Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 24.437044] ================================================================== [ 24.443972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.451523] Write of size 1 at addr ffff0008031520f0 by task kunit_try_catch/209 [ 24.458899] [ 24.460385] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.460438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.460453] Hardware name: WinLink E850-96 board (DT) [ 24.460476] Call trace: [ 24.460489] show_stack+0x20/0x38 (C) [ 24.460525] dump_stack_lvl+0x8c/0xd0 [ 24.460562] print_report+0x118/0x608 [ 24.460596] kasan_report+0xdc/0x128 [ 24.460626] __asan_report_store1_noabort+0x20/0x30 [ 24.460661] krealloc_more_oob_helper+0x5c0/0x678 [ 24.460690] krealloc_large_more_oob+0x20/0x38 [ 24.460720] kunit_try_run_case+0x170/0x3f0 [ 24.460757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.460797] kthread+0x328/0x630 [ 24.460832] ret_from_fork+0x10/0x20 [ 24.460868] [ 24.528258] The buggy address belongs to the physical page: [ 24.533816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150 [ 24.541799] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.549438] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.556381] page_type: f8(unknown) [ 24.559778] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.567498] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.575224] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.583036] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.590849] head: 0bfffe0000000002 fffffdffe00c5401 00000000ffffffff 00000000ffffffff [ 24.598661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.606466] page dumped because: kasan: bad access detected [ 24.612022] [ 24.613497] Memory state around the buggy address: [ 24.618276] ffff000803151f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.625480] ffff000803152000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.632685] >ffff000803152080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.639886] ^ [ 24.646747] ffff000803152100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.653952] ffff000803152180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.661153] ================================================================== [ 24.203342] ================================================================== [ 24.212639] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.220189] Write of size 1 at addr ffff0008031520eb by task kunit_try_catch/209 [ 24.227567] [ 24.229055] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.229109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.229126] Hardware name: WinLink E850-96 board (DT) [ 24.229147] Call trace: [ 24.229161] show_stack+0x20/0x38 (C) [ 24.229197] dump_stack_lvl+0x8c/0xd0 [ 24.229233] print_report+0x118/0x608 [ 24.229265] kasan_report+0xdc/0x128 [ 24.229296] __asan_report_store1_noabort+0x20/0x30 [ 24.229334] krealloc_more_oob_helper+0x60c/0x678 [ 24.229362] krealloc_large_more_oob+0x20/0x38 [ 24.229389] kunit_try_run_case+0x170/0x3f0 [ 24.229429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.229467] kthread+0x328/0x630 [ 24.229503] ret_from_fork+0x10/0x20 [ 24.229539] [ 24.296924] The buggy address belongs to the physical page: [ 24.302482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150 [ 24.310466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.318105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.325049] page_type: f8(unknown) [ 24.328448] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.336165] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.343891] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.351703] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.359515] head: 0bfffe0000000002 fffffdffe00c5401 00000000ffffffff 00000000ffffffff [ 24.367327] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.375133] page dumped because: kasan: bad access detected [ 24.380688] [ 24.382165] Memory state around the buggy address: [ 24.386947] ffff000803151f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.394149] ffff000803152000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.401353] >ffff000803152080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.408552] ^ [ 24.415154] ffff000803152100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.422358] ffff000803152180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.429559] ================================================================== [ 22.357271] ================================================================== [ 22.364143] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.371691] Write of size 1 at addr ffff0008033108f0 by task kunit_try_catch/205 [ 22.379069] [ 22.380555] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.380605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.380620] Hardware name: WinLink E850-96 board (DT) [ 22.380638] Call trace: [ 22.380650] show_stack+0x20/0x38 (C) [ 22.380681] dump_stack_lvl+0x8c/0xd0 [ 22.380720] print_report+0x118/0x608 [ 22.380752] kasan_report+0xdc/0x128 [ 22.380781] __asan_report_store1_noabort+0x20/0x30 [ 22.380820] krealloc_more_oob_helper+0x5c0/0x678 [ 22.380849] krealloc_more_oob+0x20/0x38 [ 22.380875] kunit_try_run_case+0x170/0x3f0 [ 22.380911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.380947] kthread+0x328/0x630 [ 22.380980] ret_from_fork+0x10/0x20 [ 22.381015] [ 22.447905] Allocated by task 205: [ 22.451293] kasan_save_stack+0x3c/0x68 [ 22.455110] kasan_save_track+0x20/0x40 [ 22.458929] kasan_save_alloc_info+0x40/0x58 [ 22.463183] __kasan_krealloc+0x118/0x178 [ 22.467176] krealloc_noprof+0x128/0x360 [ 22.471082] krealloc_more_oob_helper+0x168/0x678 [ 22.475769] krealloc_more_oob+0x20/0x38 [ 22.479675] kunit_try_run_case+0x170/0x3f0 [ 22.483842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.489311] kthread+0x328/0x630 [ 22.492523] ret_from_fork+0x10/0x20 [ 22.496082] [ 22.497558] The buggy address belongs to the object at ffff000803310800 [ 22.497558] which belongs to the cache kmalloc-256 of size 256 [ 22.510059] The buggy address is located 5 bytes to the right of [ 22.510059] allocated 235-byte region [ffff000803310800, ffff0008033108eb) [ 22.522990] [ 22.524468] The buggy address belongs to the physical page: [ 22.530027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 22.538008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.545648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.552594] page_type: f5(slab) [ 22.555729] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.563448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.571175] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.578986] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.586799] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 22.594611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.602416] page dumped because: kasan: bad access detected [ 22.607972] [ 22.609449] Memory state around the buggy address: [ 22.614229] ffff000803310780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.621432] ffff000803310800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.628635] >ffff000803310880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.635836] ^ [ 22.642698] ffff000803310900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.649902] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.657104] ================================================================== [ 22.048015] ================================================================== [ 22.057029] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.064580] Write of size 1 at addr ffff0008033108eb by task kunit_try_catch/205 [ 22.071956] [ 22.073442] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.073497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.073515] Hardware name: WinLink E850-96 board (DT) [ 22.073536] Call trace: [ 22.073549] show_stack+0x20/0x38 (C) [ 22.073585] dump_stack_lvl+0x8c/0xd0 [ 22.073623] print_report+0x118/0x608 [ 22.073658] kasan_report+0xdc/0x128 [ 22.073688] __asan_report_store1_noabort+0x20/0x30 [ 22.073725] krealloc_more_oob_helper+0x60c/0x678 [ 22.073756] krealloc_more_oob+0x20/0x38 [ 22.073782] kunit_try_run_case+0x170/0x3f0 [ 22.073818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.073859] kthread+0x328/0x630 [ 22.073893] ret_from_fork+0x10/0x20 [ 22.073928] [ 22.140793] Allocated by task 205: [ 22.144180] kasan_save_stack+0x3c/0x68 [ 22.147996] kasan_save_track+0x20/0x40 [ 22.151816] kasan_save_alloc_info+0x40/0x58 [ 22.156069] __kasan_krealloc+0x118/0x178 [ 22.160062] krealloc_noprof+0x128/0x360 [ 22.163968] krealloc_more_oob_helper+0x168/0x678 [ 22.168656] krealloc_more_oob+0x20/0x38 [ 22.172562] kunit_try_run_case+0x170/0x3f0 [ 22.176729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.182197] kthread+0x328/0x630 [ 22.185409] ret_from_fork+0x10/0x20 [ 22.188968] [ 22.190445] The buggy address belongs to the object at ffff000803310800 [ 22.190445] which belongs to the cache kmalloc-256 of size 256 [ 22.202945] The buggy address is located 0 bytes to the right of [ 22.202945] allocated 235-byte region [ffff000803310800, ffff0008033108eb) [ 22.215877] [ 22.217357] The buggy address belongs to the physical page: [ 22.222913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 22.230896] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.238537] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.245479] page_type: f5(slab) [ 22.248618] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.256335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.264061] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.271873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.279686] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 22.287498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.295303] page dumped because: kasan: bad access detected [ 22.300860] [ 22.302336] Memory state around the buggy address: [ 22.307115] ffff000803310780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.314319] ffff000803310800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.321523] >ffff000803310880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.328723] ^ [ 22.335324] ffff000803310900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.342529] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.349731] ==================================================================
[ 17.835142] ================================================================== [ 17.835407] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.835528] Write of size 1 at addr fff00000c79120f0 by task kunit_try_catch/162 [ 17.835581] [ 17.835609] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.835697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.835724] Hardware name: linux,dummy-virt (DT) [ 17.835863] Call trace: [ 17.835914] show_stack+0x20/0x38 (C) [ 17.836088] dump_stack_lvl+0x8c/0xd0 [ 17.836137] print_report+0x118/0x608 [ 17.836181] kasan_report+0xdc/0x128 [ 17.836473] __asan_report_store1_noabort+0x20/0x30 [ 17.836624] krealloc_more_oob_helper+0x5c0/0x678 [ 17.836834] krealloc_large_more_oob+0x20/0x38 [ 17.837027] kunit_try_run_case+0x170/0x3f0 [ 17.837145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.837331] kthread+0x328/0x630 [ 17.837384] ret_from_fork+0x10/0x20 [ 17.837862] [ 17.837963] The buggy address belongs to the physical page: [ 17.838121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910 [ 17.838294] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.838342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.838524] page_type: f8(unknown) [ 17.838751] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.838845] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.838959] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.839063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.839234] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff [ 17.839350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.839414] page dumped because: kasan: bad access detected [ 17.839446] [ 17.839463] Memory state around the buggy address: [ 17.839565] fff00000c7911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.839612] fff00000c7912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.839974] >fff00000c7912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.840066] ^ [ 17.840155] fff00000c7912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.840288] fff00000c7912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.840328] ================================================================== [ 17.762984] ================================================================== [ 17.763218] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.763285] Write of size 1 at addr fff00000c4775cf0 by task kunit_try_catch/158 [ 17.763336] [ 17.763460] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.763604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.763865] Hardware name: linux,dummy-virt (DT) [ 17.764114] Call trace: [ 17.764163] show_stack+0x20/0x38 (C) [ 17.764245] dump_stack_lvl+0x8c/0xd0 [ 17.764407] print_report+0x118/0x608 [ 17.764466] kasan_report+0xdc/0x128 [ 17.764537] __asan_report_store1_noabort+0x20/0x30 [ 17.764587] krealloc_more_oob_helper+0x5c0/0x678 [ 17.764882] krealloc_more_oob+0x20/0x38 [ 17.765136] kunit_try_run_case+0x170/0x3f0 [ 17.765321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.765459] kthread+0x328/0x630 [ 17.765527] ret_from_fork+0x10/0x20 [ 17.765895] [ 17.765943] Allocated by task 158: [ 17.766064] kasan_save_stack+0x3c/0x68 [ 17.766152] kasan_save_track+0x20/0x40 [ 17.766322] kasan_save_alloc_info+0x40/0x58 [ 17.766409] __kasan_krealloc+0x118/0x178 [ 17.766782] krealloc_noprof+0x128/0x360 [ 17.766846] krealloc_more_oob_helper+0x168/0x678 [ 17.767044] krealloc_more_oob+0x20/0x38 [ 17.767203] kunit_try_run_case+0x170/0x3f0 [ 17.767303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.767393] kthread+0x328/0x630 [ 17.767442] ret_from_fork+0x10/0x20 [ 17.767736] [ 17.767806] The buggy address belongs to the object at fff00000c4775c00 [ 17.767806] which belongs to the cache kmalloc-256 of size 256 [ 17.768078] The buggy address is located 5 bytes to the right of [ 17.768078] allocated 235-byte region [fff00000c4775c00, fff00000c4775ceb) [ 17.768248] [ 17.768293] The buggy address belongs to the physical page: [ 17.768333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.768502] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.768604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.768786] page_type: f5(slab) [ 17.768871] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.769097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.769161] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.769360] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.769541] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.769603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.769689] page dumped because: kasan: bad access detected [ 17.769805] [ 17.770057] Memory state around the buggy address: [ 17.770243] fff00000c4775b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.770297] fff00000c4775c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.770365] >fff00000c4775c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.770559] ^ [ 17.770681] fff00000c4775d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.770785] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.770824] ================================================================== [ 17.830722] ================================================================== [ 17.830774] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.830825] Write of size 1 at addr fff00000c79120eb by task kunit_try_catch/162 [ 17.830924] [ 17.831103] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.831474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.831541] Hardware name: linux,dummy-virt (DT) [ 17.831575] Call trace: [ 17.832051] show_stack+0x20/0x38 (C) [ 17.832122] dump_stack_lvl+0x8c/0xd0 [ 17.832169] print_report+0x118/0x608 [ 17.832213] kasan_report+0xdc/0x128 [ 17.832256] __asan_report_store1_noabort+0x20/0x30 [ 17.832306] krealloc_more_oob_helper+0x60c/0x678 [ 17.832352] krealloc_large_more_oob+0x20/0x38 [ 17.832397] kunit_try_run_case+0x170/0x3f0 [ 17.832444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.832497] kthread+0x328/0x630 [ 17.832541] ret_from_fork+0x10/0x20 [ 17.832587] [ 17.832606] The buggy address belongs to the physical page: [ 17.832636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910 [ 17.832688] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.832733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.832784] page_type: f8(unknown) [ 17.832823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.832893] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.832944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.832994] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.833045] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff [ 17.833095] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.833138] page dumped because: kasan: bad access detected [ 17.833169] [ 17.833186] Memory state around the buggy address: [ 17.833216] fff00000c7911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.833260] fff00000c7912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.833304] >fff00000c7912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.833342] ^ [ 17.833665] fff00000c7912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.833850] fff00000c7912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.834010] ================================================================== [ 17.755631] ================================================================== [ 17.755733] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.755841] Write of size 1 at addr fff00000c4775ceb by task kunit_try_catch/158 [ 17.756253] [ 17.756392] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.756610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.756649] Hardware name: linux,dummy-virt (DT) [ 17.756688] Call trace: [ 17.756720] show_stack+0x20/0x38 (C) [ 17.756823] dump_stack_lvl+0x8c/0xd0 [ 17.756882] print_report+0x118/0x608 [ 17.756936] kasan_report+0xdc/0x128 [ 17.756985] __asan_report_store1_noabort+0x20/0x30 [ 17.757050] krealloc_more_oob_helper+0x60c/0x678 [ 17.757105] krealloc_more_oob+0x20/0x38 [ 17.757148] kunit_try_run_case+0x170/0x3f0 [ 17.757198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.757261] kthread+0x328/0x630 [ 17.757306] ret_from_fork+0x10/0x20 [ 17.757367] [ 17.757409] Allocated by task 158: [ 17.757436] kasan_save_stack+0x3c/0x68 [ 17.757486] kasan_save_track+0x20/0x40 [ 17.757520] kasan_save_alloc_info+0x40/0x58 [ 17.757564] __kasan_krealloc+0x118/0x178 [ 17.757599] krealloc_noprof+0x128/0x360 [ 17.757635] krealloc_more_oob_helper+0x168/0x678 [ 17.757672] krealloc_more_oob+0x20/0x38 [ 17.757715] kunit_try_run_case+0x170/0x3f0 [ 17.757762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.757815] kthread+0x328/0x630 [ 17.758121] ret_from_fork+0x10/0x20 [ 17.758362] [ 17.758395] The buggy address belongs to the object at fff00000c4775c00 [ 17.758395] which belongs to the cache kmalloc-256 of size 256 [ 17.758586] The buggy address is located 0 bytes to the right of [ 17.758586] allocated 235-byte region [fff00000c4775c00, fff00000c4775ceb) [ 17.758882] [ 17.759162] The buggy address belongs to the physical page: [ 17.759241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.759325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.759677] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.759767] page_type: f5(slab) [ 17.759960] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.760067] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.760143] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.760242] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.760369] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.760532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.760577] page dumped because: kasan: bad access detected [ 17.760610] [ 17.760628] Memory state around the buggy address: [ 17.760659] fff00000c4775b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.760818] fff00000c4775c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.761116] >fff00000c4775c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.761243] ^ [ 17.761350] fff00000c4775d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.761404] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.761525] ==================================================================
[ 10.492110] ================================================================== [ 10.492607] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 10.492955] Write of size 1 at addr ffff8881009a2aeb by task kunit_try_catch/175 [ 10.493180] [ 10.493451] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.493667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.493683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.493707] Call Trace: [ 10.493720] <TASK> [ 10.493740] dump_stack_lvl+0x73/0xb0 [ 10.493772] print_report+0xd1/0x650 [ 10.493795] ? __virt_addr_valid+0x1db/0x2d0 [ 10.493818] ? krealloc_more_oob_helper+0x821/0x930 [ 10.493838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.493860] ? krealloc_more_oob_helper+0x821/0x930 [ 10.493880] kasan_report+0x141/0x180 [ 10.493901] ? krealloc_more_oob_helper+0x821/0x930 [ 10.493937] __asan_report_store1_noabort+0x1b/0x30 [ 10.493957] krealloc_more_oob_helper+0x821/0x930 [ 10.493975] ? __schedule+0x10cc/0x2b60 [ 10.493999] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.494018] ? finish_task_switch.isra.0+0x153/0x700 [ 10.494043] ? __switch_to+0x5d9/0xf60 [ 10.494064] ? dequeue_task_fair+0x166/0x4e0 [ 10.494088] ? __schedule+0x10cc/0x2b60 [ 10.494109] ? __pfx_read_tsc+0x10/0x10 [ 10.494132] krealloc_more_oob+0x1c/0x30 [ 10.494150] kunit_try_run_case+0x1a5/0x480 [ 10.494176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.494197] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.494222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.494244] ? __kthread_parkme+0x82/0x180 [ 10.494266] ? preempt_count_sub+0x50/0x80 [ 10.494290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.494312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.494334] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.494355] kthread+0x337/0x6f0 [ 10.494371] ? trace_preempt_on+0x20/0xc0 [ 10.494396] ? __pfx_kthread+0x10/0x10 [ 10.494413] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.494434] ? calculate_sigpending+0x7b/0xa0 [ 10.494455] ? __pfx_kthread+0x10/0x10 [ 10.494473] ret_from_fork+0x41/0x80 [ 10.494493] ? __pfx_kthread+0x10/0x10 [ 10.494510] ret_from_fork_asm+0x1a/0x30 [ 10.494541] </TASK> [ 10.494552] [ 10.503164] Allocated by task 175: [ 10.503367] kasan_save_stack+0x45/0x70 [ 10.503547] kasan_save_track+0x18/0x40 [ 10.503718] kasan_save_alloc_info+0x3b/0x50 [ 10.503866] __kasan_krealloc+0x190/0x1f0 [ 10.504015] krealloc_noprof+0xf3/0x340 [ 10.504243] krealloc_more_oob_helper+0x1a9/0x930 [ 10.504480] krealloc_more_oob+0x1c/0x30 [ 10.504673] kunit_try_run_case+0x1a5/0x480 [ 10.504877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.505139] kthread+0x337/0x6f0 [ 10.505431] ret_from_fork+0x41/0x80 [ 10.505618] ret_from_fork_asm+0x1a/0x30 [ 10.505884] [ 10.505970] The buggy address belongs to the object at ffff8881009a2a00 [ 10.505970] which belongs to the cache kmalloc-256 of size 256 [ 10.506415] The buggy address is located 0 bytes to the right of [ 10.506415] allocated 235-byte region [ffff8881009a2a00, ffff8881009a2aeb) [ 10.507167] [ 10.507258] The buggy address belongs to the physical page: [ 10.507481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2 [ 10.507864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.508187] flags: 0x200000000000040(head|node=0|zone=2) [ 10.508424] page_type: f5(slab) [ 10.508583] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.508972] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.509270] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.509590] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.509882] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff [ 10.510224] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.510453] page dumped because: kasan: bad access detected [ 10.510620] [ 10.510689] Memory state around the buggy address: [ 10.510887] ffff8881009a2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.511476] ffff8881009a2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.511773] >ffff8881009a2a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 10.511995] ^ [ 10.512193] ffff8881009a2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.512414] ffff8881009a2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.512802] ================================================================== [ 10.668009] ================================================================== [ 10.668635] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 10.669048] Write of size 1 at addr ffff8881028920eb by task kunit_try_catch/179 [ 10.669382] [ 10.669497] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.669542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.669573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.669594] Call Trace: [ 10.669608] <TASK> [ 10.669627] dump_stack_lvl+0x73/0xb0 [ 10.669653] print_report+0xd1/0x650 [ 10.669675] ? __virt_addr_valid+0x1db/0x2d0 [ 10.669696] ? krealloc_more_oob_helper+0x821/0x930 [ 10.669716] ? kasan_addr_to_slab+0x11/0xa0 [ 10.669736] ? krealloc_more_oob_helper+0x821/0x930 [ 10.669756] kasan_report+0x141/0x180 [ 10.669778] ? krealloc_more_oob_helper+0x821/0x930 [ 10.669802] __asan_report_store1_noabort+0x1b/0x30 [ 10.669822] krealloc_more_oob_helper+0x821/0x930 [ 10.669841] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 10.669867] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.669887] ? irqentry_exit+0x2a/0x60 [ 10.669904] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 10.669937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.669964] ? __pfx_read_tsc+0x10/0x10 [ 10.669987] krealloc_large_more_oob+0x1c/0x30 [ 10.670006] kunit_try_run_case+0x1a5/0x480 [ 10.670028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.670049] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.670073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.670095] ? __kthread_parkme+0x82/0x180 [ 10.670117] ? preempt_count_sub+0x50/0x80 [ 10.670142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.670164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.670186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.670208] kthread+0x337/0x6f0 [ 10.670225] ? trace_preempt_on+0x20/0xc0 [ 10.670248] ? __pfx_kthread+0x10/0x10 [ 10.670265] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.670286] ? calculate_sigpending+0x7b/0xa0 [ 10.670308] ? __pfx_kthread+0x10/0x10 [ 10.670326] ret_from_fork+0x41/0x80 [ 10.670346] ? __pfx_kthread+0x10/0x10 [ 10.670362] ret_from_fork_asm+0x1a/0x30 [ 10.670393] </TASK> [ 10.670404] [ 10.677623] The buggy address belongs to the physical page: [ 10.677813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102890 [ 10.678068] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.678397] flags: 0x200000000000040(head|node=0|zone=2) [ 10.678670] page_type: f8(unknown) [ 10.678852] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.679134] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.679395] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.679764] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.680112] head: 0200000000000002 ffffea00040a2401 00000000ffffffff 00000000ffffffff [ 10.680433] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.680732] page dumped because: kasan: bad access detected [ 10.680903] [ 10.680979] Memory state around the buggy address: [ 10.681140] ffff888102891f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.681461] ffff888102892000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.681800] >ffff888102892080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 10.682058] ^ [ 10.682258] ffff888102892100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.682476] ffff888102892180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.682808] ================================================================== [ 10.513426] ================================================================== [ 10.514180] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 10.514531] Write of size 1 at addr ffff8881009a2af0 by task kunit_try_catch/175 [ 10.515348] [ 10.515479] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.515526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.515537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.515557] Call Trace: [ 10.515575] <TASK> [ 10.515593] dump_stack_lvl+0x73/0xb0 [ 10.515619] print_report+0xd1/0x650 [ 10.515642] ? __virt_addr_valid+0x1db/0x2d0 [ 10.515662] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.515681] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.515703] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.515724] kasan_report+0x141/0x180 [ 10.515747] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.515771] __asan_report_store1_noabort+0x1b/0x30 [ 10.515791] krealloc_more_oob_helper+0x7eb/0x930 [ 10.515810] ? __schedule+0x10cc/0x2b60 [ 10.515833] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.515853] ? finish_task_switch.isra.0+0x153/0x700 [ 10.515875] ? __switch_to+0x5d9/0xf60 [ 10.515895] ? dequeue_task_fair+0x166/0x4e0 [ 10.515936] ? __schedule+0x10cc/0x2b60 [ 10.515957] ? __pfx_read_tsc+0x10/0x10 [ 10.515980] krealloc_more_oob+0x1c/0x30 [ 10.515997] kunit_try_run_case+0x1a5/0x480 [ 10.516022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.516043] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.516066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.516088] ? __kthread_parkme+0x82/0x180 [ 10.516109] ? preempt_count_sub+0x50/0x80 [ 10.516132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.516155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.516178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.516200] kthread+0x337/0x6f0 [ 10.516216] ? trace_preempt_on+0x20/0xc0 [ 10.516239] ? __pfx_kthread+0x10/0x10 [ 10.516264] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.516284] ? calculate_sigpending+0x7b/0xa0 [ 10.516305] ? __pfx_kthread+0x10/0x10 [ 10.516323] ret_from_fork+0x41/0x80 [ 10.516342] ? __pfx_kthread+0x10/0x10 [ 10.516359] ret_from_fork_asm+0x1a/0x30 [ 10.516389] </TASK> [ 10.516400] [ 10.524577] Allocated by task 175: [ 10.524826] kasan_save_stack+0x45/0x70 [ 10.525044] kasan_save_track+0x18/0x40 [ 10.525179] kasan_save_alloc_info+0x3b/0x50 [ 10.525322] __kasan_krealloc+0x190/0x1f0 [ 10.525459] krealloc_noprof+0xf3/0x340 [ 10.525592] krealloc_more_oob_helper+0x1a9/0x930 [ 10.525956] krealloc_more_oob+0x1c/0x30 [ 10.526156] kunit_try_run_case+0x1a5/0x480 [ 10.526367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.526611] kthread+0x337/0x6f0 [ 10.526786] ret_from_fork+0x41/0x80 [ 10.527174] ret_from_fork_asm+0x1a/0x30 [ 10.527382] [ 10.527477] The buggy address belongs to the object at ffff8881009a2a00 [ 10.527477] which belongs to the cache kmalloc-256 of size 256 [ 10.527988] The buggy address is located 5 bytes to the right of [ 10.527988] allocated 235-byte region [ffff8881009a2a00, ffff8881009a2aeb) [ 10.528370] [ 10.528445] The buggy address belongs to the physical page: [ 10.528615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2 [ 10.528947] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.529274] flags: 0x200000000000040(head|node=0|zone=2) [ 10.529608] page_type: f5(slab) [ 10.529849] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.530152] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.530384] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.530720] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.531129] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff [ 10.531710] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.532189] page dumped because: kasan: bad access detected [ 10.532433] [ 10.532507] Memory state around the buggy address: [ 10.532716] ffff8881009a2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.533081] ffff8881009a2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.533376] >ffff8881009a2a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 10.533633] ^ [ 10.534659] ffff8881009a2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.534962] ffff8881009a2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.535240] ================================================================== [ 10.683862] ================================================================== [ 10.684211] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 10.684497] Write of size 1 at addr ffff8881028920f0 by task kunit_try_catch/179 [ 10.685136] [ 10.685237] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 10.685280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.685292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.685312] Call Trace: [ 10.685324] <TASK> [ 10.685339] dump_stack_lvl+0x73/0xb0 [ 10.685366] print_report+0xd1/0x650 [ 10.685390] ? __virt_addr_valid+0x1db/0x2d0 [ 10.685413] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.685433] ? kasan_addr_to_slab+0x11/0xa0 [ 10.685454] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.685473] kasan_report+0x141/0x180 [ 10.685495] ? krealloc_more_oob_helper+0x7eb/0x930 [ 10.685519] __asan_report_store1_noabort+0x1b/0x30 [ 10.685540] krealloc_more_oob_helper+0x7eb/0x930 [ 10.685581] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 10.685607] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.685627] ? irqentry_exit+0x2a/0x60 [ 10.685645] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 10.685669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.685697] ? __pfx_read_tsc+0x10/0x10 [ 10.685722] krealloc_large_more_oob+0x1c/0x30 [ 10.685742] kunit_try_run_case+0x1a5/0x480 [ 10.685765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.685786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.685811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.685833] ? __kthread_parkme+0x82/0x180 [ 10.685857] ? preempt_count_sub+0x50/0x80 [ 10.685884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.685908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.685940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.685963] kthread+0x337/0x6f0 [ 10.685979] ? trace_preempt_on+0x20/0xc0 [ 10.686004] ? __pfx_kthread+0x10/0x10 [ 10.686021] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.686042] ? calculate_sigpending+0x7b/0xa0 [ 10.686064] ? __pfx_kthread+0x10/0x10 [ 10.686082] ret_from_fork+0x41/0x80 [ 10.686102] ? __pfx_kthread+0x10/0x10 [ 10.686119] ret_from_fork_asm+0x1a/0x30 [ 10.686150] </TASK> [ 10.686160] [ 10.693191] The buggy address belongs to the physical page: [ 10.693457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102890 [ 10.693785] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.694024] flags: 0x200000000000040(head|node=0|zone=2) [ 10.694273] page_type: f8(unknown) [ 10.694454] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.694817] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.695085] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.695397] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.695719] head: 0200000000000002 ffffea00040a2401 00000000ffffffff 00000000ffffffff [ 10.696037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.696343] page dumped because: kasan: bad access detected [ 10.696587] [ 10.696680] Memory state around the buggy address: [ 10.696885] ffff888102891f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.697168] ffff888102892000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.697434] >ffff888102892080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 10.697712] ^ [ 10.697926] ffff888102892100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.698237] ffff888102892180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.698546] ==================================================================