Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 17.569596] ================================================================== [ 17.569742] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.569874] Write of size 1 at addr fff00000c79d60f0 by task kunit_try_catch/162 [ 17.569994] [ 17.570088] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 17.570253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.570307] Hardware name: linux,dummy-virt (DT) [ 17.570374] Call trace: [ 17.570423] show_stack+0x20/0x38 (C) [ 17.570526] dump_stack_lvl+0x8c/0xd0 [ 17.570638] print_report+0x118/0x608 [ 17.570736] kasan_report+0xdc/0x128 [ 17.570831] __asan_report_store1_noabort+0x20/0x30 [ 17.570941] krealloc_more_oob_helper+0x5c0/0x678 [ 17.571052] krealloc_large_more_oob+0x20/0x38 [ 17.571166] kunit_try_run_case+0x170/0x3f0 [ 17.571270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.571423] kthread+0x328/0x630 [ 17.571553] ret_from_fork+0x10/0x20 [ 17.571653] [ 17.571695] The buggy address belongs to the physical page: [ 17.572137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d4 [ 17.572255] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.572349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.572988] page_type: f8(unknown) [ 17.573075] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.573180] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.573335] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.573444] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.573581] head: 0bfffe0000000002 ffffc1ffc31e7501 00000000ffffffff 00000000ffffffff [ 17.573694] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.573789] page dumped because: kasan: bad access detected [ 17.573859] [ 17.573902] Memory state around the buggy address: [ 17.573965] fff00000c79d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.574074] fff00000c79d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.574211] >fff00000c79d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.574300] ^ [ 17.574389] fff00000c79d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.574489] fff00000c79d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.574626] ================================================================== [ 17.455274] ================================================================== [ 17.455449] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.455586] Write of size 1 at addr fff00000c47144eb by task kunit_try_catch/158 [ 17.455693] [ 17.455782] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 17.455968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.456020] Hardware name: linux,dummy-virt (DT) [ 17.456086] Call trace: [ 17.456136] show_stack+0x20/0x38 (C) [ 17.456232] dump_stack_lvl+0x8c/0xd0 [ 17.456323] print_report+0x118/0x608 [ 17.456412] kasan_report+0xdc/0x128 [ 17.456487] __asan_report_store1_noabort+0x20/0x30 [ 17.456616] krealloc_more_oob_helper+0x60c/0x678 [ 17.456733] krealloc_more_oob+0x20/0x38 [ 17.456899] kunit_try_run_case+0x170/0x3f0 [ 17.456963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.457016] kthread+0x328/0x630 [ 17.457070] ret_from_fork+0x10/0x20 [ 17.457182] [ 17.457224] Allocated by task 158: [ 17.457288] kasan_save_stack+0x3c/0x68 [ 17.457371] kasan_save_track+0x20/0x40 [ 17.457446] kasan_save_alloc_info+0x40/0x58 [ 17.457558] __kasan_krealloc+0x118/0x178 [ 17.457671] krealloc_noprof+0x128/0x360 [ 17.457758] krealloc_more_oob_helper+0x168/0x678 [ 17.457855] krealloc_more_oob+0x20/0x38 [ 17.457944] kunit_try_run_case+0x170/0x3f0 [ 17.458032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.458153] kthread+0x328/0x630 [ 17.458236] ret_from_fork+0x10/0x20 [ 17.458307] [ 17.458347] The buggy address belongs to the object at fff00000c4714400 [ 17.458347] which belongs to the cache kmalloc-256 of size 256 [ 17.458477] The buggy address is located 0 bytes to the right of [ 17.458477] allocated 235-byte region [fff00000c4714400, fff00000c47144eb) [ 17.458630] [ 17.458676] The buggy address belongs to the physical page: [ 17.458747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104714 [ 17.458869] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.458971] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.459090] page_type: f5(slab) [ 17.459174] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.459322] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.459425] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.459529] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.459700] head: 0bfffe0000000001 ffffc1ffc311c501 00000000ffffffff 00000000ffffffff [ 17.459797] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.459878] page dumped because: kasan: bad access detected [ 17.459946] [ 17.459987] Memory state around the buggy address: [ 17.460063] fff00000c4714380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460165] fff00000c4714400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.460274] >fff00000c4714480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.460398] ^ [ 17.460508] fff00000c4714500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460631] fff00000c4714580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460756] ================================================================== [ 17.561920] ================================================================== [ 17.562254] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.562596] Write of size 1 at addr fff00000c79d60eb by task kunit_try_catch/162 [ 17.562935] [ 17.563042] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 17.563231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.563309] Hardware name: linux,dummy-virt (DT) [ 17.563413] Call trace: [ 17.563523] show_stack+0x20/0x38 (C) [ 17.563716] dump_stack_lvl+0x8c/0xd0 [ 17.563805] print_report+0x118/0x608 [ 17.563895] kasan_report+0xdc/0x128 [ 17.563990] __asan_report_store1_noabort+0x20/0x30 [ 17.564328] krealloc_more_oob_helper+0x60c/0x678 [ 17.564544] krealloc_large_more_oob+0x20/0x38 [ 17.565012] kunit_try_run_case+0x170/0x3f0 [ 17.565142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.565514] kthread+0x328/0x630 [ 17.565786] ret_from_fork+0x10/0x20 [ 17.565949] [ 17.566012] The buggy address belongs to the physical page: [ 17.566087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d4 [ 17.566254] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.566400] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.566548] page_type: f8(unknown) [ 17.566635] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.566792] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.566950] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.567086] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.567198] head: 0bfffe0000000002 ffffc1ffc31e7501 00000000ffffffff 00000000ffffffff [ 17.567343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.567428] page dumped because: kasan: bad access detected [ 17.567517] [ 17.567578] Memory state around the buggy address: [ 17.567735] fff00000c79d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.567944] fff00000c79d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.568212] >fff00000c79d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.568304] ^ [ 17.568390] fff00000c79d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.568469] fff00000c79d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.568550] ================================================================== [ 17.462483] ================================================================== [ 17.463075] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.463191] Write of size 1 at addr fff00000c47144f0 by task kunit_try_catch/158 [ 17.463288] [ 17.463749] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 17.463909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.464210] Hardware name: linux,dummy-virt (DT) [ 17.464464] Call trace: [ 17.464546] show_stack+0x20/0x38 (C) [ 17.464721] dump_stack_lvl+0x8c/0xd0 [ 17.464865] print_report+0x118/0x608 [ 17.464967] kasan_report+0xdc/0x128 [ 17.465054] __asan_report_store1_noabort+0x20/0x30 [ 17.465166] krealloc_more_oob_helper+0x5c0/0x678 [ 17.465281] krealloc_more_oob+0x20/0x38 [ 17.465390] kunit_try_run_case+0x170/0x3f0 [ 17.465564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.465733] kthread+0x328/0x630 [ 17.465838] ret_from_fork+0x10/0x20 [ 17.465944] [ 17.465985] Allocated by task 158: [ 17.466047] kasan_save_stack+0x3c/0x68 [ 17.466133] kasan_save_track+0x20/0x40 [ 17.466210] kasan_save_alloc_info+0x40/0x58 [ 17.466294] __kasan_krealloc+0x118/0x178 [ 17.466371] krealloc_noprof+0x128/0x360 [ 17.466490] krealloc_more_oob_helper+0x168/0x678 [ 17.466800] krealloc_more_oob+0x20/0x38 [ 17.466888] kunit_try_run_case+0x170/0x3f0 [ 17.466969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.467057] kthread+0x328/0x630 [ 17.467210] ret_from_fork+0x10/0x20 [ 17.467333] [ 17.467400] The buggy address belongs to the object at fff00000c4714400 [ 17.467400] which belongs to the cache kmalloc-256 of size 256 [ 17.467837] The buggy address is located 5 bytes to the right of [ 17.467837] allocated 235-byte region [fff00000c4714400, fff00000c47144eb) [ 17.468053] [ 17.468159] The buggy address belongs to the physical page: [ 17.468291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104714 [ 17.468527] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.468776] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.469000] page_type: f5(slab) [ 17.469211] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.469507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.469725] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.469850] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.470065] head: 0bfffe0000000001 ffffc1ffc311c501 00000000ffffffff 00000000ffffffff [ 17.470196] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.470651] page dumped because: kasan: bad access detected [ 17.470725] [ 17.470769] Memory state around the buggy address: [ 17.470925] fff00000c4714380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.471162] fff00000c4714400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.471404] >fff00000c4714480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.471943] ^ [ 17.472149] fff00000c4714500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.472266] fff00000c4714580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.472436] ==================================================================
[ 17.575771] ================================================================== [ 17.577051] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.577768] Write of size 1 at addr ffff8881028a20f0 by task kunit_try_catch/180 [ 17.578372] [ 17.579766] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 17.579893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.579929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.579982] Call Trace: [ 17.580024] <TASK> [ 17.580070] dump_stack_lvl+0x73/0xb0 [ 17.580566] print_report+0xd1/0x650 [ 17.580626] ? __virt_addr_valid+0x1db/0x2d0 [ 17.580658] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.580692] ? kasan_addr_to_slab+0x11/0xa0 [ 17.580720] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.580754] kasan_report+0x141/0x180 [ 17.580784] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.580824] __asan_report_store1_noabort+0x1b/0x30 [ 17.580851] krealloc_more_oob_helper+0x7eb/0x930 [ 17.580882] ? __schedule+0x10cc/0x2b30 [ 17.580917] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.580953] ? finish_task_switch.isra.0+0x153/0x700 [ 17.580984] ? __switch_to+0x5d9/0xf60 [ 17.581011] ? dequeue_task_fair+0x166/0x4e0 [ 17.581043] ? __schedule+0x10cc/0x2b30 [ 17.581075] ? __pfx_read_tsc+0x10/0x10 [ 17.581106] krealloc_large_more_oob+0x1c/0x30 [ 17.581140] kunit_try_run_case+0x1a5/0x480 [ 17.581172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.581200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.581233] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.581266] ? __kthread_parkme+0x82/0x180 [ 17.581295] ? preempt_count_sub+0x50/0x80 [ 17.581327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.581358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.581387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.581417] kthread+0x337/0x6f0 [ 17.581553] ? trace_preempt_on+0x20/0xc0 [ 17.581635] ? __pfx_kthread+0x10/0x10 [ 17.581669] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.581700] ? calculate_sigpending+0x7b/0xa0 [ 17.581729] ? __pfx_kthread+0x10/0x10 [ 17.581759] ret_from_fork+0x41/0x80 [ 17.581788] ? __pfx_kthread+0x10/0x10 [ 17.581817] ret_from_fork_asm+0x1a/0x30 [ 17.581858] </TASK> [ 17.581871] [ 17.602911] The buggy address belongs to the physical page: [ 17.603475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a0 [ 17.604444] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.605351] flags: 0x200000000000040(head|node=0|zone=2) [ 17.605926] page_type: f8(unknown) [ 17.606228] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.607079] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.607993] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.608848] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.609687] head: 0200000000000002 ffffea00040a2801 00000000ffffffff 00000000ffffffff [ 17.610427] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.610986] page dumped because: kasan: bad access detected [ 17.611675] [ 17.612137] Memory state around the buggy address: [ 17.612841] ffff8881028a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.613698] ffff8881028a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.614759] >ffff8881028a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.615337] ^ [ 17.616339] ffff8881028a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.617099] ffff8881028a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.618283] ================================================================== [ 17.530186] ================================================================== [ 17.531081] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.532527] Write of size 1 at addr ffff8881028a20eb by task kunit_try_catch/180 [ 17.533297] [ 17.533788] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 17.533908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.533944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.534004] Call Trace: [ 17.534046] <TASK> [ 17.534099] dump_stack_lvl+0x73/0xb0 [ 17.534185] print_report+0xd1/0x650 [ 17.534265] ? __virt_addr_valid+0x1db/0x2d0 [ 17.534321] ? krealloc_more_oob_helper+0x821/0x930 [ 17.534365] ? kasan_addr_to_slab+0x11/0xa0 [ 17.534410] ? krealloc_more_oob_helper+0x821/0x930 [ 17.534490] kasan_report+0x141/0x180 [ 17.534589] ? krealloc_more_oob_helper+0x821/0x930 [ 17.534637] __asan_report_store1_noabort+0x1b/0x30 [ 17.534667] krealloc_more_oob_helper+0x821/0x930 [ 17.534700] ? __schedule+0x10cc/0x2b30 [ 17.534735] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.534769] ? finish_task_switch.isra.0+0x153/0x700 [ 17.534801] ? __switch_to+0x5d9/0xf60 [ 17.534830] ? dequeue_task_fair+0x166/0x4e0 [ 17.534864] ? __schedule+0x10cc/0x2b30 [ 17.534894] ? __pfx_read_tsc+0x10/0x10 [ 17.534925] krealloc_large_more_oob+0x1c/0x30 [ 17.534957] kunit_try_run_case+0x1a5/0x480 [ 17.534991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.535021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.535052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.535084] ? __kthread_parkme+0x82/0x180 [ 17.535114] ? preempt_count_sub+0x50/0x80 [ 17.535146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.535176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.535206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.535236] kthread+0x337/0x6f0 [ 17.535264] ? trace_preempt_on+0x20/0xc0 [ 17.535297] ? __pfx_kthread+0x10/0x10 [ 17.535327] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.535356] ? calculate_sigpending+0x7b/0xa0 [ 17.535385] ? __pfx_kthread+0x10/0x10 [ 17.535416] ret_from_fork+0x41/0x80 [ 17.535460] ? __pfx_kthread+0x10/0x10 [ 17.535555] ret_from_fork_asm+0x1a/0x30 [ 17.535642] </TASK> [ 17.535660] [ 17.558081] The buggy address belongs to the physical page: [ 17.560731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a0 [ 17.561887] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.562775] flags: 0x200000000000040(head|node=0|zone=2) [ 17.563280] page_type: f8(unknown) [ 17.563870] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.564877] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.565474] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.566326] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.567246] head: 0200000000000002 ffffea00040a2801 00000000ffffffff 00000000ffffffff [ 17.567951] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.568733] page dumped because: kasan: bad access detected [ 17.569217] [ 17.569438] Memory state around the buggy address: [ 17.570025] ffff8881028a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.570695] ffff8881028a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.571421] >ffff8881028a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.572158] ^ [ 17.572972] ffff8881028a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.573608] ffff8881028a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.574447] ================================================================== [ 17.130404] ================================================================== [ 17.131398] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.132160] Write of size 1 at addr ffff8881003414eb by task kunit_try_catch/176 [ 17.133259] [ 17.134052] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 17.134181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.134223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.134281] Call Trace: [ 17.134321] <TASK> [ 17.134370] dump_stack_lvl+0x73/0xb0 [ 17.134600] print_report+0xd1/0x650 [ 17.134685] ? __virt_addr_valid+0x1db/0x2d0 [ 17.134761] ? krealloc_more_oob_helper+0x821/0x930 [ 17.134834] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.134874] ? krealloc_more_oob_helper+0x821/0x930 [ 17.134909] kasan_report+0x141/0x180 [ 17.134941] ? krealloc_more_oob_helper+0x821/0x930 [ 17.134981] __asan_report_store1_noabort+0x1b/0x30 [ 17.135009] krealloc_more_oob_helper+0x821/0x930 [ 17.135041] ? __schedule+0x10cc/0x2b30 [ 17.135074] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.135108] ? finish_task_switch.isra.0+0x153/0x700 [ 17.135141] ? __switch_to+0x5d9/0xf60 [ 17.135170] ? dequeue_task_fair+0x166/0x4e0 [ 17.135204] ? __schedule+0x10cc/0x2b30 [ 17.135235] ? __pfx_read_tsc+0x10/0x10 [ 17.135266] krealloc_more_oob+0x1c/0x30 [ 17.135297] kunit_try_run_case+0x1a5/0x480 [ 17.135332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.135362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.135394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.135427] ? __kthread_parkme+0x82/0x180 [ 17.135596] ? preempt_count_sub+0x50/0x80 [ 17.135675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.135741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.135811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.135885] kthread+0x337/0x6f0 [ 17.135932] ? trace_preempt_on+0x20/0xc0 [ 17.135967] ? __pfx_kthread+0x10/0x10 [ 17.136000] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.136032] ? calculate_sigpending+0x7b/0xa0 [ 17.136061] ? __pfx_kthread+0x10/0x10 [ 17.136093] ret_from_fork+0x41/0x80 [ 17.136122] ? __pfx_kthread+0x10/0x10 [ 17.136153] ret_from_fork_asm+0x1a/0x30 [ 17.136197] </TASK> [ 17.136212] [ 17.161400] Allocated by task 176: [ 17.162748] kasan_save_stack+0x45/0x70 [ 17.163162] kasan_save_track+0x18/0x40 [ 17.163864] kasan_save_alloc_info+0x3b/0x50 [ 17.164212] __kasan_krealloc+0x190/0x1f0 [ 17.164841] krealloc_noprof+0xf3/0x340 [ 17.165337] krealloc_more_oob_helper+0x1a9/0x930 [ 17.166302] krealloc_more_oob+0x1c/0x30 [ 17.166777] kunit_try_run_case+0x1a5/0x480 [ 17.167252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.168561] kthread+0x337/0x6f0 [ 17.169430] ret_from_fork+0x41/0x80 [ 17.169918] ret_from_fork_asm+0x1a/0x30 [ 17.170311] [ 17.170989] The buggy address belongs to the object at ffff888100341400 [ 17.170989] which belongs to the cache kmalloc-256 of size 256 [ 17.172127] The buggy address is located 0 bytes to the right of [ 17.172127] allocated 235-byte region [ffff888100341400, ffff8881003414eb) [ 17.173488] [ 17.173982] The buggy address belongs to the physical page: [ 17.174450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340 [ 17.175657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.176425] flags: 0x200000000000040(head|node=0|zone=2) [ 17.177242] page_type: f5(slab) [ 17.177942] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.179061] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.179787] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.180453] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.181389] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff [ 17.182356] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.183194] page dumped because: kasan: bad access detected [ 17.183969] [ 17.184143] Memory state around the buggy address: [ 17.184864] ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.185451] ffff888100341400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.186616] >ffff888100341480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.187302] ^ [ 17.188126] ffff888100341500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189079] ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189882] ================================================================== [ 17.191198] ================================================================== [ 17.192286] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.193942] Write of size 1 at addr ffff8881003414f0 by task kunit_try_catch/176 [ 17.194704] [ 17.194869] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 17.194934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.194950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.194980] Call Trace: [ 17.194996] <TASK> [ 17.195019] dump_stack_lvl+0x73/0xb0 [ 17.195059] print_report+0xd1/0x650 [ 17.195092] ? __virt_addr_valid+0x1db/0x2d0 [ 17.195123] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.195158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.195189] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.195224] kasan_report+0x141/0x180 [ 17.195255] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.195296] __asan_report_store1_noabort+0x1b/0x30 [ 17.195325] krealloc_more_oob_helper+0x7eb/0x930 [ 17.195358] ? __schedule+0x10cc/0x2b30 [ 17.195393] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.195429] ? finish_task_switch.isra.0+0x153/0x700 [ 17.195517] ? __switch_to+0x5d9/0xf60 [ 17.195590] ? dequeue_task_fair+0x166/0x4e0 [ 17.195676] ? __schedule+0x10cc/0x2b30 [ 17.195752] ? __pfx_read_tsc+0x10/0x10 [ 17.195906] krealloc_more_oob+0x1c/0x30 [ 17.195983] kunit_try_run_case+0x1a5/0x480 [ 17.196063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.196132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.196206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.196254] ? __kthread_parkme+0x82/0x180 [ 17.196287] ? preempt_count_sub+0x50/0x80 [ 17.196321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.196354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.196386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.196418] kthread+0x337/0x6f0 [ 17.196528] ? trace_preempt_on+0x20/0xc0 [ 17.196596] ? __pfx_kthread+0x10/0x10 [ 17.196629] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.196661] ? calculate_sigpending+0x7b/0xa0 [ 17.196692] ? __pfx_kthread+0x10/0x10 [ 17.196724] ret_from_fork+0x41/0x80 [ 17.196755] ? __pfx_kthread+0x10/0x10 [ 17.196786] ret_from_fork_asm+0x1a/0x30 [ 17.196830] </TASK> [ 17.196843] [ 17.219437] Allocated by task 176: [ 17.220186] kasan_save_stack+0x45/0x70 [ 17.220980] kasan_save_track+0x18/0x40 [ 17.221284] kasan_save_alloc_info+0x3b/0x50 [ 17.221944] __kasan_krealloc+0x190/0x1f0 [ 17.222651] krealloc_noprof+0xf3/0x340 [ 17.223084] krealloc_more_oob_helper+0x1a9/0x930 [ 17.223553] krealloc_more_oob+0x1c/0x30 [ 17.224449] kunit_try_run_case+0x1a5/0x480 [ 17.224992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.225804] kthread+0x337/0x6f0 [ 17.226392] ret_from_fork+0x41/0x80 [ 17.227018] ret_from_fork_asm+0x1a/0x30 [ 17.227789] [ 17.227970] The buggy address belongs to the object at ffff888100341400 [ 17.227970] which belongs to the cache kmalloc-256 of size 256 [ 17.229780] The buggy address is located 5 bytes to the right of [ 17.229780] allocated 235-byte region [ffff888100341400, ffff8881003414eb) [ 17.231161] [ 17.231324] The buggy address belongs to the physical page: [ 17.232483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340 [ 17.233066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.234053] flags: 0x200000000000040(head|node=0|zone=2) [ 17.235140] page_type: f5(slab) [ 17.235856] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.236397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.237362] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.238374] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.239349] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff [ 17.240094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.240788] page dumped because: kasan: bad access detected [ 17.241821] [ 17.241994] Memory state around the buggy address: [ 17.242351] ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.243687] ffff888100341400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.244339] >ffff888100341480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.245016] ^ [ 17.246171] ffff888100341500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.246627] ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.247434] ==================================================================
[ 19.485032] ================================================================== [ 19.485706] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.486433] Write of size 1 at addr ffff000001a960f0 by task kunit_try_catch/218 [ 19.487105] [ 19.487261] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.487297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.487307] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.487319] Call trace: [ 19.487328] show_stack+0x20/0x38 (C) [ 19.487351] dump_stack_lvl+0x8c/0xd0 [ 19.487373] print_report+0x118/0x608 [ 19.487394] kasan_report+0xdc/0x128 [ 19.487413] __asan_report_store1_noabort+0x20/0x30 [ 19.487438] krealloc_more_oob_helper+0x5c0/0x678 [ 19.487463] krealloc_large_more_oob+0x20/0x38 [ 19.487488] kunit_try_run_case+0x170/0x3f0 [ 19.487514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487541] kthread+0x328/0x630 [ 19.487566] ret_from_fork+0x10/0x20 [ 19.487590] [ 19.493575] The buggy address belongs to the physical page: [ 19.494082] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94 [ 19.494794] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.495487] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.496124] page_type: f8(unknown) [ 19.496448] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.497150] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.497851] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.498560] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.499270] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff [ 19.499979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.500683] page dumped because: kasan: bad access detected [ 19.501189] [ 19.501334] Memory state around the buggy address: [ 19.501773] ffff000001a95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.502426] ffff000001a96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.503080] >ffff000001a96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.503730] ^ [ 19.504351] ffff000001a96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.505005] ffff000001a96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.505656] ================================================================== [ 19.462778] ================================================================== [ 19.463867] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.464591] Write of size 1 at addr ffff000001a960eb by task kunit_try_catch/218 [ 19.465275] [ 19.465441] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.465489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.465503] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.465521] Call trace: [ 19.465533] show_stack+0x20/0x38 (C) [ 19.465568] dump_stack_lvl+0x8c/0xd0 [ 19.465600] print_report+0x118/0x608 [ 19.465630] kasan_report+0xdc/0x128 [ 19.465658] __asan_report_store1_noabort+0x20/0x30 [ 19.465692] krealloc_more_oob_helper+0x60c/0x678 [ 19.465729] krealloc_large_more_oob+0x20/0x38 [ 19.465764] kunit_try_run_case+0x170/0x3f0 [ 19.465799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.465838] kthread+0x328/0x630 [ 19.465873] ret_from_fork+0x10/0x20 [ 19.465906] [ 19.471939] The buggy address belongs to the physical page: [ 19.472458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94 [ 19.473181] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.473887] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.474538] page_type: f8(unknown) [ 19.474874] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.475590] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.476304] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.477026] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.477749] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff [ 19.478471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.479186] page dumped because: kasan: bad access detected [ 19.479701] [ 19.479852] Memory state around the buggy address: [ 19.480299] ffff000001a95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.480964] ffff000001a96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.481629] >ffff000001a96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.482290] ^ [ 19.482899] ffff000001a96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.483565] ffff000001a96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.484226] ================================================================== [ 19.258095] ================================================================== [ 19.259091] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.259797] Write of size 1 at addr ffff00000a9e8aeb by task kunit_try_catch/214 [ 19.260467] [ 19.260614] CPU: 5 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.260639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.260645] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.260653] Call trace: [ 19.260659] show_stack+0x20/0x38 (C) [ 19.260676] dump_stack_lvl+0x8c/0xd0 [ 19.260691] print_report+0x118/0x608 [ 19.260704] kasan_report+0xdc/0x128 [ 19.260717] __asan_report_store1_noabort+0x20/0x30 [ 19.260732] krealloc_more_oob_helper+0x60c/0x678 [ 19.260749] krealloc_more_oob+0x20/0x38 [ 19.260765] kunit_try_run_case+0x170/0x3f0 [ 19.260781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.260798] kthread+0x328/0x630 [ 19.260814] ret_from_fork+0x10/0x20 [ 19.260828] [ 19.266719] Allocated by task 214: [ 19.267028] kasan_save_stack+0x3c/0x68 [ 19.267381] kasan_save_track+0x20/0x40 [ 19.267731] kasan_save_alloc_info+0x40/0x58 [ 19.268121] __kasan_krealloc+0x118/0x178 [ 19.268486] krealloc_noprof+0x128/0x360 [ 19.268844] krealloc_more_oob_helper+0x168/0x678 [ 19.269273] krealloc_more_oob+0x20/0x38 [ 19.269635] kunit_try_run_case+0x170/0x3f0 [ 19.270017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.270514] kthread+0x328/0x630 [ 19.270813] ret_from_fork+0x10/0x20 [ 19.271140] [ 19.271281] The buggy address belongs to the object at ffff00000a9e8a00 [ 19.271281] which belongs to the cache kmalloc-256 of size 256 [ 19.272385] The buggy address is located 0 bytes to the right of [ 19.272385] allocated 235-byte region [ffff00000a9e8a00, ffff00000a9e8aeb) [ 19.273531] [ 19.273671] The buggy address belongs to the physical page: [ 19.274170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa9e8 [ 19.274869] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.275551] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.276176] page_type: f5(slab) [ 19.276467] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.277158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.277847] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.278545] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.279242] head: 03fffe0000000001 fffffdffc02a7a01 00000000ffffffff 00000000ffffffff [ 19.279938] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.280632] page dumped because: kasan: bad access detected [ 19.281129] [ 19.281269] Memory state around the buggy address: [ 19.281699] ffff00000a9e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.282342] ffff00000a9e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.282985] >ffff00000a9e8a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.283626] ^ [ 19.284214] ffff00000a9e8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.284857] ffff00000a9e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.285498] ================================================================== [ 19.286224] ================================================================== [ 19.286869] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.287549] Write of size 1 at addr ffff00000a9e8af0 by task kunit_try_catch/214 [ 19.288208] [ 19.288350] CPU: 5 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.288367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.288371] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.288377] Call trace: [ 19.288380] show_stack+0x20/0x38 (C) [ 19.288392] dump_stack_lvl+0x8c/0xd0 [ 19.288401] print_report+0x118/0x608 [ 19.288411] kasan_report+0xdc/0x128 [ 19.288420] __asan_report_store1_noabort+0x20/0x30 [ 19.288431] krealloc_more_oob_helper+0x5c0/0x678 [ 19.288444] krealloc_more_oob+0x20/0x38 [ 19.288455] kunit_try_run_case+0x170/0x3f0 [ 19.288467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.288480] kthread+0x328/0x630 [ 19.288491] ret_from_fork+0x10/0x20 [ 19.288501] [ 19.294374] Allocated by task 214: [ 19.294679] kasan_save_stack+0x3c/0x68 [ 19.295024] kasan_save_track+0x20/0x40 [ 19.295370] kasan_save_alloc_info+0x40/0x58 [ 19.295755] __kasan_krealloc+0x118/0x178 [ 19.296116] krealloc_noprof+0x128/0x360 [ 19.296469] krealloc_more_oob_helper+0x168/0x678 [ 19.296893] krealloc_more_oob+0x20/0x38 [ 19.297249] kunit_try_run_case+0x170/0x3f0 [ 19.297625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298117] kthread+0x328/0x630 [ 19.298411] ret_from_fork+0x10/0x20 [ 19.298734] [ 19.298872] The buggy address belongs to the object at ffff00000a9e8a00 [ 19.298872] which belongs to the cache kmalloc-256 of size 256 [ 19.299971] The buggy address is located 5 bytes to the right of [ 19.299971] allocated 235-byte region [ffff00000a9e8a00, ffff00000a9e8aeb) [ 19.301109] [ 19.301246] The buggy address belongs to the physical page: [ 19.301739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa9e8 [ 19.302433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.303109] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.303726] page_type: f5(slab) [ 19.304011] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.304696] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.305379] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.306070] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.306763] head: 03fffe0000000001 fffffdffc02a7a01 00000000ffffffff 00000000ffffffff [ 19.307455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.308146] page dumped because: kasan: bad access detected [ 19.308638] [ 19.308775] Memory state around the buggy address: [ 19.309201] ffff00000a9e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.309841] ffff00000a9e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.310480] >ffff00000a9e8a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.311116] ^ [ 19.311723] ffff00000a9e8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.312361] ffff00000a9e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.312997] ==================================================================