Date
May 26, 2025, 9:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.208064] ================================================================== [ 17.208200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.208306] Write of size 1 at addr fff00000c63230eb by task kunit_try_catch/158 [ 17.208436] [ 17.208527] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.208729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.208790] Hardware name: linux,dummy-virt (DT) [ 17.208855] Call trace: [ 17.208899] show_stack+0x20/0x38 (C) [ 17.209014] dump_stack_lvl+0x8c/0xd0 [ 17.209126] print_report+0x118/0x608 [ 17.209231] kasan_report+0xdc/0x128 [ 17.209354] __asan_report_store1_noabort+0x20/0x30 [ 17.209465] krealloc_less_oob_helper+0xa58/0xc50 [ 17.210030] krealloc_less_oob+0x20/0x38 [ 17.210193] kunit_try_run_case+0x170/0x3f0 [ 17.210359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.210524] kthread+0x328/0x630 [ 17.210651] ret_from_fork+0x10/0x20 [ 17.210824] [ 17.210865] Allocated by task 158: [ 17.211218] kasan_save_stack+0x3c/0x68 [ 17.211635] kasan_save_track+0x20/0x40 [ 17.211714] kasan_save_alloc_info+0x40/0x58 [ 17.211794] __kasan_krealloc+0x118/0x178 [ 17.212108] krealloc_noprof+0x128/0x360 [ 17.212196] krealloc_less_oob_helper+0x168/0xc50 [ 17.212333] krealloc_less_oob+0x20/0x38 [ 17.212469] kunit_try_run_case+0x170/0x3f0 [ 17.212600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.212738] kthread+0x328/0x630 [ 17.212826] ret_from_fork+0x10/0x20 [ 17.212940] [ 17.213003] The buggy address belongs to the object at fff00000c6323000 [ 17.213003] which belongs to the cache kmalloc-256 of size 256 [ 17.213150] The buggy address is located 34 bytes to the right of [ 17.213150] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.213303] [ 17.213354] The buggy address belongs to the physical page: [ 17.213423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.213607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.213702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.214035] page_type: f5(slab) [ 17.214117] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.214221] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.214605] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.214798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.214880] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.214932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.215002] page dumped because: kasan: bad access detected [ 17.215037] [ 17.215057] Memory state around the buggy address: [ 17.215097] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.215159] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.215214] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.215253] ^ [ 17.215295] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.215362] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.215403] ================================================================== [ 17.256756] ================================================================== [ 17.256882] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.257001] Write of size 1 at addr fff00000c65b60c9 by task kunit_try_catch/162 [ 17.257096] [ 17.257172] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.257372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.257434] Hardware name: linux,dummy-virt (DT) [ 17.257503] Call trace: [ 17.257560] show_stack+0x20/0x38 (C) [ 17.257685] dump_stack_lvl+0x8c/0xd0 [ 17.257830] print_report+0x118/0x608 [ 17.257964] kasan_report+0xdc/0x128 [ 17.258125] __asan_report_store1_noabort+0x20/0x30 [ 17.258285] krealloc_less_oob_helper+0xa48/0xc50 [ 17.258448] krealloc_large_less_oob+0x20/0x38 [ 17.258578] kunit_try_run_case+0x170/0x3f0 [ 17.258674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.258812] kthread+0x328/0x630 [ 17.258899] ret_from_fork+0x10/0x20 [ 17.259001] [ 17.259044] The buggy address belongs to the physical page: [ 17.259130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.259307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.259427] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.259550] page_type: f8(unknown) [ 17.259640] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.259755] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.259889] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.259988] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.260077] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.260197] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.260282] page dumped because: kasan: bad access detected [ 17.260360] [ 17.260397] Memory state around the buggy address: [ 17.260467] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.260569] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.260658] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.260738] ^ [ 17.260848] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.260982] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.261106] ================================================================== [ 17.183676] ================================================================== [ 17.183798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.183959] Write of size 1 at addr fff00000c63230da by task kunit_try_catch/158 [ 17.184084] [ 17.184159] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.184366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.184434] Hardware name: linux,dummy-virt (DT) [ 17.184522] Call trace: [ 17.184976] show_stack+0x20/0x38 (C) [ 17.185481] dump_stack_lvl+0x8c/0xd0 [ 17.185596] print_report+0x118/0x608 [ 17.185702] kasan_report+0xdc/0x128 [ 17.185803] __asan_report_store1_noabort+0x20/0x30 [ 17.185916] krealloc_less_oob_helper+0xa80/0xc50 [ 17.186022] krealloc_less_oob+0x20/0x38 [ 17.186125] kunit_try_run_case+0x170/0x3f0 [ 17.186230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.186354] kthread+0x328/0x630 [ 17.186449] ret_from_fork+0x10/0x20 [ 17.186555] [ 17.186597] Allocated by task 158: [ 17.186659] kasan_save_stack+0x3c/0x68 [ 17.186746] kasan_save_track+0x20/0x40 [ 17.186841] kasan_save_alloc_info+0x40/0x58 [ 17.186927] __kasan_krealloc+0x118/0x178 [ 17.187008] krealloc_noprof+0x128/0x360 [ 17.187090] krealloc_less_oob_helper+0x168/0xc50 [ 17.187175] krealloc_less_oob+0x20/0x38 [ 17.187252] kunit_try_run_case+0x170/0x3f0 [ 17.188016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.188794] kthread+0x328/0x630 [ 17.188894] ret_from_fork+0x10/0x20 [ 17.188969] [ 17.189016] The buggy address belongs to the object at fff00000c6323000 [ 17.189016] which belongs to the cache kmalloc-256 of size 256 [ 17.189145] The buggy address is located 17 bytes to the right of [ 17.189145] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.189295] [ 17.189356] The buggy address belongs to the physical page: [ 17.189393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.189450] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.189496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.189555] page_type: f5(slab) [ 17.189599] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.189650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.189699] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.189746] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.189793] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.189840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.189878] page dumped because: kasan: bad access detected [ 17.189909] [ 17.189927] Memory state around the buggy address: [ 17.189958] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189999] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.190039] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.190076] ^ [ 17.190112] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.190152] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.190188] ================================================================== [ 17.157766] ================================================================== [ 17.157914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.158041] Write of size 1 at addr fff00000c63230c9 by task kunit_try_catch/158 [ 17.158147] [ 17.158226] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.158566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.158820] Hardware name: linux,dummy-virt (DT) [ 17.158903] Call trace: [ 17.158960] show_stack+0x20/0x38 (C) [ 17.159172] dump_stack_lvl+0x8c/0xd0 [ 17.159506] print_report+0x118/0x608 [ 17.159661] kasan_report+0xdc/0x128 [ 17.159757] __asan_report_store1_noabort+0x20/0x30 [ 17.160057] krealloc_less_oob_helper+0xa48/0xc50 [ 17.160229] krealloc_less_oob+0x20/0x38 [ 17.160387] kunit_try_run_case+0x170/0x3f0 [ 17.160686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.160950] kthread+0x328/0x630 [ 17.161069] ret_from_fork+0x10/0x20 [ 17.161438] [ 17.161694] Allocated by task 158: [ 17.161979] kasan_save_stack+0x3c/0x68 [ 17.162397] kasan_save_track+0x20/0x40 [ 17.162626] kasan_save_alloc_info+0x40/0x58 [ 17.162926] __kasan_krealloc+0x118/0x178 [ 17.163299] krealloc_noprof+0x128/0x360 [ 17.163398] krealloc_less_oob_helper+0x168/0xc50 [ 17.163949] krealloc_less_oob+0x20/0x38 [ 17.164114] kunit_try_run_case+0x170/0x3f0 [ 17.164429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.164595] kthread+0x328/0x630 [ 17.164702] ret_from_fork+0x10/0x20 [ 17.164826] [ 17.164901] The buggy address belongs to the object at fff00000c6323000 [ 17.164901] which belongs to the cache kmalloc-256 of size 256 [ 17.165042] The buggy address is located 0 bytes to the right of [ 17.165042] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.165196] [ 17.165261] The buggy address belongs to the physical page: [ 17.165377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.165532] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.165639] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.165812] page_type: f5(slab) [ 17.165933] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.166082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.166219] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.166359] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.166448] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.166719] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.166812] page dumped because: kasan: bad access detected [ 17.167125] [ 17.167171] Memory state around the buggy address: [ 17.167279] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.167513] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.167618] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.167738] ^ [ 17.167906] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.168017] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.168128] ================================================================== [ 17.293239] ================================================================== [ 17.293376] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.293486] Write of size 1 at addr fff00000c65b60eb by task kunit_try_catch/162 [ 17.293598] [ 17.293667] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.293859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.294610] Hardware name: linux,dummy-virt (DT) [ 17.295346] Call trace: [ 17.295710] show_stack+0x20/0x38 (C) [ 17.296199] dump_stack_lvl+0x8c/0xd0 [ 17.296526] print_report+0x118/0x608 [ 17.297082] kasan_report+0xdc/0x128 [ 17.297339] __asan_report_store1_noabort+0x20/0x30 [ 17.297485] krealloc_less_oob_helper+0xa58/0xc50 [ 17.297604] krealloc_large_less_oob+0x20/0x38 [ 17.297745] kunit_try_run_case+0x170/0x3f0 [ 17.297899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.298040] kthread+0x328/0x630 [ 17.298567] ret_from_fork+0x10/0x20 [ 17.298761] [ 17.298809] The buggy address belongs to the physical page: [ 17.298936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.299209] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.299496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.299623] page_type: f8(unknown) [ 17.299780] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.300248] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.300737] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.301156] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.301333] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.301790] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.301955] page dumped because: kasan: bad access detected [ 17.302031] [ 17.302069] Memory state around the buggy address: [ 17.302137] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.302235] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.302516] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.303131] ^ [ 17.303273] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.303383] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.303835] ================================================================== [ 17.262076] ================================================================== [ 17.262171] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.262274] Write of size 1 at addr fff00000c65b60d0 by task kunit_try_catch/162 [ 17.262380] [ 17.262445] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.262634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.262724] Hardware name: linux,dummy-virt (DT) [ 17.262824] Call trace: [ 17.262894] show_stack+0x20/0x38 (C) [ 17.262963] dump_stack_lvl+0x8c/0xd0 [ 17.263159] print_report+0x118/0x608 [ 17.263291] kasan_report+0xdc/0x128 [ 17.263492] __asan_report_store1_noabort+0x20/0x30 [ 17.264102] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.264257] krealloc_large_less_oob+0x20/0x38 [ 17.264371] kunit_try_run_case+0x170/0x3f0 [ 17.264487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.264759] kthread+0x328/0x630 [ 17.264969] ret_from_fork+0x10/0x20 [ 17.265207] [ 17.265348] The buggy address belongs to the physical page: [ 17.265427] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.265566] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.265675] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.265807] page_type: f8(unknown) [ 17.265900] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.266408] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.266807] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.266953] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.267148] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.267378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.267564] page dumped because: kasan: bad access detected [ 17.267709] [ 17.267754] Memory state around the buggy address: [ 17.267822] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.268382] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.268530] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.268729] ^ [ 17.268823] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.268928] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.269016] ================================================================== [ 17.282645] ================================================================== [ 17.282992] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.283458] Write of size 1 at addr fff00000c65b60ea by task kunit_try_catch/162 [ 17.283589] [ 17.283834] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.284105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.284288] Hardware name: linux,dummy-virt (DT) [ 17.284373] Call trace: [ 17.284663] show_stack+0x20/0x38 (C) [ 17.285197] dump_stack_lvl+0x8c/0xd0 [ 17.285522] print_report+0x118/0x608 [ 17.285635] kasan_report+0xdc/0x128 [ 17.286114] __asan_report_store1_noabort+0x20/0x30 [ 17.286496] krealloc_less_oob_helper+0xae4/0xc50 [ 17.286687] krealloc_large_less_oob+0x20/0x38 [ 17.286818] kunit_try_run_case+0x170/0x3f0 [ 17.286917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.287482] kthread+0x328/0x630 [ 17.287656] ret_from_fork+0x10/0x20 [ 17.287833] [ 17.287883] The buggy address belongs to the physical page: [ 17.287959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.288078] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.288185] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.288573] page_type: f8(unknown) [ 17.288743] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.289254] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.289555] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.289663] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.289774] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.289880] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.289979] page dumped because: kasan: bad access detected [ 17.290047] [ 17.290086] Memory state around the buggy address: [ 17.290154] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.290249] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.290357] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.290444] ^ [ 17.290530] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.290628] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.290730] ================================================================== [ 17.270038] ================================================================== [ 17.270198] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.270555] Write of size 1 at addr fff00000c65b60da by task kunit_try_catch/162 [ 17.270858] [ 17.270933] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.271134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.271199] Hardware name: linux,dummy-virt (DT) [ 17.271275] Call trace: [ 17.271607] show_stack+0x20/0x38 (C) [ 17.271906] dump_stack_lvl+0x8c/0xd0 [ 17.272030] print_report+0x118/0x608 [ 17.272927] kasan_report+0xdc/0x128 [ 17.273542] __asan_report_store1_noabort+0x20/0x30 [ 17.273998] krealloc_less_oob_helper+0xa80/0xc50 [ 17.274119] krealloc_large_less_oob+0x20/0x38 [ 17.275083] kunit_try_run_case+0x170/0x3f0 [ 17.275525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.275657] kthread+0x328/0x630 [ 17.276013] ret_from_fork+0x10/0x20 [ 17.276192] [ 17.276241] The buggy address belongs to the physical page: [ 17.276369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.276692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.277103] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.277278] page_type: f8(unknown) [ 17.277552] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.277666] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.277954] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.278374] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.278855] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.279157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.279313] page dumped because: kasan: bad access detected [ 17.279406] [ 17.279503] Memory state around the buggy address: [ 17.279584] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.279731] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.279846] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.279919] ^ [ 17.280181] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.280314] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.280744] ================================================================== [ 17.192726] ================================================================== [ 17.192843] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.192954] Write of size 1 at addr fff00000c63230ea by task kunit_try_catch/158 [ 17.193070] [ 17.193146] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.193347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.193415] Hardware name: linux,dummy-virt (DT) [ 17.193487] Call trace: [ 17.193536] show_stack+0x20/0x38 (C) [ 17.193651] dump_stack_lvl+0x8c/0xd0 [ 17.193762] print_report+0x118/0x608 [ 17.193870] kasan_report+0xdc/0x128 [ 17.193976] __asan_report_store1_noabort+0x20/0x30 [ 17.194096] krealloc_less_oob_helper+0xae4/0xc50 [ 17.195843] krealloc_less_oob+0x20/0x38 [ 17.196912] kunit_try_run_case+0x170/0x3f0 [ 17.197446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.198126] kthread+0x328/0x630 [ 17.198650] ret_from_fork+0x10/0x20 [ 17.199310] [ 17.199365] Allocated by task 158: [ 17.199427] kasan_save_stack+0x3c/0x68 [ 17.199512] kasan_save_track+0x20/0x40 [ 17.199578] kasan_save_alloc_info+0x40/0x58 [ 17.199642] __kasan_krealloc+0x118/0x178 [ 17.199730] krealloc_noprof+0x128/0x360 [ 17.199806] krealloc_less_oob_helper+0x168/0xc50 [ 17.199990] krealloc_less_oob+0x20/0x38 [ 17.200236] kunit_try_run_case+0x170/0x3f0 [ 17.200809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.200922] kthread+0x328/0x630 [ 17.201181] ret_from_fork+0x10/0x20 [ 17.201727] [ 17.201789] The buggy address belongs to the object at fff00000c6323000 [ 17.201789] which belongs to the cache kmalloc-256 of size 256 [ 17.201928] The buggy address is located 33 bytes to the right of [ 17.201928] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.202065] [ 17.202109] The buggy address belongs to the physical page: [ 17.202182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.202297] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.202406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.203789] page_type: f5(slab) [ 17.203949] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.204104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.204270] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.204395] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.204523] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.204638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.204723] page dumped because: kasan: bad access detected [ 17.204791] [ 17.204831] Memory state around the buggy address: [ 17.204901] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.204998] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.205132] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.205218] ^ [ 17.205325] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.205406] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.205485] ================================================================== [ 17.169669] ================================================================== [ 17.169784] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.169889] Write of size 1 at addr fff00000c63230d0 by task kunit_try_catch/158 [ 17.170000] [ 17.170072] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.170262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.170373] Hardware name: linux,dummy-virt (DT) [ 17.170443] Call trace: [ 17.170486] show_stack+0x20/0x38 (C) [ 17.170877] dump_stack_lvl+0x8c/0xd0 [ 17.171011] print_report+0x118/0x608 [ 17.171315] kasan_report+0xdc/0x128 [ 17.171752] __asan_report_store1_noabort+0x20/0x30 [ 17.171919] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.172083] krealloc_less_oob+0x20/0x38 [ 17.172195] kunit_try_run_case+0x170/0x3f0 [ 17.172361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.172518] kthread+0x328/0x630 [ 17.172630] ret_from_fork+0x10/0x20 [ 17.172841] [ 17.172882] Allocated by task 158: [ 17.172943] kasan_save_stack+0x3c/0x68 [ 17.173489] kasan_save_track+0x20/0x40 [ 17.173920] kasan_save_alloc_info+0x40/0x58 [ 17.174343] __kasan_krealloc+0x118/0x178 [ 17.174521] krealloc_noprof+0x128/0x360 [ 17.174608] krealloc_less_oob_helper+0x168/0xc50 [ 17.174696] krealloc_less_oob+0x20/0x38 [ 17.174782] kunit_try_run_case+0x170/0x3f0 [ 17.174861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.174956] kthread+0x328/0x630 [ 17.175661] ret_from_fork+0x10/0x20 [ 17.175746] [ 17.175783] The buggy address belongs to the object at fff00000c6323000 [ 17.175783] which belongs to the cache kmalloc-256 of size 256 [ 17.175890] The buggy address is located 7 bytes to the right of [ 17.175890] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.176030] [ 17.176097] The buggy address belongs to the physical page: [ 17.176162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.176273] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.176389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.176527] page_type: f5(slab) [ 17.176630] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.176750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.176878] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.177070] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.177246] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.177394] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.177532] page dumped because: kasan: bad access detected [ 17.177641] [ 17.177725] Memory state around the buggy address: [ 17.177798] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.178246] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.178355] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.178604] ^ [ 17.178689] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.178900] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.179040] ==================================================================
[ 10.851538] ================================================================== [ 10.851936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 10.852449] Write of size 1 at addr ffff88810294e0da by task kunit_try_catch/180 [ 10.852761] [ 10.852856] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.852899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.852911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.852930] Call Trace: [ 10.852945] <TASK> [ 10.852958] dump_stack_lvl+0x73/0xb0 [ 10.852983] print_report+0xd1/0x650 [ 10.853005] ? __virt_addr_valid+0x1db/0x2d0 [ 10.853027] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.853050] ? kasan_addr_to_slab+0x11/0xa0 [ 10.853070] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.853093] kasan_report+0x141/0x180 [ 10.853115] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.853144] __asan_report_store1_noabort+0x1b/0x30 [ 10.853181] krealloc_less_oob_helper+0xec6/0x11d0 [ 10.853206] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.853230] ? finish_task_switch.isra.0+0x153/0x700 [ 10.853251] ? __switch_to+0x47/0xf50 [ 10.853275] ? __schedule+0x10cc/0x2b60 [ 10.853298] ? __pfx_read_tsc+0x10/0x10 [ 10.853321] krealloc_large_less_oob+0x1c/0x30 [ 10.853343] kunit_try_run_case+0x1a5/0x480 [ 10.853364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.853393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.853416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.853440] ? __kthread_parkme+0x82/0x180 [ 10.853459] ? preempt_count_sub+0x50/0x80 [ 10.853482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.853504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.853530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.853555] kthread+0x337/0x6f0 [ 10.853575] ? trace_preempt_on+0x20/0xc0 [ 10.853598] ? __pfx_kthread+0x10/0x10 [ 10.853618] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.853640] ? calculate_sigpending+0x7b/0xa0 [ 10.853663] ? __pfx_kthread+0x10/0x10 [ 10.853684] ret_from_fork+0x116/0x1d0 [ 10.853702] ? __pfx_kthread+0x10/0x10 [ 10.853772] ret_from_fork_asm+0x1a/0x30 [ 10.853805] </TASK> [ 10.853815] [ 10.861881] The buggy address belongs to the physical page: [ 10.862071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294c [ 10.862641] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.863418] flags: 0x200000000000040(head|node=0|zone=2) [ 10.863605] page_type: f8(unknown) [ 10.863739] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.864227] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.864589] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.864944] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.865178] head: 0200000000000002 ffffea00040a5301 00000000ffffffff 00000000ffffffff [ 10.865532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.865871] page dumped because: kasan: bad access detected [ 10.866047] [ 10.866117] Memory state around the buggy address: [ 10.866272] ffff88810294df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.866774] ffff88810294e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.867090] >ffff88810294e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.867413] ^ [ 10.867700] ffff88810294e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.868060] ffff88810294e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.868335] ================================================================== [ 10.735701] ================================================================== [ 10.736041] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 10.736414] Write of size 1 at addr ffff888100a372ea by task kunit_try_catch/176 [ 10.737312] [ 10.737417] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.737461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.737472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.737493] Call Trace: [ 10.737505] <TASK> [ 10.737519] dump_stack_lvl+0x73/0xb0 [ 10.737546] print_report+0xd1/0x650 [ 10.737569] ? __virt_addr_valid+0x1db/0x2d0 [ 10.737590] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.737614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.737636] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.737660] kasan_report+0x141/0x180 [ 10.737682] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.737710] __asan_report_store1_noabort+0x1b/0x30 [ 10.737733] krealloc_less_oob_helper+0xe90/0x11d0 [ 10.737758] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.737782] ? finish_task_switch.isra.0+0x153/0x700 [ 10.737803] ? __switch_to+0x47/0xf50 [ 10.737827] ? __schedule+0x10cc/0x2b60 [ 10.737849] ? __pfx_read_tsc+0x10/0x10 [ 10.737873] krealloc_less_oob+0x1c/0x30 [ 10.737893] kunit_try_run_case+0x1a5/0x480 [ 10.737914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.737932] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.737956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.737979] ? __kthread_parkme+0x82/0x180 [ 10.737999] ? preempt_count_sub+0x50/0x80 [ 10.738021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.738048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.738071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.738096] kthread+0x337/0x6f0 [ 10.738114] ? trace_preempt_on+0x20/0xc0 [ 10.738137] ? __pfx_kthread+0x10/0x10 [ 10.738157] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.738179] ? calculate_sigpending+0x7b/0xa0 [ 10.738202] ? __pfx_kthread+0x10/0x10 [ 10.738223] ret_from_fork+0x116/0x1d0 [ 10.738241] ? __pfx_kthread+0x10/0x10 [ 10.738261] ret_from_fork_asm+0x1a/0x30 [ 10.738292] </TASK> [ 10.738303] [ 10.746494] Allocated by task 176: [ 10.746627] kasan_save_stack+0x45/0x70 [ 10.746946] kasan_save_track+0x18/0x40 [ 10.747152] kasan_save_alloc_info+0x3b/0x50 [ 10.747532] __kasan_krealloc+0x190/0x1f0 [ 10.747764] krealloc_noprof+0xf3/0x340 [ 10.747956] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.748272] krealloc_less_oob+0x1c/0x30 [ 10.748452] kunit_try_run_case+0x1a5/0x480 [ 10.748665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.748902] kthread+0x337/0x6f0 [ 10.749101] ret_from_fork+0x116/0x1d0 [ 10.749386] ret_from_fork_asm+0x1a/0x30 [ 10.749593] [ 10.749670] The buggy address belongs to the object at ffff888100a37200 [ 10.749670] which belongs to the cache kmalloc-256 of size 256 [ 10.750435] The buggy address is located 33 bytes to the right of [ 10.750435] allocated 201-byte region [ffff888100a37200, ffff888100a372c9) [ 10.750972] [ 10.751072] The buggy address belongs to the physical page: [ 10.751367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a36 [ 10.751736] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.752033] flags: 0x200000000000040(head|node=0|zone=2) [ 10.752243] page_type: f5(slab) [ 10.752362] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.752708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.753047] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.753358] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.753603] head: 0200000000000001 ffffea0004028d81 00000000ffffffff 00000000ffffffff [ 10.754129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.754396] page dumped because: kasan: bad access detected [ 10.754568] [ 10.754637] Memory state around the buggy address: [ 10.754836] ffff888100a37180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.755157] ffff888100a37200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.755521] >ffff888100a37280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.755830] ^ [ 10.756151] ffff888100a37300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.756370] ffff888100a37380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.756708] ================================================================== [ 10.690393] ================================================================== [ 10.690669] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 10.691443] Write of size 1 at addr ffff888100a372d0 by task kunit_try_catch/176 [ 10.691776] [ 10.691891] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.691935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.691947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.691967] Call Trace: [ 10.691982] <TASK> [ 10.691997] dump_stack_lvl+0x73/0xb0 [ 10.692025] print_report+0xd1/0x650 [ 10.692047] ? __virt_addr_valid+0x1db/0x2d0 [ 10.692069] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.692092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.692114] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.692138] kasan_report+0x141/0x180 [ 10.692159] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.692187] __asan_report_store1_noabort+0x1b/0x30 [ 10.692208] krealloc_less_oob_helper+0xe23/0x11d0 [ 10.692233] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.692345] ? finish_task_switch.isra.0+0x153/0x700 [ 10.692367] ? __switch_to+0x47/0xf50 [ 10.692405] ? __schedule+0x10cc/0x2b60 [ 10.692428] ? __pfx_read_tsc+0x10/0x10 [ 10.692452] krealloc_less_oob+0x1c/0x30 [ 10.692473] kunit_try_run_case+0x1a5/0x480 [ 10.692494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.692513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.692536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.692560] ? __kthread_parkme+0x82/0x180 [ 10.692579] ? preempt_count_sub+0x50/0x80 [ 10.692602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.692624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.692648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.692672] kthread+0x337/0x6f0 [ 10.692690] ? trace_preempt_on+0x20/0xc0 [ 10.692713] ? __pfx_kthread+0x10/0x10 [ 10.692745] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.692767] ? calculate_sigpending+0x7b/0xa0 [ 10.692790] ? __pfx_kthread+0x10/0x10 [ 10.692810] ret_from_fork+0x116/0x1d0 [ 10.692828] ? __pfx_kthread+0x10/0x10 [ 10.692848] ret_from_fork_asm+0x1a/0x30 [ 10.692878] </TASK> [ 10.692887] [ 10.703591] Allocated by task 176: [ 10.704048] kasan_save_stack+0x45/0x70 [ 10.704331] kasan_save_track+0x18/0x40 [ 10.704492] kasan_save_alloc_info+0x3b/0x50 [ 10.704872] __kasan_krealloc+0x190/0x1f0 [ 10.705107] krealloc_noprof+0xf3/0x340 [ 10.705292] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.705532] krealloc_less_oob+0x1c/0x30 [ 10.705712] kunit_try_run_case+0x1a5/0x480 [ 10.706174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.706544] kthread+0x337/0x6f0 [ 10.706731] ret_from_fork+0x116/0x1d0 [ 10.707255] ret_from_fork_asm+0x1a/0x30 [ 10.707453] [ 10.707646] The buggy address belongs to the object at ffff888100a37200 [ 10.707646] which belongs to the cache kmalloc-256 of size 256 [ 10.708154] The buggy address is located 7 bytes to the right of [ 10.708154] allocated 201-byte region [ffff888100a37200, ffff888100a372c9) [ 10.708675] [ 10.708850] The buggy address belongs to the physical page: [ 10.709035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a36 [ 10.709356] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.709660] flags: 0x200000000000040(head|node=0|zone=2) [ 10.710102] page_type: f5(slab) [ 10.710277] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.710583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.710839] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.711180] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.711550] head: 0200000000000001 ffffea0004028d81 00000000ffffffff 00000000ffffffff [ 10.711973] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.712340] page dumped because: kasan: bad access detected [ 10.712529] [ 10.712623] Memory state around the buggy address: [ 10.712854] ffff888100a37180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.713335] ffff888100a37200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.713658] >ffff888100a37280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.713940] ^ [ 10.714196] ffff888100a37300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.714587] ffff888100a37380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.714868] ================================================================== [ 10.657139] ================================================================== [ 10.658131] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 10.658407] Write of size 1 at addr ffff888100a372c9 by task kunit_try_catch/176 [ 10.658634] [ 10.658722] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.658765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.658777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.658797] Call Trace: [ 10.658810] <TASK> [ 10.658826] dump_stack_lvl+0x73/0xb0 [ 10.658852] print_report+0xd1/0x650 [ 10.658876] ? __virt_addr_valid+0x1db/0x2d0 [ 10.658897] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.658921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.658943] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.658966] kasan_report+0x141/0x180 [ 10.658988] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.659016] __asan_report_store1_noabort+0x1b/0x30 [ 10.659037] krealloc_less_oob_helper+0xd70/0x11d0 [ 10.659062] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.659086] ? finish_task_switch.isra.0+0x153/0x700 [ 10.659107] ? __switch_to+0x47/0xf50 [ 10.659131] ? __schedule+0x10cc/0x2b60 [ 10.659154] ? __pfx_read_tsc+0x10/0x10 [ 10.659178] krealloc_less_oob+0x1c/0x30 [ 10.659199] kunit_try_run_case+0x1a5/0x480 [ 10.659220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.659239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.659262] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.659286] ? __kthread_parkme+0x82/0x180 [ 10.659305] ? preempt_count_sub+0x50/0x80 [ 10.659327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.659347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.659370] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.659403] kthread+0x337/0x6f0 [ 10.659422] ? trace_preempt_on+0x20/0xc0 [ 10.659446] ? __pfx_kthread+0x10/0x10 [ 10.659466] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.659880] ? calculate_sigpending+0x7b/0xa0 [ 10.659908] ? __pfx_kthread+0x10/0x10 [ 10.659930] ret_from_fork+0x116/0x1d0 [ 10.660138] ? __pfx_kthread+0x10/0x10 [ 10.660162] ret_from_fork_asm+0x1a/0x30 [ 10.660193] </TASK> [ 10.660204] [ 10.673655] Allocated by task 176: [ 10.673926] kasan_save_stack+0x45/0x70 [ 10.674437] kasan_save_track+0x18/0x40 [ 10.674817] kasan_save_alloc_info+0x3b/0x50 [ 10.674963] __kasan_krealloc+0x190/0x1f0 [ 10.675483] krealloc_noprof+0xf3/0x340 [ 10.675887] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.676232] krealloc_less_oob+0x1c/0x30 [ 10.676394] kunit_try_run_case+0x1a5/0x480 [ 10.676845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.677413] kthread+0x337/0x6f0 [ 10.677683] ret_from_fork+0x116/0x1d0 [ 10.678123] ret_from_fork_asm+0x1a/0x30 [ 10.678405] [ 10.678477] The buggy address belongs to the object at ffff888100a37200 [ 10.678477] which belongs to the cache kmalloc-256 of size 256 [ 10.678972] The buggy address is located 0 bytes to the right of [ 10.678972] allocated 201-byte region [ffff888100a37200, ffff888100a372c9) [ 10.680248] [ 10.680445] The buggy address belongs to the physical page: [ 10.680872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a36 [ 10.681118] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.681339] flags: 0x200000000000040(head|node=0|zone=2) [ 10.681970] page_type: f5(slab) [ 10.682426] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.683135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.684042] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.684586] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.684848] head: 0200000000000001 ffffea0004028d81 00000000ffffffff 00000000ffffffff [ 10.685739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.686552] page dumped because: kasan: bad access detected [ 10.686934] [ 10.687012] Memory state around the buggy address: [ 10.687336] ffff888100a37180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.688006] ffff888100a37200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.688410] >ffff888100a37280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.688629] ^ [ 10.688829] ffff888100a37300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.689129] ffff888100a37380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.689527] ================================================================== [ 10.868614] ================================================================== [ 10.869087] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 10.869460] Write of size 1 at addr ffff88810294e0ea by task kunit_try_catch/180 [ 10.869781] [ 10.869890] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.869933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.869944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.869964] Call Trace: [ 10.869978] <TASK> [ 10.869992] dump_stack_lvl+0x73/0xb0 [ 10.870016] print_report+0xd1/0x650 [ 10.870041] ? __virt_addr_valid+0x1db/0x2d0 [ 10.870062] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.870085] ? kasan_addr_to_slab+0x11/0xa0 [ 10.870106] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.870129] kasan_report+0x141/0x180 [ 10.870151] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 10.870179] __asan_report_store1_noabort+0x1b/0x30 [ 10.870200] krealloc_less_oob_helper+0xe90/0x11d0 [ 10.870226] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.870250] ? finish_task_switch.isra.0+0x153/0x700 [ 10.870271] ? __switch_to+0x47/0xf50 [ 10.870295] ? __schedule+0x10cc/0x2b60 [ 10.870318] ? __pfx_read_tsc+0x10/0x10 [ 10.870341] krealloc_large_less_oob+0x1c/0x30 [ 10.870363] kunit_try_run_case+0x1a5/0x480 [ 10.870393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.870412] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.870435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.870459] ? __kthread_parkme+0x82/0x180 [ 10.870478] ? preempt_count_sub+0x50/0x80 [ 10.870500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.870520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.870544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.870567] kthread+0x337/0x6f0 [ 10.870586] ? trace_preempt_on+0x20/0xc0 [ 10.870608] ? __pfx_kthread+0x10/0x10 [ 10.870628] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.870650] ? calculate_sigpending+0x7b/0xa0 [ 10.870673] ? __pfx_kthread+0x10/0x10 [ 10.870694] ret_from_fork+0x116/0x1d0 [ 10.870711] ? __pfx_kthread+0x10/0x10 [ 10.870731] ret_from_fork_asm+0x1a/0x30 [ 10.870761] </TASK> [ 10.870770] [ 10.881820] The buggy address belongs to the physical page: [ 10.882373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294c [ 10.883138] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.883814] flags: 0x200000000000040(head|node=0|zone=2) [ 10.884351] page_type: f8(unknown) [ 10.884557] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.884796] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.885026] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.885261] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.886225] head: 0200000000000002 ffffea00040a5301 00000000ffffffff 00000000ffffffff [ 10.886929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.887671] page dumped because: kasan: bad access detected [ 10.888264] [ 10.888445] Memory state around the buggy address: [ 10.888902] ffff88810294df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.889625] ffff88810294e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.890500] >ffff88810294e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.891288] ^ [ 10.892010] ffff88810294e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.892412] ffff88810294e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.892629] ================================================================== [ 10.757249] ================================================================== [ 10.757575] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 10.757901] Write of size 1 at addr ffff888100a372eb by task kunit_try_catch/176 [ 10.758411] [ 10.758499] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.758541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.758552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.758571] Call Trace: [ 10.758586] <TASK> [ 10.758601] dump_stack_lvl+0x73/0xb0 [ 10.758628] print_report+0xd1/0x650 [ 10.758650] ? __virt_addr_valid+0x1db/0x2d0 [ 10.758671] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.758694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.758716] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.758740] kasan_report+0x141/0x180 [ 10.758761] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.758790] __asan_report_store1_noabort+0x1b/0x30 [ 10.758810] krealloc_less_oob_helper+0xd47/0x11d0 [ 10.758835] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.758859] ? finish_task_switch.isra.0+0x153/0x700 [ 10.758880] ? __switch_to+0x47/0xf50 [ 10.758904] ? __schedule+0x10cc/0x2b60 [ 10.758928] ? __pfx_read_tsc+0x10/0x10 [ 10.758951] krealloc_less_oob+0x1c/0x30 [ 10.758972] kunit_try_run_case+0x1a5/0x480 [ 10.758992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.759010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.759034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.759057] ? __kthread_parkme+0x82/0x180 [ 10.759076] ? preempt_count_sub+0x50/0x80 [ 10.759099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.759119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.759142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.759165] kthread+0x337/0x6f0 [ 10.759184] ? trace_preempt_on+0x20/0xc0 [ 10.759207] ? __pfx_kthread+0x10/0x10 [ 10.759227] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.759249] ? calculate_sigpending+0x7b/0xa0 [ 10.759274] ? __pfx_kthread+0x10/0x10 [ 10.759296] ret_from_fork+0x116/0x1d0 [ 10.759313] ? __pfx_kthread+0x10/0x10 [ 10.759333] ret_from_fork_asm+0x1a/0x30 [ 10.759362] </TASK> [ 10.759371] [ 10.767659] Allocated by task 176: [ 10.767997] kasan_save_stack+0x45/0x70 [ 10.768206] kasan_save_track+0x18/0x40 [ 10.768418] kasan_save_alloc_info+0x3b/0x50 [ 10.768626] __kasan_krealloc+0x190/0x1f0 [ 10.768933] krealloc_noprof+0xf3/0x340 [ 10.769102] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.769321] krealloc_less_oob+0x1c/0x30 [ 10.769499] kunit_try_run_case+0x1a5/0x480 [ 10.769683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.769944] kthread+0x337/0x6f0 [ 10.770133] ret_from_fork+0x116/0x1d0 [ 10.770365] ret_from_fork_asm+0x1a/0x30 [ 10.770513] [ 10.770582] The buggy address belongs to the object at ffff888100a37200 [ 10.770582] which belongs to the cache kmalloc-256 of size 256 [ 10.770932] The buggy address is located 34 bytes to the right of [ 10.770932] allocated 201-byte region [ffff888100a37200, ffff888100a372c9) [ 10.771533] [ 10.771630] The buggy address belongs to the physical page: [ 10.771876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a36 [ 10.772191] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.772426] flags: 0x200000000000040(head|node=0|zone=2) [ 10.772601] page_type: f5(slab) [ 10.772719] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.773517] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.774091] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.774438] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.774672] head: 0200000000000001 ffffea0004028d81 00000000ffffffff 00000000ffffffff [ 10.774915] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.775428] page dumped because: kasan: bad access detected [ 10.775677] [ 10.775769] Memory state around the buggy address: [ 10.776089] ffff888100a37180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.776385] ffff888100a37200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.776623] >ffff888100a37280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.777179] ^ [ 10.777445] ffff888100a37300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.777737] ffff888100a37380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.777975] ================================================================== [ 10.817204] ================================================================== [ 10.817711] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 10.818335] Write of size 1 at addr ffff88810294e0c9 by task kunit_try_catch/180 [ 10.818674] [ 10.818775] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.818819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.818831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.818853] Call Trace: [ 10.818864] <TASK> [ 10.818878] dump_stack_lvl+0x73/0xb0 [ 10.818906] print_report+0xd1/0x650 [ 10.818929] ? __virt_addr_valid+0x1db/0x2d0 [ 10.818952] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.818975] ? kasan_addr_to_slab+0x11/0xa0 [ 10.818995] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.819018] kasan_report+0x141/0x180 [ 10.819040] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 10.819068] __asan_report_store1_noabort+0x1b/0x30 [ 10.819088] krealloc_less_oob_helper+0xd70/0x11d0 [ 10.819113] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.819137] ? finish_task_switch.isra.0+0x153/0x700 [ 10.819158] ? __switch_to+0x47/0xf50 [ 10.819184] ? __schedule+0x10cc/0x2b60 [ 10.819207] ? __pfx_read_tsc+0x10/0x10 [ 10.819319] krealloc_large_less_oob+0x1c/0x30 [ 10.819344] kunit_try_run_case+0x1a5/0x480 [ 10.819366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.819397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.819421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.819445] ? __kthread_parkme+0x82/0x180 [ 10.819464] ? preempt_count_sub+0x50/0x80 [ 10.819487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.819507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.819530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.819555] kthread+0x337/0x6f0 [ 10.819574] ? trace_preempt_on+0x20/0xc0 [ 10.819598] ? __pfx_kthread+0x10/0x10 [ 10.819618] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.819640] ? calculate_sigpending+0x7b/0xa0 [ 10.819664] ? __pfx_kthread+0x10/0x10 [ 10.819684] ret_from_fork+0x116/0x1d0 [ 10.819702] ? __pfx_kthread+0x10/0x10 [ 10.819731] ret_from_fork_asm+0x1a/0x30 [ 10.819761] </TASK> [ 10.819771] [ 10.827613] The buggy address belongs to the physical page: [ 10.827802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294c [ 10.828187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.828533] flags: 0x200000000000040(head|node=0|zone=2) [ 10.828833] page_type: f8(unknown) [ 10.829045] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.829306] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.829644] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.830045] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.830625] head: 0200000000000002 ffffea00040a5301 00000000ffffffff 00000000ffffffff [ 10.831003] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.831408] page dumped because: kasan: bad access detected [ 10.831643] [ 10.831740] Memory state around the buggy address: [ 10.832042] ffff88810294df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.832325] ffff88810294e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.832664] >ffff88810294e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.832983] ^ [ 10.833248] ffff88810294e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.833563] ffff88810294e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.833903] ================================================================== [ 10.834567] ================================================================== [ 10.834931] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 10.835485] Write of size 1 at addr ffff88810294e0d0 by task kunit_try_catch/180 [ 10.835788] [ 10.835899] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.835941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.835953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.835973] Call Trace: [ 10.835985] <TASK> [ 10.836000] dump_stack_lvl+0x73/0xb0 [ 10.836030] print_report+0xd1/0x650 [ 10.836054] ? __virt_addr_valid+0x1db/0x2d0 [ 10.836077] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.836100] ? kasan_addr_to_slab+0x11/0xa0 [ 10.836121] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.836144] kasan_report+0x141/0x180 [ 10.836166] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 10.836194] __asan_report_store1_noabort+0x1b/0x30 [ 10.836215] krealloc_less_oob_helper+0xe23/0x11d0 [ 10.836241] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.836264] ? finish_task_switch.isra.0+0x153/0x700 [ 10.836286] ? __switch_to+0x47/0xf50 [ 10.836311] ? __schedule+0x10cc/0x2b60 [ 10.836335] ? __pfx_read_tsc+0x10/0x10 [ 10.836360] krealloc_large_less_oob+0x1c/0x30 [ 10.836393] kunit_try_run_case+0x1a5/0x480 [ 10.836415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.836434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.836458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.836482] ? __kthread_parkme+0x82/0x180 [ 10.836501] ? preempt_count_sub+0x50/0x80 [ 10.836523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.836543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.836566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.836590] kthread+0x337/0x6f0 [ 10.836609] ? trace_preempt_on+0x20/0xc0 [ 10.836633] ? __pfx_kthread+0x10/0x10 [ 10.836653] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.836675] ? calculate_sigpending+0x7b/0xa0 [ 10.836699] ? __pfx_kthread+0x10/0x10 [ 10.836720] ret_from_fork+0x116/0x1d0 [ 10.836738] ? __pfx_kthread+0x10/0x10 [ 10.836758] ret_from_fork_asm+0x1a/0x30 [ 10.836788] </TASK> [ 10.836797] [ 10.844442] The buggy address belongs to the physical page: [ 10.844624] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294c [ 10.845326] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.845646] flags: 0x200000000000040(head|node=0|zone=2) [ 10.845947] page_type: f8(unknown) [ 10.846083] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.846348] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.846710] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.847197] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.847504] head: 0200000000000002 ffffea00040a5301 00000000ffffffff 00000000ffffffff [ 10.847845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.848071] page dumped because: kasan: bad access detected [ 10.848240] [ 10.848310] Memory state around the buggy address: [ 10.848544] ffff88810294df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.849215] ffff88810294e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.849541] >ffff88810294e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.849755] ^ [ 10.849933] ffff88810294e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.850439] ffff88810294e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.850873] ================================================================== [ 10.893190] ================================================================== [ 10.893883] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 10.894633] Write of size 1 at addr ffff88810294e0eb by task kunit_try_catch/180 [ 10.895404] [ 10.895580] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.895626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.895638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.895658] Call Trace: [ 10.895670] <TASK> [ 10.895685] dump_stack_lvl+0x73/0xb0 [ 10.895711] print_report+0xd1/0x650 [ 10.895734] ? __virt_addr_valid+0x1db/0x2d0 [ 10.895755] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.895778] ? kasan_addr_to_slab+0x11/0xa0 [ 10.895798] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.895822] kasan_report+0x141/0x180 [ 10.895852] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 10.895881] __asan_report_store1_noabort+0x1b/0x30 [ 10.895901] krealloc_less_oob_helper+0xd47/0x11d0 [ 10.895926] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.895950] ? finish_task_switch.isra.0+0x153/0x700 [ 10.895971] ? __switch_to+0x47/0xf50 [ 10.895995] ? __schedule+0x10cc/0x2b60 [ 10.896065] ? __pfx_read_tsc+0x10/0x10 [ 10.896089] krealloc_large_less_oob+0x1c/0x30 [ 10.896112] kunit_try_run_case+0x1a5/0x480 [ 10.896132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.896151] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.896174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.896198] ? __kthread_parkme+0x82/0x180 [ 10.896217] ? preempt_count_sub+0x50/0x80 [ 10.896239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.896259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.896283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.896306] kthread+0x337/0x6f0 [ 10.896325] ? trace_preempt_on+0x20/0xc0 [ 10.896347] ? __pfx_kthread+0x10/0x10 [ 10.896367] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.896401] ? calculate_sigpending+0x7b/0xa0 [ 10.896424] ? __pfx_kthread+0x10/0x10 [ 10.896445] ret_from_fork+0x116/0x1d0 [ 10.896462] ? __pfx_kthread+0x10/0x10 [ 10.896483] ret_from_fork_asm+0x1a/0x30 [ 10.896513] </TASK> [ 10.896523] [ 10.904971] The buggy address belongs to the physical page: [ 10.905244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294c [ 10.905595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.906052] flags: 0x200000000000040(head|node=0|zone=2) [ 10.906305] page_type: f8(unknown) [ 10.906478] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.906808] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.907086] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 10.907469] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 10.907709] head: 0200000000000002 ffffea00040a5301 00000000ffffffff 00000000ffffffff [ 10.908005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 10.908344] page dumped because: kasan: bad access detected [ 10.908612] [ 10.908704] Memory state around the buggy address: [ 10.908886] ffff88810294df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.909154] ffff88810294e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.909370] >ffff88810294e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 10.910052] ^ [ 10.910390] ffff88810294e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.910685] ffff88810294e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 10.910998] ================================================================== [ 10.715658] ================================================================== [ 10.715991] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 10.716339] Write of size 1 at addr ffff888100a372da by task kunit_try_catch/176 [ 10.716612] [ 10.716725] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.716769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.716780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.716801] Call Trace: [ 10.716812] <TASK> [ 10.716826] dump_stack_lvl+0x73/0xb0 [ 10.716850] print_report+0xd1/0x650 [ 10.716873] ? __virt_addr_valid+0x1db/0x2d0 [ 10.716894] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.716917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.716939] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.716962] kasan_report+0x141/0x180 [ 10.716984] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 10.717012] __asan_report_store1_noabort+0x1b/0x30 [ 10.717032] krealloc_less_oob_helper+0xec6/0x11d0 [ 10.717058] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 10.717081] ? finish_task_switch.isra.0+0x153/0x700 [ 10.717102] ? __switch_to+0x47/0xf50 [ 10.717126] ? __schedule+0x10cc/0x2b60 [ 10.717149] ? __pfx_read_tsc+0x10/0x10 [ 10.717171] krealloc_less_oob+0x1c/0x30 [ 10.717193] kunit_try_run_case+0x1a5/0x480 [ 10.717212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.717231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.717255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.717278] ? __kthread_parkme+0x82/0x180 [ 10.717297] ? preempt_count_sub+0x50/0x80 [ 10.717319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.717339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.717363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.717397] kthread+0x337/0x6f0 [ 10.717415] ? trace_preempt_on+0x20/0xc0 [ 10.717438] ? __pfx_kthread+0x10/0x10 [ 10.717457] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.717479] ? calculate_sigpending+0x7b/0xa0 [ 10.717502] ? __pfx_kthread+0x10/0x10 [ 10.717523] ret_from_fork+0x116/0x1d0 [ 10.717540] ? __pfx_kthread+0x10/0x10 [ 10.717560] ret_from_fork_asm+0x1a/0x30 [ 10.717589] </TASK> [ 10.717600] [ 10.725057] Allocated by task 176: [ 10.725293] kasan_save_stack+0x45/0x70 [ 10.725492] kasan_save_track+0x18/0x40 [ 10.725692] kasan_save_alloc_info+0x3b/0x50 [ 10.725839] __kasan_krealloc+0x190/0x1f0 [ 10.725979] krealloc_noprof+0xf3/0x340 [ 10.726141] krealloc_less_oob_helper+0x1aa/0x11d0 [ 10.726422] krealloc_less_oob+0x1c/0x30 [ 10.726621] kunit_try_run_case+0x1a5/0x480 [ 10.726822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.727065] kthread+0x337/0x6f0 [ 10.727187] ret_from_fork+0x116/0x1d0 [ 10.727542] ret_from_fork_asm+0x1a/0x30 [ 10.727817] [ 10.727915] The buggy address belongs to the object at ffff888100a37200 [ 10.727915] which belongs to the cache kmalloc-256 of size 256 [ 10.728428] The buggy address is located 17 bytes to the right of [ 10.728428] allocated 201-byte region [ffff888100a37200, ffff888100a372c9) [ 10.729104] [ 10.729222] The buggy address belongs to the physical page: [ 10.729485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a36 [ 10.729803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.730036] flags: 0x200000000000040(head|node=0|zone=2) [ 10.730212] page_type: f5(slab) [ 10.730330] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.731065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.731428] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.731843] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.732226] head: 0200000000000001 ffffea0004028d81 00000000ffffffff 00000000ffffffff [ 10.732543] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.732891] page dumped because: kasan: bad access detected [ 10.733158] [ 10.733229] Memory state around the buggy address: [ 10.733462] ffff888100a37180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.733805] ffff888100a37200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 10.734027] >ffff888100a37280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 10.734306] ^ [ 10.734740] ffff888100a37300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.735014] ffff888100a37380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.735324] ==================================================================