Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 23.022527] ================================================================== [ 23.022619] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 23.022724] Write of size 1 at addr fff00000c76ce0f0 by task kunit_try_catch/162 [ 23.022837] [ 23.022899] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.025000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.025131] Hardware name: linux,dummy-virt (DT) [ 23.025237] Call trace: [ 23.025379] show_stack+0x20/0x38 (C) [ 23.025825] dump_stack_lvl+0x8c/0xd0 [ 23.026272] print_report+0x118/0x608 [ 23.026427] kasan_report+0xdc/0x128 [ 23.026636] __asan_report_store1_noabort+0x20/0x30 [ 23.027100] krealloc_more_oob_helper+0x5c0/0x678 [ 23.027228] krealloc_large_more_oob+0x20/0x38 [ 23.030196] kunit_try_run_case+0x170/0x3f0 [ 23.030376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.030511] kthread+0x328/0x630 [ 23.032490] ret_from_fork+0x10/0x20 [ 23.033810] [ 23.033886] The buggy address belongs to the physical page: [ 23.034247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 23.035369] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.035504] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.036479] page_type: f8(unknown) [ 23.037494] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.037989] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.038676] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.038801] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.038923] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 23.040352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.040448] page dumped because: kasan: bad access detected [ 23.040519] [ 23.040563] Memory state around the buggy address: [ 23.042335] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.043089] fff00000c76ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.043265] >fff00000c76ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.043738] ^ [ 23.044374] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.045073] fff00000c76ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.045548] ================================================================== [ 22.886067] ================================================================== [ 22.886160] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.886263] Write of size 1 at addr fff00000c67390f0 by task kunit_try_catch/158 [ 22.886390] [ 22.886465] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.886864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.887014] Hardware name: linux,dummy-virt (DT) [ 22.887100] Call trace: [ 22.887165] show_stack+0x20/0x38 (C) [ 22.887287] dump_stack_lvl+0x8c/0xd0 [ 22.887599] print_report+0x118/0x608 [ 22.888018] kasan_report+0xdc/0x128 [ 22.888312] __asan_report_store1_noabort+0x20/0x30 [ 22.888642] krealloc_more_oob_helper+0x5c0/0x678 [ 22.889048] krealloc_more_oob+0x20/0x38 [ 22.889209] kunit_try_run_case+0x170/0x3f0 [ 22.889373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.889621] kthread+0x328/0x630 [ 22.889759] ret_from_fork+0x10/0x20 [ 22.890871] [ 22.891123] Allocated by task 158: [ 22.892189] kasan_save_stack+0x3c/0x68 [ 22.892332] kasan_save_track+0x20/0x40 [ 22.892551] kasan_save_alloc_info+0x40/0x58 [ 22.892653] __kasan_krealloc+0x118/0x178 [ 22.892779] krealloc_noprof+0x128/0x360 [ 22.893033] krealloc_more_oob_helper+0x168/0x678 [ 22.893137] krealloc_more_oob+0x20/0x38 [ 22.893225] kunit_try_run_case+0x170/0x3f0 [ 22.893315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.893414] kthread+0x328/0x630 [ 22.893495] ret_from_fork+0x10/0x20 [ 22.893578] [ 22.893622] The buggy address belongs to the object at fff00000c6739000 [ 22.893622] which belongs to the cache kmalloc-256 of size 256 [ 22.893799] The buggy address is located 5 bytes to the right of [ 22.893799] allocated 235-byte region [fff00000c6739000, fff00000c67390eb) [ 22.894405] [ 22.894662] The buggy address belongs to the physical page: [ 22.895124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 [ 22.895335] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.895460] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.896030] page_type: f5(slab) [ 22.896182] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.896311] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.896438] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.896974] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.897190] head: 0bfffe0000000001 ffffc1ffc319ce01 00000000ffffffff 00000000ffffffff [ 22.897489] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.897674] page dumped because: kasan: bad access detected [ 22.897747] [ 22.897789] Memory state around the buggy address: [ 22.897859] fff00000c6738f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.897979] fff00000c6739000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.899347] >fff00000c6739080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.899617] ^ [ 22.899737] fff00000c6739100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899846] fff00000c6739180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.900024] ================================================================== [ 22.873834] ================================================================== [ 22.874424] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.874545] Write of size 1 at addr fff00000c67390eb by task kunit_try_catch/158 [ 22.874818] [ 22.874898] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.875137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.875223] Hardware name: linux,dummy-virt (DT) [ 22.875294] Call trace: [ 22.875344] show_stack+0x20/0x38 (C) [ 22.875459] dump_stack_lvl+0x8c/0xd0 [ 22.875586] print_report+0x118/0x608 [ 22.875709] kasan_report+0xdc/0x128 [ 22.875817] __asan_report_store1_noabort+0x20/0x30 [ 22.875951] krealloc_more_oob_helper+0x60c/0x678 [ 22.876075] krealloc_more_oob+0x20/0x38 [ 22.876191] kunit_try_run_case+0x170/0x3f0 [ 22.876306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.876431] kthread+0x328/0x630 [ 22.876536] ret_from_fork+0x10/0x20 [ 22.876651] [ 22.876693] Allocated by task 158: [ 22.876754] kasan_save_stack+0x3c/0x68 [ 22.876841] kasan_save_track+0x20/0x40 [ 22.878659] kasan_save_alloc_info+0x40/0x58 [ 22.878782] __kasan_krealloc+0x118/0x178 [ 22.878885] krealloc_noprof+0x128/0x360 [ 22.879011] krealloc_more_oob_helper+0x168/0x678 [ 22.879124] krealloc_more_oob+0x20/0x38 [ 22.879229] kunit_try_run_case+0x170/0x3f0 [ 22.879391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.879534] kthread+0x328/0x630 [ 22.879767] ret_from_fork+0x10/0x20 [ 22.879859] [ 22.879909] The buggy address belongs to the object at fff00000c6739000 [ 22.879909] which belongs to the cache kmalloc-256 of size 256 [ 22.880098] The buggy address is located 0 bytes to the right of [ 22.880098] allocated 235-byte region [fff00000c6739000, fff00000c67390eb) [ 22.880475] [ 22.880574] The buggy address belongs to the physical page: [ 22.880670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 [ 22.880790] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.880896] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.881212] page_type: f5(slab) [ 22.881388] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.881523] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.881695] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 22.881966] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.882085] head: 0bfffe0000000001 ffffc1ffc319ce01 00000000ffffffff 00000000ffffffff [ 22.882267] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.882394] page dumped because: kasan: bad access detected [ 22.882467] [ 22.882560] Memory state around the buggy address: [ 22.882754] fff00000c6738f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.882907] fff00000c6739000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.883125] >fff00000c6739080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.883268] ^ [ 22.883406] fff00000c6739100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.883658] fff00000c6739180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.883916] ================================================================== [ 23.013736] ================================================================== [ 23.014025] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 23.014277] Write of size 1 at addr fff00000c76ce0eb by task kunit_try_catch/162 [ 23.014459] [ 23.014653] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.014837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.014899] Hardware name: linux,dummy-virt (DT) [ 23.014987] Call trace: [ 23.015038] show_stack+0x20/0x38 (C) [ 23.015157] dump_stack_lvl+0x8c/0xd0 [ 23.015269] print_report+0x118/0x608 [ 23.015374] kasan_report+0xdc/0x128 [ 23.015478] __asan_report_store1_noabort+0x20/0x30 [ 23.015612] krealloc_more_oob_helper+0x60c/0x678 [ 23.015746] krealloc_large_more_oob+0x20/0x38 [ 23.015869] kunit_try_run_case+0x170/0x3f0 [ 23.016722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.016927] kthread+0x328/0x630 [ 23.017080] ret_from_fork+0x10/0x20 [ 23.017211] [ 23.017266] The buggy address belongs to the physical page: [ 23.017343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 23.017480] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.017606] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.017727] page_type: f8(unknown) [ 23.018028] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.018156] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.018284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.018595] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.018765] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 23.018990] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.019086] page dumped because: kasan: bad access detected [ 23.019208] [ 23.019286] Memory state around the buggy address: [ 23.019357] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.019621] fff00000c76ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.019751] >fff00000c76ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.019854] ^ [ 23.019979] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.020093] fff00000c76ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.020196] ==================================================================
[ 11.152181] ================================================================== [ 11.152744] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.153090] Write of size 1 at addr ffff8881003510eb by task kunit_try_catch/176 [ 11.153448] [ 11.153612] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.153658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.153669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.153688] Call Trace: [ 11.153710] <TASK> [ 11.153724] dump_stack_lvl+0x73/0xb0 [ 11.153751] print_report+0xd1/0x650 [ 11.153791] ? __virt_addr_valid+0x1db/0x2d0 [ 11.153813] ? krealloc_more_oob_helper+0x821/0x930 [ 11.153836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.153858] ? krealloc_more_oob_helper+0x821/0x930 [ 11.153882] kasan_report+0x141/0x180 [ 11.153904] ? krealloc_more_oob_helper+0x821/0x930 [ 11.153932] __asan_report_store1_noabort+0x1b/0x30 [ 11.153961] krealloc_more_oob_helper+0x821/0x930 [ 11.153983] ? __schedule+0x10cc/0x2b30 [ 11.154006] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.154040] ? finish_task_switch.isra.0+0x153/0x700 [ 11.154063] ? __switch_to+0x5d9/0xf60 [ 11.154084] ? dequeue_task_fair+0x166/0x4e0 [ 11.154121] ? __schedule+0x10cc/0x2b30 [ 11.154162] ? __pfx_read_tsc+0x10/0x10 [ 11.154185] krealloc_more_oob+0x1c/0x30 [ 11.154216] kunit_try_run_case+0x1a5/0x480 [ 11.154239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.154260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.154282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.154306] ? __kthread_parkme+0x82/0x180 [ 11.154336] ? preempt_count_sub+0x50/0x80 [ 11.154359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.154382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.154443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.154466] kthread+0x337/0x6f0 [ 11.154485] ? trace_preempt_on+0x20/0xc0 [ 11.154507] ? __pfx_kthread+0x10/0x10 [ 11.154529] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.154550] ? calculate_sigpending+0x7b/0xa0 [ 11.154571] ? __pfx_kthread+0x10/0x10 [ 11.154592] ret_from_fork+0x41/0x80 [ 11.154612] ? __pfx_kthread+0x10/0x10 [ 11.154633] ret_from_fork_asm+0x1a/0x30 [ 11.154664] </TASK> [ 11.154674] [ 11.166697] Allocated by task 176: [ 11.166865] kasan_save_stack+0x45/0x70 [ 11.167100] kasan_save_track+0x18/0x40 [ 11.167339] kasan_save_alloc_info+0x3b/0x50 [ 11.167669] __kasan_krealloc+0x190/0x1f0 [ 11.167906] krealloc_noprof+0xf3/0x340 [ 11.168097] krealloc_more_oob_helper+0x1a9/0x930 [ 11.168312] krealloc_more_oob+0x1c/0x30 [ 11.168604] kunit_try_run_case+0x1a5/0x480 [ 11.168807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.169059] kthread+0x337/0x6f0 [ 11.169250] ret_from_fork+0x41/0x80 [ 11.169416] ret_from_fork_asm+0x1a/0x30 [ 11.169638] [ 11.169710] The buggy address belongs to the object at ffff888100351000 [ 11.169710] which belongs to the cache kmalloc-256 of size 256 [ 11.170316] The buggy address is located 0 bytes to the right of [ 11.170316] allocated 235-byte region [ffff888100351000, ffff8881003510eb) [ 11.170896] [ 11.170995] The buggy address belongs to the physical page: [ 11.171240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.171604] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.171828] flags: 0x200000000000040(head|node=0|zone=2) [ 11.172111] page_type: f5(slab) [ 11.172277] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.172902] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.173430] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.173780] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.174066] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.174487] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.174813] page dumped because: kasan: bad access detected [ 11.174990] [ 11.175083] Memory state around the buggy address: [ 11.175570] ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.175916] ffff888100351000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.176181] >ffff888100351080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.176597] ^ [ 11.176799] ffff888100351100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.177112] ffff888100351180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.177672] ================================================================== [ 11.178516] ================================================================== [ 11.178812] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.179125] Write of size 1 at addr ffff8881003510f0 by task kunit_try_catch/176 [ 11.179651] [ 11.179771] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.179816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.179826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.179846] Call Trace: [ 11.179857] <TASK> [ 11.179872] dump_stack_lvl+0x73/0xb0 [ 11.179897] print_report+0xd1/0x650 [ 11.179919] ? __virt_addr_valid+0x1db/0x2d0 [ 11.179940] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.179963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.179985] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.180008] kasan_report+0x141/0x180 [ 11.180030] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.180059] __asan_report_store1_noabort+0x1b/0x30 [ 11.180079] krealloc_more_oob_helper+0x7eb/0x930 [ 11.180101] ? __schedule+0x10cc/0x2b30 [ 11.180123] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.180147] ? finish_task_switch.isra.0+0x153/0x700 [ 11.180169] ? __switch_to+0x5d9/0xf60 [ 11.180189] ? dequeue_task_fair+0x166/0x4e0 [ 11.180213] ? __schedule+0x10cc/0x2b30 [ 11.180247] ? __pfx_read_tsc+0x10/0x10 [ 11.180270] krealloc_more_oob+0x1c/0x30 [ 11.180291] kunit_try_run_case+0x1a5/0x480 [ 11.180334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.180355] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.180379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.180402] ? __kthread_parkme+0x82/0x180 [ 11.180422] ? preempt_count_sub+0x50/0x80 [ 11.180446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.180468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.180489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.180511] kthread+0x337/0x6f0 [ 11.180531] ? trace_preempt_on+0x20/0xc0 [ 11.180554] ? __pfx_kthread+0x10/0x10 [ 11.180575] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.180596] ? calculate_sigpending+0x7b/0xa0 [ 11.180815] ? __pfx_kthread+0x10/0x10 [ 11.180837] ret_from_fork+0x41/0x80 [ 11.180858] ? __pfx_kthread+0x10/0x10 [ 11.180879] ret_from_fork_asm+0x1a/0x30 [ 11.180910] </TASK> [ 11.180921] [ 11.189194] Allocated by task 176: [ 11.189620] kasan_save_stack+0x45/0x70 [ 11.189852] kasan_save_track+0x18/0x40 [ 11.190099] kasan_save_alloc_info+0x3b/0x50 [ 11.190294] __kasan_krealloc+0x190/0x1f0 [ 11.190481] krealloc_noprof+0xf3/0x340 [ 11.190690] krealloc_more_oob_helper+0x1a9/0x930 [ 11.190964] krealloc_more_oob+0x1c/0x30 [ 11.191161] kunit_try_run_case+0x1a5/0x480 [ 11.191396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.191569] kthread+0x337/0x6f0 [ 11.191687] ret_from_fork+0x41/0x80 [ 11.191813] ret_from_fork_asm+0x1a/0x30 [ 11.192087] [ 11.192238] The buggy address belongs to the object at ffff888100351000 [ 11.192238] which belongs to the cache kmalloc-256 of size 256 [ 11.192962] The buggy address is located 5 bytes to the right of [ 11.192962] allocated 235-byte region [ffff888100351000, ffff8881003510eb) [ 11.193388] [ 11.193496] The buggy address belongs to the physical page: [ 11.193811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 11.194293] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.194789] flags: 0x200000000000040(head|node=0|zone=2) [ 11.195166] page_type: f5(slab) [ 11.195366] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.195788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.196121] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.196552] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.196903] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 11.197254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.197645] page dumped because: kasan: bad access detected [ 11.197888] [ 11.197957] Memory state around the buggy address: [ 11.198111] ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.198453] ffff888100351000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.198697] >ffff888100351080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.199272] ^ [ 11.199795] ffff888100351100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.200119] ffff888100351180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.200555] ================================================================== [ 11.349076] ================================================================== [ 11.349451] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.350040] Write of size 1 at addr ffff888102c5a0f0 by task kunit_try_catch/180 [ 11.350446] [ 11.350563] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.350606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.350617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.350638] Call Trace: [ 11.350653] <TASK> [ 11.350667] dump_stack_lvl+0x73/0xb0 [ 11.350690] print_report+0xd1/0x650 [ 11.350712] ? __virt_addr_valid+0x1db/0x2d0 [ 11.350734] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.350757] ? kasan_addr_to_slab+0x11/0xa0 [ 11.350778] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.350802] kasan_report+0x141/0x180 [ 11.350824] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.350853] __asan_report_store1_noabort+0x1b/0x30 [ 11.350873] krealloc_more_oob_helper+0x7eb/0x930 [ 11.350895] ? __schedule+0x10cc/0x2b30 [ 11.350918] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.350942] ? finish_task_switch.isra.0+0x153/0x700 [ 11.350963] ? __switch_to+0x5d9/0xf60 [ 11.350983] ? dequeue_task_fair+0x166/0x4e0 [ 11.351007] ? __schedule+0x10cc/0x2b30 [ 11.351029] ? __pfx_read_tsc+0x10/0x10 [ 11.351052] krealloc_large_more_oob+0x1c/0x30 [ 11.351075] kunit_try_run_case+0x1a5/0x480 [ 11.351098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.351118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.351152] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.351175] ? __kthread_parkme+0x82/0x180 [ 11.351196] ? preempt_count_sub+0x50/0x80 [ 11.351220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.351242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.351264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.351287] kthread+0x337/0x6f0 [ 11.351307] ? trace_preempt_on+0x20/0xc0 [ 11.351342] ? __pfx_kthread+0x10/0x10 [ 11.351364] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.351385] ? calculate_sigpending+0x7b/0xa0 [ 11.351407] ? __pfx_kthread+0x10/0x10 [ 11.351429] ret_from_fork+0x41/0x80 [ 11.351449] ? __pfx_kthread+0x10/0x10 [ 11.351470] ret_from_fork_asm+0x1a/0x30 [ 11.351501] </TASK> [ 11.351511] [ 11.359846] The buggy address belongs to the physical page: [ 11.360236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.360710] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.360986] flags: 0x200000000000040(head|node=0|zone=2) [ 11.361174] page_type: f8(unknown) [ 11.361379] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.361883] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.362237] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.362593] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.362934] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.363226] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.363592] page dumped because: kasan: bad access detected [ 11.363765] [ 11.363833] Memory state around the buggy address: [ 11.364031] ffff888102c59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.364350] ffff888102c5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.364711] >ffff888102c5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.364925] ^ [ 11.365127] ffff888102c5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.365757] ffff888102c5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.366100] ================================================================== [ 11.320860] ================================================================== [ 11.321911] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.322168] Write of size 1 at addr ffff888102c5a0eb by task kunit_try_catch/180 [ 11.323085] [ 11.323354] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.323687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.323699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.323720] Call Trace: [ 11.323733] <TASK> [ 11.323749] dump_stack_lvl+0x73/0xb0 [ 11.323776] print_report+0xd1/0x650 [ 11.323810] ? __virt_addr_valid+0x1db/0x2d0 [ 11.323832] ? krealloc_more_oob_helper+0x821/0x930 [ 11.323855] ? kasan_addr_to_slab+0x11/0xa0 [ 11.323887] ? krealloc_more_oob_helper+0x821/0x930 [ 11.323911] kasan_report+0x141/0x180 [ 11.323934] ? krealloc_more_oob_helper+0x821/0x930 [ 11.323963] __asan_report_store1_noabort+0x1b/0x30 [ 11.323984] krealloc_more_oob_helper+0x821/0x930 [ 11.324006] ? __schedule+0x10cc/0x2b30 [ 11.324030] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.324054] ? finish_task_switch.isra.0+0x153/0x700 [ 11.324077] ? __switch_to+0x5d9/0xf60 [ 11.324096] ? dequeue_task_fair+0x166/0x4e0 [ 11.324122] ? __schedule+0x10cc/0x2b30 [ 11.324152] ? __pfx_read_tsc+0x10/0x10 [ 11.324175] krealloc_large_more_oob+0x1c/0x30 [ 11.324198] kunit_try_run_case+0x1a5/0x480 [ 11.324221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.324242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.324266] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.324289] ? __kthread_parkme+0x82/0x180 [ 11.324310] ? preempt_count_sub+0x50/0x80 [ 11.324343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.324367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.324410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.324432] kthread+0x337/0x6f0 [ 11.324453] ? trace_preempt_on+0x20/0xc0 [ 11.324475] ? __pfx_kthread+0x10/0x10 [ 11.324497] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.324518] ? calculate_sigpending+0x7b/0xa0 [ 11.324539] ? __pfx_kthread+0x10/0x10 [ 11.324562] ret_from_fork+0x41/0x80 [ 11.324582] ? __pfx_kthread+0x10/0x10 [ 11.324603] ret_from_fork_asm+0x1a/0x30 [ 11.324635] </TASK> [ 11.324645] [ 11.338045] The buggy address belongs to the physical page: [ 11.338583] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.339189] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.339660] flags: 0x200000000000040(head|node=0|zone=2) [ 11.340136] page_type: f8(unknown) [ 11.340320] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.341011] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.341737] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.342071] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.342974] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.343845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.344400] page dumped because: kasan: bad access detected [ 11.344773] [ 11.344867] Memory state around the buggy address: [ 11.345070] ffff888102c59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.346078] ffff888102c5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.346668] >ffff888102c5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.347046] ^ [ 11.347757] ffff888102c5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.348168] ffff888102c5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.348696] ==================================================================
[ 20.946348] ================================================================== [ 20.947383] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 20.948105] Write of size 1 at addr ffff00000240faeb by task kunit_try_catch/210 [ 20.948789] [ 20.948954] CPU: 2 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.949002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.949015] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.949033] Call trace: [ 20.949044] show_stack+0x20/0x38 (C) [ 20.949076] dump_stack_lvl+0x8c/0xd0 [ 20.949107] print_report+0x118/0x608 [ 20.949136] kasan_report+0xdc/0x128 [ 20.949164] __asan_report_store1_noabort+0x20/0x30 [ 20.949198] krealloc_more_oob_helper+0x60c/0x678 [ 20.949234] krealloc_more_oob+0x20/0x38 [ 20.949267] kunit_try_run_case+0x170/0x3f0 [ 20.949302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.949340] kthread+0x328/0x630 [ 20.949374] ret_from_fork+0x10/0x20 [ 20.949407] [ 20.955392] Allocated by task 210: [ 20.955722] kasan_save_stack+0x3c/0x68 [ 20.956096] kasan_save_track+0x20/0x40 [ 20.956468] kasan_save_alloc_info+0x40/0x58 [ 20.956880] __kasan_krealloc+0x118/0x178 [ 20.957267] krealloc_noprof+0x128/0x360 [ 20.957648] krealloc_more_oob_helper+0x168/0x678 [ 20.958102] krealloc_more_oob+0x20/0x38 [ 20.958486] kunit_try_run_case+0x170/0x3f0 [ 20.958892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.959416] kthread+0x328/0x630 [ 20.959739] ret_from_fork+0x10/0x20 [ 20.960090] [ 20.960243] The buggy address belongs to the object at ffff00000240fa00 [ 20.960243] which belongs to the cache kmalloc-256 of size 256 [ 20.961376] The buggy address is located 0 bytes to the right of [ 20.961376] allocated 235-byte region [ffff00000240fa00, ffff00000240faeb) [ 20.962549] [ 20.962704] The buggy address belongs to the physical page: [ 20.963220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x240e [ 20.963945] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.964650] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.965301] page_type: f5(slab) [ 20.965615] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.966330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.967046] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.967768] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.968491] head: 03fffe0000000001 fffffdffc0090381 00000000ffffffff 00000000ffffffff [ 20.969213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.969928] page dumped because: kasan: bad access detected [ 20.970443] [ 20.970595] Memory state around the buggy address: [ 20.971044] ffff00000240f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.971708] ffff00000240fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.972373] >ffff00000240fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.973034] ^ [ 20.973643] ffff00000240fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.974308] ffff00000240fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.974969] ================================================================== [ 20.976293] ================================================================== [ 20.976969] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 20.977674] Write of size 1 at addr ffff00000240faf0 by task kunit_try_catch/210 [ 20.978347] [ 20.978501] CPU: 4 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.978537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.978547] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.978558] Call trace: [ 20.978567] show_stack+0x20/0x38 (C) [ 20.978590] dump_stack_lvl+0x8c/0xd0 [ 20.978610] print_report+0x118/0x608 [ 20.978629] kasan_report+0xdc/0x128 [ 20.978647] __asan_report_store1_noabort+0x20/0x30 [ 20.978670] krealloc_more_oob_helper+0x5c0/0x678 [ 20.978693] krealloc_more_oob+0x20/0x38 [ 20.978715] kunit_try_run_case+0x170/0x3f0 [ 20.978738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.978763] kthread+0x328/0x630 [ 20.978785] ret_from_fork+0x10/0x20 [ 20.978806] [ 20.984739] Allocated by task 210: [ 20.985055] kasan_save_stack+0x3c/0x68 [ 20.985416] kasan_save_track+0x20/0x40 [ 20.985774] kasan_save_alloc_info+0x40/0x58 [ 20.986172] __kasan_krealloc+0x118/0x178 [ 20.986546] krealloc_noprof+0x128/0x360 [ 20.986913] krealloc_more_oob_helper+0x168/0x678 [ 20.987351] krealloc_more_oob+0x20/0x38 [ 20.987721] kunit_try_run_case+0x170/0x3f0 [ 20.988112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.988620] kthread+0x328/0x630 [ 20.988928] ret_from_fork+0x10/0x20 [ 20.989265] [ 20.989410] The buggy address belongs to the object at ffff00000240fa00 [ 20.989410] which belongs to the cache kmalloc-256 of size 256 [ 20.990528] The buggy address is located 5 bytes to the right of [ 20.990528] allocated 235-byte region [ffff00000240fa00, ffff00000240faeb) [ 20.991685] [ 20.991831] The buggy address belongs to the physical page: [ 20.992336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x240e [ 20.993044] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.993734] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.994370] page_type: f5(slab) [ 20.994669] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.995368] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.996068] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.996773] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.997479] head: 03fffe0000000001 fffffdffc0090381 00000000ffffffff 00000000ffffffff [ 20.998185] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.998886] page dumped because: kasan: bad access detected [ 20.999388] [ 20.999533] Memory state around the buggy address: [ 20.999971] ffff00000240f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.000623] ffff00000240fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.001274] >ffff00000240fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 21.001923] ^ [ 21.002544] ffff00000240fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.003194] ffff00000240fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.003842] ================================================================== [ 21.180096] ================================================================== [ 21.180790] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 21.181536] Write of size 1 at addr ffff00000d7360f0 by task kunit_try_catch/214 [ 21.182250] [ 21.182432] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.182509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.182532] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.182559] Call trace: [ 21.182577] show_stack+0x20/0x38 (C) [ 21.182626] dump_stack_lvl+0x8c/0xd0 [ 21.182675] print_report+0x118/0x608 [ 21.182723] kasan_report+0xdc/0x128 [ 21.182769] __asan_report_store1_noabort+0x20/0x30 [ 21.182825] krealloc_more_oob_helper+0x5c0/0x678 [ 21.182885] krealloc_large_more_oob+0x20/0x38 [ 21.182943] kunit_try_run_case+0x170/0x3f0 [ 21.182999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183064] kthread+0x328/0x630 [ 21.183118] ret_from_fork+0x10/0x20 [ 21.183170] [ 21.189314] The buggy address belongs to the physical page: [ 21.189850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734 [ 21.190603] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.191336] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.192017] page_type: f8(unknown) [ 21.192377] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.193122] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.193869] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.194622] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.195376] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff [ 21.196129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.196870] page dumped because: kasan: bad access detected [ 21.197405] [ 21.197573] Memory state around the buggy address: [ 21.198042] ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.198735] ffff00000d736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.199427] >ffff00000d736080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.200113] ^ [ 21.200770] ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.201462] ffff00000d736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.202148] ================================================================== [ 21.156729] ================================================================== [ 21.157821] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 21.158582] Write of size 1 at addr ffff00000d7360eb by task kunit_try_catch/214 [ 21.159296] [ 21.159481] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.159559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.159582] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.159609] Call trace: [ 21.159627] show_stack+0x20/0x38 (C) [ 21.159680] dump_stack_lvl+0x8c/0xd0 [ 21.159730] print_report+0x118/0x608 [ 21.159778] kasan_report+0xdc/0x128 [ 21.159826] __asan_report_store1_noabort+0x20/0x30 [ 21.159882] krealloc_more_oob_helper+0x60c/0x678 [ 21.159943] krealloc_large_more_oob+0x20/0x38 [ 21.160002] kunit_try_run_case+0x170/0x3f0 [ 21.160059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.160123] kthread+0x328/0x630 [ 21.160179] ret_from_fork+0x10/0x20 [ 21.160232] [ 21.166379] The buggy address belongs to the physical page: [ 21.166916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734 [ 21.167670] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.168403] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.169085] page_type: f8(unknown) [ 21.169448] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.170194] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.170941] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.171694] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.172449] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff [ 21.173203] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.173944] page dumped because: kasan: bad access detected [ 21.174479] [ 21.174648] Memory state around the buggy address: [ 21.175117] ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.175810] ffff00000d736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.176503] >ffff00000d736080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.177188] ^ [ 21.177823] ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.178515] ffff00000d736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.179201] ==================================================================