Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 23.058412] ================================================================== [ 23.065411] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 23.072960] Write of size 1 at addr ffff0008033948d0 by task kunit_try_catch/202 [ 23.080339] [ 23.081824] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.081873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.081889] Hardware name: WinLink E850-96 board (DT) [ 23.081908] Call trace: [ 23.081918] show_stack+0x20/0x38 (C) [ 23.081952] dump_stack_lvl+0x8c/0xd0 [ 23.081988] print_report+0x118/0x608 [ 23.082025] kasan_report+0xdc/0x128 [ 23.082055] __asan_report_store1_noabort+0x20/0x30 [ 23.082086] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.082118] krealloc_less_oob+0x20/0x38 [ 23.082149] kunit_try_run_case+0x170/0x3f0 [ 23.082183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.082222] kthread+0x328/0x630 [ 23.082249] ret_from_fork+0x10/0x20 [ 23.082284] [ 23.150042] Allocated by task 202: [ 23.153428] kasan_save_stack+0x3c/0x68 [ 23.157247] kasan_save_track+0x20/0x40 [ 23.161066] kasan_save_alloc_info+0x40/0x58 [ 23.165320] __kasan_krealloc+0x118/0x178 [ 23.169314] krealloc_noprof+0x128/0x360 [ 23.173219] krealloc_less_oob_helper+0x168/0xc50 [ 23.177906] krealloc_less_oob+0x20/0x38 [ 23.181813] kunit_try_run_case+0x170/0x3f0 [ 23.185979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.191448] kthread+0x328/0x630 [ 23.194660] ret_from_fork+0x10/0x20 [ 23.198219] [ 23.199696] The buggy address belongs to the object at ffff000803394800 [ 23.199696] which belongs to the cache kmalloc-256 of size 256 [ 23.212196] The buggy address is located 7 bytes to the right of [ 23.212196] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 23.225128] [ 23.226604] The buggy address belongs to the physical page: [ 23.232163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 23.240145] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.247785] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.254730] page_type: f5(slab) [ 23.257864] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.265586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.273312] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.281123] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.288936] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 23.296748] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.304554] page dumped because: kasan: bad access detected [ 23.310110] [ 23.311585] Memory state around the buggy address: [ 23.316364] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.323568] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.330774] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.337974] ^ [ 23.343793] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.350998] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.358199] ================================================================== [ 24.759205] ================================================================== [ 24.769119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.776670] Write of size 1 at addr ffff0008048ce0c9 by task kunit_try_catch/206 [ 24.784046] [ 24.785531] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.785585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.785602] Hardware name: WinLink E850-96 board (DT) [ 24.785623] Call trace: [ 24.785636] show_stack+0x20/0x38 (C) [ 24.785671] dump_stack_lvl+0x8c/0xd0 [ 24.785709] print_report+0x118/0x608 [ 24.785744] kasan_report+0xdc/0x128 [ 24.785775] __asan_report_store1_noabort+0x20/0x30 [ 24.785807] krealloc_less_oob_helper+0xa48/0xc50 [ 24.785840] krealloc_large_less_oob+0x20/0x38 [ 24.785871] kunit_try_run_case+0x170/0x3f0 [ 24.785905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.785942] kthread+0x328/0x630 [ 24.785971] ret_from_fork+0x10/0x20 [ 24.786008] [ 24.854272] The buggy address belongs to the physical page: [ 24.859829] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 24.867814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.875455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.882397] page_type: f8(unknown) [ 24.885794] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.893513] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.901239] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.909050] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.916863] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 24.924675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.932480] page dumped because: kasan: bad access detected [ 24.938038] [ 24.939512] Memory state around the buggy address: [ 24.944292] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.951496] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.958701] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.965900] ^ [ 24.971459] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.978664] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.985865] ================================================================== [ 25.224594] ================================================================== [ 25.231698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 25.239247] Write of size 1 at addr ffff0008048ce0da by task kunit_try_catch/206 [ 25.246625] [ 25.248108] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.248152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.248166] Hardware name: WinLink E850-96 board (DT) [ 25.248184] Call trace: [ 25.248194] show_stack+0x20/0x38 (C) [ 25.248229] dump_stack_lvl+0x8c/0xd0 [ 25.248263] print_report+0x118/0x608 [ 25.248295] kasan_report+0xdc/0x128 [ 25.248327] __asan_report_store1_noabort+0x20/0x30 [ 25.248358] krealloc_less_oob_helper+0xa80/0xc50 [ 25.248390] krealloc_large_less_oob+0x20/0x38 [ 25.248421] kunit_try_run_case+0x170/0x3f0 [ 25.248451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.248489] kthread+0x328/0x630 [ 25.248514] ret_from_fork+0x10/0x20 [ 25.248544] [ 25.316850] The buggy address belongs to the physical page: [ 25.322407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.330392] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.338031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.344975] page_type: f8(unknown) [ 25.348368] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.356092] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.363818] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.371630] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.379443] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.387255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.395061] page dumped because: kasan: bad access detected [ 25.400616] [ 25.402092] Memory state around the buggy address: [ 25.406870] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.414074] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.421279] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.428480] ^ [ 25.434560] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.441765] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.448966] ================================================================== [ 23.673066] ================================================================== [ 23.680159] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.687708] Write of size 1 at addr ffff0008033948ea by task kunit_try_catch/202 [ 23.695086] [ 23.696568] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.696616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.696630] Hardware name: WinLink E850-96 board (DT) [ 23.696644] Call trace: [ 23.696655] show_stack+0x20/0x38 (C) [ 23.696687] dump_stack_lvl+0x8c/0xd0 [ 23.696722] print_report+0x118/0x608 [ 23.696755] kasan_report+0xdc/0x128 [ 23.696786] __asan_report_store1_noabort+0x20/0x30 [ 23.696815] krealloc_less_oob_helper+0xae4/0xc50 [ 23.696847] krealloc_less_oob+0x20/0x38 [ 23.696879] kunit_try_run_case+0x170/0x3f0 [ 23.696911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.696947] kthread+0x328/0x630 [ 23.696971] ret_from_fork+0x10/0x20 [ 23.697002] [ 23.764791] Allocated by task 202: [ 23.768175] kasan_save_stack+0x3c/0x68 [ 23.771995] kasan_save_track+0x20/0x40 [ 23.775814] kasan_save_alloc_info+0x40/0x58 [ 23.780068] __kasan_krealloc+0x118/0x178 [ 23.784061] krealloc_noprof+0x128/0x360 [ 23.787967] krealloc_less_oob_helper+0x168/0xc50 [ 23.792654] krealloc_less_oob+0x20/0x38 [ 23.796560] kunit_try_run_case+0x170/0x3f0 [ 23.800727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.806196] kthread+0x328/0x630 [ 23.809408] ret_from_fork+0x10/0x20 [ 23.812967] [ 23.814442] The buggy address belongs to the object at ffff000803394800 [ 23.814442] which belongs to the cache kmalloc-256 of size 256 [ 23.826942] The buggy address is located 33 bytes to the right of [ 23.826942] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 23.839962] [ 23.841439] The buggy address belongs to the physical page: [ 23.846996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 23.854980] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.862619] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.869563] page_type: f5(slab) [ 23.872699] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.880420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.888146] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.895958] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.903771] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 23.911583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.919388] page dumped because: kasan: bad access detected [ 23.924944] [ 23.926419] Memory state around the buggy address: [ 23.931200] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938402] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.945607] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.952808] ^ [ 23.959408] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.966613] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.973815] ================================================================== [ 25.456237] ================================================================== [ 25.463377] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 25.470928] Write of size 1 at addr ffff0008048ce0ea by task kunit_try_catch/206 [ 25.478306] [ 25.479785] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.479830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.479844] Hardware name: WinLink E850-96 board (DT) [ 25.479862] Call trace: [ 25.479872] show_stack+0x20/0x38 (C) [ 25.479903] dump_stack_lvl+0x8c/0xd0 [ 25.479935] print_report+0x118/0x608 [ 25.479969] kasan_report+0xdc/0x128 [ 25.480000] __asan_report_store1_noabort+0x20/0x30 [ 25.480029] krealloc_less_oob_helper+0xae4/0xc50 [ 25.480062] krealloc_large_less_oob+0x20/0x38 [ 25.480092] kunit_try_run_case+0x170/0x3f0 [ 25.480125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.480160] kthread+0x328/0x630 [ 25.480186] ret_from_fork+0x10/0x20 [ 25.480216] [ 25.548531] The buggy address belongs to the physical page: [ 25.554087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.562072] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.569711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.576655] page_type: f8(unknown) [ 25.580048] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.587773] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.595499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.603310] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.611123] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.618936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.626741] page dumped because: kasan: bad access detected [ 25.632297] [ 25.633772] Memory state around the buggy address: [ 25.638550] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.645755] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.652960] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.660161] ^ [ 25.666761] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.673966] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.681168] ================================================================== [ 23.981120] ================================================================== [ 23.988227] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.995776] Write of size 1 at addr ffff0008033948eb by task kunit_try_catch/202 [ 24.003155] [ 24.004635] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.004679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.004693] Hardware name: WinLink E850-96 board (DT) [ 24.004711] Call trace: [ 24.004722] show_stack+0x20/0x38 (C) [ 24.004754] dump_stack_lvl+0x8c/0xd0 [ 24.004789] print_report+0x118/0x608 [ 24.004823] kasan_report+0xdc/0x128 [ 24.004853] __asan_report_store1_noabort+0x20/0x30 [ 24.004882] krealloc_less_oob_helper+0xa58/0xc50 [ 24.004916] krealloc_less_oob+0x20/0x38 [ 24.004946] kunit_try_run_case+0x170/0x3f0 [ 24.004977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.005013] kthread+0x328/0x630 [ 24.005037] ret_from_fork+0x10/0x20 [ 24.005070] [ 24.072858] Allocated by task 202: [ 24.076244] kasan_save_stack+0x3c/0x68 [ 24.080063] kasan_save_track+0x20/0x40 [ 24.083883] kasan_save_alloc_info+0x40/0x58 [ 24.088136] __kasan_krealloc+0x118/0x178 [ 24.092129] krealloc_noprof+0x128/0x360 [ 24.096035] krealloc_less_oob_helper+0x168/0xc50 [ 24.100723] krealloc_less_oob+0x20/0x38 [ 24.104629] kunit_try_run_case+0x170/0x3f0 [ 24.108795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.114264] kthread+0x328/0x630 [ 24.117476] ret_from_fork+0x10/0x20 [ 24.121035] [ 24.122510] The buggy address belongs to the object at ffff000803394800 [ 24.122510] which belongs to the cache kmalloc-256 of size 256 [ 24.135011] The buggy address is located 34 bytes to the right of [ 24.135011] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 24.148030] [ 24.149507] The buggy address belongs to the physical page: [ 24.155063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 24.163048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.170687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.177631] page_type: f5(slab) [ 24.180763] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.188488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.196214] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.204026] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.211839] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 24.219651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.227456] page dumped because: kasan: bad access detected [ 24.233012] [ 24.234487] Memory state around the buggy address: [ 24.239267] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.246470] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.253675] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.260876] ^ [ 24.267477] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.274682] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.281883] ================================================================== [ 22.749239] ================================================================== [ 22.758473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.766022] Write of size 1 at addr ffff0008033948c9 by task kunit_try_catch/202 [ 22.773399] [ 22.774886] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 22.774945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.774962] Hardware name: WinLink E850-96 board (DT) [ 22.774983] Call trace: [ 22.774996] show_stack+0x20/0x38 (C) [ 22.775033] dump_stack_lvl+0x8c/0xd0 [ 22.775070] print_report+0x118/0x608 [ 22.775107] kasan_report+0xdc/0x128 [ 22.775139] __asan_report_store1_noabort+0x20/0x30 [ 22.775170] krealloc_less_oob_helper+0xa48/0xc50 [ 22.775202] krealloc_less_oob+0x20/0x38 [ 22.775233] kunit_try_run_case+0x170/0x3f0 [ 22.775269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.775306] kthread+0x328/0x630 [ 22.775336] ret_from_fork+0x10/0x20 [ 22.775369] [ 22.843104] Allocated by task 202: [ 22.846492] kasan_save_stack+0x3c/0x68 [ 22.850307] kasan_save_track+0x20/0x40 [ 22.854127] kasan_save_alloc_info+0x40/0x58 [ 22.858380] __kasan_krealloc+0x118/0x178 [ 22.862374] krealloc_noprof+0x128/0x360 [ 22.866279] krealloc_less_oob_helper+0x168/0xc50 [ 22.870966] krealloc_less_oob+0x20/0x38 [ 22.874873] kunit_try_run_case+0x170/0x3f0 [ 22.879039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.884508] kthread+0x328/0x630 [ 22.887720] ret_from_fork+0x10/0x20 [ 22.891279] [ 22.892757] The buggy address belongs to the object at ffff000803394800 [ 22.892757] which belongs to the cache kmalloc-256 of size 256 [ 22.905258] The buggy address is located 0 bytes to the right of [ 22.905258] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 22.918188] [ 22.919667] The buggy address belongs to the physical page: [ 22.925224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 22.933208] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.940847] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.947790] page_type: f5(slab) [ 22.950928] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.958646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.966373] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.974183] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.981996] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 22.989808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.997614] page dumped because: kasan: bad access detected [ 23.003171] [ 23.004644] Memory state around the buggy address: [ 23.009427] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.016628] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.023834] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.031034] ^ [ 23.036593] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.043798] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.050999] ================================================================== [ 23.365514] ================================================================== [ 23.372611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.380160] Write of size 1 at addr ffff0008033948da by task kunit_try_catch/202 [ 23.387539] [ 23.389021] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.389071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.389087] Hardware name: WinLink E850-96 board (DT) [ 23.389104] Call trace: [ 23.389116] show_stack+0x20/0x38 (C) [ 23.389150] dump_stack_lvl+0x8c/0xd0 [ 23.389186] print_report+0x118/0x608 [ 23.389221] kasan_report+0xdc/0x128 [ 23.389253] __asan_report_store1_noabort+0x20/0x30 [ 23.389283] krealloc_less_oob_helper+0xa80/0xc50 [ 23.389316] krealloc_less_oob+0x20/0x38 [ 23.389347] kunit_try_run_case+0x170/0x3f0 [ 23.389380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.389416] kthread+0x328/0x630 [ 23.389444] ret_from_fork+0x10/0x20 [ 23.389476] [ 23.457242] Allocated by task 202: [ 23.460628] kasan_save_stack+0x3c/0x68 [ 23.464448] kasan_save_track+0x20/0x40 [ 23.468267] kasan_save_alloc_info+0x40/0x58 [ 23.472520] __kasan_krealloc+0x118/0x178 [ 23.476515] krealloc_noprof+0x128/0x360 [ 23.480419] krealloc_less_oob_helper+0x168/0xc50 [ 23.485107] krealloc_less_oob+0x20/0x38 [ 23.489013] kunit_try_run_case+0x170/0x3f0 [ 23.493180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.498648] kthread+0x328/0x630 [ 23.501860] ret_from_fork+0x10/0x20 [ 23.505419] [ 23.506894] The buggy address belongs to the object at ffff000803394800 [ 23.506894] which belongs to the cache kmalloc-256 of size 256 [ 23.519395] The buggy address is located 17 bytes to the right of [ 23.519395] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 23.532415] [ 23.533892] The buggy address belongs to the physical page: [ 23.539448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 23.547433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.555071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.562015] page_type: f5(slab) [ 23.565151] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.572872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.580599] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.588410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.596223] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 23.604035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.611841] page dumped because: kasan: bad access detected [ 23.617398] [ 23.618872] Memory state around the buggy address: [ 23.623653] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.630855] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.638060] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.645261] ^ [ 23.651340] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.658545] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.665747] ================================================================== [ 25.688467] ================================================================== [ 25.695578] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 25.703129] Write of size 1 at addr ffff0008048ce0eb by task kunit_try_catch/206 [ 25.710507] [ 25.711987] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.712033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.712047] Hardware name: WinLink E850-96 board (DT) [ 25.712063] Call trace: [ 25.712073] show_stack+0x20/0x38 (C) [ 25.712104] dump_stack_lvl+0x8c/0xd0 [ 25.712137] print_report+0x118/0x608 [ 25.712169] kasan_report+0xdc/0x128 [ 25.712201] __asan_report_store1_noabort+0x20/0x30 [ 25.712230] krealloc_less_oob_helper+0xa58/0xc50 [ 25.712261] krealloc_large_less_oob+0x20/0x38 [ 25.712295] kunit_try_run_case+0x170/0x3f0 [ 25.712326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.712362] kthread+0x328/0x630 [ 25.712389] ret_from_fork+0x10/0x20 [ 25.712418] [ 25.780732] The buggy address belongs to the physical page: [ 25.786288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.794274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.801912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.808856] page_type: f8(unknown) [ 25.812250] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.819974] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.827700] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.835512] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.843325] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.851137] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.858943] page dumped because: kasan: bad access detected [ 25.864498] [ 25.865974] Memory state around the buggy address: [ 25.870752] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.877957] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.885161] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.892362] ^ [ 25.898963] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.906168] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.913369] ================================================================== [ 24.993244] ================================================================== [ 25.000279] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 25.007827] Write of size 1 at addr ffff0008048ce0d0 by task kunit_try_catch/206 [ 25.015205] [ 25.016689] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.016736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.016752] Hardware name: WinLink E850-96 board (DT) [ 25.016770] Call trace: [ 25.016779] show_stack+0x20/0x38 (C) [ 25.016812] dump_stack_lvl+0x8c/0xd0 [ 25.016849] print_report+0x118/0x608 [ 25.016885] kasan_report+0xdc/0x128 [ 25.016916] __asan_report_store1_noabort+0x20/0x30 [ 25.016947] krealloc_less_oob_helper+0xb9c/0xc50 [ 25.016978] krealloc_large_less_oob+0x20/0x38 [ 25.017009] kunit_try_run_case+0x170/0x3f0 [ 25.017043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.017081] kthread+0x328/0x630 [ 25.017107] ret_from_fork+0x10/0x20 [ 25.017141] [ 25.085432] The buggy address belongs to the physical page: [ 25.090988] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.098972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.106610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.113555] page_type: f8(unknown) [ 25.116948] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.124672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.132398] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.140210] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.148023] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.155835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.163641] page dumped because: kasan: bad access detected [ 25.169197] [ 25.170672] Memory state around the buggy address: [ 25.175450] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.182654] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.189859] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.197060] ^ [ 25.202880] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.210085] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.217285] ==================================================================
[ 24.632878] ================================================================== [ 24.633009] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 24.633312] Write of size 1 at addr fff00000c77b60eb by task kunit_try_catch/163 [ 24.633572] [ 24.633646] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.634098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.634162] Hardware name: linux,dummy-virt (DT) [ 24.634234] Call trace: [ 24.634282] show_stack+0x20/0x38 (C) [ 24.634394] dump_stack_lvl+0x8c/0xd0 [ 24.634505] print_report+0x118/0x608 [ 24.634627] kasan_report+0xdc/0x128 [ 24.634762] __asan_report_store1_noabort+0x20/0x30 [ 24.634939] krealloc_less_oob_helper+0xa58/0xc50 [ 24.635174] krealloc_large_less_oob+0x20/0x38 [ 24.635314] kunit_try_run_case+0x170/0x3f0 [ 24.635462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.635600] kthread+0x328/0x630 [ 24.635739] ret_from_fork+0x10/0x20 [ 24.636050] [ 24.636102] The buggy address belongs to the physical page: [ 24.636173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.636295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.636412] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.636533] page_type: f8(unknown) [ 24.636621] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.636756] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.636871] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.636981] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.637096] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.637210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.637329] page dumped because: kasan: bad access detected [ 24.637415] [ 24.637519] Memory state around the buggy address: [ 24.637632] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.637765] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.637976] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.638077] ^ [ 24.638186] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.638360] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.638487] ================================================================== [ 24.495738] ================================================================== [ 24.495908] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 24.496080] Write of size 1 at addr fff00000c5fb20eb by task kunit_try_catch/159 [ 24.496209] [ 24.496281] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.496569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.496720] Hardware name: linux,dummy-virt (DT) [ 24.496809] Call trace: [ 24.497118] show_stack+0x20/0x38 (C) [ 24.497261] dump_stack_lvl+0x8c/0xd0 [ 24.497415] print_report+0x118/0x608 [ 24.497629] kasan_report+0xdc/0x128 [ 24.497775] __asan_report_store1_noabort+0x20/0x30 [ 24.497995] krealloc_less_oob_helper+0xa58/0xc50 [ 24.498130] krealloc_less_oob+0x20/0x38 [ 24.498249] kunit_try_run_case+0x170/0x3f0 [ 24.498372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.498503] kthread+0x328/0x630 [ 24.498608] ret_from_fork+0x10/0x20 [ 24.498771] [ 24.498934] Allocated by task 159: [ 24.499095] kasan_save_stack+0x3c/0x68 [ 24.499211] kasan_save_track+0x20/0x40 [ 24.499324] kasan_save_alloc_info+0x40/0x58 [ 24.499528] __kasan_krealloc+0x118/0x178 [ 24.499643] krealloc_noprof+0x128/0x360 [ 24.499769] krealloc_less_oob_helper+0x168/0xc50 [ 24.499915] krealloc_less_oob+0x20/0x38 [ 24.500038] kunit_try_run_case+0x170/0x3f0 [ 24.500234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.500400] kthread+0x328/0x630 [ 24.500516] ret_from_fork+0x10/0x20 [ 24.500841] [ 24.500895] The buggy address belongs to the object at fff00000c5fb2000 [ 24.500895] which belongs to the cache kmalloc-256 of size 256 [ 24.501104] The buggy address is located 34 bytes to the right of [ 24.501104] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.501458] [ 24.501509] The buggy address belongs to the physical page: [ 24.501578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.501715] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.501828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.501975] page_type: f5(slab) [ 24.502228] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.502366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.502520] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.502635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.502781] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.503192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.503301] page dumped because: kasan: bad access detected [ 24.503384] [ 24.503434] Memory state around the buggy address: [ 24.503516] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.503625] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.503823] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.503918] ^ [ 24.504050] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.504236] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.504335] ================================================================== [ 24.486460] ================================================================== [ 24.486708] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 24.486852] Write of size 1 at addr fff00000c5fb20ea by task kunit_try_catch/159 [ 24.487132] [ 24.487222] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.487414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.487475] Hardware name: linux,dummy-virt (DT) [ 24.487548] Call trace: [ 24.487605] show_stack+0x20/0x38 (C) [ 24.487775] dump_stack_lvl+0x8c/0xd0 [ 24.487954] print_report+0x118/0x608 [ 24.488095] kasan_report+0xdc/0x128 [ 24.488225] __asan_report_store1_noabort+0x20/0x30 [ 24.488403] krealloc_less_oob_helper+0xae4/0xc50 [ 24.488531] krealloc_less_oob+0x20/0x38 [ 24.488654] kunit_try_run_case+0x170/0x3f0 [ 24.488817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.489055] kthread+0x328/0x630 [ 24.489379] ret_from_fork+0x10/0x20 [ 24.489512] [ 24.489563] Allocated by task 159: [ 24.489643] kasan_save_stack+0x3c/0x68 [ 24.489777] kasan_save_track+0x20/0x40 [ 24.489888] kasan_save_alloc_info+0x40/0x58 [ 24.490093] __kasan_krealloc+0x118/0x178 [ 24.490360] krealloc_noprof+0x128/0x360 [ 24.490458] krealloc_less_oob_helper+0x168/0xc50 [ 24.490570] krealloc_less_oob+0x20/0x38 [ 24.490844] kunit_try_run_case+0x170/0x3f0 [ 24.490944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.491060] kthread+0x328/0x630 [ 24.491301] ret_from_fork+0x10/0x20 [ 24.491394] [ 24.491469] The buggy address belongs to the object at fff00000c5fb2000 [ 24.491469] which belongs to the cache kmalloc-256 of size 256 [ 24.491652] The buggy address is located 33 bytes to the right of [ 24.491652] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.491914] [ 24.491974] The buggy address belongs to the physical page: [ 24.492055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.492189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.492316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.492447] page_type: f5(slab) [ 24.492537] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.492714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.492856] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.492988] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.493153] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.493302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.493434] page dumped because: kasan: bad access detected [ 24.493577] [ 24.493632] Memory state around the buggy address: [ 24.493735] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.493836] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.493925] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.494013] ^ [ 24.494201] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.494303] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.494389] ================================================================== [ 24.620642] ================================================================== [ 24.621267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 24.621594] Write of size 1 at addr fff00000c77b60ea by task kunit_try_catch/163 [ 24.621786] [ 24.621995] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.622196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.622261] Hardware name: linux,dummy-virt (DT) [ 24.622335] Call trace: [ 24.622383] show_stack+0x20/0x38 (C) [ 24.622496] dump_stack_lvl+0x8c/0xd0 [ 24.622629] print_report+0x118/0x608 [ 24.622842] kasan_report+0xdc/0x128 [ 24.623612] __asan_report_store1_noabort+0x20/0x30 [ 24.623761] krealloc_less_oob_helper+0xae4/0xc50 [ 24.624220] krealloc_large_less_oob+0x20/0x38 [ 24.624398] kunit_try_run_case+0x170/0x3f0 [ 24.624523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.624670] kthread+0x328/0x630 [ 24.624896] ret_from_fork+0x10/0x20 [ 24.625165] [ 24.625295] The buggy address belongs to the physical page: [ 24.625378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.625531] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.625798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.625976] page_type: f8(unknown) [ 24.626067] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.626179] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.626291] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.626402] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.626516] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.627080] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.627331] page dumped because: kasan: bad access detected [ 24.627633] [ 24.627698] Memory state around the buggy address: [ 24.627777] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.627882] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.629301] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.630149] ^ [ 24.630451] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.630555] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.630646] ================================================================== [ 24.589637] ================================================================== [ 24.589772] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.589890] Write of size 1 at addr fff00000c77b60d0 by task kunit_try_catch/163 [ 24.590005] [ 24.590075] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.593798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.593884] Hardware name: linux,dummy-virt (DT) [ 24.594431] Call trace: [ 24.594494] show_stack+0x20/0x38 (C) [ 24.594626] dump_stack_lvl+0x8c/0xd0 [ 24.595638] print_report+0x118/0x608 [ 24.595809] kasan_report+0xdc/0x128 [ 24.600167] __asan_report_store1_noabort+0x20/0x30 [ 24.600351] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.600500] krealloc_large_less_oob+0x20/0x38 [ 24.600757] kunit_try_run_case+0x170/0x3f0 [ 24.601060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.601209] kthread+0x328/0x630 [ 24.601337] ret_from_fork+0x10/0x20 [ 24.601475] [ 24.601534] The buggy address belongs to the physical page: [ 24.601906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.602384] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.602559] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.602708] page_type: f8(unknown) [ 24.602986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.603185] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.603462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.603656] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.603808] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.604035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.604721] page dumped because: kasan: bad access detected [ 24.604834] [ 24.604887] Memory state around the buggy address: [ 24.605197] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.605319] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.605440] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.605610] ^ [ 24.605749] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.606048] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.606415] ================================================================== [ 24.418631] ================================================================== [ 24.418781] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.418921] Write of size 1 at addr fff00000c5fb20c9 by task kunit_try_catch/159 [ 24.419034] [ 24.419111] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.419302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.419364] Hardware name: linux,dummy-virt (DT) [ 24.419435] Call trace: [ 24.419484] show_stack+0x20/0x38 (C) [ 24.419605] dump_stack_lvl+0x8c/0xd0 [ 24.420400] print_report+0x118/0x608 [ 24.420533] kasan_report+0xdc/0x128 [ 24.420880] __asan_report_store1_noabort+0x20/0x30 [ 24.421076] krealloc_less_oob_helper+0xa48/0xc50 [ 24.421459] krealloc_less_oob+0x20/0x38 [ 24.421635] kunit_try_run_case+0x170/0x3f0 [ 24.422009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.422211] kthread+0x328/0x630 [ 24.422323] ret_from_fork+0x10/0x20 [ 24.423007] [ 24.423714] Allocated by task 159: [ 24.423803] kasan_save_stack+0x3c/0x68 [ 24.424264] kasan_save_track+0x20/0x40 [ 24.424831] kasan_save_alloc_info+0x40/0x58 [ 24.425060] __kasan_krealloc+0x118/0x178 [ 24.425668] krealloc_noprof+0x128/0x360 [ 24.425786] krealloc_less_oob_helper+0x168/0xc50 [ 24.426428] krealloc_less_oob+0x20/0x38 [ 24.426761] kunit_try_run_case+0x170/0x3f0 [ 24.427035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.428145] kthread+0x328/0x630 [ 24.428669] ret_from_fork+0x10/0x20 [ 24.429031] [ 24.429087] The buggy address belongs to the object at fff00000c5fb2000 [ 24.429087] which belongs to the cache kmalloc-256 of size 256 [ 24.429219] The buggy address is located 0 bytes to the right of [ 24.429219] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.429379] [ 24.429429] The buggy address belongs to the physical page: [ 24.429506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.429630] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.429755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.432089] page_type: f5(slab) [ 24.432408] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.432525] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.432929] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.433727] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.433850] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.433966] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.435153] page dumped because: kasan: bad access detected [ 24.435409] [ 24.435456] Memory state around the buggy address: [ 24.435756] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.435969] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.436068] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.436153] ^ [ 24.437113] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.437219] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.438390] ================================================================== [ 24.445601] ================================================================== [ 24.447255] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.448151] Write of size 1 at addr fff00000c5fb20d0 by task kunit_try_catch/159 [ 24.448319] [ 24.448710] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.448934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.448995] Hardware name: linux,dummy-virt (DT) [ 24.449037] Call trace: [ 24.449064] show_stack+0x20/0x38 (C) [ 24.449160] dump_stack_lvl+0x8c/0xd0 [ 24.449305] print_report+0x118/0x608 [ 24.449656] kasan_report+0xdc/0x128 [ 24.449905] __asan_report_store1_noabort+0x20/0x30 [ 24.450134] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.450355] krealloc_less_oob+0x20/0x38 [ 24.450506] kunit_try_run_case+0x170/0x3f0 [ 24.450736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.451179] kthread+0x328/0x630 [ 24.451410] ret_from_fork+0x10/0x20 [ 24.451635] [ 24.451751] Allocated by task 159: [ 24.451837] kasan_save_stack+0x3c/0x68 [ 24.452038] kasan_save_track+0x20/0x40 [ 24.452175] kasan_save_alloc_info+0x40/0x58 [ 24.452362] __kasan_krealloc+0x118/0x178 [ 24.452599] krealloc_noprof+0x128/0x360 [ 24.453324] krealloc_less_oob_helper+0x168/0xc50 [ 24.453432] krealloc_less_oob+0x20/0x38 [ 24.453521] kunit_try_run_case+0x170/0x3f0 [ 24.453610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.453733] kthread+0x328/0x630 [ 24.453832] ret_from_fork+0x10/0x20 [ 24.455032] [ 24.455113] The buggy address belongs to the object at fff00000c5fb2000 [ 24.455113] which belongs to the cache kmalloc-256 of size 256 [ 24.455423] The buggy address is located 7 bytes to the right of [ 24.455423] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.455847] [ 24.455966] The buggy address belongs to the physical page: [ 24.456052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.456180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.456295] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.456560] page_type: f5(slab) [ 24.456846] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.457600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.457740] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.458570] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.458862] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.459002] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.459649] page dumped because: kasan: bad access detected [ 24.459744] [ 24.459792] Memory state around the buggy address: [ 24.459870] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.459973] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.460076] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.461510] ^ [ 24.462047] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462428] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462718] ================================================================== [ 24.464128] ================================================================== [ 24.464443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 24.464570] Write of size 1 at addr fff00000c5fb20da by task kunit_try_catch/159 [ 24.464952] [ 24.465062] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.465270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.465336] Hardware name: linux,dummy-virt (DT) [ 24.465411] Call trace: [ 24.465464] show_stack+0x20/0x38 (C) [ 24.466165] dump_stack_lvl+0x8c/0xd0 [ 24.466403] print_report+0x118/0x608 [ 24.466667] kasan_report+0xdc/0x128 [ 24.466957] __asan_report_store1_noabort+0x20/0x30 [ 24.467328] krealloc_less_oob_helper+0xa80/0xc50 [ 24.467777] krealloc_less_oob+0x20/0x38 [ 24.467955] kunit_try_run_case+0x170/0x3f0 [ 24.468478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.468621] kthread+0x328/0x630 [ 24.468867] ret_from_fork+0x10/0x20 [ 24.469338] [ 24.469560] Allocated by task 159: [ 24.469789] kasan_save_stack+0x3c/0x68 [ 24.469969] kasan_save_track+0x20/0x40 [ 24.470232] kasan_save_alloc_info+0x40/0x58 [ 24.470541] __kasan_krealloc+0x118/0x178 [ 24.470745] krealloc_noprof+0x128/0x360 [ 24.470848] krealloc_less_oob_helper+0x168/0xc50 [ 24.470956] krealloc_less_oob+0x20/0x38 [ 24.471423] kunit_try_run_case+0x170/0x3f0 [ 24.472227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.472592] kthread+0x328/0x630 [ 24.472943] ret_from_fork+0x10/0x20 [ 24.473037] [ 24.473086] The buggy address belongs to the object at fff00000c5fb2000 [ 24.473086] which belongs to the cache kmalloc-256 of size 256 [ 24.474159] The buggy address is located 17 bytes to the right of [ 24.474159] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.474648] [ 24.474897] The buggy address belongs to the physical page: [ 24.474980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.475744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.476206] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.476390] page_type: f5(slab) [ 24.477409] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.477979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.478352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.478653] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.479411] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.479552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.479992] page dumped because: kasan: bad access detected [ 24.480068] [ 24.481077] Memory state around the buggy address: [ 24.481843] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.482300] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.482769] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.483096] ^ [ 24.483731] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.484296] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.484392] ================================================================== [ 24.608157] ================================================================== [ 24.608835] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 24.609170] Write of size 1 at addr fff00000c77b60da by task kunit_try_catch/163 [ 24.609876] [ 24.609962] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.610150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.610211] Hardware name: linux,dummy-virt (DT) [ 24.610281] Call trace: [ 24.610331] show_stack+0x20/0x38 (C) [ 24.610447] dump_stack_lvl+0x8c/0xd0 [ 24.610564] print_report+0x118/0x608 [ 24.612442] kasan_report+0xdc/0x128 [ 24.612876] __asan_report_store1_noabort+0x20/0x30 [ 24.613368] krealloc_less_oob_helper+0xa80/0xc50 [ 24.613499] krealloc_large_less_oob+0x20/0x38 [ 24.613618] kunit_try_run_case+0x170/0x3f0 [ 24.613755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.613913] kthread+0x328/0x630 [ 24.614027] ret_from_fork+0x10/0x20 [ 24.614146] [ 24.614213] The buggy address belongs to the physical page: [ 24.614303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.614431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.614549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.615470] page_type: f8(unknown) [ 24.615569] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.615706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.616238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.616479] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.616731] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.617013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.617121] page dumped because: kasan: bad access detected [ 24.617193] [ 24.618148] Memory state around the buggy address: [ 24.618290] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.618460] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.618559] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.618652] ^ [ 24.618756] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.618903] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.619145] ================================================================== [ 24.573325] ================================================================== [ 24.573463] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.573779] Write of size 1 at addr fff00000c77b60c9 by task kunit_try_catch/163 [ 24.573951] [ 24.574177] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.574406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.574468] Hardware name: linux,dummy-virt (DT) [ 24.574539] Call trace: [ 24.574599] show_stack+0x20/0x38 (C) [ 24.574770] dump_stack_lvl+0x8c/0xd0 [ 24.574914] print_report+0x118/0x608 [ 24.575504] kasan_report+0xdc/0x128 [ 24.575637] __asan_report_store1_noabort+0x20/0x30 [ 24.575797] krealloc_less_oob_helper+0xa48/0xc50 [ 24.576173] krealloc_large_less_oob+0x20/0x38 [ 24.576506] kunit_try_run_case+0x170/0x3f0 [ 24.576696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.576849] kthread+0x328/0x630 [ 24.577060] ret_from_fork+0x10/0x20 [ 24.577373] [ 24.577506] The buggy address belongs to the physical page: [ 24.577727] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.577854] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.577966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.578089] page_type: f8(unknown) [ 24.578181] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.578295] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.578408] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.578520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.578631] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.578786] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.578896] page dumped because: kasan: bad access detected [ 24.578979] [ 24.579030] Memory state around the buggy address: [ 24.579545] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.579665] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.579793] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.579879] ^ [ 24.579957] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.580053] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.580138] ==================================================================
[ 17.547855] ================================================================== [ 17.549253] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 17.550995] Write of size 1 at addr ffff888100a242eb by task kunit_try_catch/175 [ 17.552645] [ 17.552894] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.553020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.553077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.553135] Call Trace: [ 17.553186] <TASK> [ 17.553237] dump_stack_lvl+0x73/0xb0 [ 17.553320] print_report+0xd1/0x650 [ 17.553395] ? __virt_addr_valid+0x1db/0x2d0 [ 17.553434] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 17.553469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.553500] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 17.553534] kasan_report+0x141/0x180 [ 17.553564] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 17.553604] __asan_report_store1_noabort+0x1b/0x30 [ 17.553632] krealloc_less_oob_helper+0xd47/0x11d0 [ 17.553668] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.553701] ? finish_task_switch.isra.0+0x153/0x700 [ 17.553733] ? __switch_to+0x47/0xf50 [ 17.553785] ? __schedule+0x10cc/0x2b60 [ 17.553865] ? __pfx_read_tsc+0x10/0x10 [ 17.553945] krealloc_less_oob+0x1c/0x30 [ 17.554111] kunit_try_run_case+0x1a5/0x480 [ 17.554270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.554352] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.554430] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.554528] ? __kthread_parkme+0x82/0x180 [ 17.554595] ? preempt_count_sub+0x50/0x80 [ 17.554668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.554741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.554828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.554900] kthread+0x337/0x6f0 [ 17.554932] ? trace_preempt_on+0x20/0xc0 [ 17.554964] ? __pfx_kthread+0x10/0x10 [ 17.554992] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.555064] ? calculate_sigpending+0x7b/0xa0 [ 17.555120] ? __pfx_kthread+0x10/0x10 [ 17.555151] ret_from_fork+0x116/0x1d0 [ 17.555217] ? __pfx_kthread+0x10/0x10 [ 17.555296] ret_from_fork_asm+0x1a/0x30 [ 17.555342] </TASK> [ 17.555356] [ 17.582947] Allocated by task 175: [ 17.583982] kasan_save_stack+0x45/0x70 [ 17.584592] kasan_save_track+0x18/0x40 [ 17.585360] kasan_save_alloc_info+0x3b/0x50 [ 17.585732] __kasan_krealloc+0x190/0x1f0 [ 17.586299] krealloc_noprof+0xf3/0x340 [ 17.586777] krealloc_less_oob_helper+0x1aa/0x11d0 [ 17.587334] krealloc_less_oob+0x1c/0x30 [ 17.587766] kunit_try_run_case+0x1a5/0x480 [ 17.588141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.588684] kthread+0x337/0x6f0 [ 17.589788] ret_from_fork+0x116/0x1d0 [ 17.590531] ret_from_fork_asm+0x1a/0x30 [ 17.591236] [ 17.591705] The buggy address belongs to the object at ffff888100a24200 [ 17.591705] which belongs to the cache kmalloc-256 of size 256 [ 17.592681] The buggy address is located 34 bytes to the right of [ 17.592681] allocated 201-byte region [ffff888100a24200, ffff888100a242c9) [ 17.595231] [ 17.595444] The buggy address belongs to the physical page: [ 17.595958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24 [ 17.597732] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.598755] flags: 0x200000000000040(head|node=0|zone=2) [ 17.599727] page_type: f5(slab) [ 17.600509] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.601495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.602280] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.602902] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.603994] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff [ 17.605064] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.605763] page dumped because: kasan: bad access detected [ 17.605979] [ 17.606091] Memory state around the buggy address: [ 17.606264] ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.606506] ffff888100a24200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.606734] >ffff888100a24280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.606990] ^ [ 17.607428] ffff888100a24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.609384] ffff888100a24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.610000] ================================================================== [ 17.706674] ================================================================== [ 17.707548] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 17.709332] Write of size 1 at addr ffff8881024ce0c9 by task kunit_try_catch/179 [ 17.709890] [ 17.710491] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.710556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.710573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.710602] Call Trace: [ 17.710620] <TASK> [ 17.710642] dump_stack_lvl+0x73/0xb0 [ 17.710680] print_report+0xd1/0x650 [ 17.710711] ? __virt_addr_valid+0x1db/0x2d0 [ 17.710742] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 17.710821] ? kasan_addr_to_slab+0x11/0xa0 [ 17.710854] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 17.710889] kasan_report+0x141/0x180 [ 17.710920] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 17.710959] __asan_report_store1_noabort+0x1b/0x30 [ 17.710988] krealloc_less_oob_helper+0xd70/0x11d0 [ 17.711024] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.711096] ? finish_task_switch.isra.0+0x153/0x700 [ 17.711130] ? __switch_to+0x47/0xf50 [ 17.711165] ? __schedule+0x10cc/0x2b60 [ 17.711198] ? __pfx_read_tsc+0x10/0x10 [ 17.711232] krealloc_large_less_oob+0x1c/0x30 [ 17.711266] kunit_try_run_case+0x1a5/0x480 [ 17.711296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.711323] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.711357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.711392] ? __kthread_parkme+0x82/0x180 [ 17.711420] ? preempt_count_sub+0x50/0x80 [ 17.711451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.711480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.711513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.711547] kthread+0x337/0x6f0 [ 17.711574] ? trace_preempt_on+0x20/0xc0 [ 17.711605] ? __pfx_kthread+0x10/0x10 [ 17.711633] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.711664] ? calculate_sigpending+0x7b/0xa0 [ 17.711698] ? __pfx_kthread+0x10/0x10 [ 17.711727] ret_from_fork+0x116/0x1d0 [ 17.711755] ? __pfx_kthread+0x10/0x10 [ 17.711809] ret_from_fork_asm+0x1a/0x30 [ 17.711854] </TASK> [ 17.711868] [ 17.733004] The buggy address belongs to the physical page: [ 17.733619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024cc [ 17.734715] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.735615] flags: 0x200000000000040(head|node=0|zone=2) [ 17.736363] page_type: f8(unknown) [ 17.737201] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.737771] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.738206] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.738469] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.738716] head: 0200000000000002 ffffea0004093301 00000000ffffffff 00000000ffffffff [ 17.739916] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.740948] page dumped because: kasan: bad access detected [ 17.741436] [ 17.741708] Memory state around the buggy address: [ 17.742199] ffff8881024cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.743275] ffff8881024ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.743723] >ffff8881024ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.744555] ^ [ 17.745303] ffff8881024ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.745855] ffff8881024ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.746594] ================================================================== [ 17.863963] ================================================================== [ 17.864595] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 17.865277] Write of size 1 at addr ffff8881024ce0eb by task kunit_try_catch/179 [ 17.866125] [ 17.866362] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.866506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.866539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.866615] Call Trace: [ 17.866668] <TASK> [ 17.866708] dump_stack_lvl+0x73/0xb0 [ 17.866778] print_report+0xd1/0x650 [ 17.866846] ? __virt_addr_valid+0x1db/0x2d0 [ 17.866909] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 17.866976] ? kasan_addr_to_slab+0x11/0xa0 [ 17.867099] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 17.867206] kasan_report+0x141/0x180 [ 17.867329] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 17.867445] __asan_report_store1_noabort+0x1b/0x30 [ 17.867519] krealloc_less_oob_helper+0xd47/0x11d0 [ 17.867602] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.867683] ? finish_task_switch.isra.0+0x153/0x700 [ 17.867798] ? __switch_to+0x47/0xf50 [ 17.867906] ? __schedule+0x10cc/0x2b60 [ 17.868017] ? __pfx_read_tsc+0x10/0x10 [ 17.868120] krealloc_large_less_oob+0x1c/0x30 [ 17.868199] kunit_try_run_case+0x1a5/0x480 [ 17.868276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.868340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.868442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.868553] ? __kthread_parkme+0x82/0x180 [ 17.868622] ? preempt_count_sub+0x50/0x80 [ 17.868695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.868733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.868807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.868844] kthread+0x337/0x6f0 [ 17.868871] ? trace_preempt_on+0x20/0xc0 [ 17.868906] ? __pfx_kthread+0x10/0x10 [ 17.868935] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.868968] ? calculate_sigpending+0x7b/0xa0 [ 17.869001] ? __pfx_kthread+0x10/0x10 [ 17.869050] ret_from_fork+0x116/0x1d0 [ 17.869085] ? __pfx_kthread+0x10/0x10 [ 17.869168] ret_from_fork_asm+0x1a/0x30 [ 17.869301] </TASK> [ 17.869340] [ 17.885532] The buggy address belongs to the physical page: [ 17.886247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024cc [ 17.887078] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.887695] flags: 0x200000000000040(head|node=0|zone=2) [ 17.888097] page_type: f8(unknown) [ 17.888397] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.889121] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.889901] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.890496] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.891319] head: 0200000000000002 ffffea0004093301 00000000ffffffff 00000000ffffffff [ 17.892057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.892730] page dumped because: kasan: bad access detected [ 17.893323] [ 17.893592] Memory state around the buggy address: [ 17.894129] ffff8881024cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.894816] ffff8881024ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.895467] >ffff8881024ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.896175] ^ [ 17.896734] ffff8881024ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.897387] ffff8881024ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.897979] ================================================================== [ 17.401489] ================================================================== [ 17.402579] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 17.403426] Write of size 1 at addr ffff888100a242da by task kunit_try_catch/175 [ 17.404942] [ 17.405253] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.405620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.405661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.405780] Call Trace: [ 17.405821] <TASK> [ 17.405843] dump_stack_lvl+0x73/0xb0 [ 17.405880] print_report+0xd1/0x650 [ 17.405910] ? __virt_addr_valid+0x1db/0x2d0 [ 17.405941] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 17.405974] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.406004] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 17.406037] kasan_report+0x141/0x180 [ 17.406095] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 17.406135] __asan_report_store1_noabort+0x1b/0x30 [ 17.406171] krealloc_less_oob_helper+0xec6/0x11d0 [ 17.406331] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.406367] ? finish_task_switch.isra.0+0x153/0x700 [ 17.406400] ? __switch_to+0x47/0xf50 [ 17.406434] ? __schedule+0x10cc/0x2b60 [ 17.406467] ? __pfx_read_tsc+0x10/0x10 [ 17.406499] krealloc_less_oob+0x1c/0x30 [ 17.406529] kunit_try_run_case+0x1a5/0x480 [ 17.406558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.406583] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.406617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.406687] ? __kthread_parkme+0x82/0x180 [ 17.406717] ? preempt_count_sub+0x50/0x80 [ 17.406748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.406796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.406847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.406903] kthread+0x337/0x6f0 [ 17.406933] ? trace_preempt_on+0x20/0xc0 [ 17.406982] ? __pfx_kthread+0x10/0x10 [ 17.407013] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.407074] ? calculate_sigpending+0x7b/0xa0 [ 17.407113] ? __pfx_kthread+0x10/0x10 [ 17.407155] ret_from_fork+0x116/0x1d0 [ 17.407208] ? __pfx_kthread+0x10/0x10 [ 17.407256] ret_from_fork_asm+0x1a/0x30 [ 17.407302] </TASK> [ 17.407316] [ 17.435746] Allocated by task 175: [ 17.437066] kasan_save_stack+0x45/0x70 [ 17.437855] kasan_save_track+0x18/0x40 [ 17.438545] kasan_save_alloc_info+0x3b/0x50 [ 17.439348] __kasan_krealloc+0x190/0x1f0 [ 17.440103] krealloc_noprof+0xf3/0x340 [ 17.440914] krealloc_less_oob_helper+0x1aa/0x11d0 [ 17.441827] krealloc_less_oob+0x1c/0x30 [ 17.442596] kunit_try_run_case+0x1a5/0x480 [ 17.443917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.444508] kthread+0x337/0x6f0 [ 17.444888] ret_from_fork+0x116/0x1d0 [ 17.445298] ret_from_fork_asm+0x1a/0x30 [ 17.445719] [ 17.445937] The buggy address belongs to the object at ffff888100a24200 [ 17.445937] which belongs to the cache kmalloc-256 of size 256 [ 17.448447] The buggy address is located 17 bytes to the right of [ 17.448447] allocated 201-byte region [ffff888100a24200, ffff888100a242c9) [ 17.450098] [ 17.450279] The buggy address belongs to the physical page: [ 17.450693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24 [ 17.452679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.453839] flags: 0x200000000000040(head|node=0|zone=2) [ 17.454907] page_type: f5(slab) [ 17.455179] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.456555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.457300] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.458225] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.460298] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff [ 17.461355] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.462993] page dumped because: kasan: bad access detected [ 17.463476] [ 17.463721] Memory state around the buggy address: [ 17.464100] ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.464862] ffff888100a24200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.466242] >ffff888100a24280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.467331] ^ [ 17.468334] ffff888100a24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.469283] ffff888100a24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.469687] ================================================================== [ 17.748210] ================================================================== [ 17.748745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 17.749407] Write of size 1 at addr ffff8881024ce0d0 by task kunit_try_catch/179 [ 17.750481] [ 17.750692] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.750761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.750798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.750830] Call Trace: [ 17.750846] <TASK> [ 17.750865] dump_stack_lvl+0x73/0xb0 [ 17.750899] print_report+0xd1/0x650 [ 17.750929] ? __virt_addr_valid+0x1db/0x2d0 [ 17.750960] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 17.750994] ? kasan_addr_to_slab+0x11/0xa0 [ 17.751022] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 17.751110] kasan_report+0x141/0x180 [ 17.751185] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 17.751274] __asan_report_store1_noabort+0x1b/0x30 [ 17.751344] krealloc_less_oob_helper+0xe23/0x11d0 [ 17.751427] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.751508] ? finish_task_switch.isra.0+0x153/0x700 [ 17.751582] ? __switch_to+0x47/0xf50 [ 17.751662] ? __schedule+0x10cc/0x2b60 [ 17.751726] ? __pfx_read_tsc+0x10/0x10 [ 17.751781] krealloc_large_less_oob+0x1c/0x30 [ 17.751830] kunit_try_run_case+0x1a5/0x480 [ 17.751860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.751886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.751921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.751955] ? __kthread_parkme+0x82/0x180 [ 17.751982] ? preempt_count_sub+0x50/0x80 [ 17.752012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.752576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.752668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.752811] kthread+0x337/0x6f0 [ 17.752886] ? trace_preempt_on+0x20/0xc0 [ 17.752963] ? __pfx_kthread+0x10/0x10 [ 17.753065] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.753104] ? calculate_sigpending+0x7b/0xa0 [ 17.753139] ? __pfx_kthread+0x10/0x10 [ 17.753169] ret_from_fork+0x116/0x1d0 [ 17.753195] ? __pfx_kthread+0x10/0x10 [ 17.753223] ret_from_fork_asm+0x1a/0x30 [ 17.753264] </TASK> [ 17.753279] [ 17.770743] The buggy address belongs to the physical page: [ 17.771359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024cc [ 17.772246] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.773002] flags: 0x200000000000040(head|node=0|zone=2) [ 17.773598] page_type: f8(unknown) [ 17.774131] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.774856] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.775564] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.776394] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.777146] head: 0200000000000002 ffffea0004093301 00000000ffffffff 00000000ffffffff [ 17.777941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.778532] page dumped because: kasan: bad access detected [ 17.779148] [ 17.779471] Memory state around the buggy address: [ 17.780020] ffff8881024cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.780669] ffff8881024ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.781460] >ffff8881024ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.782215] ^ [ 17.782864] ffff8881024ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.783547] ffff8881024ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.784333] ================================================================== [ 17.823514] ================================================================== [ 17.824099] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 17.825125] Write of size 1 at addr ffff8881024ce0ea by task kunit_try_catch/179 [ 17.825913] [ 17.826228] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.826478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.826519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.826639] Call Trace: [ 17.826709] <TASK> [ 17.826758] dump_stack_lvl+0x73/0xb0 [ 17.826839] print_report+0xd1/0x650 [ 17.826912] ? __virt_addr_valid+0x1db/0x2d0 [ 17.826988] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 17.827116] ? kasan_addr_to_slab+0x11/0xa0 [ 17.827154] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 17.827192] kasan_report+0x141/0x180 [ 17.827224] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 17.827264] __asan_report_store1_noabort+0x1b/0x30 [ 17.827293] krealloc_less_oob_helper+0xe90/0x11d0 [ 17.827329] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.827363] ? finish_task_switch.isra.0+0x153/0x700 [ 17.827396] ? __switch_to+0x47/0xf50 [ 17.827430] ? __schedule+0x10cc/0x2b60 [ 17.827464] ? __pfx_read_tsc+0x10/0x10 [ 17.827499] krealloc_large_less_oob+0x1c/0x30 [ 17.827531] kunit_try_run_case+0x1a5/0x480 [ 17.827561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.827623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.827657] ? __kthread_parkme+0x82/0x180 [ 17.827684] ? preempt_count_sub+0x50/0x80 [ 17.827714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.827818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.827855] kthread+0x337/0x6f0 [ 17.827882] ? trace_preempt_on+0x20/0xc0 [ 17.827914] ? __pfx_kthread+0x10/0x10 [ 17.827942] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.827974] ? calculate_sigpending+0x7b/0xa0 [ 17.828008] ? __pfx_kthread+0x10/0x10 [ 17.828061] ret_from_fork+0x116/0x1d0 [ 17.828091] ? __pfx_kthread+0x10/0x10 [ 17.828121] ret_from_fork_asm+0x1a/0x30 [ 17.828163] </TASK> [ 17.828177] [ 17.850381] The buggy address belongs to the physical page: [ 17.850940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024cc [ 17.851689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.852398] flags: 0x200000000000040(head|node=0|zone=2) [ 17.852987] page_type: f8(unknown) [ 17.853378] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.854122] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.854790] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.855343] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.855999] head: 0200000000000002 ffffea0004093301 00000000ffffffff 00000000ffffffff [ 17.856595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.857352] page dumped because: kasan: bad access detected [ 17.857812] [ 17.858096] Memory state around the buggy address: [ 17.858602] ffff8881024cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.859268] ffff8881024ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.859956] >ffff8881024ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.860568] ^ [ 17.861213] ffff8881024ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.861915] ffff8881024ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.862533] ================================================================== [ 17.282969] ================================================================== [ 17.283677] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 17.284949] Write of size 1 at addr ffff888100a242c9 by task kunit_try_catch/175 [ 17.286316] [ 17.286535] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.286707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.286746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.286810] Call Trace: [ 17.286850] <TASK> [ 17.286899] dump_stack_lvl+0x73/0xb0 [ 17.287032] print_report+0xd1/0x650 [ 17.287133] ? __virt_addr_valid+0x1db/0x2d0 [ 17.287195] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 17.287241] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.287273] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 17.287346] kasan_report+0x141/0x180 [ 17.287381] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 17.287421] __asan_report_store1_noabort+0x1b/0x30 [ 17.287449] krealloc_less_oob_helper+0xd70/0x11d0 [ 17.287487] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.287522] ? finish_task_switch.isra.0+0x153/0x700 [ 17.287554] ? __switch_to+0x47/0xf50 [ 17.287590] ? __schedule+0x10cc/0x2b60 [ 17.287624] ? __pfx_read_tsc+0x10/0x10 [ 17.287658] krealloc_less_oob+0x1c/0x30 [ 17.287689] kunit_try_run_case+0x1a5/0x480 [ 17.287721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.287748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.287914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.287957] ? __kthread_parkme+0x82/0x180 [ 17.287987] ? preempt_count_sub+0x50/0x80 [ 17.288017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.288069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.288111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.288145] kthread+0x337/0x6f0 [ 17.288253] ? trace_preempt_on+0x20/0xc0 [ 17.288298] ? __pfx_kthread+0x10/0x10 [ 17.288327] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.288360] ? calculate_sigpending+0x7b/0xa0 [ 17.288394] ? __pfx_kthread+0x10/0x10 [ 17.288424] ret_from_fork+0x116/0x1d0 [ 17.288449] ? __pfx_kthread+0x10/0x10 [ 17.288477] ret_from_fork_asm+0x1a/0x30 [ 17.288518] </TASK> [ 17.288532] [ 17.310713] Allocated by task 175: [ 17.311036] kasan_save_stack+0x45/0x70 [ 17.311556] kasan_save_track+0x18/0x40 [ 17.313859] kasan_save_alloc_info+0x3b/0x50 [ 17.314085] __kasan_krealloc+0x190/0x1f0 [ 17.315421] krealloc_noprof+0xf3/0x340 [ 17.316225] krealloc_less_oob_helper+0x1aa/0x11d0 [ 17.317037] krealloc_less_oob+0x1c/0x30 [ 17.317491] kunit_try_run_case+0x1a5/0x480 [ 17.318024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.318795] kthread+0x337/0x6f0 [ 17.319360] ret_from_fork+0x116/0x1d0 [ 17.319877] ret_from_fork_asm+0x1a/0x30 [ 17.320354] [ 17.320648] The buggy address belongs to the object at ffff888100a24200 [ 17.320648] which belongs to the cache kmalloc-256 of size 256 [ 17.322143] The buggy address is located 0 bytes to the right of [ 17.322143] allocated 201-byte region [ffff888100a24200, ffff888100a242c9) [ 17.323612] [ 17.324558] The buggy address belongs to the physical page: [ 17.325138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24 [ 17.325858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.326545] flags: 0x200000000000040(head|node=0|zone=2) [ 17.327069] page_type: f5(slab) [ 17.327547] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.328915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.329587] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.330598] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.331438] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff [ 17.332475] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.333232] page dumped because: kasan: bad access detected [ 17.333902] [ 17.334108] Memory state around the buggy address: [ 17.335583] ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.336319] ffff888100a24200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.337294] >ffff888100a24280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.337885] ^ [ 17.338709] ffff888100a24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.339603] ffff888100a24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.340218] ================================================================== [ 17.472886] ================================================================== [ 17.473966] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 17.474788] Write of size 1 at addr ffff888100a242ea by task kunit_try_catch/175 [ 17.476119] [ 17.476424] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.476553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.476592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.476635] Call Trace: [ 17.476679] <TASK> [ 17.476705] dump_stack_lvl+0x73/0xb0 [ 17.476743] print_report+0xd1/0x650 [ 17.476815] ? __virt_addr_valid+0x1db/0x2d0 [ 17.476862] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 17.476897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.476927] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 17.476961] kasan_report+0x141/0x180 [ 17.476992] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 17.477033] __asan_report_store1_noabort+0x1b/0x30 [ 17.477123] krealloc_less_oob_helper+0xe90/0x11d0 [ 17.477446] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.477507] ? finish_task_switch.isra.0+0x153/0x700 [ 17.477559] ? __switch_to+0x47/0xf50 [ 17.477618] ? __schedule+0x10cc/0x2b60 [ 17.477676] ? __pfx_read_tsc+0x10/0x10 [ 17.477729] krealloc_less_oob+0x1c/0x30 [ 17.477803] kunit_try_run_case+0x1a5/0x480 [ 17.477856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.477905] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.477958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.478016] ? __kthread_parkme+0x82/0x180 [ 17.478083] ? preempt_count_sub+0x50/0x80 [ 17.478140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.478192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.478250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.478316] kthread+0x337/0x6f0 [ 17.478365] ? trace_preempt_on+0x20/0xc0 [ 17.478418] ? __pfx_kthread+0x10/0x10 [ 17.478465] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.478519] ? calculate_sigpending+0x7b/0xa0 [ 17.478573] ? __pfx_kthread+0x10/0x10 [ 17.478623] ret_from_fork+0x116/0x1d0 [ 17.478666] ? __pfx_kthread+0x10/0x10 [ 17.478717] ret_from_fork_asm+0x1a/0x30 [ 17.478789] </TASK> [ 17.478815] [ 17.506773] Allocated by task 175: [ 17.507269] kasan_save_stack+0x45/0x70 [ 17.507717] kasan_save_track+0x18/0x40 [ 17.509138] kasan_save_alloc_info+0x3b/0x50 [ 17.509726] __kasan_krealloc+0x190/0x1f0 [ 17.510331] krealloc_noprof+0xf3/0x340 [ 17.510865] krealloc_less_oob_helper+0x1aa/0x11d0 [ 17.512351] krealloc_less_oob+0x1c/0x30 [ 17.513416] kunit_try_run_case+0x1a5/0x480 [ 17.514231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.515534] kthread+0x337/0x6f0 [ 17.516338] ret_from_fork+0x116/0x1d0 [ 17.517174] ret_from_fork_asm+0x1a/0x30 [ 17.518207] [ 17.518587] The buggy address belongs to the object at ffff888100a24200 [ 17.518587] which belongs to the cache kmalloc-256 of size 256 [ 17.520529] The buggy address is located 33 bytes to the right of [ 17.520529] allocated 201-byte region [ffff888100a24200, ffff888100a242c9) [ 17.522984] [ 17.523266] The buggy address belongs to the physical page: [ 17.523731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24 [ 17.526012] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.527226] flags: 0x200000000000040(head|node=0|zone=2) [ 17.527839] page_type: f5(slab) [ 17.528266] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.529354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.530122] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.531635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.532626] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff [ 17.533873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.535170] page dumped because: kasan: bad access detected [ 17.536453] [ 17.536756] Memory state around the buggy address: [ 17.538063] ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.540013] ffff888100a24200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.541151] >ffff888100a24280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.542303] ^ [ 17.542769] ffff888100a24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.544257] ffff888100a24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.545411] ================================================================== [ 17.785734] ================================================================== [ 17.786365] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 17.787006] Write of size 1 at addr ffff8881024ce0da by task kunit_try_catch/179 [ 17.787586] [ 17.787933] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.788069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.788102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.788148] Call Trace: [ 17.788190] <TASK> [ 17.788230] dump_stack_lvl+0x73/0xb0 [ 17.788302] print_report+0xd1/0x650 [ 17.788364] ? __virt_addr_valid+0x1db/0x2d0 [ 17.788423] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 17.788488] ? kasan_addr_to_slab+0x11/0xa0 [ 17.788551] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 17.788617] kasan_report+0x141/0x180 [ 17.788684] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 17.788797] __asan_report_store1_noabort+0x1b/0x30 [ 17.788870] krealloc_less_oob_helper+0xec6/0x11d0 [ 17.789002] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.789131] ? finish_task_switch.isra.0+0x153/0x700 [ 17.789394] ? __switch_to+0x47/0xf50 [ 17.789478] ? __schedule+0x10cc/0x2b60 [ 17.789557] ? __pfx_read_tsc+0x10/0x10 [ 17.789636] krealloc_large_less_oob+0x1c/0x30 [ 17.789716] kunit_try_run_case+0x1a5/0x480 [ 17.789820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.789863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.789899] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.789935] ? __kthread_parkme+0x82/0x180 [ 17.789962] ? preempt_count_sub+0x50/0x80 [ 17.789992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.790020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.790086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.790123] kthread+0x337/0x6f0 [ 17.790151] ? trace_preempt_on+0x20/0xc0 [ 17.790183] ? __pfx_kthread+0x10/0x10 [ 17.790211] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.790243] ? calculate_sigpending+0x7b/0xa0 [ 17.790275] ? __pfx_kthread+0x10/0x10 [ 17.790321] ret_from_fork+0x116/0x1d0 [ 17.790348] ? __pfx_kthread+0x10/0x10 [ 17.790376] ret_from_fork_asm+0x1a/0x30 [ 17.790417] </TASK> [ 17.790431] [ 17.807094] The buggy address belongs to the physical page: [ 17.807634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024cc [ 17.808455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.809166] flags: 0x200000000000040(head|node=0|zone=2) [ 17.809696] page_type: f8(unknown) [ 17.810094] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.810594] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.811458] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.813173] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.814312] head: 0200000000000002 ffffea0004093301 00000000ffffffff 00000000ffffffff [ 17.814872] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.815461] page dumped because: kasan: bad access detected [ 17.815882] [ 17.816165] Memory state around the buggy address: [ 17.816686] ffff8881024cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.817416] ffff8881024ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.818014] >ffff8881024ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.818819] ^ [ 17.819426] ffff8881024ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.820179] ffff8881024ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.820874] ================================================================== [ 17.342853] ================================================================== [ 17.343456] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 17.344089] Write of size 1 at addr ffff888100a242d0 by task kunit_try_catch/175 [ 17.344639] [ 17.344903] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.345028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.345917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.345952] Call Trace: [ 17.345969] <TASK> [ 17.345990] dump_stack_lvl+0x73/0xb0 [ 17.346029] print_report+0xd1/0x650 [ 17.346089] ? __virt_addr_valid+0x1db/0x2d0 [ 17.346125] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 17.346160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.346280] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 17.346334] kasan_report+0x141/0x180 [ 17.346366] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 17.346405] __asan_report_store1_noabort+0x1b/0x30 [ 17.346434] krealloc_less_oob_helper+0xe23/0x11d0 [ 17.346470] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 17.346503] ? finish_task_switch.isra.0+0x153/0x700 [ 17.346535] ? __switch_to+0x47/0xf50 [ 17.346569] ? __schedule+0x10cc/0x2b60 [ 17.346602] ? __pfx_read_tsc+0x10/0x10 [ 17.346636] krealloc_less_oob+0x1c/0x30 [ 17.346666] kunit_try_run_case+0x1a5/0x480 [ 17.346695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.346721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.346755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.346818] ? __kthread_parkme+0x82/0x180 [ 17.346847] ? preempt_count_sub+0x50/0x80 [ 17.346878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.346905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.346940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.346974] kthread+0x337/0x6f0 [ 17.347000] ? trace_preempt_on+0x20/0xc0 [ 17.347032] ? __pfx_kthread+0x10/0x10 [ 17.347086] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.347119] ? calculate_sigpending+0x7b/0xa0 [ 17.347153] ? __pfx_kthread+0x10/0x10 [ 17.347277] ret_from_fork+0x116/0x1d0 [ 17.347308] ? __pfx_kthread+0x10/0x10 [ 17.347337] ret_from_fork_asm+0x1a/0x30 [ 17.347378] </TASK> [ 17.347392] [ 17.370491] Allocated by task 175: [ 17.370645] kasan_save_stack+0x45/0x70 [ 17.371105] kasan_save_track+0x18/0x40 [ 17.371823] kasan_save_alloc_info+0x3b/0x50 [ 17.372812] __kasan_krealloc+0x190/0x1f0 [ 17.373824] krealloc_noprof+0xf3/0x340 [ 17.374222] krealloc_less_oob_helper+0x1aa/0x11d0 [ 17.374802] krealloc_less_oob+0x1c/0x30 [ 17.375561] kunit_try_run_case+0x1a5/0x480 [ 17.376089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.376602] kthread+0x337/0x6f0 [ 17.376986] ret_from_fork+0x116/0x1d0 [ 17.377400] ret_from_fork_asm+0x1a/0x30 [ 17.377754] [ 17.378532] The buggy address belongs to the object at ffff888100a24200 [ 17.378532] which belongs to the cache kmalloc-256 of size 256 [ 17.380094] The buggy address is located 7 bytes to the right of [ 17.380094] allocated 201-byte region [ffff888100a24200, ffff888100a242c9) [ 17.382006] [ 17.382373] The buggy address belongs to the physical page: [ 17.383186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24 [ 17.383959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.385120] flags: 0x200000000000040(head|node=0|zone=2) [ 17.385747] page_type: f5(slab) [ 17.386074] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.387555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.388533] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.389573] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.391012] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff [ 17.391725] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.392821] page dumped because: kasan: bad access detected [ 17.393097] [ 17.393317] Memory state around the buggy address: [ 17.393716] ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.394866] ffff888100a24200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.395507] >ffff888100a24280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.396909] ^ [ 17.397442] ffff888100a24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.398667] ffff888100a24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399826] ==================================================================
[ 49.845367] ================================================================== [ 49.852630] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4 [ 49.860260] Write of size 1 at addr cb2c3eda by task kunit_try_catch/210 [ 49.867004] [ 49.868499] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 49.868530] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.868560] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.868560] Call trace: [ 49.868560] unwind_backtrace from show_stack+0x18/0x1c [ 49.868591] show_stack from dump_stack_lvl+0x70/0x90 [ 49.868621] dump_stack_lvl from print_report+0x158/0x528 [ 49.868652] print_report from kasan_report+0xdc/0x118 [ 49.868652] kasan_report from krealloc_less_oob_helper+0xd18/0xea4 [ 49.868682] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.868713] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.868743] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.868774] kthread from ret_from_fork+0x14/0x20 [ 49.868774] Exception stack(0xf221bfb0 to 0xf221bff8) [ 49.868804] bfa0: 00000000 00000000 00000000 00000000 [ 49.868804] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.868835] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.868835] [ 49.975799] Allocated by task 210: [ 49.979217] kasan_save_track+0x30/0x5c [ 49.983093] __kasan_krealloc+0xf4/0x140 [ 49.987030] krealloc_noprof+0x104/0x2e4 [ 49.990997] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.995727] kunit_try_run_case+0x22c/0x5a8 [ 49.999969] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.005493] kthread+0x464/0x810 [ 50.008728] ret_from_fork+0x14/0x20 [ 50.012329] [ 50.013854] The buggy address belongs to the object at cb2c3e00 [ 50.013854] which belongs to the cache kmalloc-256 of size 256 [ 50.025726] The buggy address is located 17 bytes to the right of [ 50.025726] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 50.037475] [ 50.038970] The buggy address belongs to the physical page: [ 50.044586] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 50.051849] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.059539] flags: 0x40(head|zone=0) [ 50.063140] page_type: f5(slab) [ 50.066314] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.074462] raw: 00000000 [ 50.077117] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.085327] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.093566] head: 00000000 00000002 [ 50.097076] page dumped because: kasan: bad access detected [ 50.102691] [ 50.104187] Memory state around the buggy address: [ 50.109008] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.115570] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.122161] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.128723] ^ [ 50.134155] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.140716] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.147277] ================================================================== [ 49.536499] ================================================================== [ 49.543762] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4 [ 49.551391] Write of size 1 at addr cb2c3ed0 by task kunit_try_catch/210 [ 49.558135] [ 49.559631] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 49.559661] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.559661] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.559661] Call trace: [ 49.559692] unwind_backtrace from show_stack+0x18/0x1c [ 49.559692] show_stack from dump_stack_lvl+0x70/0x90 [ 49.559722] dump_stack_lvl from print_report+0x158/0x528 [ 49.559753] print_report from kasan_report+0xdc/0x118 [ 49.559783] kasan_report from krealloc_less_oob_helper+0xdd0/0xea4 [ 49.559783] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.559814] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.559844] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.559875] kthread from ret_from_fork+0x14/0x20 [ 49.559906] Exception stack(0xf221bfb0 to 0xf221bff8) [ 49.559906] bfa0: 00000000 00000000 00000000 00000000 [ 49.559936] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.559936] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.559936] [ 49.666900] Allocated by task 210: [ 49.670349] kasan_save_track+0x30/0x5c [ 49.674194] __kasan_krealloc+0xf4/0x140 [ 49.678161] krealloc_noprof+0x104/0x2e4 [ 49.682098] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.686859] kunit_try_run_case+0x22c/0x5a8 [ 49.691070] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.696594] kthread+0x464/0x810 [ 49.699859] ret_from_fork+0x14/0x20 [ 49.703460] [ 49.704956] The buggy address belongs to the object at cb2c3e00 [ 49.704956] which belongs to the cache kmalloc-256 of size 256 [ 49.716857] The buggy address is located 7 bytes to the right of [ 49.716857] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 49.728485] [ 49.729980] The buggy address belongs to the physical page: [ 49.735595] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 49.742858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.750579] flags: 0x40(head|zone=0) [ 49.754180] page_type: f5(slab) [ 49.757354] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.765502] raw: 00000000 [ 49.768127] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.776367] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.784606] head: 00000000 00000002 [ 49.788116] page dumped because: kasan: bad access detected [ 49.793701] [ 49.795227] Memory state around the buggy address: [ 49.800048] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.806610] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.813171] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 49.819732] ^ [ 49.824920] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.831481] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.838073] ================================================================== [ 50.154602] ================================================================== [ 50.161895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4 [ 50.169494] Write of size 1 at addr cb2c3eea by task kunit_try_catch/210 [ 50.176269] [ 50.177764] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 50.177795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.177795] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.177795] Call trace: [ 50.177825] unwind_backtrace from show_stack+0x18/0x1c [ 50.177825] show_stack from dump_stack_lvl+0x70/0x90 [ 50.177856] dump_stack_lvl from print_report+0x158/0x528 [ 50.177886] print_report from kasan_report+0xdc/0x118 [ 50.177917] kasan_report from krealloc_less_oob_helper+0xd58/0xea4 [ 50.177917] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.177947] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.177978] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.178009] kthread from ret_from_fork+0x14/0x20 [ 50.178039] Exception stack(0xf221bfb0 to 0xf221bff8) [ 50.178039] bfa0: 00000000 00000000 00000000 00000000 [ 50.178070] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.178070] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.178070] [ 50.285034] Allocated by task 210: [ 50.288482] kasan_save_track+0x30/0x5c [ 50.292327] __kasan_krealloc+0xf4/0x140 [ 50.296295] krealloc_noprof+0x104/0x2e4 [ 50.300231] krealloc_less_oob_helper+0x1d8/0xea4 [ 50.304992] kunit_try_run_case+0x22c/0x5a8 [ 50.309204] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.314727] kthread+0x464/0x810 [ 50.317993] ret_from_fork+0x14/0x20 [ 50.321594] [ 50.323089] The buggy address belongs to the object at cb2c3e00 [ 50.323089] which belongs to the cache kmalloc-256 of size 256 [ 50.334991] The buggy address is located 33 bytes to the right of [ 50.334991] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 50.346710] [ 50.348205] The buggy address belongs to the physical page: [ 50.353820] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 50.361083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.368804] flags: 0x40(head|zone=0) [ 50.372406] page_type: f5(slab) [ 50.375579] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.383697] raw: 00000000 [ 50.386352] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.394592] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.402832] head: 00000000 00000002 [ 50.406341] page dumped because: kasan: bad access detected [ 50.411926] [ 50.413421] Memory state around the buggy address: [ 50.418273] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.424835] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.431396] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.437957] ^ [ 50.443939] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.450500] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.457061] ================================================================== [ 51.523834] ================================================================== [ 51.531097] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4 [ 51.538726] Write of size 1 at addr cc74e0d0 by task kunit_try_catch/214 [ 51.545471] [ 51.546966] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.546997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.547027] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.547027] Call trace: [ 51.547027] unwind_backtrace from show_stack+0x18/0x1c [ 51.547058] show_stack from dump_stack_lvl+0x70/0x90 [ 51.547088] dump_stack_lvl from print_report+0x158/0x528 [ 51.547119] print_report from kasan_report+0xdc/0x118 [ 51.547119] kasan_report from krealloc_less_oob_helper+0xdd0/0xea4 [ 51.547149] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.547180] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.547210] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.547241] kthread from ret_from_fork+0x14/0x20 [ 51.547241] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 51.547271] 3fa0: 00000000 00000000 00000000 00000000 [ 51.547271] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.547302] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.547302] [ 51.654266] The buggy address belongs to the physical page: [ 51.659881] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.667144] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.674835] flags: 0x40(head|zone=0) [ 51.678466] page_type: f8(unknown) [ 51.681884] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.690032] raw: 00000000 [ 51.692657] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.700897] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.709136] head: 00000000 00000004 [ 51.712646] page dumped because: kasan: bad access detected [ 51.718231] [ 51.719757] Memory state around the buggy address: [ 51.724578] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.731140] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.737701] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 51.744293] ^ [ 51.749450] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.756011] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.762573] ================================================================== [ 51.273590] ================================================================== [ 51.285217] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4 [ 51.292846] Write of size 1 at addr cc74e0c9 by task kunit_try_catch/214 [ 51.299591] [ 51.301116] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.301116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.301147] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.301147] Call trace: [ 51.301147] unwind_backtrace from show_stack+0x18/0x1c [ 51.301177] show_stack from dump_stack_lvl+0x70/0x90 [ 51.301208] dump_stack_lvl from print_report+0x158/0x528 [ 51.301239] print_report from kasan_report+0xdc/0x118 [ 51.301239] kasan_report from krealloc_less_oob_helper+0xcf4/0xea4 [ 51.301269] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.301300] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.301330] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.301361] kthread from ret_from_fork+0x14/0x20 [ 51.301361] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 51.301391] 3fa0: 00000000 00000000 00000000 00000000 [ 51.301391] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.301422] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.301422] [ 51.408386] The buggy address belongs to the physical page: [ 51.414001] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.421264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.428985] flags: 0x40(head|zone=0) [ 51.432586] page_type: f8(unknown) [ 51.436004] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.444152] raw: 00000000 [ 51.446807] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.455017] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.463256] head: 00000000 00000004 [ 51.466766] page dumped because: kasan: bad access detected [ 51.472381] [ 51.473876] Memory state around the buggy address: [ 51.478698] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.485260] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.491851] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 51.498413] ^ [ 51.503326] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.509887] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.516448] ================================================================== [ 51.769927] ================================================================== [ 51.777191] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4 [ 51.784820] Write of size 1 at addr cc74e0da by task kunit_try_catch/214 [ 51.791564] [ 51.793060] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.793090] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.793121] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.793121] Call trace: [ 51.793121] unwind_backtrace from show_stack+0x18/0x1c [ 51.793151] show_stack from dump_stack_lvl+0x70/0x90 [ 51.793182] dump_stack_lvl from print_report+0x158/0x528 [ 51.793212] print_report from kasan_report+0xdc/0x118 [ 51.793212] kasan_report from krealloc_less_oob_helper+0xd18/0xea4 [ 51.793243] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.793273] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.793304] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.793334] kthread from ret_from_fork+0x14/0x20 [ 51.793334] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 51.793365] 3fa0: 00000000 00000000 00000000 00000000 [ 51.793365] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.793395] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.793395] [ 51.900360] The buggy address belongs to the physical page: [ 51.905975] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.913238] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.920959] flags: 0x40(head|zone=0) [ 51.924560] page_type: f8(unknown) [ 51.927978] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.936126] raw: 00000000 [ 51.938751] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.946990] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.955230] head: 00000000 00000004 [ 51.958740] page dumped because: kasan: bad access detected [ 51.964355] [ 51.965850] Memory state around the buggy address: [ 51.970672] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.977233] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.983825] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 51.990386] ^ [ 51.995819] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.002380] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.008941] ================================================================== [ 52.263153] ================================================================== [ 52.270416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4 [ 52.278045] Write of size 1 at addr cc74e0eb by task kunit_try_catch/214 [ 52.284790] [ 52.286285] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.286315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.286315] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.286315] Call trace: [ 52.286346] unwind_backtrace from show_stack+0x18/0x1c [ 52.286346] show_stack from dump_stack_lvl+0x70/0x90 [ 52.286376] dump_stack_lvl from print_report+0x158/0x528 [ 52.286407] print_report from kasan_report+0xdc/0x118 [ 52.286437] kasan_report from krealloc_less_oob_helper+0xd00/0xea4 [ 52.286437] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 52.286468] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.286499] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.286529] kthread from ret_from_fork+0x14/0x20 [ 52.286560] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 52.286560] 3fa0: 00000000 00000000 00000000 00000000 [ 52.286590] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.286590] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.286590] [ 52.393554] The buggy address belongs to the physical page: [ 52.399169] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 52.406433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.414154] flags: 0x40(head|zone=0) [ 52.417755] page_type: f8(unknown) [ 52.421173] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.429321] raw: 00000000 [ 52.431976] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.440216] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.448425] head: 00000000 00000004 [ 52.451934] page dumped because: kasan: bad access detected [ 52.457550] [ 52.459045] Memory state around the buggy address: [ 52.463867] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.470458] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.477020] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.483581] ^ [ 52.489532] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.496124] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.502685] ================================================================== [ 49.223968] ================================================================== [ 49.235107] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4 [ 49.242736] Write of size 1 at addr cb2c3ec9 by task kunit_try_catch/210 [ 49.249481] [ 49.250976] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 49.251007] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.251007] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.251037] Call trace: [ 49.251037] unwind_backtrace from show_stack+0x18/0x1c [ 49.251068] show_stack from dump_stack_lvl+0x70/0x90 [ 49.251068] dump_stack_lvl from print_report+0x158/0x528 [ 49.251098] print_report from kasan_report+0xdc/0x118 [ 49.251129] kasan_report from krealloc_less_oob_helper+0xcf4/0xea4 [ 49.251159] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.251190] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.251190] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.251220] kthread from ret_from_fork+0x14/0x20 [ 49.251251] Exception stack(0xf221bfb0 to 0xf221bff8) [ 49.251251] bfa0: 00000000 00000000 00000000 00000000 [ 49.251281] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.251281] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.251312] [ 49.358276] Allocated by task 210: [ 49.361694] kasan_save_track+0x30/0x5c [ 49.365570] __kasan_krealloc+0xf4/0x140 [ 49.369506] krealloc_noprof+0x104/0x2e4 [ 49.373474] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.378204] kunit_try_run_case+0x22c/0x5a8 [ 49.382415] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.387969] kthread+0x464/0x810 [ 49.391204] ret_from_fork+0x14/0x20 [ 49.394805] [ 49.396331] The buggy address belongs to the object at cb2c3e00 [ 49.396331] which belongs to the cache kmalloc-256 of size 256 [ 49.408203] The buggy address is located 0 bytes to the right of [ 49.408203] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 49.419860] [ 49.421356] The buggy address belongs to the physical page: [ 49.426971] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 49.434234] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.441955] flags: 0x40(head|zone=0) [ 49.445556] page_type: f5(slab) [ 49.448730] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.456848] raw: 00000000 [ 49.459503] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.467742] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.475982] head: 00000000 00000002 [ 49.479492] page dumped because: kasan: bad access detected [ 49.485076] [ 49.486602] Memory state around the buggy address: [ 49.491424] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.497985] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.504547] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 49.511108] ^ [ 49.516021] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.522613] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.529174] ================================================================== [ 52.016265] ================================================================== [ 52.023529] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4 [ 52.031158] Write of size 1 at addr cc74e0ea by task kunit_try_catch/214 [ 52.037902] [ 52.039428] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.039428] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.039459] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.039459] Call trace: [ 52.039459] unwind_backtrace from show_stack+0x18/0x1c [ 52.039489] show_stack from dump_stack_lvl+0x70/0x90 [ 52.039520] dump_stack_lvl from print_report+0x158/0x528 [ 52.039550] print_report from kasan_report+0xdc/0x118 [ 52.039550] kasan_report from krealloc_less_oob_helper+0xd58/0xea4 [ 52.039581] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 52.039611] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.039642] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.039672] kthread from ret_from_fork+0x14/0x20 [ 52.039672] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 52.039703] 3fa0: 00000000 00000000 00000000 00000000 [ 52.039703] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.039733] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.039733] [ 52.146697] The buggy address belongs to the physical page: [ 52.152313] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 52.159576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.167297] flags: 0x40(head|zone=0) [ 52.170898] page_type: f8(unknown) [ 52.174316] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.182464] raw: 00000000 [ 52.185119] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.193328] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.201568] head: 00000000 00000004 [ 52.205078] page dumped because: kasan: bad access detected [ 52.210693] [ 52.212188] Memory state around the buggy address: [ 52.217010] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.223571] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.230163] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.236724] ^ [ 52.242675] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.249237] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.255828] ================================================================== [ 50.464385] ================================================================== [ 50.471649] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4 [ 50.479278] Write of size 1 at addr cb2c3eeb by task kunit_try_catch/210 [ 50.486022] [ 50.487518] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 50.487548] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.487579] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.487579] Call trace: [ 50.487579] unwind_backtrace from show_stack+0x18/0x1c [ 50.487609] show_stack from dump_stack_lvl+0x70/0x90 [ 50.487640] dump_stack_lvl from print_report+0x158/0x528 [ 50.487640] print_report from kasan_report+0xdc/0x118 [ 50.487670] kasan_report from krealloc_less_oob_helper+0xd00/0xea4 [ 50.487701] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.487731] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.487762] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.487792] kthread from ret_from_fork+0x14/0x20 [ 50.487792] Exception stack(0xf221bfb0 to 0xf221bff8) [ 50.487823] bfa0: 00000000 00000000 00000000 00000000 [ 50.487823] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.487854] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.487854] [ 50.594818] Allocated by task 210: [ 50.598236] kasan_save_track+0x30/0x5c [ 50.602111] __kasan_krealloc+0xf4/0x140 [ 50.606048] krealloc_noprof+0x104/0x2e4 [ 50.610015] krealloc_less_oob_helper+0x1d8/0xea4 [ 50.614746] kunit_try_run_case+0x22c/0x5a8 [ 50.618988] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.624511] kthread+0x464/0x810 [ 50.627746] ret_from_fork+0x14/0x20 [ 50.631347] [ 50.632873] The buggy address belongs to the object at cb2c3e00 [ 50.632873] which belongs to the cache kmalloc-256 of size 256 [ 50.644775] The buggy address is located 34 bytes to the right of [ 50.644775] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 50.656494] [ 50.657989] The buggy address belongs to the physical page: [ 50.663604] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 50.670867] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.678558] flags: 0x40(head|zone=0) [ 50.682159] page_type: f5(slab) [ 50.685333] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.693481] raw: 00000000 [ 50.696136] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.704345] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.712585] head: 00000000 00000002 [ 50.716094] page dumped because: kasan: bad access detected [ 50.721710] [ 50.723205] Memory state around the buggy address: [ 50.728027] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.734588] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.741180] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.747741] ^ [ 50.753692] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.760253] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.766845] ==================================================================