Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 24.290698] ================================================================== [ 24.300116] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.307666] Write of size 1 at addr ffff000801bba0eb by task kunit_try_catch/204 [ 24.315043] [ 24.316527] CPU: 3 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.316578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.316595] Hardware name: WinLink E850-96 board (DT) [ 24.316617] Call trace: [ 24.316629] show_stack+0x20/0x38 (C) [ 24.316665] dump_stack_lvl+0x8c/0xd0 [ 24.316701] print_report+0x118/0x608 [ 24.316737] kasan_report+0xdc/0x128 [ 24.316767] __asan_report_store1_noabort+0x20/0x30 [ 24.316796] krealloc_more_oob_helper+0x60c/0x678 [ 24.316829] krealloc_large_more_oob+0x20/0x38 [ 24.316859] kunit_try_run_case+0x170/0x3f0 [ 24.316895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.316935] kthread+0x328/0x630 [ 24.316962] ret_from_fork+0x10/0x20 [ 24.316995] [ 24.385269] The buggy address belongs to the physical page: [ 24.390827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8 [ 24.398810] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.406451] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.413393] page_type: f8(unknown) [ 24.416789] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.424509] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.432235] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.440047] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.447860] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff [ 24.455672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.463477] page dumped because: kasan: bad access detected [ 24.469034] [ 24.470508] Memory state around the buggy address: [ 24.475291] ffff000801bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.482491] ffff000801bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.489696] >ffff000801bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.496897] ^ [ 24.503498] ffff000801bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.510703] ffff000801bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.517904] ================================================================== [ 22.129293] ================================================================== [ 22.138430] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.145980] Write of size 1 at addr ffff0008030ff2eb by task kunit_try_catch/200 [ 22.153356] [ 22.154843] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 22.154898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.154914] Hardware name: WinLink E850-96 board (DT) [ 22.154935] Call trace: [ 22.154949] show_stack+0x20/0x38 (C) [ 22.154989] dump_stack_lvl+0x8c/0xd0 [ 22.155030] print_report+0x118/0x608 [ 22.155067] kasan_report+0xdc/0x128 [ 22.155097] __asan_report_store1_noabort+0x20/0x30 [ 22.155129] krealloc_more_oob_helper+0x60c/0x678 [ 22.155161] krealloc_more_oob+0x20/0x38 [ 22.155190] kunit_try_run_case+0x170/0x3f0 [ 22.155226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.155265] kthread+0x328/0x630 [ 22.155293] ret_from_fork+0x10/0x20 [ 22.155328] [ 22.223061] Allocated by task 200: [ 22.226448] kasan_save_stack+0x3c/0x68 [ 22.230264] kasan_save_track+0x20/0x40 [ 22.234084] kasan_save_alloc_info+0x40/0x58 [ 22.238337] __kasan_krealloc+0x118/0x178 [ 22.242330] krealloc_noprof+0x128/0x360 [ 22.246236] krealloc_more_oob_helper+0x168/0x678 [ 22.250924] krealloc_more_oob+0x20/0x38 [ 22.254830] kunit_try_run_case+0x170/0x3f0 [ 22.258997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.264465] kthread+0x328/0x630 [ 22.267677] ret_from_fork+0x10/0x20 [ 22.271236] [ 22.272714] The buggy address belongs to the object at ffff0008030ff200 [ 22.272714] which belongs to the cache kmalloc-256 of size 256 [ 22.285215] The buggy address is located 0 bytes to the right of [ 22.285215] allocated 235-byte region [ffff0008030ff200, ffff0008030ff2eb) [ 22.298145] [ 22.299623] The buggy address belongs to the physical page: [ 22.305182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 22.313166] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.320805] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.327747] page_type: f5(slab) [ 22.330884] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.338603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.346330] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.354140] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.361953] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 22.369765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.377571] page dumped because: kasan: bad access detected [ 22.383128] [ 22.384602] Memory state around the buggy address: [ 22.389384] ffff0008030ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.396585] ffff0008030ff200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.403791] >ffff0008030ff280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.410991] ^ [ 22.417592] ffff0008030ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.424795] ffff0008030ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.431998] ================================================================== [ 22.439400] ================================================================== [ 22.446415] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.453961] Write of size 1 at addr ffff0008030ff2f0 by task kunit_try_catch/200 [ 22.461337] [ 22.462822] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 22.462876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.462892] Hardware name: WinLink E850-96 board (DT) [ 22.462911] Call trace: [ 22.462922] show_stack+0x20/0x38 (C) [ 22.462958] dump_stack_lvl+0x8c/0xd0 [ 22.462998] print_report+0x118/0x608 [ 22.463034] kasan_report+0xdc/0x128 [ 22.463064] __asan_report_store1_noabort+0x20/0x30 [ 22.463094] krealloc_more_oob_helper+0x5c0/0x678 [ 22.463128] krealloc_more_oob+0x20/0x38 [ 22.463156] kunit_try_run_case+0x170/0x3f0 [ 22.463194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.463233] kthread+0x328/0x630 [ 22.463262] ret_from_fork+0x10/0x20 [ 22.463298] [ 22.531041] Allocated by task 200: [ 22.534428] kasan_save_stack+0x3c/0x68 [ 22.538246] kasan_save_track+0x20/0x40 [ 22.542065] kasan_save_alloc_info+0x40/0x58 [ 22.546319] __kasan_krealloc+0x118/0x178 [ 22.550313] krealloc_noprof+0x128/0x360 [ 22.554218] krealloc_more_oob_helper+0x168/0x678 [ 22.558905] krealloc_more_oob+0x20/0x38 [ 22.562812] kunit_try_run_case+0x170/0x3f0 [ 22.566978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.572447] kthread+0x328/0x630 [ 22.575659] ret_from_fork+0x10/0x20 [ 22.579218] [ 22.580696] The buggy address belongs to the object at ffff0008030ff200 [ 22.580696] which belongs to the cache kmalloc-256 of size 256 [ 22.593196] The buggy address is located 5 bytes to the right of [ 22.593196] allocated 235-byte region [ffff0008030ff200, ffff0008030ff2eb) [ 22.606127] [ 22.607606] The buggy address belongs to the physical page: [ 22.613162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 22.621148] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.628786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.635729] page_type: f5(slab) [ 22.638863] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.646584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.654312] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.662122] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.669935] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 22.677747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.685553] page dumped because: kasan: bad access detected [ 22.691109] [ 22.692584] Memory state around the buggy address: [ 22.697365] ffff0008030ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.704568] ffff0008030ff200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.711773] >ffff0008030ff280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.718972] ^ [ 22.725833] ffff0008030ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.733038] ffff0008030ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740240] ================================================================== [ 24.525204] ================================================================== [ 24.532318] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.539865] Write of size 1 at addr ffff000801bba0f0 by task kunit_try_catch/204 [ 24.547244] [ 24.548726] CPU: 3 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.548777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.548791] Hardware name: WinLink E850-96 board (DT) [ 24.548810] Call trace: [ 24.548823] show_stack+0x20/0x38 (C) [ 24.548858] dump_stack_lvl+0x8c/0xd0 [ 24.548895] print_report+0x118/0x608 [ 24.548930] kasan_report+0xdc/0x128 [ 24.548960] __asan_report_store1_noabort+0x20/0x30 [ 24.548990] krealloc_more_oob_helper+0x5c0/0x678 [ 24.549021] krealloc_large_more_oob+0x20/0x38 [ 24.549052] kunit_try_run_case+0x170/0x3f0 [ 24.549089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.549128] kthread+0x328/0x630 [ 24.549155] ret_from_fork+0x10/0x20 [ 24.549188] [ 24.617471] The buggy address belongs to the physical page: [ 24.623025] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8 [ 24.631010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.638652] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.645593] page_type: f8(unknown) [ 24.648986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.656710] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.664436] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.672248] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.680061] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff [ 24.687873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.695679] page dumped because: kasan: bad access detected [ 24.701236] [ 24.702710] Memory state around the buggy address: [ 24.707491] ffff000801bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.714692] ffff000801bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.721899] >ffff000801bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.729099] ^ [ 24.735960] ffff000801bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.743165] ffff000801bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.750366] ==================================================================
[ 24.541552] ================================================================== [ 24.541653] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.541791] Write of size 1 at addr fff00000c77b60f0 by task kunit_try_catch/161 [ 24.541902] [ 24.541978] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.542165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.542225] Hardware name: linux,dummy-virt (DT) [ 24.542296] Call trace: [ 24.542345] show_stack+0x20/0x38 (C) [ 24.542461] dump_stack_lvl+0x8c/0xd0 [ 24.542578] print_report+0x118/0x608 [ 24.546554] kasan_report+0xdc/0x128 [ 24.547443] __asan_report_store1_noabort+0x20/0x30 [ 24.547718] krealloc_more_oob_helper+0x5c0/0x678 [ 24.547856] krealloc_large_more_oob+0x20/0x38 [ 24.547977] kunit_try_run_case+0x170/0x3f0 [ 24.548170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.548355] kthread+0x328/0x630 [ 24.548622] ret_from_fork+0x10/0x20 [ 24.548799] [ 24.548924] The buggy address belongs to the physical page: [ 24.549062] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.549187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.549350] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.550709] page_type: f8(unknown) [ 24.550826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.550959] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.551097] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.551227] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.551360] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.551500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.552381] page dumped because: kasan: bad access detected [ 24.552469] [ 24.552519] Memory state around the buggy address: [ 24.552592] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552697] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552799] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.553777] ^ [ 24.553876] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.553980] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.554127] ================================================================== [ 24.525336] ================================================================== [ 24.526320] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.527917] Write of size 1 at addr fff00000c77b60eb by task kunit_try_catch/161 [ 24.528041] [ 24.528960] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.529660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.529769] Hardware name: linux,dummy-virt (DT) [ 24.529986] Call trace: [ 24.530099] show_stack+0x20/0x38 (C) [ 24.530787] dump_stack_lvl+0x8c/0xd0 [ 24.531417] print_report+0x118/0x608 [ 24.531790] kasan_report+0xdc/0x128 [ 24.532509] __asan_report_store1_noabort+0x20/0x30 [ 24.532937] krealloc_more_oob_helper+0x60c/0x678 [ 24.533063] krealloc_large_more_oob+0x20/0x38 [ 24.534488] kunit_try_run_case+0x170/0x3f0 [ 24.534800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.535262] kthread+0x328/0x630 [ 24.535382] ret_from_fork+0x10/0x20 [ 24.535514] [ 24.535565] The buggy address belongs to the physical page: [ 24.535640] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.535789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.536345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.536503] page_type: f8(unknown) [ 24.536626] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.536769] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.536901] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.537027] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.537158] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.537934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.538095] page dumped because: kasan: bad access detected [ 24.538214] [ 24.538291] Memory state around the buggy address: [ 24.538368] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.538471] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.538568] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.538743] ^ [ 24.538851] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.538964] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.539065] ================================================================== [ 24.364218] ================================================================== [ 24.364362] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.364496] Write of size 1 at addr fff00000c5fb1eeb by task kunit_try_catch/157 [ 24.364607] [ 24.364705] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.364898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.364959] Hardware name: linux,dummy-virt (DT) [ 24.365030] Call trace: [ 24.365094] show_stack+0x20/0x38 (C) [ 24.365482] dump_stack_lvl+0x8c/0xd0 [ 24.365964] print_report+0x118/0x608 [ 24.366604] kasan_report+0xdc/0x128 [ 24.366822] __asan_report_store1_noabort+0x20/0x30 [ 24.366975] krealloc_more_oob_helper+0x60c/0x678 [ 24.367135] krealloc_more_oob+0x20/0x38 [ 24.367413] kunit_try_run_case+0x170/0x3f0 [ 24.367548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.367847] kthread+0x328/0x630 [ 24.368063] ret_from_fork+0x10/0x20 [ 24.368384] [ 24.368449] Allocated by task 157: [ 24.368641] kasan_save_stack+0x3c/0x68 [ 24.368968] kasan_save_track+0x20/0x40 [ 24.369071] kasan_save_alloc_info+0x40/0x58 [ 24.369633] __kasan_krealloc+0x118/0x178 [ 24.369777] krealloc_noprof+0x128/0x360 [ 24.369889] krealloc_more_oob_helper+0x168/0x678 [ 24.370002] krealloc_more_oob+0x20/0x38 [ 24.370554] kunit_try_run_case+0x170/0x3f0 [ 24.370783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.371161] kthread+0x328/0x630 [ 24.371241] ret_from_fork+0x10/0x20 [ 24.371333] [ 24.371382] The buggy address belongs to the object at fff00000c5fb1e00 [ 24.371382] which belongs to the cache kmalloc-256 of size 256 [ 24.371570] The buggy address is located 0 bytes to the right of [ 24.371570] allocated 235-byte region [fff00000c5fb1e00, fff00000c5fb1eeb) [ 24.371751] [ 24.371806] The buggy address belongs to the physical page: [ 24.371873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb0 [ 24.371993] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.372229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.372361] page_type: f5(slab) [ 24.372457] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.372591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.372802] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.372983] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.373282] head: 0bfffe0000000001 ffffc1ffc317ec01 00000000ffffffff 00000000ffffffff [ 24.373604] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.373750] page dumped because: kasan: bad access detected [ 24.373834] [ 24.373886] Memory state around the buggy address: [ 24.373971] fff00000c5fb1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.374083] fff00000c5fb1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.374197] >fff00000c5fb1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.374299] ^ [ 24.374401] fff00000c5fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.374513] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.374604] ================================================================== [ 24.375995] ================================================================== [ 24.376092] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.376201] Write of size 1 at addr fff00000c5fb1ef0 by task kunit_try_catch/157 [ 24.376315] [ 24.376380] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.376564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.376625] Hardware name: linux,dummy-virt (DT) [ 24.376716] Call trace: [ 24.376769] show_stack+0x20/0x38 (C) [ 24.376886] dump_stack_lvl+0x8c/0xd0 [ 24.377030] print_report+0x118/0x608 [ 24.377169] kasan_report+0xdc/0x128 [ 24.377323] __asan_report_store1_noabort+0x20/0x30 [ 24.377463] krealloc_more_oob_helper+0x5c0/0x678 [ 24.377606] krealloc_more_oob+0x20/0x38 [ 24.377759] kunit_try_run_case+0x170/0x3f0 [ 24.377901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.378047] kthread+0x328/0x630 [ 24.378165] ret_from_fork+0x10/0x20 [ 24.378292] [ 24.378337] Allocated by task 157: [ 24.378458] kasan_save_stack+0x3c/0x68 [ 24.379289] kasan_save_track+0x20/0x40 [ 24.379482] kasan_save_alloc_info+0x40/0x58 [ 24.380116] __kasan_krealloc+0x118/0x178 [ 24.381021] krealloc_noprof+0x128/0x360 [ 24.381591] krealloc_more_oob_helper+0x168/0x678 [ 24.382978] krealloc_more_oob+0x20/0x38 [ 24.383462] kunit_try_run_case+0x170/0x3f0 [ 24.384592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.384739] kthread+0x328/0x630 [ 24.384842] ret_from_fork+0x10/0x20 [ 24.385465] [ 24.385934] The buggy address belongs to the object at fff00000c5fb1e00 [ 24.385934] which belongs to the cache kmalloc-256 of size 256 [ 24.386606] The buggy address is located 5 bytes to the right of [ 24.386606] allocated 235-byte region [fff00000c5fb1e00, fff00000c5fb1eeb) [ 24.387109] [ 24.387350] The buggy address belongs to the physical page: [ 24.387433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb0 [ 24.387558] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.388041] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.388237] page_type: f5(slab) [ 24.388333] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.388445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.388559] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.388670] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.388809] head: 0bfffe0000000001 ffffc1ffc317ec01 00000000ffffffff 00000000ffffffff [ 24.388920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.389027] page dumped because: kasan: bad access detected [ 24.389124] [ 24.389170] Memory state around the buggy address: [ 24.389274] fff00000c5fb1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.389375] fff00000c5fb1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.389473] >fff00000c5fb1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.389563] ^ [ 24.389664] fff00000c5fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.389783] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.390343] ==================================================================
[ 17.615857] ================================================================== [ 17.617653] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.618617] Write of size 1 at addr ffff8881024ce0eb by task kunit_try_catch/177 [ 17.619628] [ 17.619835] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.619901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.619917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.619945] Call Trace: [ 17.619963] <TASK> [ 17.619983] dump_stack_lvl+0x73/0xb0 [ 17.620020] print_report+0xd1/0x650 [ 17.620077] ? __virt_addr_valid+0x1db/0x2d0 [ 17.620114] ? krealloc_more_oob_helper+0x821/0x930 [ 17.620148] ? kasan_addr_to_slab+0x11/0xa0 [ 17.621264] ? krealloc_more_oob_helper+0x821/0x930 [ 17.621314] kasan_report+0x141/0x180 [ 17.621349] ? krealloc_more_oob_helper+0x821/0x930 [ 17.621390] __asan_report_store1_noabort+0x1b/0x30 [ 17.621420] krealloc_more_oob_helper+0x821/0x930 [ 17.621453] ? __schedule+0x10cc/0x2b60 [ 17.621488] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.621524] ? finish_task_switch.isra.0+0x153/0x700 [ 17.621555] ? __switch_to+0x47/0xf50 [ 17.621590] ? __schedule+0x10cc/0x2b60 [ 17.621622] ? __pfx_read_tsc+0x10/0x10 [ 17.621655] krealloc_large_more_oob+0x1c/0x30 [ 17.621688] kunit_try_run_case+0x1a5/0x480 [ 17.621716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.621743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.621796] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.621840] ? __kthread_parkme+0x82/0x180 [ 17.621869] ? preempt_count_sub+0x50/0x80 [ 17.621899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.621927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.621963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.621997] kthread+0x337/0x6f0 [ 17.622024] ? trace_preempt_on+0x20/0xc0 [ 17.622085] ? __pfx_kthread+0x10/0x10 [ 17.622116] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.622148] ? calculate_sigpending+0x7b/0xa0 [ 17.622272] ? __pfx_kthread+0x10/0x10 [ 17.622320] ret_from_fork+0x116/0x1d0 [ 17.622347] ? __pfx_kthread+0x10/0x10 [ 17.622376] ret_from_fork_asm+0x1a/0x30 [ 17.622417] </TASK> [ 17.622432] [ 17.642588] The buggy address belongs to the physical page: [ 17.643274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024cc [ 17.644029] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.644895] flags: 0x200000000000040(head|node=0|zone=2) [ 17.645474] page_type: f8(unknown) [ 17.645880] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.646927] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.647535] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.648092] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.649365] head: 0200000000000002 ffffea0004093301 00000000ffffffff 00000000ffffffff [ 17.650840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.651637] page dumped because: kasan: bad access detected [ 17.652128] [ 17.652374] Memory state around the buggy address: [ 17.652930] ffff8881024cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.653642] ffff8881024ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.654661] >ffff8881024ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.655316] ^ [ 17.656061] ffff8881024ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.656900] ffff8881024ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.657669] ================================================================== [ 17.226083] ================================================================== [ 17.226711] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.227624] Write of size 1 at addr ffff8881003564f0 by task kunit_try_catch/173 [ 17.228406] [ 17.228759] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.228882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.228918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.228975] Call Trace: [ 17.229012] <TASK> [ 17.229091] dump_stack_lvl+0x73/0xb0 [ 17.229292] print_report+0xd1/0x650 [ 17.229373] ? __virt_addr_valid+0x1db/0x2d0 [ 17.229452] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.229549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.229656] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.229741] kasan_report+0x141/0x180 [ 17.229818] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.229910] __asan_report_store1_noabort+0x1b/0x30 [ 17.229945] krealloc_more_oob_helper+0x7eb/0x930 [ 17.229979] ? __schedule+0x10cc/0x2b60 [ 17.230014] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.230074] ? finish_task_switch.isra.0+0x153/0x700 [ 17.230110] ? __switch_to+0x47/0xf50 [ 17.230146] ? __schedule+0x10cc/0x2b60 [ 17.230261] ? __pfx_read_tsc+0x10/0x10 [ 17.230315] krealloc_more_oob+0x1c/0x30 [ 17.230348] kunit_try_run_case+0x1a5/0x480 [ 17.230378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.230404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.230439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.230474] ? __kthread_parkme+0x82/0x180 [ 17.230502] ? preempt_count_sub+0x50/0x80 [ 17.230533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.230561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.230595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.230629] kthread+0x337/0x6f0 [ 17.230655] ? trace_preempt_on+0x20/0xc0 [ 17.230687] ? __pfx_kthread+0x10/0x10 [ 17.230715] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.230746] ? calculate_sigpending+0x7b/0xa0 [ 17.230798] ? __pfx_kthread+0x10/0x10 [ 17.230837] ret_from_fork+0x116/0x1d0 [ 17.230861] ? __pfx_kthread+0x10/0x10 [ 17.230889] ret_from_fork_asm+0x1a/0x30 [ 17.230930] </TASK> [ 17.230944] [ 17.248737] Allocated by task 173: [ 17.249027] kasan_save_stack+0x45/0x70 [ 17.249486] kasan_save_track+0x18/0x40 [ 17.249924] kasan_save_alloc_info+0x3b/0x50 [ 17.251126] __kasan_krealloc+0x190/0x1f0 [ 17.251635] krealloc_noprof+0xf3/0x340 [ 17.252075] krealloc_more_oob_helper+0x1a9/0x930 [ 17.252994] krealloc_more_oob+0x1c/0x30 [ 17.253499] kunit_try_run_case+0x1a5/0x480 [ 17.253835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.254308] kthread+0x337/0x6f0 [ 17.254776] ret_from_fork+0x116/0x1d0 [ 17.255688] ret_from_fork_asm+0x1a/0x30 [ 17.256899] [ 17.257662] The buggy address belongs to the object at ffff888100356400 [ 17.257662] which belongs to the cache kmalloc-256 of size 256 [ 17.260066] The buggy address is located 5 bytes to the right of [ 17.260066] allocated 235-byte region [ffff888100356400, ffff8881003564eb) [ 17.261116] [ 17.261466] The buggy address belongs to the physical page: [ 17.262127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100356 [ 17.262866] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.263504] flags: 0x200000000000040(head|node=0|zone=2) [ 17.264303] page_type: f5(slab) [ 17.264679] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.265370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.266461] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.267426] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.268164] head: 0200000000000001 ffffea000400d581 00000000ffffffff 00000000ffffffff [ 17.268891] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.269602] page dumped because: kasan: bad access detected [ 17.270687] [ 17.270940] Memory state around the buggy address: [ 17.271342] ffff888100356380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.272023] ffff888100356400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.272956] >ffff888100356480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.273664] ^ [ 17.274289] ffff888100356500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.274976] ffff888100356580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.275878] ================================================================== [ 17.658994] ================================================================== [ 17.659595] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.660343] Write of size 1 at addr ffff8881024ce0f0 by task kunit_try_catch/177 [ 17.661176] [ 17.661398] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.661522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.661687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.661779] Call Trace: [ 17.661821] <TASK> [ 17.661868] dump_stack_lvl+0x73/0xb0 [ 17.661948] print_report+0xd1/0x650 [ 17.662081] ? __virt_addr_valid+0x1db/0x2d0 [ 17.662162] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.662241] ? kasan_addr_to_slab+0x11/0xa0 [ 17.662319] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.662399] kasan_report+0x141/0x180 [ 17.662474] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.662563] __asan_report_store1_noabort+0x1b/0x30 [ 17.662638] krealloc_more_oob_helper+0x7eb/0x930 [ 17.662712] ? __schedule+0x10cc/0x2b60 [ 17.663155] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.663240] ? finish_task_switch.isra.0+0x153/0x700 [ 17.663317] ? __switch_to+0x47/0xf50 [ 17.663397] ? __schedule+0x10cc/0x2b60 [ 17.663477] ? __pfx_read_tsc+0x10/0x10 [ 17.663525] krealloc_large_more_oob+0x1c/0x30 [ 17.663559] kunit_try_run_case+0x1a5/0x480 [ 17.663588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.663616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.663650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.663687] ? __kthread_parkme+0x82/0x180 [ 17.663715] ? preempt_count_sub+0x50/0x80 [ 17.663745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.663803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.663843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.663878] kthread+0x337/0x6f0 [ 17.663905] ? trace_preempt_on+0x20/0xc0 [ 17.663937] ? __pfx_kthread+0x10/0x10 [ 17.663966] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.663998] ? calculate_sigpending+0x7b/0xa0 [ 17.664032] ? __pfx_kthread+0x10/0x10 [ 17.664089] ret_from_fork+0x116/0x1d0 [ 17.664115] ? __pfx_kthread+0x10/0x10 [ 17.664143] ret_from_fork_asm+0x1a/0x30 [ 17.664242] </TASK> [ 17.664286] [ 17.683569] The buggy address belongs to the physical page: [ 17.684678] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024cc [ 17.685576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.686558] flags: 0x200000000000040(head|node=0|zone=2) [ 17.687078] page_type: f8(unknown) [ 17.687792] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.688824] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.689707] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.690712] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.691685] head: 0200000000000002 ffffea0004093301 00000000ffffffff 00000000ffffffff [ 17.692533] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.694129] page dumped because: kasan: bad access detected [ 17.694768] [ 17.695082] Memory state around the buggy address: [ 17.695548] ffff8881024cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.696535] ffff8881024ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.697663] >ffff8881024ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.698455] ^ [ 17.698689] ffff8881024ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.699969] ffff8881024ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.700731] ================================================================== [ 17.173903] ================================================================== [ 17.174514] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.174821] Write of size 1 at addr ffff8881003564eb by task kunit_try_catch/173 [ 17.175116] [ 17.175960] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.176105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.176144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.176203] Call Trace: [ 17.176242] <TASK> [ 17.176290] dump_stack_lvl+0x73/0xb0 [ 17.176373] print_report+0xd1/0x650 [ 17.176555] ? __virt_addr_valid+0x1db/0x2d0 [ 17.176634] ? krealloc_more_oob_helper+0x821/0x930 [ 17.176708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.176825] ? krealloc_more_oob_helper+0x821/0x930 [ 17.176908] kasan_report+0x141/0x180 [ 17.176982] ? krealloc_more_oob_helper+0x821/0x930 [ 17.177085] __asan_report_store1_noabort+0x1b/0x30 [ 17.177127] krealloc_more_oob_helper+0x821/0x930 [ 17.177165] ? __schedule+0x10cc/0x2b60 [ 17.177297] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.177336] ? finish_task_switch.isra.0+0x153/0x700 [ 17.177369] ? __switch_to+0x47/0xf50 [ 17.177405] ? __schedule+0x10cc/0x2b60 [ 17.177437] ? __pfx_read_tsc+0x10/0x10 [ 17.177472] krealloc_more_oob+0x1c/0x30 [ 17.177505] kunit_try_run_case+0x1a5/0x480 [ 17.177536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.177563] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.177598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.177632] ? __kthread_parkme+0x82/0x180 [ 17.177660] ? preempt_count_sub+0x50/0x80 [ 17.177690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.177718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.177752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.177820] kthread+0x337/0x6f0 [ 17.177853] ? trace_preempt_on+0x20/0xc0 [ 17.177889] ? __pfx_kthread+0x10/0x10 [ 17.177919] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.177951] ? calculate_sigpending+0x7b/0xa0 [ 17.177985] ? __pfx_kthread+0x10/0x10 [ 17.178015] ret_from_fork+0x116/0x1d0 [ 17.178039] ? __pfx_kthread+0x10/0x10 [ 17.178095] ret_from_fork_asm+0x1a/0x30 [ 17.178138] </TASK> [ 17.178153] [ 17.196701] Allocated by task 173: [ 17.197110] kasan_save_stack+0x45/0x70 [ 17.197661] kasan_save_track+0x18/0x40 [ 17.199135] kasan_save_alloc_info+0x3b/0x50 [ 17.200108] __kasan_krealloc+0x190/0x1f0 [ 17.200513] krealloc_noprof+0xf3/0x340 [ 17.201424] krealloc_more_oob_helper+0x1a9/0x930 [ 17.201982] krealloc_more_oob+0x1c/0x30 [ 17.202598] kunit_try_run_case+0x1a5/0x480 [ 17.203249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.203823] kthread+0x337/0x6f0 [ 17.204205] ret_from_fork+0x116/0x1d0 [ 17.204728] ret_from_fork_asm+0x1a/0x30 [ 17.205103] [ 17.205754] The buggy address belongs to the object at ffff888100356400 [ 17.205754] which belongs to the cache kmalloc-256 of size 256 [ 17.207114] The buggy address is located 0 bytes to the right of [ 17.207114] allocated 235-byte region [ffff888100356400, ffff8881003564eb) [ 17.208596] [ 17.208767] The buggy address belongs to the physical page: [ 17.209721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100356 [ 17.210780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.211412] flags: 0x200000000000040(head|node=0|zone=2) [ 17.211941] page_type: f5(slab) [ 17.212490] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.213904] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.214740] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.215026] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.215924] head: 0200000000000001 ffffea000400d581 00000000ffffffff 00000000ffffffff [ 17.217391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.217977] page dumped because: kasan: bad access detected [ 17.218481] [ 17.218714] Memory state around the buggy address: [ 17.219123] ffff888100356380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.219667] ffff888100356400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.220567] >ffff888100356480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.221454] ^ [ 17.222535] ffff888100356500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.223436] ffff888100356580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224130] ==================================================================
[ 51.025756] ================================================================== [ 51.033020] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808 [ 51.040649] Write of size 1 at addr cc74e0f0 by task kunit_try_catch/212 [ 51.047393] [ 51.048919] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.048919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.048950] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.048950] Call trace: [ 51.048950] unwind_backtrace from show_stack+0x18/0x1c [ 51.048980] show_stack from dump_stack_lvl+0x70/0x90 [ 51.049011] dump_stack_lvl from print_report+0x158/0x528 [ 51.049041] print_report from kasan_report+0xdc/0x118 [ 51.049041] kasan_report from krealloc_more_oob_helper+0x72c/0x808 [ 51.049072] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.049102] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.049133] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.049163] kthread from ret_from_fork+0x14/0x20 [ 51.049163] Exception stack(0xf222bfb0 to 0xf222bff8) [ 51.049194] bfa0: 00000000 00000000 00000000 00000000 [ 51.049194] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.049224] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.049224] [ 51.156188] The buggy address belongs to the physical page: [ 51.161804] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.169067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.176788] flags: 0x40(head|zone=0) [ 51.180389] page_type: f8(unknown) [ 51.183807] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.191955] raw: 00000000 [ 51.194610] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.202819] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.211059] head: 00000000 00000004 [ 51.214569] page dumped because: kasan: bad access detected [ 51.220184] [ 51.221679] Memory state around the buggy address: [ 51.226501] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.233062] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.239654] >cc74e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 51.246215] ^ [ 51.252441] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.259002] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.265563] ================================================================== [ 48.599609] ================================================================== [ 48.610473] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808 [ 48.618103] Write of size 1 at addr cb2c3ceb by task kunit_try_catch/208 [ 48.624847] [ 48.626373] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 48.626403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.626403] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.626403] Call trace: [ 48.626403] unwind_backtrace from show_stack+0x18/0x1c [ 48.626434] show_stack from dump_stack_lvl+0x70/0x90 [ 48.626464] dump_stack_lvl from print_report+0x158/0x528 [ 48.626495] print_report from kasan_report+0xdc/0x118 [ 48.626525] kasan_report from krealloc_more_oob_helper+0x77c/0x808 [ 48.626525] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 48.626556] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.626586] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.626617] kthread from ret_from_fork+0x14/0x20 [ 48.626647] Exception stack(0xf2213fb0 to 0xf2213ff8) [ 48.626647] 3fa0: 00000000 00000000 00000000 00000000 [ 48.626678] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.626678] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.626678] [ 48.733673] Allocated by task 208: [ 48.737091] kasan_save_track+0x30/0x5c [ 48.740936] __kasan_krealloc+0xf4/0x140 [ 48.744903] krealloc_noprof+0x104/0x2e4 [ 48.748870] krealloc_more_oob_helper+0x1e0/0x808 [ 48.753601] kunit_try_run_case+0x22c/0x5a8 [ 48.757812] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.763336] kthread+0x464/0x810 [ 48.766601] ret_from_fork+0x14/0x20 [ 48.770202] [ 48.771697] The buggy address belongs to the object at cb2c3c00 [ 48.771697] which belongs to the cache kmalloc-256 of size 256 [ 48.783599] The buggy address is located 0 bytes to the right of [ 48.783599] allocated 235-byte region [cb2c3c00, cb2c3ceb) [ 48.795227] [ 48.796752] The buggy address belongs to the physical page: [ 48.802337] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 48.809631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.817321] flags: 0x40(head|zone=0) [ 48.820922] page_type: f5(slab) [ 48.824096] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 48.832244] raw: 00000000 [ 48.834869] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 48.843109] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 48.851348] head: 00000000 00000002 [ 48.854858] page dumped because: kasan: bad access detected [ 48.860473] [ 48.861968] Memory state around the buggy address: [ 48.866790] cb2c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.873352] cb2c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.879943] >cb2c3c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 48.886505] ^ [ 48.892456] cb2c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.899017] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.905609] ================================================================== [ 50.774871] ================================================================== [ 50.785980] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808 [ 50.793609] Write of size 1 at addr cc74e0eb by task kunit_try_catch/212 [ 50.800354] [ 50.801879] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 50.801910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.801910] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.801910] Call trace: [ 50.801910] unwind_backtrace from show_stack+0x18/0x1c [ 50.801940] show_stack from dump_stack_lvl+0x70/0x90 [ 50.801971] dump_stack_lvl from print_report+0x158/0x528 [ 50.802001] print_report from kasan_report+0xdc/0x118 [ 50.802032] kasan_report from krealloc_more_oob_helper+0x77c/0x808 [ 50.802032] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.802062] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.802093] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.802124] kthread from ret_from_fork+0x14/0x20 [ 50.802154] Exception stack(0xf222bfb0 to 0xf222bff8) [ 50.802154] bfa0: 00000000 00000000 00000000 00000000 [ 50.802185] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.802185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.802185] [ 50.909149] The buggy address belongs to the physical page: [ 50.914764] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 50.922027] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.929748] flags: 0x40(head|zone=0) [ 50.933349] page_type: f8(unknown) [ 50.936767] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 50.944915] raw: 00000000 [ 50.947570] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 50.955810] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.964019] head: 00000000 00000004 [ 50.967529] page dumped because: kasan: bad access detected [ 50.973144] [ 50.974639] Memory state around the buggy address: [ 50.979461] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.986022] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.992614] >cc74e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 50.999176] ^ [ 51.005126] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.011688] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.018280] ================================================================== [ 48.913116] ================================================================== [ 48.920379] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808 [ 48.928009] Write of size 1 at addr cb2c3cf0 by task kunit_try_catch/208 [ 48.934753] [ 48.936248] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 48.936279] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.936279] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.936309] Call trace: [ 48.936309] unwind_backtrace from show_stack+0x18/0x1c [ 48.936340] show_stack from dump_stack_lvl+0x70/0x90 [ 48.936340] dump_stack_lvl from print_report+0x158/0x528 [ 48.936370] print_report from kasan_report+0xdc/0x118 [ 48.936401] kasan_report from krealloc_more_oob_helper+0x72c/0x808 [ 48.936431] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 48.936462] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.936462] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.936492] kthread from ret_from_fork+0x14/0x20 [ 48.936523] Exception stack(0xf2213fb0 to 0xf2213ff8) [ 48.936523] 3fa0: 00000000 00000000 00000000 00000000 [ 48.936553] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.936553] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.936584] [ 49.043548] Allocated by task 208: [ 49.046966] kasan_save_track+0x30/0x5c [ 49.050842] __kasan_krealloc+0xf4/0x140 [ 49.054779] krealloc_noprof+0x104/0x2e4 [ 49.058746] krealloc_more_oob_helper+0x1e0/0x808 [ 49.063476] kunit_try_run_case+0x22c/0x5a8 [ 49.067687] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.073242] kthread+0x464/0x810 [ 49.076477] ret_from_fork+0x14/0x20 [ 49.080078] [ 49.081573] The buggy address belongs to the object at cb2c3c00 [ 49.081573] which belongs to the cache kmalloc-256 of size 256 [ 49.093475] The buggy address is located 5 bytes to the right of [ 49.093475] allocated 235-byte region [cb2c3c00, cb2c3ceb) [ 49.105133] [ 49.106628] The buggy address belongs to the physical page: [ 49.112243] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 49.119506] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.127197] flags: 0x40(head|zone=0) [ 49.130798] page_type: f5(slab) [ 49.133972] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.142120] raw: 00000000 [ 49.144775] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.152984] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.161224] head: 00000000 00000002 [ 49.164733] page dumped because: kasan: bad access detected [ 49.170349] [ 49.171844] Memory state around the buggy address: [ 49.176666] cb2c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.183227] cb2c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.189819] >cb2c3c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 49.196380] ^ [ 49.202606] cb2c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.209167] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.215728] ==================================================================