Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 178.029852] ================================================================== [ 178.032197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590 [ 178.033980] Write of size 1 at addr ffff0000c0b824c9 by task kunit_try_catch/136 [ 178.035417] [ 178.035975] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.037904] Hardware name: linux,dummy-virt (DT) [ 178.039138] Call trace: [ 178.039865] dump_backtrace+0x9c/0x128 [ 178.041062] show_stack+0x20/0x38 [ 178.042049] dump_stack_lvl+0x60/0xb0 [ 178.043391] print_report+0xf8/0x5d8 [ 178.044525] kasan_report+0xc8/0x118 [ 178.045856] __asan_store1+0x60/0x70 [ 178.046838] krealloc_less_oob_helper+0x110/0x590 [ 178.048562] krealloc_less_oob+0x20/0x38 [ 178.049835] kunit_try_run_case+0xf8/0x260 [ 178.051123] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.052635] kthread+0x18c/0x1a8 [ 178.053767] ret_from_fork+0x10/0x20 [ 178.054684] [ 178.055358] Allocated by task 136: [ 178.056409] kasan_save_stack+0x3c/0x68 [ 178.057644] kasan_set_track+0x2c/0x40 [ 178.058800] kasan_save_alloc_info+0x24/0x38 [ 178.060145] __kasan_krealloc+0x10c/0x140 [ 178.061500] krealloc+0x10c/0x1a0 [ 178.062800] krealloc_less_oob_helper+0xd4/0x590 [ 178.064433] krealloc_less_oob+0x20/0x38 [ 178.065406] kunit_try_run_case+0xf8/0x260 [ 178.066704] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.068249] kthread+0x18c/0x1a8 [ 178.069525] ret_from_fork+0x10/0x20 [ 178.070449] [ 178.071112] The buggy address belongs to the object at ffff0000c0b82400 [ 178.071112] which belongs to the cache kmalloc-256 of size 256 [ 178.074288] The buggy address is located 0 bytes to the right of [ 178.074288] allocated 201-byte region [ffff0000c0b82400, ffff0000c0b824c9) [ 178.076760] [ 178.078375] The buggy address belongs to the physical page: [ 178.080106] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82 [ 178.082231] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.084090] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 178.086053] page_type: 0xffffffff() [ 178.088170] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 178.089918] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 178.091463] page dumped because: kasan: bad access detected [ 178.092705] [ 178.093219] Memory state around the buggy address: [ 178.095158] ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.096928] ffff0000c0b82400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.098623] >ffff0000c0b82480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 178.100151] ^ [ 178.102051] ffff0000c0b82500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.103668] ffff0000c0b82580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.105439] ================================================================== [ 178.109621] ================================================================== [ 178.111237] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590 [ 178.112959] Write of size 1 at addr ffff0000c0b824d0 by task kunit_try_catch/136 [ 178.114989] [ 178.115826] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.117875] Hardware name: linux,dummy-virt (DT) [ 178.118856] Call trace: [ 178.119832] dump_backtrace+0x9c/0x128 [ 178.121469] show_stack+0x20/0x38 [ 178.122312] dump_stack_lvl+0x60/0xb0 [ 178.123539] print_report+0xf8/0x5d8 [ 178.124704] kasan_report+0xc8/0x118 [ 178.125929] __asan_store1+0x60/0x70 [ 178.127071] krealloc_less_oob_helper+0x140/0x590 [ 178.128319] krealloc_less_oob+0x20/0x38 [ 178.129273] kunit_try_run_case+0xf8/0x260 [ 178.130799] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.132123] kthread+0x18c/0x1a8 [ 178.133632] ret_from_fork+0x10/0x20 [ 178.135230] [ 178.135996] Allocated by task 136: [ 178.137018] kasan_save_stack+0x3c/0x68 [ 178.138199] kasan_set_track+0x2c/0x40 [ 178.139323] kasan_save_alloc_info+0x24/0x38 [ 178.140612] __kasan_krealloc+0x10c/0x140 [ 178.142142] krealloc+0x10c/0x1a0 [ 178.143644] krealloc_less_oob_helper+0xd4/0x590 [ 178.144917] krealloc_less_oob+0x20/0x38 [ 178.146040] kunit_try_run_case+0xf8/0x260 [ 178.147225] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.148657] kthread+0x18c/0x1a8 [ 178.149626] ret_from_fork+0x10/0x20 [ 178.150726] [ 178.151337] The buggy address belongs to the object at ffff0000c0b82400 [ 178.151337] which belongs to the cache kmalloc-256 of size 256 [ 178.153561] The buggy address is located 7 bytes to the right of [ 178.153561] allocated 201-byte region [ffff0000c0b82400, ffff0000c0b824c9) [ 178.156890] [ 178.157465] The buggy address belongs to the physical page: [ 178.158854] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82 [ 178.160861] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.162649] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 178.164658] page_type: 0xffffffff() [ 178.166487] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 178.168183] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 178.170624] page dumped because: kasan: bad access detected [ 178.171852] [ 178.172376] Memory state around the buggy address: [ 178.173517] ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.175178] ffff0000c0b82400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.176787] >ffff0000c0b82480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 178.178427] ^ [ 178.179777] ffff0000c0b82500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.181397] ffff0000c0b82580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.182951] ================================================================== [ 178.796325] ================================================================== [ 178.798958] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590 [ 178.800652] Write of size 1 at addr ffff0000c60220eb by task kunit_try_catch/140 [ 178.802866] [ 178.803456] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.805490] Hardware name: linux,dummy-virt (DT) [ 178.806686] Call trace: [ 178.808076] dump_backtrace+0x9c/0x128 [ 178.809312] show_stack+0x20/0x38 [ 178.810365] dump_stack_lvl+0x60/0xb0 [ 178.811591] print_report+0xf8/0x5d8 [ 178.813794] kasan_report+0xc8/0x118 [ 178.815176] __asan_store1+0x60/0x70 [ 178.816247] krealloc_less_oob_helper+0x1e0/0x590 [ 178.817310] krealloc_pagealloc_less_oob+0x20/0x38 [ 178.818613] kunit_try_run_case+0xf8/0x260 [ 178.819782] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.821238] kthread+0x18c/0x1a8 [ 178.822222] ret_from_fork+0x10/0x20 [ 178.823471] [ 178.824026] The buggy address belongs to the physical page: [ 178.825459] page:00000000dc26f172 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020 [ 178.827549] head:00000000dc26f172 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.829320] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 178.830938] page_type: 0xffffffff() [ 178.831975] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 178.833775] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 178.835358] page dumped because: kasan: bad access detected [ 178.837228] [ 178.837719] Memory state around the buggy address: [ 178.838752] ffff0000c6021f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.840314] ffff0000c6022000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.842644] >ffff0000c6022080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 178.844360] ^ [ 178.845875] ffff0000c6022100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.847477] ffff0000c6022180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.849834] ================================================================== [ 178.267936] ================================================================== [ 178.269498] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590 [ 178.271230] Write of size 1 at addr ffff0000c0b824ea by task kunit_try_catch/136 [ 178.273080] [ 178.273964] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.275450] Hardware name: linux,dummy-virt (DT) [ 178.276301] Call trace: [ 178.277360] dump_backtrace+0x9c/0x128 [ 178.278493] show_stack+0x20/0x38 [ 178.279466] dump_stack_lvl+0x60/0xb0 [ 178.280627] print_report+0xf8/0x5d8 [ 178.281735] kasan_report+0xc8/0x118 [ 178.282952] __asan_store1+0x60/0x70 [ 178.284348] krealloc_less_oob_helper+0x1b8/0x590 [ 178.286343] krealloc_less_oob+0x20/0x38 [ 178.287515] kunit_try_run_case+0xf8/0x260 [ 178.288797] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.290440] kthread+0x18c/0x1a8 [ 178.291417] ret_from_fork+0x10/0x20 [ 178.292502] [ 178.293102] Allocated by task 136: [ 178.294058] kasan_save_stack+0x3c/0x68 [ 178.295181] kasan_set_track+0x2c/0x40 [ 178.296376] kasan_save_alloc_info+0x24/0x38 [ 178.297805] __kasan_krealloc+0x10c/0x140 [ 178.299086] krealloc+0x10c/0x1a0 [ 178.300085] krealloc_less_oob_helper+0xd4/0x590 [ 178.301598] krealloc_less_oob+0x20/0x38 [ 178.302866] kunit_try_run_case+0xf8/0x260 [ 178.303949] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.305263] kthread+0x18c/0x1a8 [ 178.306054] ret_from_fork+0x10/0x20 [ 178.306941] [ 178.307399] The buggy address belongs to the object at ffff0000c0b82400 [ 178.307399] which belongs to the cache kmalloc-256 of size 256 [ 178.310455] The buggy address is located 33 bytes to the right of [ 178.310455] allocated 201-byte region [ffff0000c0b82400, ffff0000c0b824c9) [ 178.313983] [ 178.314952] The buggy address belongs to the physical page: [ 178.316184] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82 [ 178.318566] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.320664] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 178.322448] page_type: 0xffffffff() [ 178.323464] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 178.325231] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 178.327810] page dumped because: kasan: bad access detected [ 178.329564] [ 178.330082] Memory state around the buggy address: [ 178.331324] ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.332955] ffff0000c0b82400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.334506] >ffff0000c0b82480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 178.335951] ^ [ 178.338169] ffff0000c0b82500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.339811] ffff0000c0b82580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.341770] ================================================================== [ 178.569757] ================================================================== [ 178.571957] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590 [ 178.574075] Write of size 1 at addr ffff0000c60220c9 by task kunit_try_catch/140 [ 178.575893] [ 178.576471] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.579133] Hardware name: linux,dummy-virt (DT) [ 178.580271] Call trace: [ 178.581071] dump_backtrace+0x9c/0x128 [ 178.582493] show_stack+0x20/0x38 [ 178.583474] dump_stack_lvl+0x60/0xb0 [ 178.584606] print_report+0xf8/0x5d8 [ 178.586194] kasan_report+0xc8/0x118 [ 178.587297] __asan_store1+0x60/0x70 [ 178.588410] krealloc_less_oob_helper+0x110/0x590 [ 178.589836] krealloc_pagealloc_less_oob+0x20/0x38 [ 178.591372] kunit_try_run_case+0xf8/0x260 [ 178.592828] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.594359] kthread+0x18c/0x1a8 [ 178.595357] ret_from_fork+0x10/0x20 [ 178.596509] [ 178.597211] The buggy address belongs to the physical page: [ 178.598897] page:00000000dc26f172 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020 [ 178.600940] head:00000000dc26f172 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.602788] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 178.604565] page_type: 0xffffffff() [ 178.605889] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 178.607746] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 178.609587] page dumped because: kasan: bad access detected [ 178.610299] [ 178.610613] Memory state around the buggy address: [ 178.611940] ffff0000c6021f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.613870] ffff0000c6022000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.615783] >ffff0000c6022080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 178.617679] ^ [ 178.619163] ffff0000c6022100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.620793] ffff0000c6022180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.622453] ================================================================== [ 178.187395] ================================================================== [ 178.189296] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590 [ 178.191033] Write of size 1 at addr ffff0000c0b824da by task kunit_try_catch/136 [ 178.192773] [ 178.193462] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.195732] Hardware name: linux,dummy-virt (DT) [ 178.196879] Call trace: [ 178.197501] dump_backtrace+0x9c/0x128 [ 178.198779] show_stack+0x20/0x38 [ 178.199807] dump_stack_lvl+0x60/0xb0 [ 178.201094] print_report+0xf8/0x5d8 [ 178.202145] kasan_report+0xc8/0x118 [ 178.203313] __asan_store1+0x60/0x70 [ 178.204421] krealloc_less_oob_helper+0x18c/0x590 [ 178.205848] krealloc_less_oob+0x20/0x38 [ 178.207120] kunit_try_run_case+0xf8/0x260 [ 178.208338] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.210084] kthread+0x18c/0x1a8 [ 178.211472] ret_from_fork+0x10/0x20 [ 178.213012] [ 178.213750] Allocated by task 136: [ 178.214671] kasan_save_stack+0x3c/0x68 [ 178.215844] kasan_set_track+0x2c/0x40 [ 178.216995] kasan_save_alloc_info+0x24/0x38 [ 178.218388] __kasan_krealloc+0x10c/0x140 [ 178.219787] krealloc+0x10c/0x1a0 [ 178.220960] krealloc_less_oob_helper+0xd4/0x590 [ 178.222507] krealloc_less_oob+0x20/0x38 [ 178.223777] kunit_try_run_case+0xf8/0x260 [ 178.225076] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.226675] kthread+0x18c/0x1a8 [ 178.227427] ret_from_fork+0x10/0x20 [ 178.228317] [ 178.228975] The buggy address belongs to the object at ffff0000c0b82400 [ 178.228975] which belongs to the cache kmalloc-256 of size 256 [ 178.232059] The buggy address is located 17 bytes to the right of [ 178.232059] allocated 201-byte region [ffff0000c0b82400, ffff0000c0b824c9) [ 178.234788] [ 178.235250] The buggy address belongs to the physical page: [ 178.236561] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82 [ 178.239080] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.240955] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 178.242641] page_type: 0xffffffff() [ 178.243664] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 178.245789] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 178.247898] page dumped because: kasan: bad access detected [ 178.249515] [ 178.250057] Memory state around the buggy address: [ 178.251182] ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.252730] ffff0000c0b82400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.254429] >ffff0000c0b82480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 178.256002] ^ [ 178.257530] ffff0000c0b82500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.259591] ffff0000c0b82580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.261838] ================================================================== [ 178.681294] ================================================================== [ 178.683183] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590 [ 178.686035] Write of size 1 at addr ffff0000c60220da by task kunit_try_catch/140 [ 178.687918] [ 178.688400] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.691021] Hardware name: linux,dummy-virt (DT) [ 178.691975] Call trace: [ 178.692688] dump_backtrace+0x9c/0x128 [ 178.694309] show_stack+0x20/0x38 [ 178.695430] dump_stack_lvl+0x60/0xb0 [ 178.696834] print_report+0xf8/0x5d8 [ 178.697880] kasan_report+0xc8/0x118 [ 178.699048] __asan_store1+0x60/0x70 [ 178.700152] krealloc_less_oob_helper+0x18c/0x590 [ 178.701861] krealloc_pagealloc_less_oob+0x20/0x38 [ 178.703114] kunit_try_run_case+0xf8/0x260 [ 178.704555] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.706204] kthread+0x18c/0x1a8 [ 178.707137] ret_from_fork+0x10/0x20 [ 178.708248] [ 178.708909] The buggy address belongs to the physical page: [ 178.710634] page:00000000dc26f172 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020 [ 178.712708] head:00000000dc26f172 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.714819] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 178.716364] page_type: 0xffffffff() [ 178.717479] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 178.719414] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 178.721247] page dumped because: kasan: bad access detected [ 178.722940] [ 178.723633] Memory state around the buggy address: [ 178.724911] ffff0000c6021f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.726930] ffff0000c6022000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.728754] >ffff0000c6022080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 178.730104] ^ [ 178.731474] ffff0000c6022100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.733234] ffff0000c6022180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.734844] ================================================================== [ 178.347546] ================================================================== [ 178.349130] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590 [ 178.351788] Write of size 1 at addr ffff0000c0b824eb by task kunit_try_catch/136 [ 178.354350] [ 178.355002] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.356839] Hardware name: linux,dummy-virt (DT) [ 178.357953] Call trace: [ 178.359489] dump_backtrace+0x9c/0x128 [ 178.360666] show_stack+0x20/0x38 [ 178.361722] dump_stack_lvl+0x60/0xb0 [ 178.362893] print_report+0xf8/0x5d8 [ 178.364006] kasan_report+0xc8/0x118 [ 178.365960] __asan_store1+0x60/0x70 [ 178.367006] krealloc_less_oob_helper+0x1e0/0x590 [ 178.368377] krealloc_less_oob+0x20/0x38 [ 178.369489] kunit_try_run_case+0xf8/0x260 [ 178.370723] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.372201] kthread+0x18c/0x1a8 [ 178.373436] ret_from_fork+0x10/0x20 [ 178.374356] [ 178.374844] Allocated by task 136: [ 178.375909] kasan_save_stack+0x3c/0x68 [ 178.377191] kasan_set_track+0x2c/0x40 [ 178.378341] kasan_save_alloc_info+0x24/0x38 [ 178.379636] __kasan_krealloc+0x10c/0x140 [ 178.380849] krealloc+0x10c/0x1a0 [ 178.381841] krealloc_less_oob_helper+0xd4/0x590 [ 178.383525] krealloc_less_oob+0x20/0x38 [ 178.384492] kunit_try_run_case+0xf8/0x260 [ 178.385493] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.387387] kthread+0x18c/0x1a8 [ 178.388515] ret_from_fork+0x10/0x20 [ 178.389746] [ 178.390415] The buggy address belongs to the object at ffff0000c0b82400 [ 178.390415] which belongs to the cache kmalloc-256 of size 256 [ 178.392586] The buggy address is located 34 bytes to the right of [ 178.392586] allocated 201-byte region [ffff0000c0b82400, ffff0000c0b824c9) [ 178.396031] [ 178.397171] The buggy address belongs to the physical page: [ 178.398538] page:000000000369a94f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b82 [ 178.400546] head:000000000369a94f order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.402739] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 178.405429] page_type: 0xffffffff() [ 178.406551] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000 [ 178.408307] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 178.410293] page dumped because: kasan: bad access detected [ 178.411174] [ 178.411696] Memory state around the buggy address: [ 178.412862] ffff0000c0b82380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.414433] ffff0000c0b82400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.416362] >ffff0000c0b82480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 178.418257] ^ [ 178.419946] ffff0000c0b82500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.421814] ffff0000c0b82580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 178.423412] ================================================================== [ 178.624960] ================================================================== [ 178.626662] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590 [ 178.628138] Write of size 1 at addr ffff0000c60220d0 by task kunit_try_catch/140 [ 178.630309] [ 178.630912] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.632736] Hardware name: linux,dummy-virt (DT) [ 178.633863] Call trace: [ 178.634589] dump_backtrace+0x9c/0x128 [ 178.635818] show_stack+0x20/0x38 [ 178.636678] dump_stack_lvl+0x60/0xb0 [ 178.638361] print_report+0xf8/0x5d8 [ 178.639863] kasan_report+0xc8/0x118 [ 178.641304] __asan_store1+0x60/0x70 [ 178.643280] krealloc_less_oob_helper+0x140/0x590 [ 178.644963] krealloc_pagealloc_less_oob+0x20/0x38 [ 178.646411] kunit_try_run_case+0xf8/0x260 [ 178.647602] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.649099] kthread+0x18c/0x1a8 [ 178.649898] ret_from_fork+0x10/0x20 [ 178.651731] [ 178.652256] The buggy address belongs to the physical page: [ 178.653614] page:00000000dc26f172 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020 [ 178.655670] head:00000000dc26f172 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.657361] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 178.658841] page_type: 0xffffffff() [ 178.659645] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 178.661206] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 178.663140] page dumped because: kasan: bad access detected [ 178.664508] [ 178.665201] Memory state around the buggy address: [ 178.666525] ffff0000c6021f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.668229] ffff0000c6022000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.670060] >ffff0000c6022080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 178.671735] ^ [ 178.672788] ffff0000c6022100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.675106] ffff0000c6022180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.677611] ================================================================== [ 178.738297] ================================================================== [ 178.739821] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590 [ 178.741616] Write of size 1 at addr ffff0000c60220ea by task kunit_try_catch/140 [ 178.743546] [ 178.744729] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 178.746987] Hardware name: linux,dummy-virt (DT) [ 178.748157] Call trace: [ 178.748859] dump_backtrace+0x9c/0x128 [ 178.750102] show_stack+0x20/0x38 [ 178.751104] dump_stack_lvl+0x60/0xb0 [ 178.752334] print_report+0xf8/0x5d8 [ 178.753843] kasan_report+0xc8/0x118 [ 178.755192] __asan_store1+0x60/0x70 [ 178.756243] krealloc_less_oob_helper+0x1b8/0x590 [ 178.757862] krealloc_pagealloc_less_oob+0x20/0x38 [ 178.759255] kunit_try_run_case+0xf8/0x260 [ 178.760446] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 178.761852] kthread+0x18c/0x1a8 [ 178.762639] ret_from_fork+0x10/0x20 [ 178.763351] [ 178.763752] The buggy address belongs to the physical page: [ 178.765796] page:00000000dc26f172 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020 [ 178.768081] head:00000000dc26f172 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 178.770134] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff) [ 178.771839] page_type: 0xffffffff() [ 178.772856] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000 [ 178.774536] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 178.776887] page dumped because: kasan: bad access detected [ 178.778181] [ 178.779163] Memory state around the buggy address: [ 178.780250] ffff0000c6021f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.782115] ffff0000c6022000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 178.783366] >ffff0000c6022080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 178.786207] ^ [ 178.787799] ffff0000c6022100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.789432] ffff0000c6022180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 178.791604] ==================================================================