255] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188460] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195662] ================================================================== [ 23.286767] ================================================================== [ 23.293896] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.301445] Write of size 1 at addr ffff000805d560ea by task kunit_try_catch/211 [ 23.308824] [ 23.310306] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 23.310351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.310366] Hardware name: WinLink E850-96 board (DT) [ 23.310381] Call trace: [ 23.310390] show_stack+0x20/0x38 (C) [ 23.310421] dump_stack_lvl+0x8c/0xd0 [ 23.310455] print_report+0x118/0x608 [ 23.310484] kasan_report+0xdc/0x128 [ 23.310514] __asan_report_store1_noabort+0x20/0x30 [ 23.310547] krealloc_less_oob_helper+0xae4/0xc50 [ 23.310574] krealloc_large_less_oob+0x20/0x38 [ 23.310601] kunit_try_run_case+0x170/0x3f0 [ 23.310636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.310673] kthread+0x328/0x630 [ 23.310706] ret_from_fork+0x10/0x20 [ 23.310738] [ 23.378182] The buggy address belongs to the physical page: [ 23.383737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 23.391723] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.399360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.406305] page_type: f8(unknown) [ 23.409701] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.417422] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.425149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.432960] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.440773] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 23.448585] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.456391] page dumped because: kasan: bad access detected [ 23.461946] [ 23.463422] Memory state around the buggy address: [ 23.468201] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.475405] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.482609] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.489810] ^ [ 23.496411] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.503616] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.510819] ================================================================== [ 20.588215] ================================================================== [ 20.597673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 20.605220] Write of size 1 at addr ffff000803bc64c9 by task kunit_try_catch/207 [ 20.612600] [ 20.614084] CPU: 2 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 20.614140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.614158] Hardware name: WinLink E850-96 board (DT) [ 20.614178] Call trace: [ 20.614192] show_stack+0x20/0x38 (C) [ 20.614224] dump_stack_lvl+0x8c/0xd0 [ 20.614260] print_report+0x118/0x608 [ 20.614290] kasan_report+0xdc/0x128 [ 20.614320] __asan_report_store1_noabort+0x20/0x30 [ 20.614356] krealloc_less_oob_helper+0xa48/0xc50 [ 20.614387] krealloc_less_oob+0x20/0x38 [ 20.614412] kunit_try_run_case+0x170/0x3f0 [ 20.614447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.614484] kthread+0x328/0x630 [ 20.614519] ret_from_fork+0x10/0x20 [ 20.614553] [ 20.681433] Allocated by task 207: [ 20.684822] kasan_save_stack+0x3c/0x68 [ 20.688637] kasan_save_track+0x20/0x40 [ 20.692457] kasan_save_alloc_info+0x40/0x58 [ 20.696710] __kasan_krealloc+0x118/0x178 [ 20.700703] krealloc_noprof+0x128/0x360 [ 20.704609] krealloc_less_oob_helper+0x168/0xc50 [ 20.709298] krealloc_less_oob+0x20/0x38 [ 20.713203] kunit_try_run_case+0x170/0x3f0 [ 20.717369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.722838] kthread+0x328/0x630 [ 20.726050] ret_from_fork+0x10/0x20 [ 20.729609] [ 20.731086] The buggy address belongs to the object at ffff000803bc6400 [ 20.731086] which belongs to the cache kmalloc-256 of size 256 [ 20.743588] The buggy address is located 0 bytes to the right of [ 20.743588] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 20.756518] [ 20.757996] The buggy address belongs to the physical page: [ 20.763553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 20.771538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.779175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.786120] page_type: f5(slab) [ 20.789257] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.796976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.804704] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.812513] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.820326] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 20.828140] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.835945] page dumped because: kasan: bad access detected [ 20.841499] [ 20.842975] Memory state around the buggy address: [ 20.847756] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.854958] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.862165] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.869364] ^ [ 20.874923] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.882128] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.889331] ================================================================== [ 23.055991] ================================================================== [ 23.063088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.070633] Write of size 1 at addr ffff000805d560da by task kunit_try_catch/211 [ 23.078011] [ 23.079496] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 23.079544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.079558] Hardware name: WinLink E850-96 board (DT) [ 23.079576] Call trace: [ 23.079588] show_stack+0x20/0x38 (C) [ 23.079620] dump_stack_lvl+0x8c/0xd0 [ 23.079655] print_report+0x118/0x608 [ 23.079686] kasan_report+0xdc/0x128 [ 23.079715] __asan_report_store1_noabort+0x20/0x30 [ 23.079749] krealloc_less_oob_helper+0xa80/0xc50 [ 23.079777] krealloc_large_less_oob+0x20/0x38 [ 23.079803] kunit_try_run_case+0x170/0x3f0 [ 23.079838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.079873] kthread+0x328/0x630 [ 23.079906] ret_from_fork+0x10/0x20 [ 23.079941] [ 23.147370] The buggy address belongs to the physical page: [ 23.152924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 23.160911] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.168549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.175492] page_type: f8(unknown) [ 23.178890] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.186610] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.194336] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.202147] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.209961] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 23.217773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.225578] page dumped because: kasan: bad access detected [ 23.231133] [ 23.232609] Memory state around the buggy address: [ 23.237389] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.244592] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.251799] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.258998] ^ [ 23.265078] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.272283] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.279485] ================================================================== [ 21.816865] ================================================================== [ 21.823953] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.831502] Write of size 1 at addr ffff000803bc64eb by task kunit_try_catch/207 [ 21.838880] [ 21.840364] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 21.840415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.840431] Hardware name: WinLink E850-96 board (DT) [ 21.840450] Call trace: [ 21.840462] show_stack+0x20/0x38 (C) [ 21.840491] dump_stack_lvl+0x8c/0xd0 [ 21.840528] print_report+0x118/0x608 [ 21.840560] kasan_report+0xdc/0x128 [ 21.840589] __asan_report_store1_noabort+0x20/0x30 [ 21.840624] krealloc_less_oob_helper+0xa58/0xc50 [ 21.840653] krealloc_less_oob+0x20/0x38 [ 21.840679] kunit_try_run_case+0x170/0x3f0 [ 21.840710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.840744] kthread+0x328/0x630 [ 21.840777] ret_from_fork+0x10/0x20 [ 21.840810] [ 21.907716] Allocated by task 207: [ 21.911103] kasan_save_stack+0x3c/0x68 [ 21.914921] kasan_save_track+0x20/0x40 [ 21.918740] kasan_save_alloc_info+0x40/0x58 [ 21.922994] __kasan_krealloc+0x118/0x178 [ 21.926987] krealloc_noprof+0x128/0x360 [ 21.930893] krealloc_less_oob_helper+0x168/0xc50 [ 21.935580] krealloc_less_oob+0x20/0x38 [ 21.939486] kunit_try_run_case+0x170/0x3f0 [ 21.943653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.949122] kthread+0x328/0x630 [ 21.952334] ret_from_fork+0x10/0x20 [ 21.955892] [ 21.957371] The buggy address belongs to the object at ffff000803bc6400 [ 21.957371] which belongs to the cache kmalloc-256 of size 256 [ 21.969868] The buggy address is located 34 bytes to the right of [ 21.969868] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.982889] [ 21.984366] The buggy address belongs to the physical page: [ 21.989922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.997906] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.005545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.012490] page_type: f5(slab) [ 22.015626] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.023346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.031073] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.038884] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.046697] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 22.054509] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.062314] page dumped because: kasan: bad access detected [ 22.067870] [ 22.069345] Memory state around the buggy address: [ 22.074126] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.081329] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.088535] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.095734] ^ [ 22.102335] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.109540] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.116741] ================================================================== [ 21.509853] ================================================================== [ 21.516754] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.524302] Write of size 1 at addr ffff000803bc64ea by task kunit_try_catch/207 [ 21.531680] [ 21.533165] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 21.533217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.533232] Hardware name: WinLink E850-96 board (DT) [ 21.533251] Call trace: [ 21.533264] show_stack+0x20/0x38 (C) [ 21.533296] dump_stack_lvl+0x8c/0xd0 [ 21.533331] print_report+0x118/0x608 [ 21.533362] kasan_report+0xdc/0x128 [ 21.533391] __asan_report_store1_noabort+0x20/0x30 [ 21.533426] krealloc_less_oob_helper+0xae4/0xc50 [ 21.533453] krealloc_less_oob+0x20/0x38 [ 21.533477] kunit_try_run_case+0x170/0x3f0 [ 21.533511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.533547] kthread+0x328/0x630 [ 21.533581] ret_from_fork+0x10/0x20 [ 21.533613] [ 21.600516] Allocated by task 207: [ 21.603903] kasan_save_stack+0x3c/0x68 [ 21.607722] kasan_save_track+0x20/0x40 [ 21.611540] kasan_save_alloc_info+0x40/0x58 [ 21.615793] __kasan_krealloc+0x118/0x178 [ 21.619786] krealloc_noprof+0x128/0x360 [ 21.623692] krealloc_less_oob_helper+0x168/0xc50 [ 21.628380] krealloc_less_oob+0x20/0x38 [ 21.632286] kunit_try_run_case+0x170/0x3f0 [ 21.636453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.641922] kthread+0x328/0x630 [ 21.645133] ret_from_fork+0x10/0x20 [ 21.648692] [ 21.650171] The buggy address belongs to the object at ffff000803bc6400 [ 21.650171] which belongs to the cache kmalloc-256 of size 256 [ 21.662668] The buggy address is located 33 bytes to the right of [ 21.662668] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.675688] [ 21.677167] The buggy address belongs to the physical page: [ 21.682723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.690709] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.698346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.705290] page_type: f5(slab) [ 21.708426] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.716146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.723872] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.731684] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.739497] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 21.747309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.755114] page dumped because: kasan: bad access detected [ 21.760669] [ 21.762145] Memory state around the buggy address: [ 21.766926] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.774128] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.781335] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.788534] ^ [ 21.795136] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.802339] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.809542] ================================================================== [ 22.592291] ================================================================== [ 22.602241] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.609791] Write of size 1 at addr ffff000805d560c9 by task kunit_try_catch/211 [ 22.617167] [ 22.618654] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 22.618704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.618720] Hardware name: WinLink E850-96 board (DT) [ 22.618739] Call trace: [ 22.618748] show_stack+0x20/0x38 (C) [ 22.618781] dump_stack_lvl+0x8c/0xd0 [ 22.618818] print_report+0x118/0x608 [ 22.618846] kasan_report+0xdc/0x128 [ 22.618875] __asan_report_store1_noabort+0x20/0x30 [ 22.618912] krealloc_less_oob_helper+0xa48/0xc50 [ 22.618940] krealloc_large_less_oob+0x20/0x38 [ 22.618966] kunit_try_run_case+0x170/0x3f0 [ 22.619001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.619036] kthread+0x328/0x630 [ 22.619071] ret_from_fork+0x10/0x20 [ 22.619105] [ 22.686527] The buggy address belongs to the physical page: [ 22.692084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 22.700066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.707706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.714650] page_type: f8(unknown) [ 22.718047] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.725766] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.733492] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.741303] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.749117] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 22.756929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.764734] page dumped because: kasan: bad access detected [ 22.770290] [ 22.771765] Memory state around the buggy address: [ 22.776547] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.783749] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.790955] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.798154] ^ [ 22.803713] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.810918] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.818120] ================================================================== [ 22.825654] ================================================================== [ 22.832534] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.840081] Write of size 1 at addr ffff000805d560d0 by task kunit_try_catch/211 [ 22.847459] [ 22.848943] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 22.848990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.849005] Hardware name: WinLink E850-96 board (DT) [ 22.849023] Call trace: [ 22.849035] show_stack+0x20/0x38 (C) [ 22.849067] dump_stack_lvl+0x8c/0xd0 [ 22.849101] print_report+0x118/0x608 [ 22.849135] kasan_report+0xdc/0x128 [ 22.849166] __asan_report_store1_noabort+0x20/0x30 [ 22.849201] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.849228] krealloc_large_less_oob+0x20/0x38 [ 22.849255] kunit_try_run_case+0x170/0x3f0 [ 22.849290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.849326] kthread+0x328/0x630 [ 22.849360] ret_from_fork+0x10/0x20 [ 22.849392] [ 22.916818] The buggy address belongs to the physical page: [ 22.922376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 22.930359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.937998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.944940] page_type: f8(unknown) [ 22.948337] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.956058] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.963784] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.971595] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.979409] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 22.987221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.995026] page dumped because: kasan: bad access detected [ 23.000581] [ 23.002057] Memory state around the buggy address: [ 23.006837] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.014040] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.021246] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.028446] ^ [ 23.034265] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.041470] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.048672] ================================================================== [ 23.518131] ================================================================== [ 23.525232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.532780] Write of size 1 at addr ffff000805d560eb by task kunit_try_catch/211 [ 23.540157] [ 23.541640] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 23.541690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.541704] Hardware name: WinLink E850-96 board (DT) [ 23.541724] Call trace: [ 23.541738] show_stack+0x20/0x38 (C) [ 23.541770] dump_stack_lvl+0x8c/0xd0 [ 23.541804] print_report+0x118/0x608 [ 23.541835] kasan_report+0xdc/0x128 [ 23.541863] __asan_report_store1_noabort+0x20/0x30 [ 23.541896] krealloc_less_oob_helper+0xa58/0xc50 [ 23.541926] krealloc_large_less_oob+0x20/0x38 [ 23.541952] kunit_try_run_case+0x170/0x3f0 [ 23.541986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.542023] kthread+0x328/0x630 [ 23.542057] ret_from_fork+0x10/0x20 [ 23.542091] [ 23.609514] The buggy address belongs to the physical page: [ 23.615073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 23.623057] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.630695] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.637638] page_type: f8(unknown) [ 23.641036] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.648755] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.656482] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.664293] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.672107] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 23.679918] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.687724] page dumped because: kasan: bad access detected [ 23.693279] [ 23.694755] Memory state around the buggy address: [ 23.699535] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.706738] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.713945] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.721144] ^ [ 23.727745] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.734950] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.742152] ================================================================== [ 21.203219] ================================================================== [ 21.210076] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.217623] Write of size 1 at addr ffff000803bc64da by task kunit_try_catch/207 [ 21.225001] [ 21.226488] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 21.226542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.226559] Hardware name: WinLink E850-96 board (DT) [ 21.226578] Call trace: [ 21.226590] show_stack+0x20/0x38 (C) [ 21.226628] dump_stack_lvl+0x8c/0xd0 [ 21.226663] print_report+0x118/0x608 [ 21.226695] kasan_report+0xdc/0x128 [ 21.226726] __asan_report_store1_noabort+0x20/0x30 [ 21.226762] krealloc_less_oob_helper+0xa80/0xc50 [ 21.226791] krealloc_less_oob+0x20/0x38 [ 21.226816] kunit_try_run_case+0x170/0x3f0 [ 21.226850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.226886] kthread+0x328/0x630 [ 21.226921] ret_from_fork+0x10/0x20 [ 21.226957] [ 21.293836] Allocated by task 207: [ 21.297227] kasan_save_stack+0x3c/0x68 [ 21.301041] kasan_save_track+0x20/0x40 [ 21.304860] kasan_save_alloc_info+0x40/0x58 [ 21.309114] __kasan_krealloc+0x118/0x178 [ 21.313107] krealloc_noprof+0x128/0x360 [ 21.317013] krealloc_less_oob_helper+0x168/0xc50 [ 21.321702] krealloc_less_oob+0x20/0x38 [ 21.325607] kunit_try_run_case+0x170/0x3f0 [ 21.329773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.335242] kthread+0x328/0x630 [ 21.338453] ret_from_fork+0x10/0x20 [ 21.342012] [ 21.343491] The buggy address belongs to the object at ffff000803bc6400 [ 21.343491] which belongs to the cache kmalloc-256 of size 256 [ 21.355990] The buggy address is located 17 bytes to the right of [ 21.355990] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.369009] [ 21.370487] The buggy address belongs to the physical page: [ 21.376043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.384028] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.391667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.398609] page_type: f5(slab) [ 21.401747] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.409466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.417193] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.425004] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.432817] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 21.440629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.448436] page dumped because: kasan: bad access detected [ 21.453990] [ 21.455466] Memory state around the buggy address: [ 21.460247] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.467451] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.474655] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.481854] ^ [ 21.487934] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.495140] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.502342] ==================================================================
[ 15.502107] ================================================================== [ 15.502214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.502647] Write of size 1 at addr fff00000c65660da by task kunit_try_catch/167 [ 15.502732] [ 15.502761] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.502843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.502957] Hardware name: linux,dummy-virt (DT) [ 15.503091] Call trace: [ 15.503129] show_stack+0x20/0x38 (C) [ 15.503180] dump_stack_lvl+0x8c/0xd0 [ 15.503231] print_report+0x118/0x608 [ 15.503398] kasan_report+0xdc/0x128 [ 15.503440] __asan_report_store1_noabort+0x20/0x30 [ 15.503494] krealloc_less_oob_helper+0xa80/0xc50 [ 15.503650] krealloc_large_less_oob+0x20/0x38 [ 15.503694] kunit_try_run_case+0x170/0x3f0 [ 15.503741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.503792] kthread+0x328/0x630 [ 15.503835] ret_from_fork+0x10/0x20 [ 15.504034] [ 15.504188] The buggy address belongs to the physical page: [ 15.504225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 15.504276] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.504320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.504736] page_type: f8(unknown) [ 15.504826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.505017] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.505083] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.505129] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.505175] head: 0bfffe0000000002 ffffc1ffc3195901 00000000ffffffff 00000000ffffffff [ 15.505220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.505379] page dumped because: kasan: bad access detected [ 15.505580] [ 15.505695] Memory state around the buggy address: [ 15.505782] fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.505854] fff00000c6566000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.505895] >fff00000c6566080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.505931] ^ [ 15.505966] fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.506206] fff00000c6566180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.506401] ================================================================== [ 15.491463] ================================================================== [ 15.491533] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.491646] Write of size 1 at addr fff00000c65660c9 by task kunit_try_catch/167 [ 15.491694] [ 15.491726] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.491878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.491928] Hardware name: linux,dummy-virt (DT) [ 15.492147] Call trace: [ 15.492172] show_stack+0x20/0x38 (C) [ 15.492438] dump_stack_lvl+0x8c/0xd0 [ 15.492488] print_report+0x118/0x608 [ 15.492531] kasan_report+0xdc/0x128 [ 15.492750] __asan_report_store1_noabort+0x20/0x30 [ 15.492999] krealloc_less_oob_helper+0xa48/0xc50 [ 15.493177] krealloc_large_less_oob+0x20/0x38 [ 15.493264] kunit_try_run_case+0x170/0x3f0 [ 15.493313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.493364] kthread+0x328/0x630 [ 15.493408] ret_from_fork+0x10/0x20 [ 15.493454] [ 15.493474] The buggy address belongs to the physical page: [ 15.493807] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 15.494057] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.494143] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.494192] page_type: f8(unknown) [ 15.494230] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.494330] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.494403] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.494560] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.494813] head: 0bfffe0000000002 ffffc1ffc3195901 00000000ffffffff 00000000ffffffff [ 15.495542] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.495678] page dumped because: kasan: bad access detected [ 15.495726] [ 15.495743] Memory state around the buggy address: [ 15.495781] fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.495834] fff00000c6566000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.495874] >fff00000c6566080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.495946] ^ [ 15.496100] fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.496326] fff00000c6566180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.496370] ================================================================== [ 15.447232] ================================================================== [ 15.447279] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.447324] Write of size 1 at addr fff00000c0922eea by task kunit_try_catch/163 [ 15.447371] [ 15.447399] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.447644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.447691] Hardware name: linux,dummy-virt (DT) [ 15.447743] Call trace: [ 15.447764] show_stack+0x20/0x38 (C) [ 15.448014] dump_stack_lvl+0x8c/0xd0 [ 15.448061] print_report+0x118/0x608 [ 15.448104] kasan_report+0xdc/0x128 [ 15.448146] __asan_report_store1_noabort+0x20/0x30 [ 15.448194] krealloc_less_oob_helper+0xae4/0xc50 [ 15.448776] krealloc_less_oob+0x20/0x38 [ 15.448845] kunit_try_run_case+0x170/0x3f0 [ 15.448893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.449205] kthread+0x328/0x630 [ 15.449325] ret_from_fork+0x10/0x20 [ 15.449426] [ 15.449489] Allocated by task 163: [ 15.449516] kasan_save_stack+0x3c/0x68 [ 15.449559] kasan_save_track+0x20/0x40 [ 15.449651] kasan_save_alloc_info+0x40/0x58 [ 15.449688] __kasan_krealloc+0x118/0x178 [ 15.449761] krealloc_noprof+0x128/0x360 [ 15.449926] krealloc_less_oob_helper+0x168/0xc50 [ 15.449963] krealloc_less_oob+0x20/0x38 [ 15.450000] kunit_try_run_case+0x170/0x3f0 [ 15.450037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.450080] kthread+0x328/0x630 [ 15.450113] ret_from_fork+0x10/0x20 [ 15.450147] [ 15.450165] The buggy address belongs to the object at fff00000c0922e00 [ 15.450165] which belongs to the cache kmalloc-256 of size 256 [ 15.450219] The buggy address is located 33 bytes to the right of [ 15.450219] allocated 201-byte region [fff00000c0922e00, fff00000c0922ec9) [ 15.450280] [ 15.450298] The buggy address belongs to the physical page: [ 15.450327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922 [ 15.450377] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.450467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.450587] page_type: f5(slab) [ 15.451064] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.451446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.451580] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.451654] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.451907] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff [ 15.453941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.454397] page dumped because: kasan: bad access detected [ 15.455092] [ 15.455153] Memory state around the buggy address: [ 15.455186] fff00000c0922d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.455229] fff00000c0922e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.455282] >fff00000c0922e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.455318] ^ [ 15.455512] fff00000c0922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.456009] fff00000c0922f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.456052] ================================================================== [ 15.507103] ================================================================== [ 15.507148] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.507194] Write of size 1 at addr fff00000c65660ea by task kunit_try_catch/167 [ 15.507412] [ 15.507498] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.508010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.508080] Hardware name: linux,dummy-virt (DT) [ 15.508160] Call trace: [ 15.508181] show_stack+0x20/0x38 (C) [ 15.508228] dump_stack_lvl+0x8c/0xd0 [ 15.508360] print_report+0x118/0x608 [ 15.508548] kasan_report+0xdc/0x128 [ 15.508603] __asan_report_store1_noabort+0x20/0x30 [ 15.508661] krealloc_less_oob_helper+0xae4/0xc50 [ 15.508706] krealloc_large_less_oob+0x20/0x38 [ 15.508760] kunit_try_run_case+0x170/0x3f0 [ 15.508964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.509015] kthread+0x328/0x630 [ 15.509066] ret_from_fork+0x10/0x20 [ 15.509112] [ 15.509132] The buggy address belongs to the physical page: [ 15.509162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 15.509213] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.509555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.509806] page_type: f8(unknown) [ 15.509848] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.509895] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.509942] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.510016] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.510065] head: 0bfffe0000000002 ffffc1ffc3195901 00000000ffffffff 00000000ffffffff [ 15.510112] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.510149] page dumped because: kasan: bad access detected [ 15.510226] [ 15.510243] Memory state around the buggy address: [ 15.510273] fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.510313] fff00000c6566000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.510353] >fff00000c6566080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.510435] ^ [ 15.510472] fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.510513] fff00000c6566180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.510565] ================================================================== [ 15.510960] ================================================================== [ 15.511185] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.511272] Write of size 1 at addr fff00000c65660eb by task kunit_try_catch/167 [ 15.511347] [ 15.511418] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.511493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.511518] Hardware name: linux,dummy-virt (DT) [ 15.511546] Call trace: [ 15.511566] show_stack+0x20/0x38 (C) [ 15.511610] dump_stack_lvl+0x8c/0xd0 [ 15.511668] print_report+0x118/0x608 [ 15.511721] kasan_report+0xdc/0x128 [ 15.511764] __asan_report_store1_noabort+0x20/0x30 [ 15.512047] krealloc_less_oob_helper+0xa58/0xc50 [ 15.512156] krealloc_large_less_oob+0x20/0x38 [ 15.512200] kunit_try_run_case+0x170/0x3f0 [ 15.512247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.512597] kthread+0x328/0x630 [ 15.512679] ret_from_fork+0x10/0x20 [ 15.513099] [ 15.513205] The buggy address belongs to the physical page: [ 15.513235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 15.513327] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.513445] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.513530] page_type: f8(unknown) [ 15.513659] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.513745] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.513812] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.513858] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.513905] head: 0bfffe0000000002 ffffc1ffc3195901 00000000ffffffff 00000000ffffffff [ 15.513951] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.513996] page dumped because: kasan: bad access detected [ 15.514065] [ 15.514151] Memory state around the buggy address: [ 15.514240] fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.514280] fff00000c6566000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.514321] >fff00000c6566080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.514357] ^ [ 15.514393] fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.514487] fff00000c6566180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.515071] ================================================================== [ 15.440425] ================================================================== [ 15.440471] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.440516] Write of size 1 at addr fff00000c0922eda by task kunit_try_catch/163 [ 15.440563] [ 15.440727] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.440819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.440844] Hardware name: linux,dummy-virt (DT) [ 15.440873] Call trace: [ 15.440893] show_stack+0x20/0x38 (C) [ 15.440940] dump_stack_lvl+0x8c/0xd0 [ 15.441900] print_report+0x118/0x608 [ 15.442009] kasan_report+0xdc/0x128 [ 15.442075] __asan_report_store1_noabort+0x20/0x30 [ 15.442194] krealloc_less_oob_helper+0xa80/0xc50 [ 15.442239] krealloc_less_oob+0x20/0x38 [ 15.442282] kunit_try_run_case+0x170/0x3f0 [ 15.442336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.442574] kthread+0x328/0x630 [ 15.442897] ret_from_fork+0x10/0x20 [ 15.443169] [ 15.443463] Allocated by task 163: [ 15.443510] kasan_save_stack+0x3c/0x68 [ 15.443617] kasan_save_track+0x20/0x40 [ 15.443668] kasan_save_alloc_info+0x40/0x58 [ 15.443711] __kasan_krealloc+0x118/0x178 [ 15.443798] krealloc_noprof+0x128/0x360 [ 15.443832] krealloc_less_oob_helper+0x168/0xc50 [ 15.443868] krealloc_less_oob+0x20/0x38 [ 15.443901] kunit_try_run_case+0x170/0x3f0 [ 15.444062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.444288] kthread+0x328/0x630 [ 15.444366] ret_from_fork+0x10/0x20 [ 15.444450] [ 15.444478] The buggy address belongs to the object at fff00000c0922e00 [ 15.444478] which belongs to the cache kmalloc-256 of size 256 [ 15.444581] The buggy address is located 17 bytes to the right of [ 15.444581] allocated 201-byte region [fff00000c0922e00, fff00000c0922ec9) [ 15.444652] [ 15.444671] The buggy address belongs to the physical page: [ 15.444700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922 [ 15.444823] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.444962] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.445104] page_type: f5(slab) [ 15.445199] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.445298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.445346] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.445392] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.445621] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff [ 15.445851] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.445918] page dumped because: kasan: bad access detected [ 15.445997] [ 15.446015] Memory state around the buggy address: [ 15.446045] fff00000c0922d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.446086] fff00000c0922e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.446126] >fff00000c0922e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.446164] ^ [ 15.446198] fff00000c0922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.446239] fff00000c0922f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.446285] ================================================================== [ 15.423494] ================================================================== [ 15.424063] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.424340] Write of size 1 at addr fff00000c0922ec9 by task kunit_try_catch/163 [ 15.424591] [ 15.424637] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.424827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.424862] Hardware name: linux,dummy-virt (DT) [ 15.424957] Call trace: [ 15.425004] show_stack+0x20/0x38 (C) [ 15.425115] dump_stack_lvl+0x8c/0xd0 [ 15.425189] print_report+0x118/0x608 [ 15.425293] kasan_report+0xdc/0x128 [ 15.425336] __asan_report_store1_noabort+0x20/0x30 [ 15.425384] krealloc_less_oob_helper+0xa48/0xc50 [ 15.425430] krealloc_less_oob+0x20/0x38 [ 15.425472] kunit_try_run_case+0x170/0x3f0 [ 15.425519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.425580] kthread+0x328/0x630 [ 15.425624] ret_from_fork+0x10/0x20 [ 15.426029] [ 15.426327] Allocated by task 163: [ 15.426558] kasan_save_stack+0x3c/0x68 [ 15.426884] kasan_save_track+0x20/0x40 [ 15.426951] kasan_save_alloc_info+0x40/0x58 [ 15.427164] __kasan_krealloc+0x118/0x178 [ 15.427414] krealloc_noprof+0x128/0x360 [ 15.427550] krealloc_less_oob_helper+0x168/0xc50 [ 15.427587] krealloc_less_oob+0x20/0x38 [ 15.427621] kunit_try_run_case+0x170/0x3f0 [ 15.427668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.427719] kthread+0x328/0x630 [ 15.427753] ret_from_fork+0x10/0x20 [ 15.427787] [ 15.428011] The buggy address belongs to the object at fff00000c0922e00 [ 15.428011] which belongs to the cache kmalloc-256 of size 256 [ 15.428256] The buggy address is located 0 bytes to the right of [ 15.428256] allocated 201-byte region [fff00000c0922e00, fff00000c0922ec9) [ 15.428462] [ 15.428721] The buggy address belongs to the physical page: [ 15.428755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922 [ 15.429034] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.429084] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.429181] page_type: f5(slab) [ 15.429229] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.429655] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.429785] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.429867] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.429913] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff [ 15.429959] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.430003] page dumped because: kasan: bad access detected [ 15.430122] [ 15.430140] Memory state around the buggy address: [ 15.430176] fff00000c0922d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.430317] fff00000c0922e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.430366] >fff00000c0922e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.430414] ^ [ 15.430503] fff00000c0922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.430603] fff00000c0922f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.430660] ================================================================== [ 15.456792] ================================================================== [ 15.456964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.457047] Write of size 1 at addr fff00000c0922eeb by task kunit_try_catch/163 [ 15.457166] [ 15.457235] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.457581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.457994] Hardware name: linux,dummy-virt (DT) [ 15.458209] Call trace: [ 15.458232] show_stack+0x20/0x38 (C) [ 15.458447] dump_stack_lvl+0x8c/0xd0 [ 15.458724] print_report+0x118/0x608 [ 15.458928] kasan_report+0xdc/0x128 [ 15.459010] __asan_report_store1_noabort+0x20/0x30 [ 15.459166] krealloc_less_oob_helper+0xa58/0xc50 [ 15.459415] krealloc_less_oob+0x20/0x38 [ 15.459487] kunit_try_run_case+0x170/0x3f0 [ 15.459533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.459777] kthread+0x328/0x630 [ 15.460142] ret_from_fork+0x10/0x20 [ 15.460342] [ 15.460361] Allocated by task 163: [ 15.460422] kasan_save_stack+0x3c/0x68 [ 15.460460] kasan_save_track+0x20/0x40 [ 15.460494] kasan_save_alloc_info+0x40/0x58 [ 15.460530] __kasan_krealloc+0x118/0x178 [ 15.460564] krealloc_noprof+0x128/0x360 [ 15.460598] krealloc_less_oob_helper+0x168/0xc50 [ 15.460646] krealloc_less_oob+0x20/0x38 [ 15.460679] kunit_try_run_case+0x170/0x3f0 [ 15.460715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.461003] kthread+0x328/0x630 [ 15.461039] ret_from_fork+0x10/0x20 [ 15.461074] [ 15.461093] The buggy address belongs to the object at fff00000c0922e00 [ 15.461093] which belongs to the cache kmalloc-256 of size 256 [ 15.461147] The buggy address is located 34 bytes to the right of [ 15.461147] allocated 201-byte region [fff00000c0922e00, fff00000c0922ec9) [ 15.461211] [ 15.461231] The buggy address belongs to the physical page: [ 15.461270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922 [ 15.461320] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.461374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.461613] page_type: f5(slab) [ 15.461996] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.462049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.462316] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.462432] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.462578] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff [ 15.462673] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.462712] page dumped because: kasan: bad access detected [ 15.463055] [ 15.463078] Memory state around the buggy address: [ 15.463126] fff00000c0922d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463181] fff00000c0922e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.463240] >fff00000c0922e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.463278] ^ [ 15.463419] fff00000c0922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463695] fff00000c0922f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463830] ================================================================== [ 15.433308] ================================================================== [ 15.433602] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.433880] Write of size 1 at addr fff00000c0922ed0 by task kunit_try_catch/163 [ 15.434005] [ 15.434036] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.434112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.434168] Hardware name: linux,dummy-virt (DT) [ 15.434200] Call trace: [ 15.434488] show_stack+0x20/0x38 (C) [ 15.434575] dump_stack_lvl+0x8c/0xd0 [ 15.434623] print_report+0x118/0x608 [ 15.434990] kasan_report+0xdc/0x128 [ 15.435100] __asan_report_store1_noabort+0x20/0x30 [ 15.435149] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.435201] krealloc_less_oob+0x20/0x38 [ 15.435337] kunit_try_run_case+0x170/0x3f0 [ 15.435478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.435537] kthread+0x328/0x630 [ 15.435691] ret_from_fork+0x10/0x20 [ 15.435816] [ 15.435862] Allocated by task 163: [ 15.435889] kasan_save_stack+0x3c/0x68 [ 15.435933] kasan_save_track+0x20/0x40 [ 15.436024] kasan_save_alloc_info+0x40/0x58 [ 15.436060] __kasan_krealloc+0x118/0x178 [ 15.436095] krealloc_noprof+0x128/0x360 [ 15.436129] krealloc_less_oob_helper+0x168/0xc50 [ 15.436383] krealloc_less_oob+0x20/0x38 [ 15.436424] kunit_try_run_case+0x170/0x3f0 [ 15.436462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.436505] kthread+0x328/0x630 [ 15.436538] ret_from_fork+0x10/0x20 [ 15.436572] [ 15.436591] The buggy address belongs to the object at fff00000c0922e00 [ 15.436591] which belongs to the cache kmalloc-256 of size 256 [ 15.437118] The buggy address is located 7 bytes to the right of [ 15.437118] allocated 201-byte region [fff00000c0922e00, fff00000c0922ec9) [ 15.437189] [ 15.437208] The buggy address belongs to the physical page: [ 15.437465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922 [ 15.437522] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.437567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.437637] page_type: f5(slab) [ 15.437674] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.437941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.437996] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.438098] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.438197] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff [ 15.438283] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.438335] page dumped because: kasan: bad access detected [ 15.438733] [ 15.438756] Memory state around the buggy address: [ 15.438795] fff00000c0922d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.438851] fff00000c0922e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.438892] >fff00000c0922e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.439010] ^ [ 15.439124] fff00000c0922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.439269] fff00000c0922f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.439306] ================================================================== [ 15.497099] ================================================================== [ 15.497146] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.497483] Write of size 1 at addr fff00000c65660d0 by task kunit_try_catch/167 [ 15.497881] [ 15.497925] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.498006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.498031] Hardware name: linux,dummy-virt (DT) [ 15.498066] Call trace: [ 15.498167] show_stack+0x20/0x38 (C) [ 15.498239] dump_stack_lvl+0x8c/0xd0 [ 15.498445] print_report+0x118/0x608 [ 15.498538] kasan_report+0xdc/0x128 [ 15.498580] __asan_report_store1_noabort+0x20/0x30 [ 15.498639] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.498684] krealloc_large_less_oob+0x20/0x38 [ 15.498727] kunit_try_run_case+0x170/0x3f0 [ 15.498773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.498823] kthread+0x328/0x630 [ 15.498867] ret_from_fork+0x10/0x20 [ 15.498911] [ 15.498930] The buggy address belongs to the physical page: [ 15.498959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 15.499008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.499380] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.499591] page_type: f8(unknown) [ 15.499942] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.500235] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.500318] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.500596] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.500893] head: 0bfffe0000000002 ffffc1ffc3195901 00000000ffffffff 00000000ffffffff [ 15.500942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.501031] page dumped because: kasan: bad access detected [ 15.501062] [ 15.501266] Memory state around the buggy address: [ 15.501307] fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.501435] fff00000c6566000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.501508] >fff00000c6566080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.501567] ^ [ 15.501641] fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.501681] fff00000c6566180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.501719] ==================================================================
[ 14.043020] ================================================================== [ 14.044067] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 14.045396] Write of size 1 at addr ffff8881022aa0ea by task kunit_try_catch/183 [ 14.046223] [ 14.046431] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 14.046536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.046561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.046604] Call Trace: [ 14.046649] <TASK> [ 14.046696] dump_stack_lvl+0x73/0xb0 [ 14.046757] print_report+0xd1/0x650 [ 14.046804] ? __virt_addr_valid+0x1db/0x2d0 [ 14.046848] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.046886] ? kasan_addr_to_slab+0x11/0xa0 [ 14.046928] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.046969] kasan_report+0x141/0x180 [ 14.047014] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.047069] __asan_report_store1_noabort+0x1b/0x30 [ 14.047111] krealloc_less_oob_helper+0xe90/0x11d0 [ 14.047158] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.047200] ? finish_task_switch.isra.0+0x153/0x700 [ 14.047244] ? __switch_to+0x5d9/0xf60 [ 14.047283] ? dequeue_task_fair+0x166/0x4e0 [ 14.047332] ? __schedule+0x10cc/0x2b60 [ 14.047395] ? __pfx_read_tsc+0x10/0x10 [ 14.047444] krealloc_large_less_oob+0x1c/0x30 [ 14.047483] kunit_try_run_case+0x1a5/0x480 [ 14.047531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.047571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.047618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.047665] ? __kthread_parkme+0x82/0x180 [ 14.047708] ? preempt_count_sub+0x50/0x80 [ 14.047757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.047802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.047847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.047892] kthread+0x337/0x6f0 [ 14.047933] ? __pfx_kthread+0x10/0x10 [ 14.047975] ? calculate_sigpending+0x7b/0xa0 [ 14.048019] ? __pfx_kthread+0x10/0x10 [ 14.048058] ret_from_fork+0x41/0x80 [ 14.048099] ? __pfx_kthread+0x10/0x10 [ 14.048135] ret_from_fork_asm+0x1a/0x30 [ 14.048201] </TASK> [ 14.048224] [ 14.068026] The buggy address belongs to the physical page: [ 14.068895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a8 [ 14.069444] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.070219] flags: 0x200000000000040(head|node=0|zone=2) [ 14.070532] page_type: f8(unknown) [ 14.071069] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.071896] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.072628] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.072997] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.073579] head: 0200000000000002 ffffea000408aa01 00000000ffffffff 00000000ffffffff [ 14.074448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.075289] page dumped because: kasan: bad access detected [ 14.075933] [ 14.076142] Memory state around the buggy address: [ 14.076692] ffff8881022a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.077415] ffff8881022aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.078191] >ffff8881022aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.078619] ^ [ 14.079191] ffff8881022aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.079598] ffff8881022aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.079928] ================================================================== [ 13.980836] ================================================================== [ 13.981549] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.981968] Write of size 1 at addr ffff8881022aa0d0 by task kunit_try_catch/183 [ 13.983010] [ 13.983323] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.983454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.983473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.983499] Call Trace: [ 13.983525] <TASK> [ 13.983553] dump_stack_lvl+0x73/0xb0 [ 13.983594] print_report+0xd1/0x650 [ 13.983621] ? __virt_addr_valid+0x1db/0x2d0 [ 13.983646] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.983668] ? kasan_addr_to_slab+0x11/0xa0 [ 13.983690] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.983712] kasan_report+0x141/0x180 [ 13.983736] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.983763] __asan_report_store1_noabort+0x1b/0x30 [ 13.983786] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.983810] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.983832] ? finish_task_switch.isra.0+0x153/0x700 [ 13.983857] ? __switch_to+0x5d9/0xf60 [ 13.983879] ? dequeue_task_fair+0x166/0x4e0 [ 13.983904] ? __schedule+0x10cc/0x2b60 [ 13.983929] ? __pfx_read_tsc+0x10/0x10 [ 13.983954] krealloc_large_less_oob+0x1c/0x30 [ 13.983974] kunit_try_run_case+0x1a5/0x480 [ 13.984001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.984024] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.984050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.984401] ? __kthread_parkme+0x82/0x180 [ 13.984470] ? preempt_count_sub+0x50/0x80 [ 13.984808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.984901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.984954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.985004] kthread+0x337/0x6f0 [ 13.985061] ? __pfx_kthread+0x10/0x10 [ 13.985108] ? calculate_sigpending+0x7b/0xa0 [ 13.985135] ? __pfx_kthread+0x10/0x10 [ 13.985156] ret_from_fork+0x41/0x80 [ 13.985180] ? __pfx_kthread+0x10/0x10 [ 13.985200] ret_from_fork_asm+0x1a/0x30 [ 13.985261] </TASK> [ 13.985281] [ 13.997330] The buggy address belongs to the physical page: [ 13.998734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a8 [ 13.999689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.000421] flags: 0x200000000000040(head|node=0|zone=2) [ 14.000865] page_type: f8(unknown) [ 14.001168] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.001689] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.002072] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.002483] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.002908] head: 0200000000000002 ffffea000408aa01 00000000ffffffff 00000000ffffffff [ 14.004147] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.004616] page dumped because: kasan: bad access detected [ 14.005096] [ 14.005476] Memory state around the buggy address: [ 14.005708] ffff8881022a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.006169] ffff8881022aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.006676] >ffff8881022aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.006969] ^ [ 14.007205] ffff8881022aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.007622] ffff8881022aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.008260] ================================================================== [ 13.669191] ================================================================== [ 13.670594] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.671179] Write of size 1 at addr ffff888100aa12c9 by task kunit_try_catch/179 [ 13.672270] [ 13.672446] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.672506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.672520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.672544] Call Trace: [ 13.672562] <TASK> [ 13.672589] dump_stack_lvl+0x73/0xb0 [ 13.672627] print_report+0xd1/0x650 [ 13.672653] ? __virt_addr_valid+0x1db/0x2d0 [ 13.672679] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.672700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.672724] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.672745] kasan_report+0x141/0x180 [ 13.672769] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.672796] __asan_report_store1_noabort+0x1b/0x30 [ 13.672817] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.672841] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.672863] ? finish_task_switch.isra.0+0x153/0x700 [ 13.672888] ? __switch_to+0x5d9/0xf60 [ 13.672911] ? dequeue_task_fair+0x156/0x4e0 [ 13.672936] ? __schedule+0x10cc/0x2b60 [ 13.672960] ? __pfx_read_tsc+0x10/0x10 [ 13.672986] krealloc_less_oob+0x1c/0x30 [ 13.673006] kunit_try_run_case+0x1a5/0x480 [ 13.673052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.673089] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.673135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.673180] ? __kthread_parkme+0x82/0x180 [ 13.673222] ? preempt_count_sub+0x50/0x80 [ 13.673268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.673316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.673663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.673746] kthread+0x337/0x6f0 [ 13.673783] ? trace_preempt_on+0x20/0xc0 [ 13.673824] ? __pfx_kthread+0x10/0x10 [ 13.673854] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.673891] ? calculate_sigpending+0x7b/0xa0 [ 13.673927] ? __pfx_kthread+0x10/0x10 [ 13.673947] ret_from_fork+0x41/0x80 [ 13.673970] ? __pfx_kthread+0x10/0x10 [ 13.673989] ret_from_fork_asm+0x1a/0x30 [ 13.674023] </TASK> [ 13.674036] [ 13.690854] Allocated by task 179: [ 13.691835] kasan_save_stack+0x45/0x70 [ 13.693241] kasan_save_track+0x18/0x40 [ 13.693957] kasan_save_alloc_info+0x3b/0x50 [ 13.695384] __kasan_krealloc+0x190/0x1f0 [ 13.696156] krealloc_noprof+0xf3/0x340 [ 13.696388] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.696592] krealloc_less_oob+0x1c/0x30 [ 13.696769] kunit_try_run_case+0x1a5/0x480 [ 13.696931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.697998] kthread+0x337/0x6f0 [ 13.698370] ret_from_fork+0x41/0x80 [ 13.698684] ret_from_fork_asm+0x1a/0x30 [ 13.699006] [ 13.699186] The buggy address belongs to the object at ffff888100aa1200 [ 13.699186] which belongs to the cache kmalloc-256 of size 256 [ 13.700321] The buggy address is located 0 bytes to the right of [ 13.700321] allocated 201-byte region [ffff888100aa1200, ffff888100aa12c9) [ 13.701158] [ 13.701878] The buggy address belongs to the physical page: [ 13.702579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0 [ 13.703050] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.703696] flags: 0x200000000000040(head|node=0|zone=2) [ 13.704194] page_type: f5(slab) [ 13.704691] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.705025] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.706040] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.706649] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.707383] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff [ 13.707852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.708151] page dumped because: kasan: bad access detected [ 13.708700] [ 13.708897] Memory state around the buggy address: [ 13.709756] ffff888100aa1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.710473] ffff888100aa1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.710711] >ffff888100aa1280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.711464] ^ [ 13.711786] ffff888100aa1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.712530] ffff888100aa1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.712977] ================================================================== [ 13.714775] ================================================================== [ 13.715398] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.716535] Write of size 1 at addr ffff888100aa12d0 by task kunit_try_catch/179 [ 13.716830] [ 13.717104] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.717207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.717232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.717370] Call Trace: [ 13.717419] <TASK> [ 13.717462] dump_stack_lvl+0x73/0xb0 [ 13.717526] print_report+0xd1/0x650 [ 13.717776] ? __virt_addr_valid+0x1db/0x2d0 [ 13.717855] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.717905] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.717954] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.717995] kasan_report+0x141/0x180 [ 13.718036] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.718102] __asan_report_store1_noabort+0x1b/0x30 [ 13.718138] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.718186] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.718238] ? finish_task_switch.isra.0+0x153/0x700 [ 13.718277] ? __switch_to+0x5d9/0xf60 [ 13.718311] ? dequeue_task_fair+0x156/0x4e0 [ 13.718367] ? __schedule+0x10cc/0x2b60 [ 13.718398] ? __pfx_read_tsc+0x10/0x10 [ 13.718424] krealloc_less_oob+0x1c/0x30 [ 13.718444] kunit_try_run_case+0x1a5/0x480 [ 13.718471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.718494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.718519] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.718543] ? __kthread_parkme+0x82/0x180 [ 13.718567] ? preempt_count_sub+0x50/0x80 [ 13.718591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.718615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.718639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.718662] kthread+0x337/0x6f0 [ 13.718681] ? trace_preempt_on+0x20/0xc0 [ 13.718705] ? __pfx_kthread+0x10/0x10 [ 13.718726] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.718749] ? calculate_sigpending+0x7b/0xa0 [ 13.718771] ? __pfx_kthread+0x10/0x10 [ 13.718791] ret_from_fork+0x41/0x80 [ 13.718812] ? __pfx_kthread+0x10/0x10 [ 13.718831] ret_from_fork_asm+0x1a/0x30 [ 13.718864] </TASK> [ 13.718877] [ 13.732006] Allocated by task 179: [ 13.732371] kasan_save_stack+0x45/0x70 [ 13.732990] kasan_save_track+0x18/0x40 [ 13.733267] kasan_save_alloc_info+0x3b/0x50 [ 13.733487] __kasan_krealloc+0x190/0x1f0 [ 13.734060] krealloc_noprof+0xf3/0x340 [ 13.734558] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.735332] krealloc_less_oob+0x1c/0x30 [ 13.735654] kunit_try_run_case+0x1a5/0x480 [ 13.735863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.736092] kthread+0x337/0x6f0 [ 13.736263] ret_from_fork+0x41/0x80 [ 13.736630] ret_from_fork_asm+0x1a/0x30 [ 13.736996] [ 13.737180] The buggy address belongs to the object at ffff888100aa1200 [ 13.737180] which belongs to the cache kmalloc-256 of size 256 [ 13.739842] The buggy address is located 7 bytes to the right of [ 13.739842] allocated 201-byte region [ffff888100aa1200, ffff888100aa12c9) [ 13.740961] [ 13.741412] The buggy address belongs to the physical page: [ 13.741944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0 [ 13.742614] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.743353] flags: 0x200000000000040(head|node=0|zone=2) [ 13.743725] page_type: f5(slab) [ 13.743960] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.744303] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.744595] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.745406] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.745928] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff [ 13.747116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.747860] page dumped because: kasan: bad access detected [ 13.748737] [ 13.748904] Memory state around the buggy address: [ 13.749487] ffff888100aa1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.749818] ffff888100aa1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.751007] >ffff888100aa1280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.751413] ^ [ 13.751862] ffff888100aa1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.752466] ffff888100aa1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.753573] ================================================================== [ 14.009096] ================================================================== [ 14.009611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 14.009999] Write of size 1 at addr ffff8881022aa0da by task kunit_try_catch/183 [ 14.012410] [ 14.012583] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 14.012682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.012710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.012755] Call Trace: [ 14.012797] <TASK> [ 14.012835] dump_stack_lvl+0x73/0xb0 [ 14.012898] print_report+0xd1/0x650 [ 14.012944] ? __virt_addr_valid+0x1db/0x2d0 [ 14.012992] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 14.013052] ? kasan_addr_to_slab+0x11/0xa0 [ 14.013099] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 14.013142] kasan_report+0x141/0x180 [ 14.013198] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 14.013243] __asan_report_store1_noabort+0x1b/0x30 [ 14.013279] krealloc_less_oob_helper+0xec6/0x11d0 [ 14.013316] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.013369] ? finish_task_switch.isra.0+0x153/0x700 [ 14.013411] ? __switch_to+0x5d9/0xf60 [ 14.013446] ? dequeue_task_fair+0x166/0x4e0 [ 14.013474] ? __schedule+0x10cc/0x2b60 [ 14.013501] ? __pfx_read_tsc+0x10/0x10 [ 14.013527] krealloc_large_less_oob+0x1c/0x30 [ 14.013550] kunit_try_run_case+0x1a5/0x480 [ 14.013578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.013630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.013657] ? __kthread_parkme+0x82/0x180 [ 14.013681] ? preempt_count_sub+0x50/0x80 [ 14.013708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.013759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.013784] kthread+0x337/0x6f0 [ 14.013805] ? __pfx_kthread+0x10/0x10 [ 14.013828] ? calculate_sigpending+0x7b/0xa0 [ 14.013853] ? __pfx_kthread+0x10/0x10 [ 14.013874] ret_from_fork+0x41/0x80 [ 14.013897] ? __pfx_kthread+0x10/0x10 [ 14.013917] ret_from_fork_asm+0x1a/0x30 [ 14.013952] </TASK> [ 14.013965] [ 14.027214] The buggy address belongs to the physical page: [ 14.027506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a8 [ 14.027986] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.029385] flags: 0x200000000000040(head|node=0|zone=2) [ 14.029790] page_type: f8(unknown) [ 14.029998] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.030287] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.031503] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.032133] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.033430] head: 0200000000000002 ffffea000408aa01 00000000ffffffff 00000000ffffffff [ 14.033872] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.034685] page dumped because: kasan: bad access detected [ 14.034992] [ 14.035466] Memory state around the buggy address: [ 14.035834] ffff8881022a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.037527] ffff8881022aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.038179] >ffff8881022aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.038771] ^ [ 14.039262] ffff8881022aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.040746] ffff8881022aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.041581] ================================================================== [ 14.080941] ================================================================== [ 14.081554] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 14.082120] Write of size 1 at addr ffff8881022aa0eb by task kunit_try_catch/183 [ 14.082827] [ 14.083063] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 14.083176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.083205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.083250] Call Trace: [ 14.083294] <TASK> [ 14.083381] dump_stack_lvl+0x73/0xb0 [ 14.083454] print_report+0xd1/0x650 [ 14.083495] ? __virt_addr_valid+0x1db/0x2d0 [ 14.083529] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.083563] ? kasan_addr_to_slab+0x11/0xa0 [ 14.083598] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.083632] kasan_report+0x141/0x180 [ 14.083669] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.083711] __asan_report_store1_noabort+0x1b/0x30 [ 14.083743] krealloc_less_oob_helper+0xd47/0x11d0 [ 14.083780] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.083812] ? finish_task_switch.isra.0+0x153/0x700 [ 14.083848] ? __switch_to+0x5d9/0xf60 [ 14.083881] ? dequeue_task_fair+0x166/0x4e0 [ 14.083921] ? __schedule+0x10cc/0x2b60 [ 14.083959] ? __pfx_read_tsc+0x10/0x10 [ 14.083996] krealloc_large_less_oob+0x1c/0x30 [ 14.084030] kunit_try_run_case+0x1a5/0x480 [ 14.084075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.084111] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.084153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.084190] ? __kthread_parkme+0x82/0x180 [ 14.084234] ? preempt_count_sub+0x50/0x80 [ 14.084272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.084310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.084388] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.084433] kthread+0x337/0x6f0 [ 14.084470] ? __pfx_kthread+0x10/0x10 [ 14.084505] ? calculate_sigpending+0x7b/0xa0 [ 14.084546] ? __pfx_kthread+0x10/0x10 [ 14.084581] ret_from_fork+0x41/0x80 [ 14.084620] ? __pfx_kthread+0x10/0x10 [ 14.084657] ret_from_fork_asm+0x1a/0x30 [ 14.084723] </TASK> [ 14.084748] [ 14.098071] The buggy address belongs to the physical page: [ 14.098737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a8 [ 14.100128] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.100976] flags: 0x200000000000040(head|node=0|zone=2) [ 14.101303] page_type: f8(unknown) [ 14.101726] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.102417] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.102727] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.104025] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.104670] head: 0200000000000002 ffffea000408aa01 00000000ffffffff 00000000ffffffff [ 14.105353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.105892] page dumped because: kasan: bad access detected [ 14.106175] [ 14.106617] Memory state around the buggy address: [ 14.106987] ffff8881022a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.107397] ffff8881022aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.108018] >ffff8881022aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.108948] ^ [ 14.109695] ffff8881022aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.110121] ffff8881022aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.110440] ================================================================== [ 13.836478] ================================================================== [ 13.837186] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.837917] Write of size 1 at addr ffff888100aa12eb by task kunit_try_catch/179 [ 13.838645] [ 13.838977] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.839107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.839144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.839190] Call Trace: [ 13.839278] <TASK> [ 13.839356] dump_stack_lvl+0x73/0xb0 [ 13.839419] print_report+0xd1/0x650 [ 13.839460] ? __virt_addr_valid+0x1db/0x2d0 [ 13.839498] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.839530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.839568] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.839601] kasan_report+0x141/0x180 [ 13.839636] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.839678] __asan_report_store1_noabort+0x1b/0x30 [ 13.839714] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.839754] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.839787] ? finish_task_switch.isra.0+0x153/0x700 [ 13.839825] ? __switch_to+0x5d9/0xf60 [ 13.839863] ? dequeue_task_fair+0x156/0x4e0 [ 13.839908] ? __schedule+0x10cc/0x2b60 [ 13.839999] ? __pfx_read_tsc+0x10/0x10 [ 13.840043] krealloc_less_oob+0x1c/0x30 [ 13.840108] kunit_try_run_case+0x1a5/0x480 [ 13.840154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.840198] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.840242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.840281] ? __kthread_parkme+0x82/0x180 [ 13.840316] ? preempt_count_sub+0x50/0x80 [ 13.840378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.840421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.840466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.840542] kthread+0x337/0x6f0 [ 13.840579] ? trace_preempt_on+0x20/0xc0 [ 13.840643] ? __pfx_kthread+0x10/0x10 [ 13.840681] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.840720] ? calculate_sigpending+0x7b/0xa0 [ 13.840749] ? __pfx_kthread+0x10/0x10 [ 13.840769] ret_from_fork+0x41/0x80 [ 13.840792] ? __pfx_kthread+0x10/0x10 [ 13.840812] ret_from_fork_asm+0x1a/0x30 [ 13.840846] </TASK> [ 13.840860] [ 13.855078] Allocated by task 179: [ 13.855497] kasan_save_stack+0x45/0x70 [ 13.856177] kasan_save_track+0x18/0x40 [ 13.856593] kasan_save_alloc_info+0x3b/0x50 [ 13.856966] __kasan_krealloc+0x190/0x1f0 [ 13.857476] krealloc_noprof+0xf3/0x340 [ 13.858499] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.858768] krealloc_less_oob+0x1c/0x30 [ 13.859534] kunit_try_run_case+0x1a5/0x480 [ 13.860024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.860430] kthread+0x337/0x6f0 [ 13.860800] ret_from_fork+0x41/0x80 [ 13.861202] ret_from_fork_asm+0x1a/0x30 [ 13.862015] [ 13.862228] The buggy address belongs to the object at ffff888100aa1200 [ 13.862228] which belongs to the cache kmalloc-256 of size 256 [ 13.862701] The buggy address is located 34 bytes to the right of [ 13.862701] allocated 201-byte region [ffff888100aa1200, ffff888100aa12c9) [ 13.864157] [ 13.864564] The buggy address belongs to the physical page: [ 13.864893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0 [ 13.865428] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.866054] flags: 0x200000000000040(head|node=0|zone=2) [ 13.866862] page_type: f5(slab) [ 13.867128] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.867478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.867819] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.869465] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.869804] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff [ 13.870415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.870758] page dumped because: kasan: bad access detected [ 13.871024] [ 13.871633] Memory state around the buggy address: [ 13.871970] ffff888100aa1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.872223] ffff888100aa1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.872676] >ffff888100aa1280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.873000] ^ [ 13.873495] ffff888100aa1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.873801] ffff888100aa1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.874107] ================================================================== [ 13.795899] ================================================================== [ 13.796554] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.796953] Write of size 1 at addr ffff888100aa12ea by task kunit_try_catch/179 [ 13.797537] [ 13.797705] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.797805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.797829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.797886] Call Trace: [ 13.797930] <TASK> [ 13.797976] dump_stack_lvl+0x73/0xb0 [ 13.798042] print_report+0xd1/0x650 [ 13.798127] ? __virt_addr_valid+0x1db/0x2d0 [ 13.798178] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.798247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.798297] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.798478] kasan_report+0x141/0x180 [ 13.798538] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.798591] __asan_report_store1_noabort+0x1b/0x30 [ 13.798642] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.798703] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.798745] ? finish_task_switch.isra.0+0x153/0x700 [ 13.798797] ? __switch_to+0x5d9/0xf60 [ 13.798841] ? dequeue_task_fair+0x156/0x4e0 [ 13.798889] ? __schedule+0x10cc/0x2b60 [ 13.798932] ? __pfx_read_tsc+0x10/0x10 [ 13.798978] krealloc_less_oob+0x1c/0x30 [ 13.799016] kunit_try_run_case+0x1a5/0x480 [ 13.799101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.799145] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.799195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.799274] ? __kthread_parkme+0x82/0x180 [ 13.799323] ? preempt_count_sub+0x50/0x80 [ 13.799392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.799434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.799473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.799510] kthread+0x337/0x6f0 [ 13.799539] ? trace_preempt_on+0x20/0xc0 [ 13.799576] ? __pfx_kthread+0x10/0x10 [ 13.799607] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.799643] ? calculate_sigpending+0x7b/0xa0 [ 13.799678] ? __pfx_kthread+0x10/0x10 [ 13.799710] ret_from_fork+0x41/0x80 [ 13.799744] ? __pfx_kthread+0x10/0x10 [ 13.799776] ret_from_fork_asm+0x1a/0x30 [ 13.799815] </TASK> [ 13.799829] [ 13.814493] Allocated by task 179: [ 13.814846] kasan_save_stack+0x45/0x70 [ 13.815651] kasan_save_track+0x18/0x40 [ 13.815894] kasan_save_alloc_info+0x3b/0x50 [ 13.816133] __kasan_krealloc+0x190/0x1f0 [ 13.816418] krealloc_noprof+0xf3/0x340 [ 13.816707] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.817055] krealloc_less_oob+0x1c/0x30 [ 13.817483] kunit_try_run_case+0x1a5/0x480 [ 13.818121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.818634] kthread+0x337/0x6f0 [ 13.818931] ret_from_fork+0x41/0x80 [ 13.819728] ret_from_fork_asm+0x1a/0x30 [ 13.820036] [ 13.820836] The buggy address belongs to the object at ffff888100aa1200 [ 13.820836] which belongs to the cache kmalloc-256 of size 256 [ 13.821879] The buggy address is located 33 bytes to the right of [ 13.821879] allocated 201-byte region [ffff888100aa1200, ffff888100aa12c9) [ 13.822647] [ 13.822826] The buggy address belongs to the physical page: [ 13.823535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0 [ 13.823964] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.824424] flags: 0x200000000000040(head|node=0|zone=2) [ 13.824841] page_type: f5(slab) [ 13.825086] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.826407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.826873] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.827460] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.828000] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff [ 13.828905] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.829653] page dumped because: kasan: bad access detected [ 13.829982] [ 13.830773] Memory state around the buggy address: [ 13.831002] ffff888100aa1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.831531] ffff888100aa1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.832560] >ffff888100aa1280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.832968] ^ [ 13.833700] ffff888100aa1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.834554] ffff888100aa1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.835037] ================================================================== [ 13.754766] ================================================================== [ 13.755239] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.755608] Write of size 1 at addr ffff888100aa12da by task kunit_try_catch/179 [ 13.756395] [ 13.756633] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.756742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.756770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.756816] Call Trace: [ 13.756860] <TASK> [ 13.756904] dump_stack_lvl+0x73/0xb0 [ 13.757365] print_report+0xd1/0x650 [ 13.757744] ? __virt_addr_valid+0x1db/0x2d0 [ 13.757883] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.757918] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.757945] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.757968] kasan_report+0x141/0x180 [ 13.757994] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.758022] __asan_report_store1_noabort+0x1b/0x30 [ 13.758044] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.758074] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.758106] ? finish_task_switch.isra.0+0x153/0x700 [ 13.758131] ? __switch_to+0x5d9/0xf60 [ 13.758154] ? dequeue_task_fair+0x156/0x4e0 [ 13.758179] ? __schedule+0x10cc/0x2b60 [ 13.758207] ? __pfx_read_tsc+0x10/0x10 [ 13.758260] krealloc_less_oob+0x1c/0x30 [ 13.758290] kunit_try_run_case+0x1a5/0x480 [ 13.758330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.758384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.758425] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.758462] ? __kthread_parkme+0x82/0x180 [ 13.758497] ? preempt_count_sub+0x50/0x80 [ 13.758537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.758575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.758614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.758646] kthread+0x337/0x6f0 [ 13.758665] ? trace_preempt_on+0x20/0xc0 [ 13.758690] ? __pfx_kthread+0x10/0x10 [ 13.758710] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.758733] ? calculate_sigpending+0x7b/0xa0 [ 13.758756] ? __pfx_kthread+0x10/0x10 [ 13.758776] ret_from_fork+0x41/0x80 [ 13.758797] ? __pfx_kthread+0x10/0x10 [ 13.758816] ret_from_fork_asm+0x1a/0x30 [ 13.758849] </TASK> [ 13.758862] [ 13.773424] Allocated by task 179: [ 13.773919] kasan_save_stack+0x45/0x70 [ 13.774654] kasan_save_track+0x18/0x40 [ 13.774837] kasan_save_alloc_info+0x3b/0x50 [ 13.775006] __kasan_krealloc+0x190/0x1f0 [ 13.775596] krealloc_noprof+0xf3/0x340 [ 13.776000] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.776671] krealloc_less_oob+0x1c/0x30 [ 13.777391] kunit_try_run_case+0x1a5/0x480 [ 13.777716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.777936] kthread+0x337/0x6f0 [ 13.778838] ret_from_fork+0x41/0x80 [ 13.779065] ret_from_fork_asm+0x1a/0x30 [ 13.779253] [ 13.779480] The buggy address belongs to the object at ffff888100aa1200 [ 13.779480] which belongs to the cache kmalloc-256 of size 256 [ 13.780577] The buggy address is located 17 bytes to the right of [ 13.780577] allocated 201-byte region [ffff888100aa1200, ffff888100aa12c9) [ 13.782464] [ 13.782599] The buggy address belongs to the physical page: [ 13.783351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0 [ 13.783989] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.785034] flags: 0x200000000000040(head|node=0|zone=2) [ 13.785723] page_type: f5(slab) [ 13.785930] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.786750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.787418] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.787854] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.788647] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff [ 13.789476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.789971] page dumped because: kasan: bad access detected [ 13.790409] [ 13.790794] Memory state around the buggy address: [ 13.791128] ffff888100aa1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.791578] ffff888100aa1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.791936] >ffff888100aa1280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.793278] ^ [ 13.793768] ffff888100aa1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.794457] ffff888100aa1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.794806] ================================================================== [ 13.942758] ================================================================== [ 13.943763] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.944505] Write of size 1 at addr ffff8881022aa0c9 by task kunit_try_catch/183 [ 13.945138] [ 13.945573] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 13.945731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.945779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.945828] Call Trace: [ 13.945859] <TASK> [ 13.945900] dump_stack_lvl+0x73/0xb0 [ 13.946019] print_report+0xd1/0x650 [ 13.946075] ? __virt_addr_valid+0x1db/0x2d0 [ 13.946123] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.946165] ? kasan_addr_to_slab+0x11/0xa0 [ 13.946240] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.946300] kasan_report+0x141/0x180 [ 13.946391] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.946426] __asan_report_store1_noabort+0x1b/0x30 [ 13.946451] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.946478] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.946501] ? finish_task_switch.isra.0+0x153/0x700 [ 13.946541] ? __switch_to+0x5d9/0xf60 [ 13.946580] ? dequeue_task_fair+0x166/0x4e0 [ 13.946621] ? __schedule+0x10cc/0x2b60 [ 13.946660] ? __pfx_read_tsc+0x10/0x10 [ 13.946699] krealloc_large_less_oob+0x1c/0x30 [ 13.946732] kunit_try_run_case+0x1a5/0x480 [ 13.946774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.946808] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.946848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.946884] ? __kthread_parkme+0x82/0x180 [ 13.946921] ? preempt_count_sub+0x50/0x80 [ 13.946961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.947000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.947039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.947064] kthread+0x337/0x6f0 [ 13.947109] ? __pfx_kthread+0x10/0x10 [ 13.947209] ? calculate_sigpending+0x7b/0xa0 [ 13.947252] ? __pfx_kthread+0x10/0x10 [ 13.947283] ret_from_fork+0x41/0x80 [ 13.947319] ? __pfx_kthread+0x10/0x10 [ 13.947359] ret_from_fork_asm+0x1a/0x30 [ 13.947398] </TASK> [ 13.947412] [ 13.967400] The buggy address belongs to the physical page: [ 13.968162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a8 [ 13.968877] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.969892] flags: 0x200000000000040(head|node=0|zone=2) [ 13.970399] page_type: f8(unknown) [ 13.970575] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.970803] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.971625] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.972019] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.973000] head: 0200000000000002 ffffea000408aa01 00000000ffffffff 00000000ffffffff [ 13.973565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.973989] page dumped because: kasan: bad access detected [ 13.974740] [ 13.974930] Memory state around the buggy address: [ 13.975938] ffff8881022a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.976881] ffff8881022aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.977611] >ffff8881022aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.978092] ^ [ 13.979082] ffff8881022aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.979517] ffff8881022aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.979866] ==================================================================
[ 22.717557] ================================================================== [ 22.728627] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 22.736280] Write of size 1 at addr ffff88810314fac9 by task kunit_try_catch/201 [ 22.743682] [ 22.745183] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 22.745192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.745194] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.745197] Call Trace: [ 22.745199] <TASK> [ 22.745201] dump_stack_lvl+0x73/0xb0 [ 22.745205] print_report+0xd1/0x650 [ 22.745209] ? __virt_addr_valid+0x1db/0x2d0 [ 22.745213] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.745221] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745225] kasan_report+0x141/0x180 [ 22.745229] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745234] __asan_report_store1_noabort+0x1b/0x30 [ 22.745238] krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745242] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.745245] ? finish_task_switch.isra.0+0x153/0x700 [ 22.745250] ? __switch_to+0x5d9/0xf60 [ 22.745253] ? dequeue_task_fair+0x166/0x4e0 [ 22.745258] ? __schedule+0x10cc/0x2b60 [ 22.745263] krealloc_less_oob+0x1c/0x30 [ 22.745266] kunit_try_run_case+0x1a2/0x480 [ 22.745271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.745275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.745280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.745284] ? __kthread_parkme+0x82/0x180 [ 22.745288] ? preempt_count_sub+0x50/0x80 [ 22.745293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.745298] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.745302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.745306] kthread+0x334/0x6f0 [ 22.745309] ? trace_preempt_on+0x20/0xc0 [ 22.745314] ? __pfx_kthread+0x10/0x10 [ 22.745317] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.745321] ? calculate_sigpending+0x7b/0xa0 [ 22.745325] ? __pfx_kthread+0x10/0x10 [ 22.745328] ret_from_fork+0x3e/0x80 [ 22.745332] ? __pfx_kthread+0x10/0x10 [ 22.745335] ret_from_fork_asm+0x1a/0x30 [ 22.745341] </TASK> [ 22.745342] [ 22.924526] Allocated by task 201: [ 22.927933] kasan_save_stack+0x45/0x70 [ 22.931798] kasan_save_track+0x18/0x40 [ 22.935639] kasan_save_alloc_info+0x3b/0x50 [ 22.939945] __kasan_krealloc+0x190/0x1f0 [ 22.943993] krealloc_noprof+0xf3/0x340 [ 22.947831] krealloc_less_oob_helper+0x1aa/0x11d0 [ 22.952626] krealloc_less_oob+0x1c/0x30 [ 22.956549] kunit_try_run_case+0x1a2/0x480 [ 22.960737] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.966134] kthread+0x334/0x6f0 [ 22.969368] ret_from_fork+0x3e/0x80 [ 22.972969] ret_from_fork_asm+0x1a/0x30 [ 22.976926] [ 22.978452] The buggy address belongs to the object at ffff88810314fa00 [ 22.978452] which belongs to the cache kmalloc-256 of size 256 [ 22.990971] The buggy address is located 0 bytes to the right of [ 22.990971] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 23.003929] [ 23.005449] The buggy address belongs to the physical page: [ 23.011021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 23.019027] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.026681] flags: 0x200000000000040(head|node=0|zone=2) [ 23.031994] page_type: f5(slab) [ 23.035142] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.042889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.050662] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.058489] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.066313] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 23.074139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.081982] page dumped because: kasan: bad access detected [ 23.087557] [ 23.089056] Memory state around the buggy address: [ 23.093847] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.101069] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.108294] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.115513] ^ [ 23.121086] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.128306] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.135525] ================================================================== [ 23.564314] ================================================================== [ 23.571545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 23.579205] Write of size 1 at addr ffff88810314fada by task kunit_try_catch/201 [ 23.586596] [ 23.588099] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 23.588107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.588109] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.588112] Call Trace: [ 23.588113] <TASK> [ 23.588115] dump_stack_lvl+0x73/0xb0 [ 23.588119] print_report+0xd1/0x650 [ 23.588123] ? __virt_addr_valid+0x1db/0x2d0 [ 23.588127] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.588135] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588139] kasan_report+0x141/0x180 [ 23.588143] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588148] __asan_report_store1_noabort+0x1b/0x30 [ 23.588152] krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588156] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.588159] ? finish_task_switch.isra.0+0x153/0x700 [ 23.588164] ? __switch_to+0x5d9/0xf60 [ 23.588168] ? dequeue_task_fair+0x166/0x4e0 [ 23.588172] ? __schedule+0x10cc/0x2b60 [ 23.588177] krealloc_less_oob+0x1c/0x30 [ 23.588180] kunit_try_run_case+0x1a2/0x480 [ 23.588185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.588189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.588194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.588199] ? __kthread_parkme+0x82/0x180 [ 23.588203] ? preempt_count_sub+0x50/0x80 [ 23.588207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.588212] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.588216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.588221] kthread+0x334/0x6f0 [ 23.588223] ? trace_preempt_on+0x20/0xc0 [ 23.588228] ? __pfx_kthread+0x10/0x10 [ 23.588231] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.588235] ? calculate_sigpending+0x7b/0xa0 [ 23.588239] ? __pfx_kthread+0x10/0x10 [ 23.588242] ret_from_fork+0x3e/0x80 [ 23.588246] ? __pfx_kthread+0x10/0x10 [ 23.588249] ret_from_fork_asm+0x1a/0x30 [ 23.588255] </TASK> [ 23.588257] [ 23.767478] Allocated by task 201: [ 23.770884] kasan_save_stack+0x45/0x70 [ 23.774759] kasan_save_track+0x18/0x40 [ 23.778605] kasan_save_alloc_info+0x3b/0x50 [ 23.782880] __kasan_krealloc+0x190/0x1f0 [ 23.786891] krealloc_noprof+0xf3/0x340 [ 23.790756] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.795549] krealloc_less_oob+0x1c/0x30 [ 23.799475] kunit_try_run_case+0x1a2/0x480 [ 23.803660] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.809060] kthread+0x334/0x6f0 [ 23.812293] ret_from_fork+0x3e/0x80 [ 23.815874] ret_from_fork_asm+0x1a/0x30 [ 23.819799] [ 23.821298] The buggy address belongs to the object at ffff88810314fa00 [ 23.821298] which belongs to the cache kmalloc-256 of size 256 [ 23.833812] The buggy address is located 17 bytes to the right of [ 23.833812] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 23.846848] [ 23.848348] The buggy address belongs to the physical page: [ 23.853929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 23.861935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.869588] flags: 0x200000000000040(head|node=0|zone=2) [ 23.874930] page_type: f5(slab) [ 23.878073] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.885813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.893552] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.901379] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.909206] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 23.917039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.924863] page dumped because: kasan: bad access detected [ 23.930437] [ 23.931937] Memory state around the buggy address: [ 23.936748] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.943973] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.951193] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.958413] ^ [ 23.964507] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.971726] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.978955] ================================================================== [ 26.558086] ================================================================== [ 26.565317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 26.572970] Write of size 1 at addr ffff888102a320ea by task kunit_try_catch/205 [ 26.580363] [ 26.581862] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 26.581869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.581871] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.581874] Call Trace: [ 26.581876] <TASK> [ 26.581877] dump_stack_lvl+0x73/0xb0 [ 26.581881] print_report+0xd1/0x650 [ 26.581885] ? __virt_addr_valid+0x1db/0x2d0 [ 26.581889] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581892] ? kasan_addr_to_slab+0x11/0xa0 [ 26.581896] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581917] kasan_report+0x141/0x180 [ 26.581921] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581926] __asan_report_store1_noabort+0x1b/0x30 [ 26.581930] krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581934] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 26.581938] ? finish_task_switch.isra.0+0x153/0x700 [ 26.581943] ? __switch_to+0x5d9/0xf60 [ 26.581959] ? dequeue_task_fair+0x166/0x4e0 [ 26.581963] ? __schedule+0x10cc/0x2b60 [ 26.581968] krealloc_large_less_oob+0x1c/0x30 [ 26.581971] kunit_try_run_case+0x1a2/0x480 [ 26.581976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.581980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.581985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.581989] ? __kthread_parkme+0x82/0x180 [ 26.581993] ? preempt_count_sub+0x50/0x80 [ 26.581998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.582003] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.582007] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.582011] kthread+0x334/0x6f0 [ 26.582014] ? trace_preempt_on+0x20/0xc0 [ 26.582018] ? __pfx_kthread+0x10/0x10 [ 26.582022] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.582026] ? calculate_sigpending+0x7b/0xa0 [ 26.582030] ? __pfx_kthread+0x10/0x10 [ 26.582033] ret_from_fork+0x3e/0x80 [ 26.582037] ? __pfx_kthread+0x10/0x10 [ 26.582040] ret_from_fork_asm+0x1a/0x30 [ 26.582045] </TASK> [ 26.582047] [ 26.760654] The buggy address belongs to the physical page: [ 26.766229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 26.774235] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.781888] flags: 0x200000000000040(head|node=0|zone=2) [ 26.787227] page_type: f8(unknown) [ 26.790632] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.798372] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.806111] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.813938] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.821790] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 26.829615] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.837440] page dumped because: kasan: bad access detected [ 26.843014] [ 26.844512] Memory state around the buggy address: [ 26.849305] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.856524] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.863743] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.870973] ^ [ 26.877584] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.884804] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.892024] ================================================================== [ 26.217515] ================================================================== [ 26.224753] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 26.232406] Write of size 1 at addr ffff888102a320da by task kunit_try_catch/205 [ 26.239799] [ 26.241300] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 26.241307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.241309] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.241312] Call Trace: [ 26.241314] <TASK> [ 26.241315] dump_stack_lvl+0x73/0xb0 [ 26.241319] print_report+0xd1/0x650 [ 26.241323] ? __virt_addr_valid+0x1db/0x2d0 [ 26.241327] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241330] ? kasan_addr_to_slab+0x11/0xa0 [ 26.241334] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241338] kasan_report+0x141/0x180 [ 26.241342] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241347] __asan_report_store1_noabort+0x1b/0x30 [ 26.241351] krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241355] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 26.241359] ? finish_task_switch.isra.0+0x153/0x700 [ 26.241363] ? __switch_to+0x5d9/0xf60 [ 26.241367] ? dequeue_task_fair+0x166/0x4e0 [ 26.241371] ? __schedule+0x10cc/0x2b60 [ 26.241376] krealloc_large_less_oob+0x1c/0x30 [ 26.241380] kunit_try_run_case+0x1a2/0x480 [ 26.241384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.241389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.241393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.241398] ? __kthread_parkme+0x82/0x180 [ 26.241402] ? preempt_count_sub+0x50/0x80 [ 26.241406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.241411] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.241415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.241420] kthread+0x334/0x6f0 [ 26.241423] ? trace_preempt_on+0x20/0xc0 [ 26.241427] ? __pfx_kthread+0x10/0x10 [ 26.241430] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.241434] ? calculate_sigpending+0x7b/0xa0 [ 26.241438] ? __pfx_kthread+0x10/0x10 [ 26.241441] ret_from_fork+0x3e/0x80 [ 26.241445] ? __pfx_kthread+0x10/0x10 [ 26.241449] ret_from_fork_asm+0x1a/0x30 [ 26.241454] </TASK> [ 26.241456] [ 26.419987] The buggy address belongs to the physical page: [ 26.425560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 26.433568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.441222] flags: 0x200000000000040(head|node=0|zone=2) [ 26.446531] page_type: f8(unknown) [ 26.449939] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.457706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.465443] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.473269] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.481097] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 26.488931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.496781] page dumped because: kasan: bad access detected [ 26.502354] [ 26.503853] Memory state around the buggy address: [ 26.508647] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.515868] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.523093] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.530314] ^ [ 26.536405] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.543626] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.550843] ================================================================== [ 24.408641] ================================================================== [ 24.415872] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 24.423526] Write of size 1 at addr ffff88810314faeb by task kunit_try_catch/201 [ 24.430929] [ 24.432426] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 24.432434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.432436] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.432439] Call Trace: [ 24.432440] <TASK> [ 24.432442] dump_stack_lvl+0x73/0xb0 [ 24.432446] print_report+0xd1/0x650 [ 24.432450] ? __virt_addr_valid+0x1db/0x2d0 [ 24.432454] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.432461] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432465] kasan_report+0x141/0x180 [ 24.432469] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432474] __asan_report_store1_noabort+0x1b/0x30 [ 24.432478] krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432482] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.432486] ? finish_task_switch.isra.0+0x153/0x700 [ 24.432490] ? __switch_to+0x5d9/0xf60 [ 24.432494] ? dequeue_task_fair+0x166/0x4e0 [ 24.432498] ? __schedule+0x10cc/0x2b60 [ 24.432503] krealloc_less_oob+0x1c/0x30 [ 24.432506] kunit_try_run_case+0x1a2/0x480 [ 24.432511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.432515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.432520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.432524] ? __kthread_parkme+0x82/0x180 [ 24.432528] ? preempt_count_sub+0x50/0x80 [ 24.432533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.432537] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.432542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.432546] kthread+0x334/0x6f0 [ 24.432549] ? trace_preempt_on+0x20/0xc0 [ 24.432553] ? __pfx_kthread+0x10/0x10 [ 24.432556] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.432560] ? calculate_sigpending+0x7b/0xa0 [ 24.432564] ? __pfx_kthread+0x10/0x10 [ 24.432567] ret_from_fork+0x3e/0x80 [ 24.432571] ? __pfx_kthread+0x10/0x10 [ 24.432574] ret_from_fork_asm+0x1a/0x30 [ 24.432580] </TASK> [ 24.432581] [ 24.611782] Allocated by task 201: [ 24.615188] kasan_save_stack+0x45/0x70 [ 24.619036] kasan_save_track+0x18/0x40 [ 24.622874] kasan_save_alloc_info+0x3b/0x50 [ 24.627146] __kasan_krealloc+0x190/0x1f0 [ 24.631160] krealloc_noprof+0xf3/0x340 [ 24.634998] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.639792] krealloc_less_oob+0x1c/0x30 [ 24.643718] kunit_try_run_case+0x1a2/0x480 [ 24.647932] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.653354] kthread+0x334/0x6f0 [ 24.656587] ret_from_fork+0x3e/0x80 [ 24.660168] ret_from_fork_asm+0x1a/0x30 [ 24.664093] [ 24.665593] The buggy address belongs to the object at ffff88810314fa00 [ 24.665593] which belongs to the cache kmalloc-256 of size 256 [ 24.678109] The buggy address is located 34 bytes to the right of [ 24.678109] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 24.691143] [ 24.692640] The buggy address belongs to the physical page: [ 24.698214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 24.706221] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.713875] flags: 0x200000000000040(head|node=0|zone=2) [ 24.719186] page_type: f5(slab) [ 24.722335] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.730082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.737830] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.745664] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.753490] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 24.761316] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.769141] page dumped because: kasan: bad access detected [ 24.774713] [ 24.776214] Memory state around the buggy address: [ 24.781007] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.788225] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.795446] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.802673] ^ [ 24.809285] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.816505] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.823724] ================================================================== [ 23.986186] ================================================================== [ 23.993425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 24.001079] Write of size 1 at addr ffff88810314faea by task kunit_try_catch/201 [ 24.008470] [ 24.009982] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 24.009989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.009991] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.009995] Call Trace: [ 24.009996] <TASK> [ 24.009998] dump_stack_lvl+0x73/0xb0 [ 24.010001] print_report+0xd1/0x650 [ 24.010005] ? __virt_addr_valid+0x1db/0x2d0 [ 24.010009] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.010017] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010021] kasan_report+0x141/0x180 [ 24.010025] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010030] __asan_report_store1_noabort+0x1b/0x30 [ 24.010034] krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010038] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.010041] ? finish_task_switch.isra.0+0x153/0x700 [ 24.010046] ? __switch_to+0x5d9/0xf60 [ 24.010049] ? dequeue_task_fair+0x166/0x4e0 [ 24.010054] ? __schedule+0x10cc/0x2b60 [ 24.010059] krealloc_less_oob+0x1c/0x30 [ 24.010062] kunit_try_run_case+0x1a2/0x480 [ 24.010067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.010071] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.010076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.010080] ? __kthread_parkme+0x82/0x180 [ 24.010084] ? preempt_count_sub+0x50/0x80 [ 24.010089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.010093] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.010097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.010102] kthread+0x334/0x6f0 [ 24.010105] ? trace_preempt_on+0x20/0xc0 [ 24.010109] ? __pfx_kthread+0x10/0x10 [ 24.010112] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.010116] ? calculate_sigpending+0x7b/0xa0 [ 24.010120] ? __pfx_kthread+0x10/0x10 [ 24.010123] ret_from_fork+0x3e/0x80 [ 24.010127] ? __pfx_kthread+0x10/0x10 [ 24.010130] ret_from_fork_asm+0x1a/0x30 [ 24.010136] </TASK> [ 24.010137] [ 24.189473] Allocated by task 201: [ 24.192879] kasan_save_stack+0x45/0x70 [ 24.196719] kasan_save_track+0x18/0x40 [ 24.200558] kasan_save_alloc_info+0x3b/0x50 [ 24.204830] __kasan_krealloc+0x190/0x1f0 [ 24.208842] krealloc_noprof+0xf3/0x340 [ 24.212683] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.217476] krealloc_less_oob+0x1c/0x30 [ 24.221401] kunit_try_run_case+0x1a2/0x480 [ 24.225588] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.230987] kthread+0x334/0x6f0 [ 24.234218] ret_from_fork+0x3e/0x80 [ 24.237800] ret_from_fork_asm+0x1a/0x30 [ 24.241724] [ 24.243225] The buggy address belongs to the object at ffff88810314fa00 [ 24.243225] which belongs to the cache kmalloc-256 of size 256 [ 24.255741] The buggy address is located 33 bytes to the right of [ 24.255741] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 24.268782] [ 24.270280] The buggy address belongs to the physical page: [ 24.275856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 24.283863] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.291515] flags: 0x200000000000040(head|node=0|zone=2) [ 24.296829] page_type: f5(slab) [ 24.299975] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.307712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.315454] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.323288] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.331112] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 24.338940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.346791] page dumped because: kasan: bad access detected [ 24.352362] [ 24.353864] Memory state around the buggy address: [ 24.358656] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.365874] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.373094] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.380314] ^ [ 24.386934] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.394181] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.401398] ================================================================== [ 25.532823] ================================================================== [ 25.544416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 25.552077] Write of size 1 at addr ffff888102a320c9 by task kunit_try_catch/205 [ 25.559479] [ 25.560977] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 25.560984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.560986] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.560990] Call Trace: [ 25.560991] <TASK> [ 25.560993] dump_stack_lvl+0x73/0xb0 [ 25.560997] print_report+0xd1/0x650 [ 25.561001] ? __virt_addr_valid+0x1db/0x2d0 [ 25.561005] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561008] ? kasan_addr_to_slab+0x11/0xa0 [ 25.561013] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561016] kasan_report+0x141/0x180 [ 25.561021] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561025] __asan_report_store1_noabort+0x1b/0x30 [ 25.561029] krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561033] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 25.561037] ? finish_task_switch.isra.0+0x153/0x700 [ 25.561041] ? __switch_to+0x5d9/0xf60 [ 25.561045] ? dequeue_task_fair+0x166/0x4e0 [ 25.561049] ? __schedule+0x10cc/0x2b60 [ 25.561054] krealloc_large_less_oob+0x1c/0x30 [ 25.561058] kunit_try_run_case+0x1a2/0x480 [ 25.561062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.561067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.561071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.561076] ? __kthread_parkme+0x82/0x180 [ 25.561080] ? preempt_count_sub+0x50/0x80 [ 25.561085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.561089] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.561094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.561098] kthread+0x334/0x6f0 [ 25.561101] ? trace_preempt_on+0x20/0xc0 [ 25.561105] ? __pfx_kthread+0x10/0x10 [ 25.561108] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.561112] ? calculate_sigpending+0x7b/0xa0 [ 25.561116] ? __pfx_kthread+0x10/0x10 [ 25.561119] ret_from_fork+0x3e/0x80 [ 25.561123] ? __pfx_kthread+0x10/0x10 [ 25.561126] ret_from_fork_asm+0x1a/0x30 [ 25.561132] </TASK> [ 25.561133] [ 25.739682] The buggy address belongs to the physical page: [ 25.745256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 25.753262] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.760931] flags: 0x200000000000040(head|node=0|zone=2) [ 25.766271] page_type: f8(unknown) [ 25.769678] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.777416] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.785158] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.792983] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.800809] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 25.808637] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.816470] page dumped because: kasan: bad access detected [ 25.822040] [ 25.823532] Memory state around the buggy address: [ 25.828324] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.835545] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.842764] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.849984] ^ [ 25.855557] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.862774] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.869994] ================================================================== [ 26.899249] ================================================================== [ 26.906489] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 26.914141] Write of size 1 at addr ffff888102a320eb by task kunit_try_catch/205 [ 26.921533] [ 26.923034] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 26.923042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.923044] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.923047] Call Trace: [ 26.923048] <TASK> [ 26.923050] dump_stack_lvl+0x73/0xb0 [ 26.923053] print_report+0xd1/0x650 [ 26.923057] ? __virt_addr_valid+0x1db/0x2d0 [ 26.923061] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923064] ? kasan_addr_to_slab+0x11/0xa0 [ 26.923068] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923072] kasan_report+0x141/0x180 [ 26.923076] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923081] __asan_report_store1_noabort+0x1b/0x30 [ 26.923085] krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923089] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 26.923093] ? finish_task_switch.isra.0+0x153/0x700 [ 26.923097] ? __switch_to+0x5d9/0xf60 [ 26.923101] ? dequeue_task_fair+0x166/0x4e0 [ 26.923105] ? __schedule+0x10cc/0x2b60 [ 26.923110] krealloc_large_less_oob+0x1c/0x30 [ 26.923113] kunit_try_run_case+0x1a2/0x480 [ 26.923118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.923122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.923127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.923131] ? __kthread_parkme+0x82/0x180 [ 26.923135] ? preempt_count_sub+0x50/0x80 [ 26.923140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.923145] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.923149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.923153] kthread+0x334/0x6f0 [ 26.923156] ? trace_preempt_on+0x20/0xc0 [ 26.923160] ? __pfx_kthread+0x10/0x10 [ 26.923163] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.923168] ? calculate_sigpending+0x7b/0xa0 [ 26.923171] ? __pfx_kthread+0x10/0x10 [ 26.923175] ret_from_fork+0x3e/0x80 [ 26.923179] ? __pfx_kthread+0x10/0x10 [ 26.923182] ret_from_fork_asm+0x1a/0x30 [ 26.923187] </TASK> [ 26.923189] [ 27.101661] The buggy address belongs to the physical page: [ 27.107235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 27.115241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.122895] flags: 0x200000000000040(head|node=0|zone=2) [ 27.128234] page_type: f8(unknown) [ 27.131640] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.139388] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.147127] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.154973] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.162804] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 27.170630] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.178455] page dumped because: kasan: bad access detected [ 27.184029] [ 27.185529] Memory state around the buggy address: [ 27.190321] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.197541] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.204769] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 27.211997] ^ [ 27.218610] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.225837] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.233056] ================================================================== [ 23.142771] ================================================================== [ 23.149998] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 23.157651] Write of size 1 at addr ffff88810314fad0 by task kunit_try_catch/201 [ 23.165044] [ 23.166545] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 23.166553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.166555] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.166558] Call Trace: [ 23.166560] <TASK> [ 23.166561] dump_stack_lvl+0x73/0xb0 [ 23.166565] print_report+0xd1/0x650 [ 23.166570] ? __virt_addr_valid+0x1db/0x2d0 [ 23.166573] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166577] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.166581] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166585] kasan_report+0x141/0x180 [ 23.166589] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166594] __asan_report_store1_noabort+0x1b/0x30 [ 23.166598] krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166602] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.166606] ? finish_task_switch.isra.0+0x153/0x700 [ 23.166610] ? __switch_to+0x5d9/0xf60 [ 23.166614] ? dequeue_task_fair+0x166/0x4e0 [ 23.166618] ? __schedule+0x10cc/0x2b60 [ 23.166623] krealloc_less_oob+0x1c/0x30 [ 23.166626] kunit_try_run_case+0x1a2/0x480 [ 23.166631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.166635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.166640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.166645] ? __kthread_parkme+0x82/0x180 [ 23.166649] ? preempt_count_sub+0x50/0x80 [ 23.166653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.166658] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.166662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.166666] kthread+0x334/0x6f0 [ 23.166669] ? trace_preempt_on+0x20/0xc0 [ 23.166674] ? __pfx_kthread+0x10/0x10 [ 23.166677] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.166681] ? calculate_sigpending+0x7b/0xa0 [ 23.166685] ? __pfx_kthread+0x10/0x10 [ 23.166688] ret_from_fork+0x3e/0x80 [ 23.166692] ? __pfx_kthread+0x10/0x10 [ 23.166695] ret_from_fork_asm+0x1a/0x30 [ 23.166700] </TASK> [ 23.166702] [ 23.345950] Allocated by task 201: [ 23.349373] kasan_save_stack+0x45/0x70 [ 23.353214] kasan_save_track+0x18/0x40 [ 23.357052] kasan_save_alloc_info+0x3b/0x50 [ 23.361327] __kasan_krealloc+0x190/0x1f0 [ 23.365346] krealloc_noprof+0xf3/0x340 [ 23.369185] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.373980] krealloc_less_oob+0x1c/0x30 [ 23.377931] kunit_try_run_case+0x1a2/0x480 [ 23.382116] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.387517] kthread+0x334/0x6f0 [ 23.390748] ret_from_fork+0x3e/0x80 [ 23.394329] ret_from_fork_asm+0x1a/0x30 [ 23.398254] [ 23.399754] The buggy address belongs to the object at ffff88810314fa00 [ 23.399754] which belongs to the cache kmalloc-256 of size 256 [ 23.412267] The buggy address is located 7 bytes to the right of [ 23.412267] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 23.425215] [ 23.426715] The buggy address belongs to the physical page: [ 23.432287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 23.440287] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.447961] flags: 0x200000000000040(head|node=0|zone=2) [ 23.453280] page_type: f5(slab) [ 23.456425] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.464164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.471930] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.479782] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.487608] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 23.495442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.503269] page dumped because: kasan: bad access detected [ 23.508839] [ 23.510331] Memory state around the buggy address: [ 23.515123] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.522345] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.529570] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.536791] ^ [ 23.542625] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.549850] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.557071] ================================================================== [ 25.877258] ================================================================== [ 25.884504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 25.892163] Write of size 1 at addr ffff888102a320d0 by task kunit_try_catch/205 [ 25.899557] [ 25.901055] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 25.901063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.901065] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.901068] Call Trace: [ 25.901069] <TASK> [ 25.901071] dump_stack_lvl+0x73/0xb0 [ 25.901075] print_report+0xd1/0x650 [ 25.901079] ? __virt_addr_valid+0x1db/0x2d0 [ 25.901083] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901086] ? kasan_addr_to_slab+0x11/0xa0 [ 25.901090] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901094] kasan_report+0x141/0x180 [ 25.901098] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901103] __asan_report_store1_noabort+0x1b/0x30 [ 25.901107] krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901111] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 25.901115] ? finish_task_switch.isra.0+0x153/0x700 [ 25.901119] ? __switch_to+0x5d9/0xf60 [ 25.901123] ? dequeue_task_fair+0x166/0x4e0 [ 25.901127] ? __schedule+0x10cc/0x2b60 [ 25.901132] krealloc_large_less_oob+0x1c/0x30 [ 25.901135] kunit_try_run_case+0x1a2/0x480 [ 25.901140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.901144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.901149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.901154] ? __kthread_parkme+0x82/0x180 [ 25.901158] ? preempt_count_sub+0x50/0x80 [ 25.901162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.901167] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.901171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.901176] kthread+0x334/0x6f0 [ 25.901178] ? trace_preempt_on+0x20/0xc0 [ 25.901183] ? __pfx_kthread+0x10/0x10 [ 25.901186] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.901190] ? calculate_sigpending+0x7b/0xa0 [ 25.901194] ? __pfx_kthread+0x10/0x10 [ 25.901197] ret_from_fork+0x3e/0x80 [ 25.901201] ? __pfx_kthread+0x10/0x10 [ 25.901204] ret_from_fork_asm+0x1a/0x30 [ 25.901210] </TASK> [ 25.901211] [ 26.079708] The buggy address belongs to the physical page: [ 26.085282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 26.093291] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.100972] flags: 0x200000000000040(head|node=0|zone=2) [ 26.106290] page_type: f8(unknown) [ 26.109695] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.117436] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.125175] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.133000] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.140829] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 26.148662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.156494] page dumped because: kasan: bad access detected [ 26.162069] [ 26.163568] Memory state around the buggy address: [ 26.168360] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.175580] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.182800] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.190019] ^ [ 26.195851] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.203070] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.210288] ==================================================================