Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 22.988506] ================================================================== [ 22.989352] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 22.989641] Write of size 1 at addr fff00000c67392eb by task kunit_try_catch/160 [ 22.990195] [ 22.990384] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.990564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.991054] Hardware name: linux,dummy-virt (DT) [ 22.992067] Call trace: [ 22.992152] show_stack+0x20/0x38 (C) [ 22.992280] dump_stack_lvl+0x8c/0xd0 [ 22.992580] print_report+0x118/0x608 [ 22.992703] kasan_report+0xdc/0x128 [ 22.994307] __asan_report_store1_noabort+0x20/0x30 [ 22.994696] krealloc_less_oob_helper+0xa58/0xc50 [ 22.995530] krealloc_less_oob+0x20/0x38 [ 22.995701] kunit_try_run_case+0x170/0x3f0 [ 22.995840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.996032] kthread+0x328/0x630 [ 22.996279] ret_from_fork+0x10/0x20 [ 22.996403] [ 22.996492] Allocated by task 160: [ 22.996572] kasan_save_stack+0x3c/0x68 [ 22.996678] kasan_save_track+0x20/0x40 [ 22.996782] kasan_save_alloc_info+0x40/0x58 [ 22.996890] __kasan_krealloc+0x118/0x178 [ 22.997009] krealloc_noprof+0x128/0x360 [ 22.997206] krealloc_less_oob_helper+0x168/0xc50 [ 22.997395] krealloc_less_oob+0x20/0x38 [ 22.997510] kunit_try_run_case+0x170/0x3f0 [ 22.997729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.997917] kthread+0x328/0x630 [ 22.998045] ret_from_fork+0x10/0x20 [ 22.998148] [ 22.998205] The buggy address belongs to the object at fff00000c6739200 [ 22.998205] which belongs to the cache kmalloc-256 of size 256 [ 22.998350] The buggy address is located 34 bytes to the right of [ 22.998350] allocated 201-byte region [fff00000c6739200, fff00000c67392c9) [ 22.998516] [ 22.998597] The buggy address belongs to the physical page: [ 22.998741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 [ 22.998864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.998988] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.999136] page_type: f5(slab) [ 22.999270] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.999474] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.999681] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.999813] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.999964] head: 0bfffe0000000001 ffffc1ffc319ce01 00000000ffffffff 00000000ffffffff [ 23.000097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.000202] page dumped because: kasan: bad access detected [ 23.000285] [ 23.000335] Memory state around the buggy address: [ 23.000417] fff00000c6739180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.000535] fff00000c6739200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.000650] >fff00000c6739280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.000750] ^ [ 23.000853] fff00000c6739300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.000990] fff00000c6739380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.001149] ================================================================== [ 23.086449] ================================================================== [ 23.086548] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.086656] Write of size 1 at addr fff00000c76ce0ea by task kunit_try_catch/164 [ 23.086785] [ 23.086859] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.087078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.087150] Hardware name: linux,dummy-virt (DT) [ 23.087232] Call trace: [ 23.087345] show_stack+0x20/0x38 (C) [ 23.087603] dump_stack_lvl+0x8c/0xd0 [ 23.087729] print_report+0x118/0x608 [ 23.087851] kasan_report+0xdc/0x128 [ 23.087985] __asan_report_store1_noabort+0x20/0x30 [ 23.088117] krealloc_less_oob_helper+0xae4/0xc50 [ 23.088338] krealloc_large_less_oob+0x20/0x38 [ 23.088546] kunit_try_run_case+0x170/0x3f0 [ 23.089235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.089670] kthread+0x328/0x630 [ 23.089817] ret_from_fork+0x10/0x20 [ 23.089968] [ 23.090024] The buggy address belongs to the physical page: [ 23.090191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 23.090368] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.091425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.091589] page_type: f8(unknown) [ 23.091704] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.091838] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.091987] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.092204] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.092325] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 23.092525] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.092791] page dumped because: kasan: bad access detected [ 23.092870] [ 23.092947] Memory state around the buggy address: [ 23.093025] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.093127] fff00000c76ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.093226] >fff00000c76ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.093312] ^ [ 23.093445] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.093570] fff00000c76ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.093673] ================================================================== [ 22.923344] ================================================================== [ 22.923699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.923967] Write of size 1 at addr fff00000c67392c9 by task kunit_try_catch/160 [ 22.924210] [ 22.924329] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.924624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.924866] Hardware name: linux,dummy-virt (DT) [ 22.924965] Call trace: [ 22.925178] show_stack+0x20/0x38 (C) [ 22.925323] dump_stack_lvl+0x8c/0xd0 [ 22.925449] print_report+0x118/0x608 [ 22.926069] kasan_report+0xdc/0x128 [ 22.926192] __asan_report_store1_noabort+0x20/0x30 [ 22.926371] krealloc_less_oob_helper+0xa48/0xc50 [ 22.926573] krealloc_less_oob+0x20/0x38 [ 22.926695] kunit_try_run_case+0x170/0x3f0 [ 22.926852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.927263] kthread+0x328/0x630 [ 22.927382] ret_from_fork+0x10/0x20 [ 22.927524] [ 22.927628] Allocated by task 160: [ 22.927711] kasan_save_stack+0x3c/0x68 [ 22.928986] kasan_save_track+0x20/0x40 [ 22.929386] kasan_save_alloc_info+0x40/0x58 [ 22.929556] __kasan_krealloc+0x118/0x178 [ 22.929653] krealloc_noprof+0x128/0x360 [ 22.929757] krealloc_less_oob_helper+0x168/0xc50 [ 22.929868] krealloc_less_oob+0x20/0x38 [ 22.930005] kunit_try_run_case+0x170/0x3f0 [ 22.930195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.930396] kthread+0x328/0x630 [ 22.930503] ret_from_fork+0x10/0x20 [ 22.930607] [ 22.930660] The buggy address belongs to the object at fff00000c6739200 [ 22.930660] which belongs to the cache kmalloc-256 of size 256 [ 22.930920] The buggy address is located 0 bytes to the right of [ 22.930920] allocated 201-byte region [fff00000c6739200, fff00000c67392c9) [ 22.931616] [ 22.931730] The buggy address belongs to the physical page: [ 22.931968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 [ 22.932093] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.932778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.933693] page_type: f5(slab) [ 22.933785] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.933898] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.934335] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.934470] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.935424] head: 0bfffe0000000001 ffffc1ffc319ce01 00000000ffffffff 00000000ffffffff [ 22.935630] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.935910] page dumped because: kasan: bad access detected [ 22.936095] [ 22.936401] Memory state around the buggy address: [ 22.936555] fff00000c6739180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.937195] fff00000c6739200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.937346] >fff00000c6739280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.937589] ^ [ 22.937679] fff00000c6739300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.938575] fff00000c6739380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.938844] ================================================================== [ 22.953991] ================================================================== [ 22.954084] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 22.954188] Write of size 1 at addr fff00000c67392da by task kunit_try_catch/160 [ 22.954301] [ 22.954362] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.957017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.957119] Hardware name: linux,dummy-virt (DT) [ 22.957206] Call trace: [ 22.957268] show_stack+0x20/0x38 (C) [ 22.957404] dump_stack_lvl+0x8c/0xd0 [ 22.957535] print_report+0x118/0x608 [ 22.957663] kasan_report+0xdc/0x128 [ 22.957770] __asan_report_store1_noabort+0x20/0x30 [ 22.957835] krealloc_less_oob_helper+0xa80/0xc50 [ 22.957897] krealloc_less_oob+0x20/0x38 [ 22.958122] kunit_try_run_case+0x170/0x3f0 [ 22.958340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.958584] kthread+0x328/0x630 [ 22.958944] ret_from_fork+0x10/0x20 [ 22.959502] [ 22.960760] Allocated by task 160: [ 22.960902] kasan_save_stack+0x3c/0x68 [ 22.961408] kasan_save_track+0x20/0x40 [ 22.961502] kasan_save_alloc_info+0x40/0x58 [ 22.961592] __kasan_krealloc+0x118/0x178 [ 22.961681] krealloc_noprof+0x128/0x360 [ 22.962332] krealloc_less_oob_helper+0x168/0xc50 [ 22.962465] krealloc_less_oob+0x20/0x38 [ 22.962587] kunit_try_run_case+0x170/0x3f0 [ 22.963263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.963384] kthread+0x328/0x630 [ 22.963900] ret_from_fork+0x10/0x20 [ 22.964045] [ 22.964101] The buggy address belongs to the object at fff00000c6739200 [ 22.964101] which belongs to the cache kmalloc-256 of size 256 [ 22.964239] The buggy address is located 17 bytes to the right of [ 22.964239] allocated 201-byte region [fff00000c6739200, fff00000c67392c9) [ 22.964397] [ 22.964445] The buggy address belongs to the physical page: [ 22.965533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 [ 22.965657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.966139] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.966291] page_type: f5(slab) [ 22.966822] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.966982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.967279] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.967394] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.967505] head: 0bfffe0000000001 ffffc1ffc319ce01 00000000ffffffff 00000000ffffffff [ 22.968211] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.968946] page dumped because: kasan: bad access detected [ 22.969212] [ 22.969467] Memory state around the buggy address: [ 22.969555] fff00000c6739180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.969681] fff00000c6739200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.970257] >fff00000c6739280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.970686] ^ [ 22.971235] fff00000c6739300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.971637] fff00000c6739380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.971772] ================================================================== [ 22.941236] ================================================================== [ 22.941330] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.941435] Write of size 1 at addr fff00000c67392d0 by task kunit_try_catch/160 [ 22.941546] [ 22.941609] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.941788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.941849] Hardware name: linux,dummy-virt (DT) [ 22.941918] Call trace: [ 22.942077] show_stack+0x20/0x38 (C) [ 22.942293] dump_stack_lvl+0x8c/0xd0 [ 22.942517] print_report+0x118/0x608 [ 22.942829] kasan_report+0xdc/0x128 [ 22.943488] __asan_report_store1_noabort+0x20/0x30 [ 22.943708] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.943854] krealloc_less_oob+0x20/0x38 [ 22.944014] kunit_try_run_case+0x170/0x3f0 [ 22.944201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.944391] kthread+0x328/0x630 [ 22.944540] ret_from_fork+0x10/0x20 [ 22.944857] [ 22.944953] Allocated by task 160: [ 22.945023] kasan_save_stack+0x3c/0x68 [ 22.945163] kasan_save_track+0x20/0x40 [ 22.945266] kasan_save_alloc_info+0x40/0x58 [ 22.945451] __kasan_krealloc+0x118/0x178 [ 22.945559] krealloc_noprof+0x128/0x360 [ 22.945660] krealloc_less_oob_helper+0x168/0xc50 [ 22.945763] krealloc_less_oob+0x20/0x38 [ 22.945897] kunit_try_run_case+0x170/0x3f0 [ 22.946029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.946246] kthread+0x328/0x630 [ 22.946525] ret_from_fork+0x10/0x20 [ 22.946690] [ 22.946789] The buggy address belongs to the object at fff00000c6739200 [ 22.946789] which belongs to the cache kmalloc-256 of size 256 [ 22.947045] The buggy address is located 7 bytes to the right of [ 22.947045] allocated 201-byte region [fff00000c6739200, fff00000c67392c9) [ 22.947394] [ 22.947453] The buggy address belongs to the physical page: [ 22.947522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 [ 22.947955] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.948287] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.948690] page_type: f5(slab) [ 22.948873] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.949066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.949300] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.949507] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.949658] head: 0bfffe0000000001 ffffc1ffc319ce01 00000000ffffffff 00000000ffffffff [ 22.950000] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.950109] page dumped because: kasan: bad access detected [ 22.950196] [ 22.950238] Memory state around the buggy address: [ 22.950537] fff00000c6739180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.951093] fff00000c6739200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.951217] >fff00000c6739280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.951579] ^ [ 22.951954] fff00000c6739300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.952312] fff00000c6739380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.952531] ================================================================== [ 23.095244] ================================================================== [ 23.095397] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.095522] Write of size 1 at addr fff00000c76ce0eb by task kunit_try_catch/164 [ 23.095677] [ 23.095750] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.096000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.096243] Hardware name: linux,dummy-virt (DT) [ 23.096326] Call trace: [ 23.096570] show_stack+0x20/0x38 (C) [ 23.096728] dump_stack_lvl+0x8c/0xd0 [ 23.097062] print_report+0x118/0x608 [ 23.097660] kasan_report+0xdc/0x128 [ 23.098109] __asan_report_store1_noabort+0x20/0x30 [ 23.098461] krealloc_less_oob_helper+0xa58/0xc50 [ 23.098631] krealloc_large_less_oob+0x20/0x38 [ 23.098923] kunit_try_run_case+0x170/0x3f0 [ 23.099128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.099264] kthread+0x328/0x630 [ 23.099373] ret_from_fork+0x10/0x20 [ 23.099483] [ 23.099527] The buggy address belongs to the physical page: [ 23.099596] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 23.099728] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.099834] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.100035] page_type: f8(unknown) [ 23.101032] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.101189] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.101347] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.101513] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.101656] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 23.101786] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.102048] page dumped because: kasan: bad access detected [ 23.102299] [ 23.102578] Memory state around the buggy address: [ 23.102769] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.102875] fff00000c76ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.103207] >fff00000c76ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.103299] ^ [ 23.103474] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.104442] fff00000c76ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.104787] ================================================================== [ 22.973922] ================================================================== [ 22.974045] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 22.974163] Write of size 1 at addr fff00000c67392ea by task kunit_try_catch/160 [ 22.974398] [ 22.974461] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.974819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.974920] Hardware name: linux,dummy-virt (DT) [ 22.975022] Call trace: [ 22.975086] show_stack+0x20/0x38 (C) [ 22.975208] dump_stack_lvl+0x8c/0xd0 [ 22.975322] print_report+0x118/0x608 [ 22.975433] kasan_report+0xdc/0x128 [ 22.975544] __asan_report_store1_noabort+0x20/0x30 [ 22.976799] krealloc_less_oob_helper+0xae4/0xc50 [ 22.977042] krealloc_less_oob+0x20/0x38 [ 22.977206] kunit_try_run_case+0x170/0x3f0 [ 22.977399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.977720] kthread+0x328/0x630 [ 22.977856] ret_from_fork+0x10/0x20 [ 22.978478] [ 22.978597] Allocated by task 160: [ 22.978799] kasan_save_stack+0x3c/0x68 [ 22.978962] kasan_save_track+0x20/0x40 [ 22.979149] kasan_save_alloc_info+0x40/0x58 [ 22.979255] __kasan_krealloc+0x118/0x178 [ 22.979437] krealloc_noprof+0x128/0x360 [ 22.979531] krealloc_less_oob_helper+0x168/0xc50 [ 22.980046] krealloc_less_oob+0x20/0x38 [ 22.980258] kunit_try_run_case+0x170/0x3f0 [ 22.980382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.980582] kthread+0x328/0x630 [ 22.980692] ret_from_fork+0x10/0x20 [ 22.981022] [ 22.981070] The buggy address belongs to the object at fff00000c6739200 [ 22.981070] which belongs to the cache kmalloc-256 of size 256 [ 22.981383] The buggy address is located 33 bytes to the right of [ 22.981383] allocated 201-byte region [fff00000c6739200, fff00000c67392c9) [ 22.982099] [ 22.982179] The buggy address belongs to the physical page: [ 22.982307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 [ 22.982457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.982820] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.983274] page_type: f5(slab) [ 22.983534] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.983703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.983978] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.984256] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.984384] head: 0bfffe0000000001 ffffc1ffc319ce01 00000000ffffffff 00000000ffffffff [ 22.985111] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.985254] page dumped because: kasan: bad access detected [ 22.985355] [ 22.985427] Memory state around the buggy address: [ 22.985508] fff00000c6739180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.985608] fff00000c6739200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.985723] >fff00000c6739280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.985812] ^ [ 22.985907] fff00000c6739300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.986063] fff00000c6739380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.986158] ================================================================== [ 23.070356] ================================================================== [ 23.070450] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 23.070554] Write of size 1 at addr fff00000c76ce0d0 by task kunit_try_catch/164 [ 23.070666] [ 23.070727] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.070901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.070982] Hardware name: linux,dummy-virt (DT) [ 23.071054] Call trace: [ 23.071102] show_stack+0x20/0x38 (C) [ 23.071227] dump_stack_lvl+0x8c/0xd0 [ 23.071514] print_report+0x118/0x608 [ 23.071702] kasan_report+0xdc/0x128 [ 23.071834] __asan_report_store1_noabort+0x20/0x30 [ 23.072000] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.072145] krealloc_large_less_oob+0x20/0x38 [ 23.072288] kunit_try_run_case+0x170/0x3f0 [ 23.072425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.072574] kthread+0x328/0x630 [ 23.072723] ret_from_fork+0x10/0x20 [ 23.072988] [ 23.073132] The buggy address belongs to the physical page: [ 23.073300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 23.073448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.073586] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.073765] page_type: f8(unknown) [ 23.073996] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.074167] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.074329] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.074589] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.074706] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 23.074819] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.074911] page dumped because: kasan: bad access detected [ 23.075011] [ 23.075063] Memory state around the buggy address: [ 23.075146] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.075261] fff00000c76ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.075376] >fff00000c76ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.075478] ^ [ 23.075632] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.075762] fff00000c76ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.075865] ================================================================== [ 23.059038] ================================================================== [ 23.059161] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 23.059501] Write of size 1 at addr fff00000c76ce0c9 by task kunit_try_catch/164 [ 23.059695] [ 23.059764] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.059968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.060029] Hardware name: linux,dummy-virt (DT) [ 23.060106] Call trace: [ 23.060160] show_stack+0x20/0x38 (C) [ 23.060279] dump_stack_lvl+0x8c/0xd0 [ 23.060389] print_report+0x118/0x608 [ 23.060496] kasan_report+0xdc/0x128 [ 23.060648] __asan_report_store1_noabort+0x20/0x30 [ 23.060796] krealloc_less_oob_helper+0xa48/0xc50 [ 23.060958] krealloc_large_less_oob+0x20/0x38 [ 23.061084] kunit_try_run_case+0x170/0x3f0 [ 23.061425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.061627] kthread+0x328/0x630 [ 23.061748] ret_from_fork+0x10/0x20 [ 23.062551] [ 23.062616] The buggy address belongs to the physical page: [ 23.063038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 23.063439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.063733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.063871] page_type: f8(unknown) [ 23.064458] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.064806] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.064943] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.066727] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.066884] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 23.067381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.067539] page dumped because: kasan: bad access detected [ 23.067662] [ 23.067749] Memory state around the buggy address: [ 23.067880] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.068005] fff00000c76ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.068155] >fff00000c76ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.068389] ^ [ 23.068562] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.068669] fff00000c76ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.068777] ================================================================== [ 23.078555] ================================================================== [ 23.078647] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.078752] Write of size 1 at addr fff00000c76ce0da by task kunit_try_catch/164 [ 23.078862] [ 23.078922] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.079121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.079181] Hardware name: linux,dummy-virt (DT) [ 23.079247] Call trace: [ 23.079295] show_stack+0x20/0x38 (C) [ 23.079407] dump_stack_lvl+0x8c/0xd0 [ 23.079520] print_report+0x118/0x608 [ 23.079656] kasan_report+0xdc/0x128 [ 23.079801] __asan_report_store1_noabort+0x20/0x30 [ 23.079962] krealloc_less_oob_helper+0xa80/0xc50 [ 23.080107] krealloc_large_less_oob+0x20/0x38 [ 23.080247] kunit_try_run_case+0x170/0x3f0 [ 23.080865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.081041] kthread+0x328/0x630 [ 23.081124] ret_from_fork+0x10/0x20 [ 23.081188] [ 23.081239] The buggy address belongs to the physical page: [ 23.081313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 23.081496] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.081748] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.082053] page_type: f8(unknown) [ 23.082146] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.083627] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.083776] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.083903] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.084090] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 23.084296] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.084396] page dumped because: kasan: bad access detected [ 23.084501] [ 23.084563] Memory state around the buggy address: [ 23.084713] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.084824] fff00000c76ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.085117] >fff00000c76ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.085210] ^ [ 23.085296] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.085401] fff00000c76ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.085656] ==================================================================
[ 11.246899] ================================================================== [ 11.247254] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.247503] Write of size 1 at addr ffff888100a234da by task kunit_try_catch/178 [ 11.247998] [ 11.248109] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.248151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.248163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.248183] Call Trace: [ 11.248197] <TASK> [ 11.248212] dump_stack_lvl+0x73/0xb0 [ 11.248235] print_report+0xd1/0x650 [ 11.248258] ? __virt_addr_valid+0x1db/0x2d0 [ 11.248279] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.248303] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.248335] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.248359] kasan_report+0x141/0x180 [ 11.248382] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.248411] __asan_report_store1_noabort+0x1b/0x30 [ 11.248432] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.248458] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.248483] ? finish_task_switch.isra.0+0x153/0x700 [ 11.248505] ? __switch_to+0x5d9/0xf60 [ 11.248524] ? dequeue_task_fair+0x156/0x4e0 [ 11.248549] ? __schedule+0x10cc/0x2b30 [ 11.248572] ? __pfx_read_tsc+0x10/0x10 [ 11.248595] krealloc_less_oob+0x1c/0x30 [ 11.248617] kunit_try_run_case+0x1a5/0x480 [ 11.248640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.248661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.248684] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.248708] ? __kthread_parkme+0x82/0x180 [ 11.248729] ? preempt_count_sub+0x50/0x80 [ 11.248753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.248776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.248798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.248820] kthread+0x337/0x6f0 [ 11.248841] ? trace_preempt_on+0x20/0xc0 [ 11.248864] ? __pfx_kthread+0x10/0x10 [ 11.248885] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.248907] ? calculate_sigpending+0x7b/0xa0 [ 11.248928] ? __pfx_kthread+0x10/0x10 [ 11.248950] ret_from_fork+0x41/0x80 [ 11.248971] ? __pfx_kthread+0x10/0x10 [ 11.248993] ret_from_fork_asm+0x1a/0x30 [ 11.249024] </TASK> [ 11.249034] [ 11.257866] Allocated by task 178: [ 11.258087] kasan_save_stack+0x45/0x70 [ 11.258314] kasan_save_track+0x18/0x40 [ 11.258583] kasan_save_alloc_info+0x3b/0x50 [ 11.258823] __kasan_krealloc+0x190/0x1f0 [ 11.258969] krealloc_noprof+0xf3/0x340 [ 11.259208] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.259667] krealloc_less_oob+0x1c/0x30 [ 11.259837] kunit_try_run_case+0x1a5/0x480 [ 11.260025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.260315] kthread+0x337/0x6f0 [ 11.260493] ret_from_fork+0x41/0x80 [ 11.260681] ret_from_fork_asm+0x1a/0x30 [ 11.260879] [ 11.260974] The buggy address belongs to the object at ffff888100a23400 [ 11.260974] which belongs to the cache kmalloc-256 of size 256 [ 11.261614] The buggy address is located 17 bytes to the right of [ 11.261614] allocated 201-byte region [ffff888100a23400, ffff888100a234c9) [ 11.262068] [ 11.262213] The buggy address belongs to the physical page: [ 11.262575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22 [ 11.262950] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.263210] flags: 0x200000000000040(head|node=0|zone=2) [ 11.263706] page_type: f5(slab) [ 11.263884] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.264220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.264633] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.264999] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.265376] head: 0200000000000001 ffffea0004028881 00000000ffffffff 00000000ffffffff [ 11.265791] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.266081] page dumped because: kasan: bad access detected [ 11.266368] [ 11.266465] Memory state around the buggy address: [ 11.266782] ffff888100a23380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.267066] ffff888100a23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.267631] >ffff888100a23480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.267908] ^ [ 11.268218] ffff888100a23500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.268630] ffff888100a23580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.268938] ================================================================== [ 11.203049] ================================================================== [ 11.203567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.204012] Write of size 1 at addr ffff888100a234c9 by task kunit_try_catch/178 [ 11.204367] [ 11.204472] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.204515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.204538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.204557] Call Trace: [ 11.204569] <TASK> [ 11.204584] dump_stack_lvl+0x73/0xb0 [ 11.204610] print_report+0xd1/0x650 [ 11.204633] ? __virt_addr_valid+0x1db/0x2d0 [ 11.204655] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.204679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.204701] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.204725] kasan_report+0x141/0x180 [ 11.204747] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.204776] __asan_report_store1_noabort+0x1b/0x30 [ 11.204798] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.204824] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.204848] ? finish_task_switch.isra.0+0x153/0x700 [ 11.204871] ? __switch_to+0x5d9/0xf60 [ 11.204891] ? dequeue_task_fair+0x156/0x4e0 [ 11.204916] ? __schedule+0x10cc/0x2b30 [ 11.204940] ? __pfx_read_tsc+0x10/0x10 [ 11.204963] krealloc_less_oob+0x1c/0x30 [ 11.204985] kunit_try_run_case+0x1a5/0x480 [ 11.205009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.205030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.205053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.205077] ? __kthread_parkme+0x82/0x180 [ 11.205098] ? preempt_count_sub+0x50/0x80 [ 11.205122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.205157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.205179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.205201] kthread+0x337/0x6f0 [ 11.205223] ? trace_preempt_on+0x20/0xc0 [ 11.205246] ? __pfx_kthread+0x10/0x10 [ 11.205268] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.205289] ? calculate_sigpending+0x7b/0xa0 [ 11.205311] ? __pfx_kthread+0x10/0x10 [ 11.205344] ret_from_fork+0x41/0x80 [ 11.205364] ? __pfx_kthread+0x10/0x10 [ 11.205386] ret_from_fork_asm+0x1a/0x30 [ 11.205418] </TASK> [ 11.205429] [ 11.213102] Allocated by task 178: [ 11.213257] kasan_save_stack+0x45/0x70 [ 11.213605] kasan_save_track+0x18/0x40 [ 11.213812] kasan_save_alloc_info+0x3b/0x50 [ 11.214018] __kasan_krealloc+0x190/0x1f0 [ 11.214235] krealloc_noprof+0xf3/0x340 [ 11.214415] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.214756] krealloc_less_oob+0x1c/0x30 [ 11.214903] kunit_try_run_case+0x1a5/0x480 [ 11.215093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.215371] kthread+0x337/0x6f0 [ 11.215555] ret_from_fork+0x41/0x80 [ 11.215741] ret_from_fork_asm+0x1a/0x30 [ 11.215918] [ 11.215988] The buggy address belongs to the object at ffff888100a23400 [ 11.215988] which belongs to the cache kmalloc-256 of size 256 [ 11.216618] The buggy address is located 0 bytes to the right of [ 11.216618] allocated 201-byte region [ffff888100a23400, ffff888100a234c9) [ 11.217085] [ 11.217199] The buggy address belongs to the physical page: [ 11.217419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22 [ 11.217749] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.217976] flags: 0x200000000000040(head|node=0|zone=2) [ 11.218171] page_type: f5(slab) [ 11.218372] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.218710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.219056] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.219553] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.219782] head: 0200000000000001 ffffea0004028881 00000000ffffffff 00000000ffffffff [ 11.220049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.220725] page dumped because: kasan: bad access detected [ 11.220982] [ 11.221074] Memory state around the buggy address: [ 11.221343] ffff888100a23380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.221820] ffff888100a23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.222063] >ffff888100a23480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.222497] ^ [ 11.222670] ffff888100a23500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.222906] ffff888100a23580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.223884] ================================================================== [ 11.401927] ================================================================== [ 11.402199] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 11.402557] Write of size 1 at addr ffff888102c5a0da by task kunit_try_catch/182 [ 11.402873] [ 11.402973] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.403011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.403022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.403040] Call Trace: [ 11.403053] <TASK> [ 11.403065] dump_stack_lvl+0x73/0xb0 [ 11.403087] print_report+0xd1/0x650 [ 11.403108] ? __virt_addr_valid+0x1db/0x2d0 [ 11.403127] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.403150] ? kasan_addr_to_slab+0x11/0xa0 [ 11.403169] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.403193] kasan_report+0x141/0x180 [ 11.403214] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 11.403241] __asan_report_store1_noabort+0x1b/0x30 [ 11.403278] krealloc_less_oob_helper+0xec6/0x11d0 [ 11.403305] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.403339] ? finish_task_switch.isra.0+0x153/0x700 [ 11.403360] ? __switch_to+0x5d9/0xf60 [ 11.403379] ? dequeue_task_fair+0x156/0x4e0 [ 11.403403] ? __schedule+0x10cc/0x2b30 [ 11.403425] ? __pfx_read_tsc+0x10/0x10 [ 11.403447] krealloc_large_less_oob+0x1c/0x30 [ 11.403469] kunit_try_run_case+0x1a5/0x480 [ 11.403492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.403513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.403535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.403558] ? __kthread_parkme+0x82/0x180 [ 11.403578] ? preempt_count_sub+0x50/0x80 [ 11.403602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.403624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.403646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.403668] kthread+0x337/0x6f0 [ 11.403688] ? trace_preempt_on+0x20/0xc0 [ 11.403710] ? __pfx_kthread+0x10/0x10 [ 11.403731] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.403753] ? calculate_sigpending+0x7b/0xa0 [ 11.403774] ? __pfx_kthread+0x10/0x10 [ 11.403795] ret_from_fork+0x41/0x80 [ 11.403815] ? __pfx_kthread+0x10/0x10 [ 11.403837] ret_from_fork_asm+0x1a/0x30 [ 11.403868] </TASK> [ 11.403878] [ 11.411373] The buggy address belongs to the physical page: [ 11.411609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.411943] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.412613] flags: 0x200000000000040(head|node=0|zone=2) [ 11.412817] page_type: f8(unknown) [ 11.412966] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.413533] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.413842] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.414109] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.414535] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.414767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.414991] page dumped because: kasan: bad access detected [ 11.415158] [ 11.415226] Memory state around the buggy address: [ 11.415511] ffff888102c59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.415829] ffff888102c5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.416136] >ffff888102c5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.416406] ^ [ 11.416591] ffff888102c5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.416799] ffff888102c5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.417256] ================================================================== [ 11.435063] ================================================================== [ 11.435546] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.435830] Write of size 1 at addr ffff888102c5a0eb by task kunit_try_catch/182 [ 11.436149] [ 11.436242] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.436282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.436293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.436311] Call Trace: [ 11.436336] <TASK> [ 11.436348] dump_stack_lvl+0x73/0xb0 [ 11.436371] print_report+0xd1/0x650 [ 11.436439] ? __virt_addr_valid+0x1db/0x2d0 [ 11.436462] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.436485] ? kasan_addr_to_slab+0x11/0xa0 [ 11.436505] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.436529] kasan_report+0x141/0x180 [ 11.436551] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.436580] __asan_report_store1_noabort+0x1b/0x30 [ 11.436601] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.436627] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.436651] ? finish_task_switch.isra.0+0x153/0x700 [ 11.436672] ? __switch_to+0x5d9/0xf60 [ 11.436691] ? dequeue_task_fair+0x156/0x4e0 [ 11.436715] ? __schedule+0x10cc/0x2b30 [ 11.436738] ? __pfx_read_tsc+0x10/0x10 [ 11.436760] krealloc_large_less_oob+0x1c/0x30 [ 11.436783] kunit_try_run_case+0x1a5/0x480 [ 11.436805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.436826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.436850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.436873] ? __kthread_parkme+0x82/0x180 [ 11.436894] ? preempt_count_sub+0x50/0x80 [ 11.436917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.436940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.436962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.436985] kthread+0x337/0x6f0 [ 11.437005] ? trace_preempt_on+0x20/0xc0 [ 11.437028] ? __pfx_kthread+0x10/0x10 [ 11.437049] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.437070] ? calculate_sigpending+0x7b/0xa0 [ 11.437091] ? __pfx_kthread+0x10/0x10 [ 11.437113] ret_from_fork+0x41/0x80 [ 11.437133] ? __pfx_kthread+0x10/0x10 [ 11.437154] ret_from_fork_asm+0x1a/0x30 [ 11.437185] </TASK> [ 11.437195] [ 11.444733] The buggy address belongs to the physical page: [ 11.444910] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.445146] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.445380] flags: 0x200000000000040(head|node=0|zone=2) [ 11.445628] page_type: f8(unknown) [ 11.445807] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.446312] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.446608] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.446836] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.447063] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.447934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.448559] page dumped because: kasan: bad access detected [ 11.448872] [ 11.448945] Memory state around the buggy address: [ 11.449099] ffff888102c59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.449345] ffff888102c5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.449832] >ffff888102c5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.450149] ^ [ 11.450439] ffff888102c5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.450693] ffff888102c5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.451019] ================================================================== [ 11.417977] ================================================================== [ 11.418575] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.418914] Write of size 1 at addr ffff888102c5a0ea by task kunit_try_catch/182 [ 11.419226] [ 11.419338] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.419379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.419390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.419409] Call Trace: [ 11.419423] <TASK> [ 11.419437] dump_stack_lvl+0x73/0xb0 [ 11.419459] print_report+0xd1/0x650 [ 11.419481] ? __virt_addr_valid+0x1db/0x2d0 [ 11.419501] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.419524] ? kasan_addr_to_slab+0x11/0xa0 [ 11.419545] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.419569] kasan_report+0x141/0x180 [ 11.419591] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.419620] __asan_report_store1_noabort+0x1b/0x30 [ 11.419640] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.419666] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.419690] ? finish_task_switch.isra.0+0x153/0x700 [ 11.419712] ? __switch_to+0x5d9/0xf60 [ 11.419731] ? dequeue_task_fair+0x156/0x4e0 [ 11.419755] ? __schedule+0x10cc/0x2b30 [ 11.419780] ? __pfx_read_tsc+0x10/0x10 [ 11.419803] krealloc_large_less_oob+0x1c/0x30 [ 11.419826] kunit_try_run_case+0x1a5/0x480 [ 11.419849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.419869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.419892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.419915] ? __kthread_parkme+0x82/0x180 [ 11.419935] ? preempt_count_sub+0x50/0x80 [ 11.419959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.419981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.420003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.420025] kthread+0x337/0x6f0 [ 11.420045] ? trace_preempt_on+0x20/0xc0 [ 11.420067] ? __pfx_kthread+0x10/0x10 [ 11.420089] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.420110] ? calculate_sigpending+0x7b/0xa0 [ 11.420186] ? __pfx_kthread+0x10/0x10 [ 11.420210] ret_from_fork+0x41/0x80 [ 11.420230] ? __pfx_kthread+0x10/0x10 [ 11.420252] ret_from_fork_asm+0x1a/0x30 [ 11.420283] </TASK> [ 11.420293] [ 11.428236] The buggy address belongs to the physical page: [ 11.428510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.428816] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.429037] flags: 0x200000000000040(head|node=0|zone=2) [ 11.429206] page_type: f8(unknown) [ 11.429340] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.429777] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.430123] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.430738] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.431097] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.431578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.431806] page dumped because: kasan: bad access detected [ 11.431975] [ 11.432043] Memory state around the buggy address: [ 11.432378] ffff888102c59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.432694] ffff888102c5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.433010] >ffff888102c5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.433584] ^ [ 11.433871] ffff888102c5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.434457] ffff888102c5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.434742] ================================================================== [ 11.269795] ================================================================== [ 11.270131] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 11.270487] Write of size 1 at addr ffff888100a234ea by task kunit_try_catch/178 [ 11.270812] [ 11.270901] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.270969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.270981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.271000] Call Trace: [ 11.271024] <TASK> [ 11.271038] dump_stack_lvl+0x73/0xb0 [ 11.271061] print_report+0xd1/0x650 [ 11.271083] ? __virt_addr_valid+0x1db/0x2d0 [ 11.271104] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.271143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.271165] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.271189] kasan_report+0x141/0x180 [ 11.271212] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 11.271241] __asan_report_store1_noabort+0x1b/0x30 [ 11.271262] krealloc_less_oob_helper+0xe90/0x11d0 [ 11.271289] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.271312] ? finish_task_switch.isra.0+0x153/0x700 [ 11.271345] ? __switch_to+0x5d9/0xf60 [ 11.271364] ? dequeue_task_fair+0x156/0x4e0 [ 11.271409] ? __schedule+0x10cc/0x2b30 [ 11.271431] ? __pfx_read_tsc+0x10/0x10 [ 11.271454] krealloc_less_oob+0x1c/0x30 [ 11.271475] kunit_try_run_case+0x1a5/0x480 [ 11.271498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.271519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.271542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.271567] ? __kthread_parkme+0x82/0x180 [ 11.271588] ? preempt_count_sub+0x50/0x80 [ 11.271612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.271635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.271657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.271679] kthread+0x337/0x6f0 [ 11.271700] ? trace_preempt_on+0x20/0xc0 [ 11.271722] ? __pfx_kthread+0x10/0x10 [ 11.271744] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.271766] ? calculate_sigpending+0x7b/0xa0 [ 11.271787] ? __pfx_kthread+0x10/0x10 [ 11.271808] ret_from_fork+0x41/0x80 [ 11.271829] ? __pfx_kthread+0x10/0x10 [ 11.271850] ret_from_fork_asm+0x1a/0x30 [ 11.271881] </TASK> [ 11.271891] [ 11.279833] Allocated by task 178: [ 11.279960] kasan_save_stack+0x45/0x70 [ 11.280119] kasan_save_track+0x18/0x40 [ 11.280341] kasan_save_alloc_info+0x3b/0x50 [ 11.280618] __kasan_krealloc+0x190/0x1f0 [ 11.280820] krealloc_noprof+0xf3/0x340 [ 11.280997] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.281186] krealloc_less_oob+0x1c/0x30 [ 11.281457] kunit_try_run_case+0x1a5/0x480 [ 11.281670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.281896] kthread+0x337/0x6f0 [ 11.282018] ret_from_fork+0x41/0x80 [ 11.282225] ret_from_fork_asm+0x1a/0x30 [ 11.282650] [ 11.282753] The buggy address belongs to the object at ffff888100a23400 [ 11.282753] which belongs to the cache kmalloc-256 of size 256 [ 11.283241] The buggy address is located 33 bytes to the right of [ 11.283241] allocated 201-byte region [ffff888100a23400, ffff888100a234c9) [ 11.283752] [ 11.283828] The buggy address belongs to the physical page: [ 11.284072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22 [ 11.284529] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.284761] flags: 0x200000000000040(head|node=0|zone=2) [ 11.284931] page_type: f5(slab) [ 11.285065] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.285516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.285865] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.286233] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.286767] head: 0200000000000001 ffffea0004028881 00000000ffffffff 00000000ffffffff [ 11.287007] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.287454] page dumped because: kasan: bad access detected [ 11.287713] [ 11.287806] Memory state around the buggy address: [ 11.288026] ffff888100a23380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.288315] ffff888100a23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.288571] >ffff888100a23480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.288891] ^ [ 11.289143] ffff888100a23500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.289506] ffff888100a23580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.289792] ================================================================== [ 11.385476] ================================================================== [ 11.385714] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.386037] Write of size 1 at addr ffff888102c5a0d0 by task kunit_try_catch/182 [ 11.386377] [ 11.386539] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.386582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.386594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.386613] Call Trace: [ 11.386624] <TASK> [ 11.386639] dump_stack_lvl+0x73/0xb0 [ 11.386662] print_report+0xd1/0x650 [ 11.386683] ? __virt_addr_valid+0x1db/0x2d0 [ 11.386704] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.386727] ? kasan_addr_to_slab+0x11/0xa0 [ 11.386747] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.386772] kasan_report+0x141/0x180 [ 11.386794] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.386824] __asan_report_store1_noabort+0x1b/0x30 [ 11.386844] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.386870] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.386894] ? finish_task_switch.isra.0+0x153/0x700 [ 11.386916] ? __switch_to+0x5d9/0xf60 [ 11.386934] ? dequeue_task_fair+0x156/0x4e0 [ 11.386959] ? __schedule+0x10cc/0x2b30 [ 11.386981] ? __pfx_read_tsc+0x10/0x10 [ 11.387003] krealloc_large_less_oob+0x1c/0x30 [ 11.387026] kunit_try_run_case+0x1a5/0x480 [ 11.387049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.387070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.387092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.387115] ? __kthread_parkme+0x82/0x180 [ 11.387137] ? preempt_count_sub+0x50/0x80 [ 11.387176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.387199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.387221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.387243] kthread+0x337/0x6f0 [ 11.387263] ? trace_preempt_on+0x20/0xc0 [ 11.387286] ? __pfx_kthread+0x10/0x10 [ 11.387307] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.387340] ? calculate_sigpending+0x7b/0xa0 [ 11.387361] ? __pfx_kthread+0x10/0x10 [ 11.387382] ret_from_fork+0x41/0x80 [ 11.387402] ? __pfx_kthread+0x10/0x10 [ 11.387423] ret_from_fork_asm+0x1a/0x30 [ 11.387644] </TASK> [ 11.387657] [ 11.395425] The buggy address belongs to the physical page: [ 11.395664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.396218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.396583] flags: 0x200000000000040(head|node=0|zone=2) [ 11.396761] page_type: f8(unknown) [ 11.396889] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.397155] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.397501] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.397911] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.398451] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.398689] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.398915] page dumped because: kasan: bad access detected [ 11.399115] [ 11.399222] Memory state around the buggy address: [ 11.399603] ffff888102c59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.399936] ffff888102c5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.400314] >ffff888102c5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.400717] ^ [ 11.400968] ffff888102c5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.401343] ffff888102c5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.401664] ================================================================== [ 11.290247] ================================================================== [ 11.290734] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 11.290988] Write of size 1 at addr ffff888100a234eb by task kunit_try_catch/178 [ 11.291335] [ 11.291533] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.291578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.291589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.291608] Call Trace: [ 11.291620] <TASK> [ 11.291634] dump_stack_lvl+0x73/0xb0 [ 11.291659] print_report+0xd1/0x650 [ 11.291681] ? __virt_addr_valid+0x1db/0x2d0 [ 11.291702] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.291726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.291748] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.291772] kasan_report+0x141/0x180 [ 11.291795] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 11.291825] __asan_report_store1_noabort+0x1b/0x30 [ 11.291847] krealloc_less_oob_helper+0xd47/0x11d0 [ 11.291874] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.291899] ? finish_task_switch.isra.0+0x153/0x700 [ 11.291921] ? __switch_to+0x5d9/0xf60 [ 11.291940] ? dequeue_task_fair+0x156/0x4e0 [ 11.291965] ? __schedule+0x10cc/0x2b30 [ 11.291987] ? __pfx_read_tsc+0x10/0x10 [ 11.292010] krealloc_less_oob+0x1c/0x30 [ 11.292032] kunit_try_run_case+0x1a5/0x480 [ 11.292056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.292077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.292100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.292146] ? __kthread_parkme+0x82/0x180 [ 11.292168] ? preempt_count_sub+0x50/0x80 [ 11.292192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.292215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.292238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.292263] kthread+0x337/0x6f0 [ 11.292286] ? trace_preempt_on+0x20/0xc0 [ 11.292309] ? __pfx_kthread+0x10/0x10 [ 11.292341] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.292364] ? calculate_sigpending+0x7b/0xa0 [ 11.292460] ? __pfx_kthread+0x10/0x10 [ 11.292484] ret_from_fork+0x41/0x80 [ 11.292506] ? __pfx_kthread+0x10/0x10 [ 11.292528] ret_from_fork_asm+0x1a/0x30 [ 11.292562] </TASK> [ 11.292572] [ 11.300567] Allocated by task 178: [ 11.300701] kasan_save_stack+0x45/0x70 [ 11.300888] kasan_save_track+0x18/0x40 [ 11.301074] kasan_save_alloc_info+0x3b/0x50 [ 11.301304] __kasan_krealloc+0x190/0x1f0 [ 11.301604] krealloc_noprof+0xf3/0x340 [ 11.301753] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.301918] krealloc_less_oob+0x1c/0x30 [ 11.302113] kunit_try_run_case+0x1a5/0x480 [ 11.303982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.304697] kthread+0x337/0x6f0 [ 11.304838] ret_from_fork+0x41/0x80 [ 11.304966] ret_from_fork_asm+0x1a/0x30 [ 11.305099] [ 11.305169] The buggy address belongs to the object at ffff888100a23400 [ 11.305169] which belongs to the cache kmalloc-256 of size 256 [ 11.305516] The buggy address is located 34 bytes to the right of [ 11.305516] allocated 201-byte region [ffff888100a23400, ffff888100a234c9) [ 11.305872] [ 11.306497] The buggy address belongs to the physical page: [ 11.307277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22 [ 11.309119] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.310622] flags: 0x200000000000040(head|node=0|zone=2) [ 11.311129] page_type: f5(slab) [ 11.311738] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.313049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.313522] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.313834] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.314154] head: 0200000000000001 ffffea0004028881 00000000ffffffff 00000000ffffffff [ 11.314643] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.314967] page dumped because: kasan: bad access detected [ 11.315204] [ 11.315302] Memory state around the buggy address: [ 11.315627] ffff888100a23380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.315900] ffff888100a23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.316195] >ffff888100a23480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.316595] ^ [ 11.316838] ffff888100a23500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.317163] ffff888100a23580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.317519] ================================================================== [ 11.369229] ================================================================== [ 11.370054] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 11.370447] Write of size 1 at addr ffff888102c5a0c9 by task kunit_try_catch/182 [ 11.370741] [ 11.370848] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.370889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.370900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.370918] Call Trace: [ 11.370929] <TASK> [ 11.370942] dump_stack_lvl+0x73/0xb0 [ 11.370967] print_report+0xd1/0x650 [ 11.370988] ? __virt_addr_valid+0x1db/0x2d0 [ 11.371009] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.371032] ? kasan_addr_to_slab+0x11/0xa0 [ 11.371052] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.371076] kasan_report+0x141/0x180 [ 11.371098] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 11.371128] __asan_report_store1_noabort+0x1b/0x30 [ 11.371158] krealloc_less_oob_helper+0xd70/0x11d0 [ 11.371184] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.371208] ? finish_task_switch.isra.0+0x153/0x700 [ 11.371230] ? __switch_to+0x5d9/0xf60 [ 11.371248] ? dequeue_task_fair+0x156/0x4e0 [ 11.371272] ? __schedule+0x10cc/0x2b30 [ 11.371294] ? __pfx_read_tsc+0x10/0x10 [ 11.371316] krealloc_large_less_oob+0x1c/0x30 [ 11.371353] kunit_try_run_case+0x1a5/0x480 [ 11.371376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.371413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.371436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.371459] ? __kthread_parkme+0x82/0x180 [ 11.371480] ? preempt_count_sub+0x50/0x80 [ 11.371504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.371526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.371548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.371570] kthread+0x337/0x6f0 [ 11.371590] ? trace_preempt_on+0x20/0xc0 [ 11.371613] ? __pfx_kthread+0x10/0x10 [ 11.371634] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.371655] ? calculate_sigpending+0x7b/0xa0 [ 11.371675] ? __pfx_kthread+0x10/0x10 [ 11.371697] ret_from_fork+0x41/0x80 [ 11.371717] ? __pfx_kthread+0x10/0x10 [ 11.371738] ret_from_fork_asm+0x1a/0x30 [ 11.371769] </TASK> [ 11.371779] [ 11.378831] The buggy address belongs to the physical page: [ 11.379095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.379569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.379844] flags: 0x200000000000040(head|node=0|zone=2) [ 11.380094] page_type: f8(unknown) [ 11.380269] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.380611] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.380907] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.381159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.381399] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.381852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.382185] page dumped because: kasan: bad access detected [ 11.382449] [ 11.382543] Memory state around the buggy address: [ 11.382750] ffff888102c59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.383027] ffff888102c5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.383665] >ffff888102c5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 11.383885] ^ [ 11.384136] ffff888102c5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.384723] ffff888102c5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.385006] ================================================================== [ 11.224749] ================================================================== [ 11.225065] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 11.225717] Write of size 1 at addr ffff888100a234d0 by task kunit_try_catch/178 [ 11.226480] [ 11.226703] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.226748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.226759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.226778] Call Trace: [ 11.226793] <TASK> [ 11.226808] dump_stack_lvl+0x73/0xb0 [ 11.226833] print_report+0xd1/0x650 [ 11.226855] ? __virt_addr_valid+0x1db/0x2d0 [ 11.226876] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.226899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.226922] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.226946] kasan_report+0x141/0x180 [ 11.226968] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 11.226997] __asan_report_store1_noabort+0x1b/0x30 [ 11.227018] krealloc_less_oob_helper+0xe23/0x11d0 [ 11.227044] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 11.227069] ? finish_task_switch.isra.0+0x153/0x700 [ 11.227091] ? __switch_to+0x5d9/0xf60 [ 11.227110] ? dequeue_task_fair+0x156/0x4e0 [ 11.227136] ? __schedule+0x10cc/0x2b30 [ 11.227159] ? __pfx_read_tsc+0x10/0x10 [ 11.227182] krealloc_less_oob+0x1c/0x30 [ 11.227203] kunit_try_run_case+0x1a5/0x480 [ 11.227226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.227248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.227270] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.227294] ? __kthread_parkme+0x82/0x180 [ 11.227315] ? preempt_count_sub+0x50/0x80 [ 11.227352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.227374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.227397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.227464] kthread+0x337/0x6f0 [ 11.227486] ? trace_preempt_on+0x20/0xc0 [ 11.227509] ? __pfx_kthread+0x10/0x10 [ 11.227530] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.227552] ? calculate_sigpending+0x7b/0xa0 [ 11.227573] ? __pfx_kthread+0x10/0x10 [ 11.227596] ret_from_fork+0x41/0x80 [ 11.227615] ? __pfx_kthread+0x10/0x10 [ 11.227637] ret_from_fork_asm+0x1a/0x30 [ 11.227668] </TASK> [ 11.227679] [ 11.235806] Allocated by task 178: [ 11.235967] kasan_save_stack+0x45/0x70 [ 11.236178] kasan_save_track+0x18/0x40 [ 11.236316] kasan_save_alloc_info+0x3b/0x50 [ 11.236530] __kasan_krealloc+0x190/0x1f0 [ 11.236908] krealloc_noprof+0xf3/0x340 [ 11.237110] krealloc_less_oob_helper+0x1aa/0x11d0 [ 11.237312] krealloc_less_oob+0x1c/0x30 [ 11.237520] kunit_try_run_case+0x1a5/0x480 [ 11.237666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.237842] kthread+0x337/0x6f0 [ 11.238084] ret_from_fork+0x41/0x80 [ 11.238281] ret_from_fork_asm+0x1a/0x30 [ 11.238504] [ 11.238600] The buggy address belongs to the object at ffff888100a23400 [ 11.238600] which belongs to the cache kmalloc-256 of size 256 [ 11.239143] The buggy address is located 7 bytes to the right of [ 11.239143] allocated 201-byte region [ffff888100a23400, ffff888100a234c9) [ 11.239820] [ 11.239923] The buggy address belongs to the physical page: [ 11.240149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22 [ 11.240659] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.240957] flags: 0x200000000000040(head|node=0|zone=2) [ 11.241228] page_type: f5(slab) [ 11.241442] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.241695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.242043] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.242407] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.242817] head: 0200000000000001 ffffea0004028881 00000000ffffffff 00000000ffffffff [ 11.243097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.243335] page dumped because: kasan: bad access detected [ 11.243508] [ 11.243653] Memory state around the buggy address: [ 11.243877] ffff888100a23380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.244253] ffff888100a23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.244765] >ffff888100a23480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 11.245304] ^ [ 11.245712] ffff888100a23500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.245966] ffff888100a23580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.246221] ==================================================================
[ 21.067591] ================================================================== [ 21.068266] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.068969] Write of size 1 at addr ffff00000dc594da by task kunit_try_catch/212 [ 21.069642] [ 21.069797] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.069833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.069842] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.069853] Call trace: [ 21.069862] show_stack+0x20/0x38 (C) [ 21.069885] dump_stack_lvl+0x8c/0xd0 [ 21.069905] print_report+0x118/0x608 [ 21.069924] kasan_report+0xdc/0x128 [ 21.069942] __asan_report_store1_noabort+0x20/0x30 [ 21.069964] krealloc_less_oob_helper+0xa80/0xc50 [ 21.069988] krealloc_less_oob+0x20/0x38 [ 21.070010] kunit_try_run_case+0x170/0x3f0 [ 21.070034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.070059] kthread+0x328/0x630 [ 21.070082] ret_from_fork+0x10/0x20 [ 21.070103] [ 21.076032] Allocated by task 212: [ 21.076349] kasan_save_stack+0x3c/0x68 [ 21.076711] kasan_save_track+0x20/0x40 [ 21.077068] kasan_save_alloc_info+0x40/0x58 [ 21.077467] __kasan_krealloc+0x118/0x178 [ 21.077840] krealloc_noprof+0x128/0x360 [ 21.078207] krealloc_less_oob_helper+0x168/0xc50 [ 21.078645] krealloc_less_oob+0x20/0x38 [ 21.079015] kunit_try_run_case+0x170/0x3f0 [ 21.079407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.079915] kthread+0x328/0x630 [ 21.080223] ret_from_fork+0x10/0x20 [ 21.080560] [ 21.080706] The buggy address belongs to the object at ffff00000dc59400 [ 21.080706] which belongs to the cache kmalloc-256 of size 256 [ 21.081822] The buggy address is located 17 bytes to the right of [ 21.081822] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.082987] [ 21.083133] The buggy address belongs to the physical page: [ 21.083638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.084347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.085037] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.085673] page_type: f5(slab) [ 21.085971] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.086671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.087370] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.088076] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.088782] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.089488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.090189] page dumped because: kasan: bad access detected [ 21.090693] [ 21.090837] Memory state around the buggy address: [ 21.091273] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.091926] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.092578] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.093227] ^ [ 21.093778] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.094430] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.095079] ================================================================== [ 21.248842] ================================================================== [ 21.249514] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.250217] Write of size 1 at addr ffff00000def60da by task kunit_try_catch/216 [ 21.250890] [ 21.251045] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.251081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.251090] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.251102] Call trace: [ 21.251110] show_stack+0x20/0x38 (C) [ 21.251133] dump_stack_lvl+0x8c/0xd0 [ 21.251154] print_report+0x118/0x608 [ 21.251173] kasan_report+0xdc/0x128 [ 21.251191] __asan_report_store1_noabort+0x20/0x30 [ 21.251213] krealloc_less_oob_helper+0xa80/0xc50 [ 21.251237] krealloc_large_less_oob+0x20/0x38 [ 21.251260] kunit_try_run_case+0x170/0x3f0 [ 21.251283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.251309] kthread+0x328/0x630 [ 21.251332] ret_from_fork+0x10/0x20 [ 21.251353] [ 21.257329] The buggy address belongs to the physical page: [ 21.257834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.258544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.259235] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.259870] page_type: f8(unknown) [ 21.260193] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.260892] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.261592] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.262299] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.263005] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.263711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.264412] page dumped because: kasan: bad access detected [ 21.264915] [ 21.265060] Memory state around the buggy address: [ 21.265497] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.266149] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.266801] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.267449] ^ [ 21.268001] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.268653] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.269301] ================================================================== [ 21.124347] ================================================================== [ 21.125001] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.125692] Write of size 1 at addr ffff00000dc594eb by task kunit_try_catch/212 [ 21.126361] [ 21.126510] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.126542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.126550] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.126560] Call trace: [ 21.126567] show_stack+0x20/0x38 (C) [ 21.126587] dump_stack_lvl+0x8c/0xd0 [ 21.126605] print_report+0x118/0x608 [ 21.126623] kasan_report+0xdc/0x128 [ 21.126641] __asan_report_store1_noabort+0x20/0x30 [ 21.126663] krealloc_less_oob_helper+0xa58/0xc50 [ 21.126686] krealloc_less_oob+0x20/0x38 [ 21.126708] kunit_try_run_case+0x170/0x3f0 [ 21.126731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.126756] kthread+0x328/0x630 [ 21.126777] ret_from_fork+0x10/0x20 [ 21.126797] [ 21.132727] Allocated by task 212: [ 21.133042] kasan_save_stack+0x3c/0x68 [ 21.133400] kasan_save_track+0x20/0x40 [ 21.133756] kasan_save_alloc_info+0x40/0x58 [ 21.134155] __kasan_krealloc+0x118/0x178 [ 21.134529] krealloc_noprof+0x128/0x360 [ 21.134894] krealloc_less_oob_helper+0x168/0xc50 [ 21.135333] krealloc_less_oob+0x20/0x38 [ 21.135702] kunit_try_run_case+0x170/0x3f0 [ 21.136095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136602] kthread+0x328/0x630 [ 21.136911] ret_from_fork+0x10/0x20 [ 21.137247] [ 21.137392] The buggy address belongs to the object at ffff00000dc59400 [ 21.137392] which belongs to the cache kmalloc-256 of size 256 [ 21.138507] The buggy address is located 34 bytes to the right of [ 21.138507] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.139670] [ 21.139816] The buggy address belongs to the physical page: [ 21.140319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.141026] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.141715] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.142347] page_type: f5(slab) [ 21.142643] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.143343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.144043] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.144750] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.145456] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.146162] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.146863] page dumped because: kasan: bad access detected [ 21.147367] [ 21.147511] Memory state around the buggy address: [ 21.147946] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148597] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.149249] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.149897] ^ [ 21.150494] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.151145] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.151793] ================================================================== [ 21.038263] ================================================================== [ 21.038936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 21.039650] Write of size 1 at addr ffff00000dc594d0 by task kunit_try_catch/212 [ 21.040334] [ 21.040497] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.040545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.040559] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.040576] Call trace: [ 21.040586] show_stack+0x20/0x38 (C) [ 21.040617] dump_stack_lvl+0x8c/0xd0 [ 21.040648] print_report+0x118/0x608 [ 21.040677] kasan_report+0xdc/0x128 [ 21.040704] __asan_report_store1_noabort+0x20/0x30 [ 21.040738] krealloc_less_oob_helper+0xb9c/0xc50 [ 21.040773] krealloc_less_oob+0x20/0x38 [ 21.040806] kunit_try_run_case+0x170/0x3f0 [ 21.040840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.040878] kthread+0x328/0x630 [ 21.040911] ret_from_fork+0x10/0x20 [ 21.040942] [ 21.046921] Allocated by task 212: [ 21.047247] kasan_save_stack+0x3c/0x68 [ 21.047618] kasan_save_track+0x20/0x40 [ 21.047990] kasan_save_alloc_info+0x40/0x58 [ 21.048401] __kasan_krealloc+0x118/0x178 [ 21.048788] krealloc_noprof+0x128/0x360 [ 21.049168] krealloc_less_oob_helper+0x168/0xc50 [ 21.049622] krealloc_less_oob+0x20/0x38 [ 21.050005] kunit_try_run_case+0x170/0x3f0 [ 21.050409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.050933] kthread+0x328/0x630 [ 21.051255] ret_from_fork+0x10/0x20 [ 21.051604] [ 21.051757] The buggy address belongs to the object at ffff00000dc59400 [ 21.051757] which belongs to the cache kmalloc-256 of size 256 [ 21.052888] The buggy address is located 7 bytes to the right of [ 21.052888] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.054061] [ 21.054214] The buggy address belongs to the physical page: [ 21.054729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.055452] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.056156] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.056807] page_type: f5(slab) [ 21.057119] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.057834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.058549] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.059271] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.059994] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.060716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.061431] page dumped because: kasan: bad access detected [ 21.061943] [ 21.062096] Memory state around the buggy address: [ 21.062543] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.063208] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.063873] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.064534] ^ [ 21.065073] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.065738] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.066400] ================================================================== [ 21.096023] ================================================================== [ 21.096676] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.097367] Write of size 1 at addr ffff00000dc594ea by task kunit_try_catch/212 [ 21.098035] [ 21.098184] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.098216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.098224] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.098234] Call trace: [ 21.098241] show_stack+0x20/0x38 (C) [ 21.098260] dump_stack_lvl+0x8c/0xd0 [ 21.098278] print_report+0x118/0x608 [ 21.098296] kasan_report+0xdc/0x128 [ 21.098314] __asan_report_store1_noabort+0x20/0x30 [ 21.098336] krealloc_less_oob_helper+0xae4/0xc50 [ 21.098359] krealloc_less_oob+0x20/0x38 [ 21.098381] kunit_try_run_case+0x170/0x3f0 [ 21.098403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.098428] kthread+0x328/0x630 [ 21.098450] ret_from_fork+0x10/0x20 [ 21.098470] [ 21.104398] Allocated by task 212: [ 21.104712] kasan_save_stack+0x3c/0x68 [ 21.105072] kasan_save_track+0x20/0x40 [ 21.105431] kasan_save_alloc_info+0x40/0x58 [ 21.105829] __kasan_krealloc+0x118/0x178 [ 21.106203] krealloc_noprof+0x128/0x360 [ 21.106567] krealloc_less_oob_helper+0x168/0xc50 [ 21.107005] krealloc_less_oob+0x20/0x38 [ 21.107375] kunit_try_run_case+0x170/0x3f0 [ 21.107767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.108274] kthread+0x328/0x630 [ 21.108584] ret_from_fork+0x10/0x20 [ 21.108921] [ 21.109066] The buggy address belongs to the object at ffff00000dc59400 [ 21.109066] which belongs to the cache kmalloc-256 of size 256 [ 21.110182] The buggy address is located 33 bytes to the right of [ 21.110182] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.111345] [ 21.111491] The buggy address belongs to the physical page: [ 21.111993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.112700] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.113389] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.114021] page_type: f5(slab) [ 21.114319] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.115018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.115717] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.116424] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.117131] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.117836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.118536] page dumped because: kasan: bad access detected [ 21.119040] [ 21.119185] Memory state around the buggy address: [ 21.119620] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.120271] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.120921] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.121570] ^ [ 21.122167] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.122818] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.123466] ================================================================== [ 21.008896] ================================================================== [ 21.009937] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 21.010658] Write of size 1 at addr ffff00000dc594c9 by task kunit_try_catch/212 [ 21.011342] [ 21.011505] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.011553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.011567] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.011583] Call trace: [ 21.011594] show_stack+0x20/0x38 (C) [ 21.011626] dump_stack_lvl+0x8c/0xd0 [ 21.011657] print_report+0x118/0x608 [ 21.011686] kasan_report+0xdc/0x128 [ 21.011713] __asan_report_store1_noabort+0x20/0x30 [ 21.011747] krealloc_less_oob_helper+0xa48/0xc50 [ 21.011783] krealloc_less_oob+0x20/0x38 [ 21.011816] kunit_try_run_case+0x170/0x3f0 [ 21.011850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.011889] kthread+0x328/0x630 [ 21.011922] ret_from_fork+0x10/0x20 [ 21.011954] [ 21.017936] Allocated by task 212: [ 21.018261] kasan_save_stack+0x3c/0x68 [ 21.018634] kasan_save_track+0x20/0x40 [ 21.019005] kasan_save_alloc_info+0x40/0x58 [ 21.019417] __kasan_krealloc+0x118/0x178 [ 21.019804] krealloc_noprof+0x128/0x360 [ 21.020183] krealloc_less_oob_helper+0x168/0xc50 [ 21.020637] krealloc_less_oob+0x20/0x38 [ 21.021021] kunit_try_run_case+0x170/0x3f0 [ 21.021426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.021950] kthread+0x328/0x630 [ 21.022273] ret_from_fork+0x10/0x20 [ 21.022623] [ 21.022776] The buggy address belongs to the object at ffff00000dc59400 [ 21.022776] which belongs to the cache kmalloc-256 of size 256 [ 21.023907] The buggy address is located 0 bytes to the right of [ 21.023907] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.025079] [ 21.025233] The buggy address belongs to the physical page: [ 21.025750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.026473] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.027178] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.027831] page_type: f5(slab) [ 21.028145] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.028860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.029575] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.030297] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.031020] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.031742] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.032457] page dumped because: kasan: bad access detected [ 21.032972] [ 21.033124] Memory state around the buggy address: [ 21.033572] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034237] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.034902] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.035563] ^ [ 21.036081] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.036746] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.037407] ================================================================== [ 21.291373] ================================================================== [ 21.292027] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.292716] Write of size 1 at addr ffff00000def60eb by task kunit_try_catch/216 [ 21.293385] [ 21.293534] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.293565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.293574] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.293583] Call trace: [ 21.293590] show_stack+0x20/0x38 (C) [ 21.293610] dump_stack_lvl+0x8c/0xd0 [ 21.293628] print_report+0x118/0x608 [ 21.293646] kasan_report+0xdc/0x128 [ 21.293664] __asan_report_store1_noabort+0x20/0x30 [ 21.293686] krealloc_less_oob_helper+0xa58/0xc50 [ 21.293709] krealloc_large_less_oob+0x20/0x38 [ 21.293732] kunit_try_run_case+0x170/0x3f0 [ 21.293754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.293780] kthread+0x328/0x630 [ 21.293802] ret_from_fork+0x10/0x20 [ 21.293821] [ 21.299792] The buggy address belongs to the physical page: [ 21.300296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.301002] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.301692] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.302323] page_type: f8(unknown) [ 21.302643] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.303342] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.304040] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.304746] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.305453] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.306158] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.306860] page dumped because: kasan: bad access detected [ 21.307363] [ 21.307508] Memory state around the buggy address: [ 21.307944] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.308596] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.309247] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.309895] ^ [ 21.310492] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.311142] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.311791] ================================================================== [ 21.227232] ================================================================== [ 21.227894] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 21.228594] Write of size 1 at addr ffff00000def60d0 by task kunit_try_catch/216 [ 21.229265] [ 21.229419] CPU: 2 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.229453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.229463] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.229476] Call trace: [ 21.229484] show_stack+0x20/0x38 (C) [ 21.229507] dump_stack_lvl+0x8c/0xd0 [ 21.229529] print_report+0x118/0x608 [ 21.229550] kasan_report+0xdc/0x128 [ 21.229569] __asan_report_store1_noabort+0x20/0x30 [ 21.229594] krealloc_less_oob_helper+0xb9c/0xc50 [ 21.229619] krealloc_large_less_oob+0x20/0x38 [ 21.229644] kunit_try_run_case+0x170/0x3f0 [ 21.229669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.229697] kthread+0x328/0x630 [ 21.229722] ret_from_fork+0x10/0x20 [ 21.229745] [ 21.235732] The buggy address belongs to the physical page: [ 21.236238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.236948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.237641] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.238278] page_type: f8(unknown) [ 21.238601] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.239302] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.240004] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.240712] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.241422] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.242132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.242835] page dumped because: kasan: bad access detected [ 21.243341] [ 21.243486] Memory state around the buggy address: [ 21.243924] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.244577] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.245231] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.245882] ^ [ 21.246411] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.247064] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.247714] ================================================================== [ 21.205424] ================================================================== [ 21.206504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 21.207217] Write of size 1 at addr ffff00000def60c9 by task kunit_try_catch/216 [ 21.207889] [ 21.208046] CPU: 2 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.208082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.208092] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.208104] Call trace: [ 21.208113] show_stack+0x20/0x38 (C) [ 21.208137] dump_stack_lvl+0x8c/0xd0 [ 21.208160] print_report+0x118/0x608 [ 21.208181] kasan_report+0xdc/0x128 [ 21.208201] __asan_report_store1_noabort+0x20/0x30 [ 21.208226] krealloc_less_oob_helper+0xa48/0xc50 [ 21.208251] krealloc_large_less_oob+0x20/0x38 [ 21.208276] kunit_try_run_case+0x170/0x3f0 [ 21.208302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.208330] kthread+0x328/0x630 [ 21.208355] ret_from_fork+0x10/0x20 [ 21.208379] [ 21.214365] The buggy address belongs to the physical page: [ 21.214872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.215583] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.216277] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.216914] page_type: f8(unknown) [ 21.217238] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.217941] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.218643] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.219352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.220062] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.220772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.221476] page dumped because: kasan: bad access detected [ 21.221982] [ 21.222128] Memory state around the buggy address: [ 21.222567] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.223221] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.223875] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.224526] ^ [ 21.225034] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.225687] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.226337] ================================================================== [ 21.270138] ================================================================== [ 21.270790] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.271480] Write of size 1 at addr ffff00000def60ea by task kunit_try_catch/216 [ 21.272149] [ 21.272297] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.272329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.272337] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.272347] Call trace: [ 21.272354] show_stack+0x20/0x38 (C) [ 21.272373] dump_stack_lvl+0x8c/0xd0 [ 21.272392] print_report+0x118/0x608 [ 21.272410] kasan_report+0xdc/0x128 [ 21.272428] __asan_report_store1_noabort+0x20/0x30 [ 21.272450] krealloc_less_oob_helper+0xae4/0xc50 [ 21.272473] krealloc_large_less_oob+0x20/0x38 [ 21.272496] kunit_try_run_case+0x170/0x3f0 [ 21.272518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.272544] kthread+0x328/0x630 [ 21.272565] ret_from_fork+0x10/0x20 [ 21.272586] [ 21.278561] The buggy address belongs to the physical page: [ 21.279064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.279773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.280463] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.281095] page_type: f8(unknown) [ 21.281415] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.282115] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.282814] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.283520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.284226] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.284932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.285634] page dumped because: kasan: bad access detected [ 21.286137] [ 21.286282] Memory state around the buggy address: [ 21.286719] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.287370] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.288022] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.288671] ^ [ 21.289269] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.289920] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.290568] ==================================================================