Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.752830] ================================================================== [ 17.753015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.753090] Write of size 1 at addr fff00000c4480ceb by task kunit_try_catch/160 [ 17.753157] [ 17.753205] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.753282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.753357] Hardware name: linux,dummy-virt (DT) [ 17.753433] Call trace: [ 17.753462] show_stack+0x20/0x38 (C) [ 17.753526] dump_stack_lvl+0x8c/0xd0 [ 17.753573] print_report+0x118/0x608 [ 17.753617] kasan_report+0xdc/0x128 [ 17.753660] __asan_report_store1_noabort+0x20/0x30 [ 17.753709] krealloc_less_oob_helper+0xa58/0xc50 [ 17.753754] krealloc_less_oob+0x20/0x38 [ 17.754394] kunit_try_run_case+0x170/0x3f0 [ 17.754457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.754527] kthread+0x328/0x630 [ 17.754599] ret_from_fork+0x10/0x20 [ 17.754666] [ 17.754685] Allocated by task 160: [ 17.754711] kasan_save_stack+0x3c/0x68 [ 17.754749] kasan_save_track+0x20/0x40 [ 17.754783] kasan_save_alloc_info+0x40/0x58 [ 17.754855] __kasan_krealloc+0x118/0x178 [ 17.754890] krealloc_noprof+0x128/0x360 [ 17.754924] krealloc_less_oob_helper+0x168/0xc50 [ 17.754962] krealloc_less_oob+0x20/0x38 [ 17.755076] kunit_try_run_case+0x170/0x3f0 [ 17.755121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.755203] kthread+0x328/0x630 [ 17.755240] ret_from_fork+0x10/0x20 [ 17.755274] [ 17.755293] The buggy address belongs to the object at fff00000c4480c00 [ 17.755293] which belongs to the cache kmalloc-256 of size 256 [ 17.755427] The buggy address is located 34 bytes to the right of [ 17.755427] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.755570] [ 17.755630] The buggy address belongs to the physical page: [ 17.755678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.755747] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.755792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.755858] page_type: f5(slab) [ 17.755974] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.756024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.756071] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.756194] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.756355] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.756433] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.756530] page dumped because: kasan: bad access detected [ 17.756605] [ 17.756676] Memory state around the buggy address: [ 17.756718] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756759] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756815] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.756851] ^ [ 17.756889] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756928] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756965] ================================================================== [ 17.789767] ================================================================== [ 17.789935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.790184] Write of size 1 at addr fff00000c784a0da by task kunit_try_catch/164 [ 17.790531] [ 17.790622] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.790701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.790727] Hardware name: linux,dummy-virt (DT) [ 17.790766] Call trace: [ 17.790875] show_stack+0x20/0x38 (C) [ 17.790930] dump_stack_lvl+0x8c/0xd0 [ 17.791000] print_report+0x118/0x608 [ 17.791130] kasan_report+0xdc/0x128 [ 17.791173] __asan_report_store1_noabort+0x20/0x30 [ 17.791221] krealloc_less_oob_helper+0xa80/0xc50 [ 17.791267] krealloc_large_less_oob+0x20/0x38 [ 17.791311] kunit_try_run_case+0x170/0x3f0 [ 17.791368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.791420] kthread+0x328/0x630 [ 17.791464] ret_from_fork+0x10/0x20 [ 17.791510] [ 17.791659] The buggy address belongs to the physical page: [ 17.791697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.792085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.792305] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.792366] page_type: f8(unknown) [ 17.792404] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.792452] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.792499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.792973] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.793045] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.793135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.793174] page dumped because: kasan: bad access detected [ 17.793204] [ 17.793222] Memory state around the buggy address: [ 17.793531] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.793623] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.793786] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.793847] ^ [ 17.793896] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.794017] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.794053] ================================================================== [ 17.736086] ================================================================== [ 17.736146] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.736406] Write of size 1 at addr fff00000c4480cd0 by task kunit_try_catch/160 [ 17.736541] [ 17.736833] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.736981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.737086] Hardware name: linux,dummy-virt (DT) [ 17.737148] Call trace: [ 17.737307] show_stack+0x20/0x38 (C) [ 17.737538] dump_stack_lvl+0x8c/0xd0 [ 17.737701] print_report+0x118/0x608 [ 17.737799] kasan_report+0xdc/0x128 [ 17.737950] __asan_report_store1_noabort+0x20/0x30 [ 17.738071] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.738204] krealloc_less_oob+0x20/0x38 [ 17.738279] kunit_try_run_case+0x170/0x3f0 [ 17.738371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.738682] kthread+0x328/0x630 [ 17.738760] ret_from_fork+0x10/0x20 [ 17.738931] [ 17.739028] Allocated by task 160: [ 17.739131] kasan_save_stack+0x3c/0x68 [ 17.739221] kasan_save_track+0x20/0x40 [ 17.739275] kasan_save_alloc_info+0x40/0x58 [ 17.739621] __kasan_krealloc+0x118/0x178 [ 17.739691] krealloc_noprof+0x128/0x360 [ 17.739744] krealloc_less_oob_helper+0x168/0xc50 [ 17.739858] krealloc_less_oob+0x20/0x38 [ 17.739913] kunit_try_run_case+0x170/0x3f0 [ 17.739957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.740008] kthread+0x328/0x630 [ 17.740045] ret_from_fork+0x10/0x20 [ 17.740126] [ 17.740146] The buggy address belongs to the object at fff00000c4480c00 [ 17.740146] which belongs to the cache kmalloc-256 of size 256 [ 17.740201] The buggy address is located 7 bytes to the right of [ 17.740201] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.740418] [ 17.740439] The buggy address belongs to the physical page: [ 17.740469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.740551] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.740607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.740658] page_type: f5(slab) [ 17.740715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.740762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.740811] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.740857] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.740905] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.740968] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.741006] page dumped because: kasan: bad access detected [ 17.741041] [ 17.741059] Memory state around the buggy address: [ 17.741088] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.741130] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.741170] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.741215] ^ [ 17.741258] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.741307] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.741369] ================================================================== [ 17.777889] ================================================================== [ 17.778109] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.778328] Write of size 1 at addr fff00000c784a0c9 by task kunit_try_catch/164 [ 17.778457] [ 17.778486] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.778568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.778699] Hardware name: linux,dummy-virt (DT) [ 17.778736] Call trace: [ 17.778847] show_stack+0x20/0x38 (C) [ 17.778900] dump_stack_lvl+0x8c/0xd0 [ 17.778948] print_report+0x118/0x608 [ 17.778992] kasan_report+0xdc/0x128 [ 17.779041] __asan_report_store1_noabort+0x20/0x30 [ 17.779261] krealloc_less_oob_helper+0xa48/0xc50 [ 17.779372] krealloc_large_less_oob+0x20/0x38 [ 17.779417] kunit_try_run_case+0x170/0x3f0 [ 17.779798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.780408] kthread+0x328/0x630 [ 17.780465] ret_from_fork+0x10/0x20 [ 17.780570] [ 17.780597] The buggy address belongs to the physical page: [ 17.780672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.780722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.780767] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.780815] page_type: f8(unknown) [ 17.780877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.780926] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.781268] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.781370] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.781451] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.781497] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.781683] page dumped because: kasan: bad access detected [ 17.781921] [ 17.781941] Memory state around the buggy address: [ 17.781973] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.782015] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.782057] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.782104] ^ [ 17.782139] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.782479] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.782738] ================================================================== [ 17.749254] ================================================================== [ 17.749362] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.749427] Write of size 1 at addr fff00000c4480cea by task kunit_try_catch/160 [ 17.749476] [ 17.749504] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.749599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.749625] Hardware name: linux,dummy-virt (DT) [ 17.749673] Call trace: [ 17.749699] show_stack+0x20/0x38 (C) [ 17.749745] dump_stack_lvl+0x8c/0xd0 [ 17.749791] print_report+0x118/0x608 [ 17.749855] kasan_report+0xdc/0x128 [ 17.749899] __asan_report_store1_noabort+0x20/0x30 [ 17.749949] krealloc_less_oob_helper+0xae4/0xc50 [ 17.749996] krealloc_less_oob+0x20/0x38 [ 17.750039] kunit_try_run_case+0x170/0x3f0 [ 17.750087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.750267] kthread+0x328/0x630 [ 17.750322] ret_from_fork+0x10/0x20 [ 17.750400] [ 17.750419] Allocated by task 160: [ 17.750445] kasan_save_stack+0x3c/0x68 [ 17.750502] kasan_save_track+0x20/0x40 [ 17.750548] kasan_save_alloc_info+0x40/0x58 [ 17.750586] __kasan_krealloc+0x118/0x178 [ 17.750621] krealloc_noprof+0x128/0x360 [ 17.750656] krealloc_less_oob_helper+0x168/0xc50 [ 17.750721] krealloc_less_oob+0x20/0x38 [ 17.750755] kunit_try_run_case+0x170/0x3f0 [ 17.750793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.750842] kthread+0x328/0x630 [ 17.750877] ret_from_fork+0x10/0x20 [ 17.750911] [ 17.750931] The buggy address belongs to the object at fff00000c4480c00 [ 17.750931] which belongs to the cache kmalloc-256 of size 256 [ 17.751007] The buggy address is located 33 bytes to the right of [ 17.751007] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.751078] [ 17.751171] The buggy address belongs to the physical page: [ 17.751221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.751277] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.751331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.751414] page_type: f5(slab) [ 17.751450] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.751507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.751572] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.751646] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.751695] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.751765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.751804] page dumped because: kasan: bad access detected [ 17.751833] [ 17.751850] Memory state around the buggy address: [ 17.751879] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.752014] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.752061] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.752098] ^ [ 17.752155] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.752218] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.752303] ================================================================== [ 17.783805] ================================================================== [ 17.783850] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.784347] Write of size 1 at addr fff00000c784a0d0 by task kunit_try_catch/164 [ 17.784424] [ 17.784454] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.784815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.784923] Hardware name: linux,dummy-virt (DT) [ 17.784960] Call trace: [ 17.785010] show_stack+0x20/0x38 (C) [ 17.785060] dump_stack_lvl+0x8c/0xd0 [ 17.785254] print_report+0x118/0x608 [ 17.785305] kasan_report+0xdc/0x128 [ 17.785500] __asan_report_store1_noabort+0x20/0x30 [ 17.785644] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.785691] krealloc_large_less_oob+0x20/0x38 [ 17.785736] kunit_try_run_case+0x170/0x3f0 [ 17.785783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.786093] kthread+0x328/0x630 [ 17.786553] ret_from_fork+0x10/0x20 [ 17.786611] [ 17.786631] The buggy address belongs to the physical page: [ 17.786667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.786866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.787183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.787237] page_type: f8(unknown) [ 17.787288] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.787360] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.787764] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.787816] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.787864] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.787911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.787949] page dumped because: kasan: bad access detected [ 17.788241] [ 17.788263] Memory state around the buggy address: [ 17.788294] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788348] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788388] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.788424] ^ [ 17.788459] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.788499] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.788977] ================================================================== [ 17.743431] ================================================================== [ 17.744064] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.744127] Write of size 1 at addr fff00000c4480cda by task kunit_try_catch/160 [ 17.744487] [ 17.744526] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.744606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.744657] Hardware name: linux,dummy-virt (DT) [ 17.744688] Call trace: [ 17.744710] show_stack+0x20/0x38 (C) [ 17.744759] dump_stack_lvl+0x8c/0xd0 [ 17.744969] print_report+0x118/0x608 [ 17.745046] kasan_report+0xdc/0x128 [ 17.745168] __asan_report_store1_noabort+0x20/0x30 [ 17.745231] krealloc_less_oob_helper+0xa80/0xc50 [ 17.745277] krealloc_less_oob+0x20/0x38 [ 17.745320] kunit_try_run_case+0x170/0x3f0 [ 17.745403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.745456] kthread+0x328/0x630 [ 17.745504] ret_from_fork+0x10/0x20 [ 17.745681] [ 17.745768] Allocated by task 160: [ 17.745845] kasan_save_stack+0x3c/0x68 [ 17.745950] kasan_save_track+0x20/0x40 [ 17.745986] kasan_save_alloc_info+0x40/0x58 [ 17.746051] __kasan_krealloc+0x118/0x178 [ 17.746373] krealloc_noprof+0x128/0x360 [ 17.746452] krealloc_less_oob_helper+0x168/0xc50 [ 17.746567] krealloc_less_oob+0x20/0x38 [ 17.746637] kunit_try_run_case+0x170/0x3f0 [ 17.746686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.746729] kthread+0x328/0x630 [ 17.746764] ret_from_fork+0x10/0x20 [ 17.746798] [ 17.746818] The buggy address belongs to the object at fff00000c4480c00 [ 17.746818] which belongs to the cache kmalloc-256 of size 256 [ 17.747025] The buggy address is located 17 bytes to the right of [ 17.747025] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.747146] [ 17.747184] The buggy address belongs to the physical page: [ 17.747248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.747367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.747425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.747474] page_type: f5(slab) [ 17.747510] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.747583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.747792] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.747915] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.748011] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.748094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.748170] page dumped because: kasan: bad access detected [ 17.748201] [ 17.748243] Memory state around the buggy address: [ 17.748297] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.748352] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.748495] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.748563] ^ [ 17.748680] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.748768] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.748866] ================================================================== [ 17.794283] ================================================================== [ 17.794323] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.794563] Write of size 1 at addr fff00000c784a0ea by task kunit_try_catch/164 [ 17.794615] [ 17.794642] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.794719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.794744] Hardware name: linux,dummy-virt (DT) [ 17.794773] Call trace: [ 17.794842] show_stack+0x20/0x38 (C) [ 17.795130] dump_stack_lvl+0x8c/0xd0 [ 17.795253] print_report+0x118/0x608 [ 17.795385] kasan_report+0xdc/0x128 [ 17.795429] __asan_report_store1_noabort+0x20/0x30 [ 17.795480] krealloc_less_oob_helper+0xae4/0xc50 [ 17.795813] krealloc_large_less_oob+0x20/0x38 [ 17.795901] kunit_try_run_case+0x170/0x3f0 [ 17.795955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.796007] kthread+0x328/0x630 [ 17.796051] ret_from_fork+0x10/0x20 [ 17.796096] [ 17.796125] The buggy address belongs to the physical page: [ 17.796259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.796585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.796637] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.796686] page_type: f8(unknown) [ 17.796882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.796933] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.796981] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.797092] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.797140] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.797186] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.797225] page dumped because: kasan: bad access detected [ 17.797303] [ 17.797327] Memory state around the buggy address: [ 17.797369] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.797410] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.797451] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.797486] ^ [ 17.797523] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.797573] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.797609] ================================================================== [ 17.798562] ================================================================== [ 17.798607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.798835] Write of size 1 at addr fff00000c784a0eb by task kunit_try_catch/164 [ 17.798969] [ 17.799115] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.799455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.799484] Hardware name: linux,dummy-virt (DT) [ 17.799514] Call trace: [ 17.799540] show_stack+0x20/0x38 (C) [ 17.799629] dump_stack_lvl+0x8c/0xd0 [ 17.799676] print_report+0x118/0x608 [ 17.799926] kasan_report+0xdc/0x128 [ 17.799972] __asan_report_store1_noabort+0x20/0x30 [ 17.800023] krealloc_less_oob_helper+0xa58/0xc50 [ 17.800070] krealloc_large_less_oob+0x20/0x38 [ 17.800115] kunit_try_run_case+0x170/0x3f0 [ 17.800163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.800224] kthread+0x328/0x630 [ 17.800271] ret_from_fork+0x10/0x20 [ 17.800383] [ 17.800410] The buggy address belongs to the physical page: [ 17.800690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.800809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.800856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.800925] page_type: f8(unknown) [ 17.800969] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.801017] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.801306] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.801482] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.801563] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.801696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.801735] page dumped because: kasan: bad access detected [ 17.801765] [ 17.801783] Memory state around the buggy address: [ 17.801812] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.801854] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.801894] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.802083] ^ [ 17.802192] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.802240] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.802276] ================================================================== [ 17.729819] ================================================================== [ 17.729873] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.729921] Write of size 1 at addr fff00000c4480cc9 by task kunit_try_catch/160 [ 17.729969] [ 17.729997] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.730074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.730100] Hardware name: linux,dummy-virt (DT) [ 17.730129] Call trace: [ 17.730150] show_stack+0x20/0x38 (C) [ 17.730196] dump_stack_lvl+0x8c/0xd0 [ 17.730244] print_report+0x118/0x608 [ 17.730290] kasan_report+0xdc/0x128 [ 17.730352] __asan_report_store1_noabort+0x20/0x30 [ 17.730402] krealloc_less_oob_helper+0xa48/0xc50 [ 17.730449] krealloc_less_oob+0x20/0x38 [ 17.730493] kunit_try_run_case+0x170/0x3f0 [ 17.730541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.730593] kthread+0x328/0x630 [ 17.730639] ret_from_fork+0x10/0x20 [ 17.730685] [ 17.730703] Allocated by task 160: [ 17.730729] kasan_save_stack+0x3c/0x68 [ 17.730766] kasan_save_track+0x20/0x40 [ 17.730801] kasan_save_alloc_info+0x40/0x58 [ 17.730843] __kasan_krealloc+0x118/0x178 [ 17.730878] krealloc_noprof+0x128/0x360 [ 17.730913] krealloc_less_oob_helper+0x168/0xc50 [ 17.730950] krealloc_less_oob+0x20/0x38 [ 17.733712] kunit_try_run_case+0x170/0x3f0 [ 17.733767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.733811] kthread+0x328/0x630 [ 17.733855] ret_from_fork+0x10/0x20 [ 17.733890] [ 17.733909] The buggy address belongs to the object at fff00000c4480c00 [ 17.733909] which belongs to the cache kmalloc-256 of size 256 [ 17.733967] The buggy address is located 0 bytes to the right of [ 17.733967] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.734028] [ 17.734047] The buggy address belongs to the physical page: [ 17.734078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.734128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.734175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.734224] page_type: f5(slab) [ 17.734261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.734309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.734371] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.734418] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.734465] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.734512] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.734552] page dumped because: kasan: bad access detected [ 17.734582] [ 17.734600] Memory state around the buggy address: [ 17.734629] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.734670] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.734711] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.734747] ^ [ 17.734780] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.734820] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.734862] ==================================================================
[ 10.923084] ================================================================== [ 10.924197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 10.924456] Write of size 1 at addr ffff888100a9c6ea by task kunit_try_catch/178 [ 10.925679] [ 10.926260] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.926309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.926332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.926353] Call Trace: [ 10.926370] <TASK> [ 10.926385] dump_stack_lvl+0x73/0xb0 [ 10.926413] print_report+0xd1/0x650 [ 10.926436] ? __virt_addr_valid+0x1db/0x2d0 [ 10.926458] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.926478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.926501] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.926522] kasan_report+0x141/0x180 [ 10.926544] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.926569] __asan_report_store1_noabort+0x1b/0x30 [ 10.926591] krealloc_less_oob_helper+0xe90/0x11d0 [ 10.926613] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.926634] ? finish_task_switch.isra.0+0x153/0x700 [ 10.926657] ? __switch_to+0x5d9/0xf60 [ 10.926677] ? dequeue_task_fair+0x166/0x4e0 [ 10.926702] ? __schedule+0x10cc/0x2b60 [ 10.926727] ? __pfx_read_tsc+0x10/0x10 [ 10.926751] krealloc_less_oob+0x1c/0x30 [ 10.926771] kunit_try_run_case+0x1a5/0x480 [ 10.926792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.926810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.926979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.927014] ? __kthread_parkme+0x82/0x180 [ 10.927036] ? preempt_count_sub+0x50/0x80 [ 10.927060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.927082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.927140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.927165] kthread+0x337/0x6f0 [ 10.927182] ? trace_preempt_on+0x20/0xc0 [ 10.927205] ? __pfx_kthread+0x10/0x10 [ 10.927223] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.927246] ? calculate_sigpending+0x7b/0xa0 [ 10.927267] ? __pfx_kthread+0x10/0x10 [ 10.927285] ret_from_fork+0x41/0x80 [ 10.927306] ? __pfx_kthread+0x10/0x10 [ 10.927323] ret_from_fork_asm+0x1a/0x30 [ 10.927353] </TASK> [ 10.927365] [ 10.942296] Allocated by task 178: [ 10.942484] kasan_save_stack+0x45/0x70 [ 10.943008] kasan_save_track+0x18/0x40 [ 10.943622] kasan_save_alloc_info+0x3b/0x50 [ 10.944164] __kasan_krealloc+0x190/0x1f0 [ 10.944370] krealloc_noprof+0xf3/0x340 [ 10.944678] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.945217] krealloc_less_oob+0x1c/0x30 [ 10.945413] kunit_try_run_case+0x1a5/0x480 [ 10.945868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.946178] kthread+0x337/0x6f0 [ 10.946463] ret_from_fork+0x41/0x80 [ 10.947019] ret_from_fork_asm+0x1a/0x30 [ 10.947274] [ 10.947531] The buggy address belongs to the object at ffff888100a9c600 [ 10.947531] which belongs to the cache kmalloc-256 of size 256 [ 10.948592] The buggy address is located 33 bytes to the right of [ 10.948592] allocated 201-byte region [ffff888100a9c600, ffff888100a9c6c9) [ 10.949527] [ 10.949764] The buggy address belongs to the physical page: [ 10.950319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9c [ 10.950918] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.951257] flags: 0x200000000000040(head|node=0|zone=2) [ 10.951843] page_type: f5(slab) [ 10.952270] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.952813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.953284] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.953914] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.954380] head: 0200000000000001 ffffea000402a701 00000000ffffffff 00000000ffffffff [ 10.955280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.955929] page dumped because: kasan: bad access detected [ 10.956328] [ 10.956589] Memory state around the buggy address: [ 10.956807] ffff888100a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.957265] ffff888100a9c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.957805] >ffff888100a9c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.958701] ^ [ 10.959481] ffff888100a9c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.960129] ffff888100a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.960448] ================================================================== [ 10.898587] ================================================================== [ 10.899028] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 10.899376] Write of size 1 at addr ffff888100a9c6da by task kunit_try_catch/178 [ 10.899745] [ 10.900021] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.900082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.900094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.900117] Call Trace: [ 10.900144] <TASK> [ 10.900161] dump_stack_lvl+0x73/0xb0 [ 10.900187] print_report+0xd1/0x650 [ 10.900211] ? __virt_addr_valid+0x1db/0x2d0 [ 10.900232] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.900252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.900275] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.900297] kasan_report+0x141/0x180 [ 10.900322] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.900358] __asan_report_store1_noabort+0x1b/0x30 [ 10.900380] krealloc_less_oob_helper+0xec6/0x11d0 [ 10.900402] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.900434] ? finish_task_switch.isra.0+0x153/0x700 [ 10.900459] ? __switch_to+0x5d9/0xf60 [ 10.900479] ? dequeue_task_fair+0x166/0x4e0 [ 10.900513] ? __schedule+0x10cc/0x2b60 [ 10.900539] ? __pfx_read_tsc+0x10/0x10 [ 10.900562] krealloc_less_oob+0x1c/0x30 [ 10.900592] kunit_try_run_case+0x1a5/0x480 [ 10.900614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.900633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.900677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.900702] ? __kthread_parkme+0x82/0x180 [ 10.900723] ? preempt_count_sub+0x50/0x80 [ 10.900748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.900768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.900792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.900816] kthread+0x337/0x6f0 [ 10.900928] ? trace_preempt_on+0x20/0xc0 [ 10.900953] ? __pfx_kthread+0x10/0x10 [ 10.900983] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.901006] ? calculate_sigpending+0x7b/0xa0 [ 10.901028] ? __pfx_kthread+0x10/0x10 [ 10.901056] ret_from_fork+0x41/0x80 [ 10.901077] ? __pfx_kthread+0x10/0x10 [ 10.901096] ret_from_fork_asm+0x1a/0x30 [ 10.901136] </TASK> [ 10.901148] [ 10.909786] Allocated by task 178: [ 10.910091] kasan_save_stack+0x45/0x70 [ 10.910351] kasan_save_track+0x18/0x40 [ 10.910590] kasan_save_alloc_info+0x3b/0x50 [ 10.910800] __kasan_krealloc+0x190/0x1f0 [ 10.911125] krealloc_noprof+0xf3/0x340 [ 10.911347] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.911525] krealloc_less_oob+0x1c/0x30 [ 10.911724] kunit_try_run_case+0x1a5/0x480 [ 10.912010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.912272] kthread+0x337/0x6f0 [ 10.912418] ret_from_fork+0x41/0x80 [ 10.912961] ret_from_fork_asm+0x1a/0x30 [ 10.913246] [ 10.913382] The buggy address belongs to the object at ffff888100a9c600 [ 10.913382] which belongs to the cache kmalloc-256 of size 256 [ 10.913991] The buggy address is located 17 bytes to the right of [ 10.913991] allocated 201-byte region [ffff888100a9c600, ffff888100a9c6c9) [ 10.914726] [ 10.914803] The buggy address belongs to the physical page: [ 10.915134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9c [ 10.915582] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.916078] flags: 0x200000000000040(head|node=0|zone=2) [ 10.916358] page_type: f5(slab) [ 10.916564] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.917091] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.917395] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.917793] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.918243] head: 0200000000000001 ffffea000402a701 00000000ffffffff 00000000ffffffff [ 10.918618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.919044] page dumped because: kasan: bad access detected [ 10.919273] [ 10.919383] Memory state around the buggy address: [ 10.919657] ffff888100a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.919966] ffff888100a9c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.920293] >ffff888100a9c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.920594] ^ [ 10.920862] ffff888100a9c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.921334] ffff888100a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.921734] ================================================================== [ 10.870985] ================================================================== [ 10.871651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 10.872181] Write of size 1 at addr ffff888100a9c6d0 by task kunit_try_catch/178 [ 10.873296] [ 10.873415] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.873459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.873471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.873491] Call Trace: [ 10.873503] <TASK> [ 10.873724] dump_stack_lvl+0x73/0xb0 [ 10.873760] print_report+0xd1/0x650 [ 10.873799] ? __virt_addr_valid+0x1db/0x2d0 [ 10.873822] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.873930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.873957] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.873978] kasan_report+0x141/0x180 [ 10.874002] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.874027] __asan_report_store1_noabort+0x1b/0x30 [ 10.874049] krealloc_less_oob_helper+0xe23/0x11d0 [ 10.874072] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.874095] ? finish_task_switch.isra.0+0x153/0x700 [ 10.874119] ? __switch_to+0x5d9/0xf60 [ 10.874140] ? dequeue_task_fair+0x166/0x4e0 [ 10.874165] ? __schedule+0x10cc/0x2b60 [ 10.874188] ? __pfx_read_tsc+0x10/0x10 [ 10.874211] krealloc_less_oob+0x1c/0x30 [ 10.874230] kunit_try_run_case+0x1a5/0x480 [ 10.874252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.874271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.874295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.874319] ? __kthread_parkme+0x82/0x180 [ 10.874340] ? preempt_count_sub+0x50/0x80 [ 10.874364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.874385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.874408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.874432] kthread+0x337/0x6f0 [ 10.874450] ? trace_preempt_on+0x20/0xc0 [ 10.874474] ? __pfx_kthread+0x10/0x10 [ 10.874492] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.874514] ? calculate_sigpending+0x7b/0xa0 [ 10.874536] ? __pfx_kthread+0x10/0x10 [ 10.874554] ret_from_fork+0x41/0x80 [ 10.874575] ? __pfx_kthread+0x10/0x10 [ 10.874594] ret_from_fork_asm+0x1a/0x30 [ 10.874623] </TASK> [ 10.874635] [ 10.886669] Allocated by task 178: [ 10.886889] kasan_save_stack+0x45/0x70 [ 10.887199] kasan_save_track+0x18/0x40 [ 10.887427] kasan_save_alloc_info+0x3b/0x50 [ 10.887621] __kasan_krealloc+0x190/0x1f0 [ 10.887967] krealloc_noprof+0xf3/0x340 [ 10.888336] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.888580] krealloc_less_oob+0x1c/0x30 [ 10.888766] kunit_try_run_case+0x1a5/0x480 [ 10.889040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.889395] kthread+0x337/0x6f0 [ 10.889549] ret_from_fork+0x41/0x80 [ 10.889762] ret_from_fork_asm+0x1a/0x30 [ 10.890004] [ 10.890128] The buggy address belongs to the object at ffff888100a9c600 [ 10.890128] which belongs to the cache kmalloc-256 of size 256 [ 10.890569] The buggy address is located 7 bytes to the right of [ 10.890569] allocated 201-byte region [ffff888100a9c600, ffff888100a9c6c9) [ 10.891155] [ 10.891233] The buggy address belongs to the physical page: [ 10.891477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9c [ 10.891894] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.892427] flags: 0x200000000000040(head|node=0|zone=2) [ 10.892716] page_type: f5(slab) [ 10.892969] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.893231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.893603] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.893978] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.894576] head: 0200000000000001 ffffea000402a701 00000000ffffffff 00000000ffffffff [ 10.895012] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.895364] page dumped because: kasan: bad access detected [ 10.895655] [ 10.895744] Memory state around the buggy address: [ 10.896206] ffff888100a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.896466] ffff888100a9c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.896783] >ffff888100a9c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.897067] ^ [ 10.897298] ffff888100a9c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.897620] ffff888100a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.898006] ================================================================== [ 11.075949] ================================================================== [ 11.076298] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.076763] Write of size 1 at addr ffff8881026fe0d0 by task kunit_try_catch/182 [ 11.077072] [ 11.077155] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.077197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.077208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.077229] Call Trace: [ 11.077244] <TASK> [ 11.077399] dump_stack_lvl+0x73/0xb0 [ 11.077429] print_report+0xd1/0x650 [ 11.077454] ? __virt_addr_valid+0x1db/0x2d0 [ 11.077476] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.077497] ? kasan_addr_to_slab+0x11/0xa0 [ 11.077520] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.077541] kasan_report+0x141/0x180 [ 11.077564] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.077589] __asan_report_store1_noabort+0x1b/0x30 [ 11.077611] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.077634] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.077656] ? finish_task_switch.isra.0+0x153/0x700 [ 11.077680] ? __switch_to+0x5d9/0xf60 [ 11.077702] ? dequeue_task_fair+0x166/0x4e0 [ 11.077727] ? __schedule+0x10cc/0x2b60 [ 11.077751] ? __pfx_read_tsc+0x10/0x10 [ 11.077775] krealloc_large_less_oob+0x1c/0x30 [ 11.077795] kunit_try_run_case+0x1a5/0x480 [ 11.077817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.078192] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.078232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.078257] ? __kthread_parkme+0x82/0x180 [ 11.078280] ? preempt_count_sub+0x50/0x80 [ 11.078305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.078326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.078350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.078374] kthread+0x337/0x6f0 [ 11.078392] ? trace_preempt_on+0x20/0xc0 [ 11.078416] ? __pfx_kthread+0x10/0x10 [ 11.078435] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.078457] ? calculate_sigpending+0x7b/0xa0 [ 11.078479] ? __pfx_kthread+0x10/0x10 [ 11.078498] ret_from_fork+0x41/0x80 [ 11.078528] ? __pfx_kthread+0x10/0x10 [ 11.078547] ret_from_fork_asm+0x1a/0x30 [ 11.078578] </TASK> [ 11.078590] [ 11.086577] The buggy address belongs to the physical page: [ 11.086827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fc [ 11.087153] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.087487] flags: 0x200000000000040(head|node=0|zone=2) [ 11.087825] page_type: f8(unknown) [ 11.088080] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.088385] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.088731] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.089083] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.089321] head: 0200000000000002 ffffea000409bf01 00000000ffffffff 00000000ffffffff [ 11.089654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.090019] page dumped because: kasan: bad access detected [ 11.090353] [ 11.090503] Memory state around the buggy address: [ 11.090702] ffff8881026fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.091014] ffff8881026fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.091349] >ffff8881026fe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.091907] ^ [ 11.092160] ffff8881026fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.092454] ffff8881026fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.092756] ================================================================== [ 11.132416] ================================================================== [ 11.132718] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.133078] Write of size 1 at addr ffff8881026fe0eb by task kunit_try_catch/182 [ 11.133445] [ 11.133567] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.133611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.133623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.133644] Call Trace: [ 11.133657] <TASK> [ 11.133672] dump_stack_lvl+0x73/0xb0 [ 11.133699] print_report+0xd1/0x650 [ 11.133742] ? __virt_addr_valid+0x1db/0x2d0 [ 11.133764] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.133785] ? kasan_addr_to_slab+0x11/0xa0 [ 11.133806] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.133827] kasan_report+0x141/0x180 [ 11.133850] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.133887] __asan_report_store1_noabort+0x1b/0x30 [ 11.133909] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.133932] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.133953] ? finish_task_switch.isra.0+0x153/0x700 [ 11.134051] ? __switch_to+0x5d9/0xf60 [ 11.134074] ? dequeue_task_fair+0x166/0x4e0 [ 11.134099] ? __schedule+0x10cc/0x2b60 [ 11.134136] ? __pfx_read_tsc+0x10/0x10 [ 11.134173] krealloc_large_less_oob+0x1c/0x30 [ 11.134195] kunit_try_run_case+0x1a5/0x480 [ 11.134218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.134250] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.134287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.134325] ? __kthread_parkme+0x82/0x180 [ 11.134347] ? preempt_count_sub+0x50/0x80 [ 11.134371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.134391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.134415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.134439] kthread+0x337/0x6f0 [ 11.134455] ? trace_preempt_on+0x20/0xc0 [ 11.134479] ? __pfx_kthread+0x10/0x10 [ 11.134497] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.134520] ? calculate_sigpending+0x7b/0xa0 [ 11.134541] ? __pfx_kthread+0x10/0x10 [ 11.134560] ret_from_fork+0x41/0x80 [ 11.134582] ? __pfx_kthread+0x10/0x10 [ 11.134600] ret_from_fork_asm+0x1a/0x30 [ 11.134631] </TASK> [ 11.134642] [ 11.143910] The buggy address belongs to the physical page: [ 11.144187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fc [ 11.144734] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.145156] flags: 0x200000000000040(head|node=0|zone=2) [ 11.145418] page_type: f8(unknown) [ 11.145631] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.145993] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.146513] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.146753] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.147225] head: 0200000000000002 ffffea000409bf01 00000000ffffffff 00000000ffffffff [ 11.147571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.147978] page dumped because: kasan: bad access detected [ 11.148256] [ 11.148330] Memory state around the buggy address: [ 11.148491] ffff8881026fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.149007] ffff8881026fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.149349] >ffff8881026fe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.149726] ^ [ 11.149969] ffff8881026fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.150417] ffff8881026fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.150804] ================================================================== [ 10.839542] ================================================================== [ 10.840196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 10.841340] Write of size 1 at addr ffff888100a9c6c9 by task kunit_try_catch/178 [ 10.842301] [ 10.842435] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.842484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.842496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.842628] Call Trace: [ 10.842646] <TASK> [ 10.842662] dump_stack_lvl+0x73/0xb0 [ 10.842691] print_report+0xd1/0x650 [ 10.842715] ? __virt_addr_valid+0x1db/0x2d0 [ 10.842737] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.842757] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.842780] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.842801] kasan_report+0x141/0x180 [ 10.842825] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.842958] __asan_report_store1_noabort+0x1b/0x30 [ 10.842984] krealloc_less_oob_helper+0xd70/0x11d0 [ 10.843007] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.843030] ? finish_task_switch.isra.0+0x153/0x700 [ 10.843053] ? __switch_to+0x5d9/0xf60 [ 10.843074] ? dequeue_task_fair+0x166/0x4e0 [ 10.843098] ? __schedule+0x10cc/0x2b60 [ 10.843121] ? __pfx_read_tsc+0x10/0x10 [ 10.843144] krealloc_less_oob+0x1c/0x30 [ 10.843162] kunit_try_run_case+0x1a5/0x480 [ 10.843184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.843203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.843228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.843252] ? __kthread_parkme+0x82/0x180 [ 10.843273] ? preempt_count_sub+0x50/0x80 [ 10.843298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.843319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.843342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.843366] kthread+0x337/0x6f0 [ 10.843382] ? trace_preempt_on+0x20/0xc0 [ 10.843406] ? __pfx_kthread+0x10/0x10 [ 10.843424] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.843445] ? calculate_sigpending+0x7b/0xa0 [ 10.843466] ? __pfx_kthread+0x10/0x10 [ 10.843485] ret_from_fork+0x41/0x80 [ 10.843505] ? __pfx_kthread+0x10/0x10 [ 10.843524] ret_from_fork_asm+0x1a/0x30 [ 10.843554] </TASK> [ 10.843565] [ 10.855326] Allocated by task 178: [ 10.855665] kasan_save_stack+0x45/0x70 [ 10.855928] kasan_save_track+0x18/0x40 [ 10.856103] kasan_save_alloc_info+0x3b/0x50 [ 10.856417] __kasan_krealloc+0x190/0x1f0 [ 10.856790] krealloc_noprof+0xf3/0x340 [ 10.857066] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.857440] krealloc_less_oob+0x1c/0x30 [ 10.857784] kunit_try_run_case+0x1a5/0x480 [ 10.858232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.858616] kthread+0x337/0x6f0 [ 10.858957] ret_from_fork+0x41/0x80 [ 10.859104] ret_from_fork_asm+0x1a/0x30 [ 10.859299] [ 10.859385] The buggy address belongs to the object at ffff888100a9c600 [ 10.859385] which belongs to the cache kmalloc-256 of size 256 [ 10.860253] The buggy address is located 0 bytes to the right of [ 10.860253] allocated 201-byte region [ffff888100a9c600, ffff888100a9c6c9) [ 10.861151] [ 10.861258] The buggy address belongs to the physical page: [ 10.861598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9c [ 10.862124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.862449] flags: 0x200000000000040(head|node=0|zone=2) [ 10.862925] page_type: f5(slab) [ 10.863112] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.863690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.864229] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.864708] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.865278] head: 0200000000000001 ffffea000402a701 00000000ffffffff 00000000ffffffff [ 10.865812] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.866347] page dumped because: kasan: bad access detected [ 10.866591] [ 10.866963] Memory state around the buggy address: [ 10.867300] ffff888100a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.867761] ffff888100a9c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.868414] >ffff888100a9c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.868955] ^ [ 10.869195] ffff888100a9c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.869507] ffff888100a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.870097] ================================================================== [ 11.093142] ================================================================== [ 11.093596] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.093848] Write of size 1 at addr ffff8881026fe0da by task kunit_try_catch/182 [ 11.094163] [ 11.094274] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.094317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.094328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.094362] Call Trace: [ 11.094377] <TASK> [ 11.094392] dump_stack_lvl+0x73/0xb0 [ 11.094418] print_report+0xd1/0x650 [ 11.094443] ? __virt_addr_valid+0x1db/0x2d0 [ 11.094465] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.094487] ? kasan_addr_to_slab+0x11/0xa0 [ 11.094511] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.094533] kasan_report+0x141/0x180 [ 11.094557] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.094582] __asan_report_store1_noabort+0x1b/0x30 [ 11.094604] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.094628] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.094649] ? finish_task_switch.isra.0+0x153/0x700 [ 11.094673] ? __switch_to+0x5d9/0xf60 [ 11.094694] ? dequeue_task_fair+0x166/0x4e0 [ 11.094718] ? __schedule+0x10cc/0x2b60 [ 11.094743] ? __pfx_read_tsc+0x10/0x10 [ 11.094767] krealloc_large_less_oob+0x1c/0x30 [ 11.094787] kunit_try_run_case+0x1a5/0x480 [ 11.094809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.094828] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.094853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.094888] ? __kthread_parkme+0x82/0x180 [ 11.094911] ? preempt_count_sub+0x50/0x80 [ 11.094935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.094956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.094980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.095003] kthread+0x337/0x6f0 [ 11.095021] ? trace_preempt_on+0x20/0xc0 [ 11.095044] ? __pfx_kthread+0x10/0x10 [ 11.095063] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.095085] ? calculate_sigpending+0x7b/0xa0 [ 11.095107] ? __pfx_kthread+0x10/0x10 [ 11.095126] ret_from_fork+0x41/0x80 [ 11.095148] ? __pfx_kthread+0x10/0x10 [ 11.095166] ret_from_fork_asm+0x1a/0x30 [ 11.095197] </TASK> [ 11.095209] [ 11.105864] The buggy address belongs to the physical page: [ 11.106184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fc [ 11.106722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.107257] flags: 0x200000000000040(head|node=0|zone=2) [ 11.107529] page_type: f8(unknown) [ 11.107685] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.108167] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.108515] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.108953] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.109300] head: 0200000000000002 ffffea000409bf01 00000000ffffffff 00000000ffffffff [ 11.109638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.110050] page dumped because: kasan: bad access detected [ 11.110278] [ 11.110377] Memory state around the buggy address: [ 11.110585] ffff8881026fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.110856] ffff8881026fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.111359] >ffff8881026fe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.111718] ^ [ 11.112305] ffff8881026fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.112580] ffff8881026fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.113162] ================================================================== [ 10.961405] ================================================================== [ 10.962140] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 10.962479] Write of size 1 at addr ffff888100a9c6eb by task kunit_try_catch/178 [ 10.963258] [ 10.963398] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.963542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.963567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.963594] Call Trace: [ 10.963613] <TASK> [ 10.963632] dump_stack_lvl+0x73/0xb0 [ 10.963668] print_report+0xd1/0x650 [ 10.963693] ? __virt_addr_valid+0x1db/0x2d0 [ 10.963715] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.963736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.963759] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.963780] kasan_report+0x141/0x180 [ 10.963803] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.963829] __asan_report_store1_noabort+0x1b/0x30 [ 10.963897] krealloc_less_oob_helper+0xd47/0x11d0 [ 10.963921] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.963942] ? finish_task_switch.isra.0+0x153/0x700 [ 10.963966] ? __switch_to+0x5d9/0xf60 [ 10.963988] ? dequeue_task_fair+0x166/0x4e0 [ 10.964012] ? __schedule+0x10cc/0x2b60 [ 10.964037] ? __pfx_read_tsc+0x10/0x10 [ 10.964060] krealloc_less_oob+0x1c/0x30 [ 10.964079] kunit_try_run_case+0x1a5/0x480 [ 10.964102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.964120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.964145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.964170] ? __kthread_parkme+0x82/0x180 [ 10.964192] ? preempt_count_sub+0x50/0x80 [ 10.964216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.964237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.964260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.964284] kthread+0x337/0x6f0 [ 10.964301] ? trace_preempt_on+0x20/0xc0 [ 10.964325] ? __pfx_kthread+0x10/0x10 [ 10.964343] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.964365] ? calculate_sigpending+0x7b/0xa0 [ 10.964387] ? __pfx_kthread+0x10/0x10 [ 10.964406] ret_from_fork+0x41/0x80 [ 10.964427] ? __pfx_kthread+0x10/0x10 [ 10.964445] ret_from_fork_asm+0x1a/0x30 [ 10.964476] </TASK> [ 10.964488] [ 10.977255] Allocated by task 178: [ 10.977440] kasan_save_stack+0x45/0x70 [ 10.977987] kasan_save_track+0x18/0x40 [ 10.978181] kasan_save_alloc_info+0x3b/0x50 [ 10.978375] __kasan_krealloc+0x190/0x1f0 [ 10.978797] krealloc_noprof+0xf3/0x340 [ 10.979413] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.979985] krealloc_less_oob+0x1c/0x30 [ 10.980225] kunit_try_run_case+0x1a5/0x480 [ 10.980431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.981041] kthread+0x337/0x6f0 [ 10.981249] ret_from_fork+0x41/0x80 [ 10.981550] ret_from_fork_asm+0x1a/0x30 [ 10.981982] [ 10.982230] The buggy address belongs to the object at ffff888100a9c600 [ 10.982230] which belongs to the cache kmalloc-256 of size 256 [ 10.983035] The buggy address is located 34 bytes to the right of [ 10.983035] allocated 201-byte region [ffff888100a9c600, ffff888100a9c6c9) [ 10.983866] [ 10.984049] The buggy address belongs to the physical page: [ 10.984295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9c [ 10.985031] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.985652] flags: 0x200000000000040(head|node=0|zone=2) [ 10.986172] page_type: f5(slab) [ 10.986571] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.987012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.987485] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.988299] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.988778] head: 0200000000000001 ffffea000402a701 00000000ffffffff 00000000ffffffff [ 10.989310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.990018] page dumped because: kasan: bad access detected [ 10.990318] [ 10.990541] Memory state around the buggy address: [ 10.990781] ffff888100a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.991259] ffff888100a9c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.991816] >ffff888100a9c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.992427] ^ [ 10.993135] ffff888100a9c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.993440] ffff888100a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.994189] ================================================================== [ 11.113578] ================================================================== [ 11.113973] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.114323] Write of size 1 at addr ffff8881026fe0ea by task kunit_try_catch/182 [ 11.114695] [ 11.114815] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.114940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.114954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.114975] Call Trace: [ 11.114991] <TASK> [ 11.115006] dump_stack_lvl+0x73/0xb0 [ 11.115033] print_report+0xd1/0x650 [ 11.115058] ? __virt_addr_valid+0x1db/0x2d0 [ 11.115098] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.115120] ? kasan_addr_to_slab+0x11/0xa0 [ 11.115141] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.115162] kasan_report+0x141/0x180 [ 11.115185] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.115211] __asan_report_store1_noabort+0x1b/0x30 [ 11.115232] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.115255] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.115276] ? finish_task_switch.isra.0+0x153/0x700 [ 11.115300] ? __switch_to+0x5d9/0xf60 [ 11.115321] ? dequeue_task_fair+0x166/0x4e0 [ 11.115345] ? __schedule+0x10cc/0x2b60 [ 11.115368] ? __pfx_read_tsc+0x10/0x10 [ 11.115392] krealloc_large_less_oob+0x1c/0x30 [ 11.115412] kunit_try_run_case+0x1a5/0x480 [ 11.115452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.115471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.115495] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.115526] ? __kthread_parkme+0x82/0x180 [ 11.115549] ? preempt_count_sub+0x50/0x80 [ 11.115580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.115617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.115653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.115678] kthread+0x337/0x6f0 [ 11.115708] ? trace_preempt_on+0x20/0xc0 [ 11.115733] ? __pfx_kthread+0x10/0x10 [ 11.115751] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.115787] ? calculate_sigpending+0x7b/0xa0 [ 11.115822] ? __pfx_kthread+0x10/0x10 [ 11.115841] ret_from_fork+0x41/0x80 [ 11.115862] ? __pfx_kthread+0x10/0x10 [ 11.115891] ret_from_fork_asm+0x1a/0x30 [ 11.115923] </TASK> [ 11.115934] [ 11.125217] The buggy address belongs to the physical page: [ 11.125574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fc [ 11.125820] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.126186] flags: 0x200000000000040(head|node=0|zone=2) [ 11.126445] page_type: f8(unknown) [ 11.126699] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.127107] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.127452] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.127813] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.128257] head: 0200000000000002 ffffea000409bf01 00000000ffffffff 00000000ffffffff [ 11.128539] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.129095] page dumped because: kasan: bad access detected [ 11.129384] [ 11.129472] Memory state around the buggy address: [ 11.129724] ffff8881026fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.130198] ffff8881026fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.130541] >ffff8881026fe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.130947] ^ [ 11.131238] ffff8881026fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.131594] ffff8881026fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.132013] ================================================================== [ 11.054508] ================================================================== [ 11.055189] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.055546] Write of size 1 at addr ffff8881026fe0c9 by task kunit_try_catch/182 [ 11.055976] [ 11.056103] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.056152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.056164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.056187] Call Trace: [ 11.056200] <TASK> [ 11.056217] dump_stack_lvl+0x73/0xb0 [ 11.056246] print_report+0xd1/0x650 [ 11.056270] ? __virt_addr_valid+0x1db/0x2d0 [ 11.056293] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.056314] ? kasan_addr_to_slab+0x11/0xa0 [ 11.056335] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.056356] kasan_report+0x141/0x180 [ 11.056379] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.056405] __asan_report_store1_noabort+0x1b/0x30 [ 11.056426] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.056449] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.056470] ? finish_task_switch.isra.0+0x153/0x700 [ 11.056548] ? __switch_to+0x5d9/0xf60 [ 11.056589] ? dequeue_task_fair+0x166/0x4e0 [ 11.056614] ? __schedule+0x10cc/0x2b60 [ 11.056645] ? __pfx_read_tsc+0x10/0x10 [ 11.056669] krealloc_large_less_oob+0x1c/0x30 [ 11.056689] kunit_try_run_case+0x1a5/0x480 [ 11.056712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.056732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.056757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.056781] ? __kthread_parkme+0x82/0x180 [ 11.056804] ? preempt_count_sub+0x50/0x80 [ 11.056828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.057067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.057093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.057117] kthread+0x337/0x6f0 [ 11.057135] ? trace_preempt_on+0x20/0xc0 [ 11.057161] ? __pfx_kthread+0x10/0x10 [ 11.057179] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.057202] ? calculate_sigpending+0x7b/0xa0 [ 11.057224] ? __pfx_kthread+0x10/0x10 [ 11.057242] ret_from_fork+0x41/0x80 [ 11.057264] ? __pfx_kthread+0x10/0x10 [ 11.057282] ret_from_fork_asm+0x1a/0x30 [ 11.057314] </TASK> [ 11.057326] [ 11.068590] The buggy address belongs to the physical page: [ 11.068929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fc [ 11.069273] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.069632] flags: 0x200000000000040(head|node=0|zone=2) [ 11.069918] page_type: f8(unknown) [ 11.070375] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.070683] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.071043] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.071401] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.071721] head: 0200000000000002 ffffea000409bf01 00000000ffffffff 00000000ffffffff [ 11.072289] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.072605] page dumped because: kasan: bad access detected [ 11.072914] [ 11.073017] Memory state around the buggy address: [ 11.073237] ffff8881026fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.073665] ffff8881026fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.074050] >ffff8881026fe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.074375] ^ [ 11.074669] ffff8881026fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.075053] ffff8881026fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.075330] ==================================================================