Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.036486] ================================================================== [ 19.036618] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.036775] Write of size 1 at addr fff00000c66160f0 by task kunit_try_catch/169 [ 19.036971] [ 19.037067] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.037324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.037382] Hardware name: linux,dummy-virt (DT) [ 19.037452] Call trace: [ 19.037501] show_stack+0x20/0x38 (C) [ 19.037600] dump_stack_lvl+0x8c/0xd0 [ 19.037706] print_report+0x118/0x608 [ 19.037802] kasan_report+0xdc/0x128 [ 19.037922] __asan_report_store1_noabort+0x20/0x30 [ 19.038049] krealloc_more_oob_helper+0x5c0/0x678 [ 19.038262] krealloc_large_more_oob+0x20/0x38 [ 19.038494] kunit_try_run_case+0x170/0x3f0 [ 19.038704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.039481] kthread+0x328/0x630 [ 19.040196] ret_from_fork+0x10/0x20 [ 19.040416] [ 19.040465] The buggy address belongs to the physical page: [ 19.041088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.041703] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.041957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.042185] page_type: f8(unknown) [ 19.042713] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.042829] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.042956] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.043074] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.043200] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.043417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.044350] page dumped because: kasan: bad access detected [ 19.045688] [ 19.046039] Memory state around the buggy address: [ 19.046133] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.046339] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.046656] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.047123] ^ [ 19.047931] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.048417] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.048528] ================================================================== [ 19.027548] ================================================================== [ 19.027689] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.027821] Write of size 1 at addr fff00000c66160eb by task kunit_try_catch/169 [ 19.028816] [ 19.028917] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.029344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.029400] Hardware name: linux,dummy-virt (DT) [ 19.029444] Call trace: [ 19.029475] show_stack+0x20/0x38 (C) [ 19.029638] dump_stack_lvl+0x8c/0xd0 [ 19.029916] print_report+0x118/0x608 [ 19.030136] kasan_report+0xdc/0x128 [ 19.030354] __asan_report_store1_noabort+0x20/0x30 [ 19.030582] krealloc_more_oob_helper+0x60c/0x678 [ 19.030722] krealloc_large_more_oob+0x20/0x38 [ 19.030854] kunit_try_run_case+0x170/0x3f0 [ 19.030977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.031090] kthread+0x328/0x630 [ 19.031176] ret_from_fork+0x10/0x20 [ 19.031492] [ 19.031548] The buggy address belongs to the physical page: [ 19.031686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.031954] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.032164] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.032383] page_type: f8(unknown) [ 19.032744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.032940] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.033143] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.033364] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.033665] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.033845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.033950] page dumped because: kasan: bad access detected [ 19.034026] [ 19.034088] Memory state around the buggy address: [ 19.034207] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.034364] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.034474] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.034571] ^ [ 19.034674] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.034786] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.034898] ================================================================== [ 18.918450] ================================================================== [ 18.918567] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 18.918688] Write of size 1 at addr fff00000c604d0f0 by task kunit_try_catch/165 [ 18.918814] [ 18.918907] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.919120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.919191] Hardware name: linux,dummy-virt (DT) [ 18.919266] Call trace: [ 18.919324] show_stack+0x20/0x38 (C) [ 18.919446] dump_stack_lvl+0x8c/0xd0 [ 18.919560] print_report+0x118/0x608 [ 18.919673] kasan_report+0xdc/0x128 [ 18.919785] __asan_report_store1_noabort+0x20/0x30 [ 18.920359] krealloc_more_oob_helper+0x5c0/0x678 [ 18.920547] krealloc_more_oob+0x20/0x38 [ 18.920711] kunit_try_run_case+0x170/0x3f0 [ 18.920931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.921353] kthread+0x328/0x630 [ 18.921463] ret_from_fork+0x10/0x20 [ 18.921703] [ 18.921752] Allocated by task 165: [ 18.921903] kasan_save_stack+0x3c/0x68 [ 18.922132] kasan_save_track+0x20/0x40 [ 18.922333] kasan_save_alloc_info+0x40/0x58 [ 18.922649] __kasan_krealloc+0x118/0x178 [ 18.922743] krealloc_noprof+0x128/0x360 [ 18.922940] krealloc_more_oob_helper+0x168/0x678 [ 18.923237] krealloc_more_oob+0x20/0x38 [ 18.923418] kunit_try_run_case+0x170/0x3f0 [ 18.923623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.923847] kthread+0x328/0x630 [ 18.924143] ret_from_fork+0x10/0x20 [ 18.924239] [ 18.924358] The buggy address belongs to the object at fff00000c604d000 [ 18.924358] which belongs to the cache kmalloc-256 of size 256 [ 18.924623] The buggy address is located 5 bytes to the right of [ 18.924623] allocated 235-byte region [fff00000c604d000, fff00000c604d0eb) [ 18.924806] [ 18.924866] The buggy address belongs to the physical page: [ 18.924944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.925081] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.925198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.925332] page_type: f5(slab) [ 18.925429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.925541] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.925670] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.926353] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.926535] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.926695] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.926803] page dumped because: kasan: bad access detected [ 18.926894] [ 18.926991] Memory state around the buggy address: [ 18.927092] fff00000c604cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.927198] fff00000c604d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.927293] >fff00000c604d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.927406] ^ [ 18.927497] fff00000c604d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.927581] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.927670] ================================================================== [ 18.904394] ================================================================== [ 18.904558] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 18.904953] Write of size 1 at addr fff00000c604d0eb by task kunit_try_catch/165 [ 18.905354] [ 18.905940] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.906323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.906520] Hardware name: linux,dummy-virt (DT) [ 18.906717] Call trace: [ 18.906968] show_stack+0x20/0x38 (C) [ 18.907108] dump_stack_lvl+0x8c/0xd0 [ 18.907476] print_report+0x118/0x608 [ 18.908052] kasan_report+0xdc/0x128 [ 18.908358] __asan_report_store1_noabort+0x20/0x30 [ 18.908540] krealloc_more_oob_helper+0x60c/0x678 [ 18.908709] krealloc_more_oob+0x20/0x38 [ 18.908894] kunit_try_run_case+0x170/0x3f0 [ 18.909047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.909629] kthread+0x328/0x630 [ 18.909819] ret_from_fork+0x10/0x20 [ 18.910056] [ 18.910111] Allocated by task 165: [ 18.910245] kasan_save_stack+0x3c/0x68 [ 18.910858] kasan_save_track+0x20/0x40 [ 18.911036] kasan_save_alloc_info+0x40/0x58 [ 18.911589] __kasan_krealloc+0x118/0x178 [ 18.912160] krealloc_noprof+0x128/0x360 [ 18.912310] krealloc_more_oob_helper+0x168/0x678 [ 18.912859] krealloc_more_oob+0x20/0x38 [ 18.912999] kunit_try_run_case+0x170/0x3f0 [ 18.913081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.913172] kthread+0x328/0x630 [ 18.913245] ret_from_fork+0x10/0x20 [ 18.913316] [ 18.913360] The buggy address belongs to the object at fff00000c604d000 [ 18.913360] which belongs to the cache kmalloc-256 of size 256 [ 18.913488] The buggy address is located 0 bytes to the right of [ 18.913488] allocated 235-byte region [fff00000c604d000, fff00000c604d0eb) [ 18.913623] [ 18.913665] The buggy address belongs to the physical page: [ 18.913740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.913901] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.914052] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.914217] page_type: f5(slab) [ 18.914336] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.914490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.914697] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.914818] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.914959] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.915088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.915203] page dumped because: kasan: bad access detected [ 18.915277] [ 18.915323] Memory state around the buggy address: [ 18.915396] fff00000c604cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.915491] fff00000c604d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.915597] >fff00000c604d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.915702] ^ [ 18.915826] fff00000c604d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.915942] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.916034] ==================================================================
[ 11.178120] ================================================================== [ 11.178850] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 11.179115] Write of size 1 at addr ffff888102a8a0eb by task kunit_try_catch/185 [ 11.179326] [ 11.179467] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 11.179557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.179582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.179617] Call Trace: [ 11.179872] <TASK> [ 11.179910] dump_stack_lvl+0x73/0xb0 [ 11.180053] print_report+0xd1/0x650 [ 11.180076] ? __virt_addr_valid+0x1db/0x2d0 [ 11.180102] ? krealloc_more_oob_helper+0x821/0x930 [ 11.180125] ? kasan_addr_to_slab+0x11/0xa0 [ 11.180145] ? krealloc_more_oob_helper+0x821/0x930 [ 11.180167] kasan_report+0x141/0x180 [ 11.180188] ? krealloc_more_oob_helper+0x821/0x930 [ 11.180216] __asan_report_store1_noabort+0x1b/0x30 [ 11.180239] krealloc_more_oob_helper+0x821/0x930 [ 11.180260] ? __schedule+0x10cc/0x2b60 [ 11.180282] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.180305] ? finish_task_switch.isra.0+0x153/0x700 [ 11.180327] ? __switch_to+0x47/0xf50 [ 11.180353] ? __schedule+0x10cc/0x2b60 [ 11.180372] ? __pfx_read_tsc+0x10/0x10 [ 11.180462] krealloc_large_more_oob+0x1c/0x30 [ 11.180486] kunit_try_run_case+0x1a5/0x480 [ 11.180511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.180532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.180554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.180575] ? __kthread_parkme+0x82/0x180 [ 11.180595] ? preempt_count_sub+0x50/0x80 [ 11.180617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.180639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.180661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.180682] kthread+0x337/0x6f0 [ 11.180701] ? trace_preempt_on+0x20/0xc0 [ 11.180725] ? __pfx_kthread+0x10/0x10 [ 11.180745] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.180764] ? calculate_sigpending+0x7b/0xa0 [ 11.180788] ? __pfx_kthread+0x10/0x10 [ 11.180808] ret_from_fork+0x116/0x1d0 [ 11.180825] ? __pfx_kthread+0x10/0x10 [ 11.180845] ret_from_fork_asm+0x1a/0x30 [ 11.180875] </TASK> [ 11.180886] [ 11.196021] The buggy address belongs to the physical page: [ 11.196198] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a88 [ 11.196432] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.196644] flags: 0x200000000000040(head|node=0|zone=2) [ 11.196974] page_type: f8(unknown) [ 11.197174] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.197457] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.197730] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.198105] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.198405] head: 0200000000000002 ffffea00040aa201 00000000ffffffff 00000000ffffffff [ 11.198716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.199156] page dumped because: kasan: bad access detected [ 11.199381] [ 11.199789] Memory state around the buggy address: [ 11.200005] ffff888102a89f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.200283] ffff888102a8a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.201274] >ffff888102a8a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.201947] ^ [ 11.202464] ffff888102a8a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.202981] ffff888102a8a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.203266] ================================================================== [ 10.976287] ================================================================== [ 10.976860] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 10.977118] Write of size 1 at addr ffff8881003352eb by task kunit_try_catch/181 [ 10.977332] [ 10.977482] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 10.977529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.977540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.977559] Call Trace: [ 10.977571] <TASK> [ 10.977587] dump_stack_lvl+0x73/0xb0 [ 10.977616] print_report+0xd1/0x650 [ 10.977637] ? __virt_addr_valid+0x1db/0x2d0 [ 10.977660] ? krealloc_more_oob_helper+0x821/0x930 [ 10.977688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.977709] ? krealloc_more_oob_helper+0x821/0x930 [ 10.977735] kasan_report+0x141/0x180 [ 10.977768] ? krealloc_more_oob_helper+0x821/0x930 [ 10.977795] __asan_report_store1_noabort+0x1b/0x30 [ 10.977817] krealloc_more_oob_helper+0x821/0x930 [ 10.977851] ? __schedule+0x10cc/0x2b60 [ 10.977871] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 10.977894] ? finish_task_switch.isra.0+0x153/0x700 [ 10.977915] ? __switch_to+0x47/0xf50 [ 10.977949] ? __schedule+0x10cc/0x2b60 [ 10.977969] ? __pfx_read_tsc+0x10/0x10 [ 10.977993] krealloc_more_oob+0x1c/0x30 [ 10.978013] kunit_try_run_case+0x1a5/0x480 [ 10.978038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.978058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.978079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.978100] ? __kthread_parkme+0x82/0x180 [ 10.978120] ? preempt_count_sub+0x50/0x80 [ 10.978141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.978163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.978194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.978216] kthread+0x337/0x6f0 [ 10.978234] ? trace_preempt_on+0x20/0xc0 [ 10.978268] ? __pfx_kthread+0x10/0x10 [ 10.978288] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.978307] ? calculate_sigpending+0x7b/0xa0 [ 10.978330] ? __pfx_kthread+0x10/0x10 [ 10.978351] ret_from_fork+0x116/0x1d0 [ 10.978369] ? __pfx_kthread+0x10/0x10 [ 10.978416] ret_from_fork_asm+0x1a/0x30 [ 10.978446] </TASK> [ 10.978456] [ 10.992586] Allocated by task 181: [ 10.992714] kasan_save_stack+0x45/0x70 [ 10.992850] kasan_save_track+0x18/0x40 [ 10.992987] kasan_save_alloc_info+0x3b/0x50 [ 10.993129] __kasan_krealloc+0x190/0x1f0 [ 10.993259] krealloc_noprof+0xf3/0x340 [ 10.993387] krealloc_more_oob_helper+0x1a9/0x930 [ 10.993538] krealloc_more_oob+0x1c/0x30 [ 10.993667] kunit_try_run_case+0x1a5/0x480 [ 10.993810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.994794] kthread+0x337/0x6f0 [ 10.994978] ret_from_fork+0x116/0x1d0 [ 10.995112] ret_from_fork_asm+0x1a/0x30 [ 10.995246] [ 10.995314] The buggy address belongs to the object at ffff888100335200 [ 10.995314] which belongs to the cache kmalloc-256 of size 256 [ 10.995941] The buggy address is located 0 bytes to the right of [ 10.995941] allocated 235-byte region [ffff888100335200, ffff8881003352eb) [ 10.996550] [ 10.996656] The buggy address belongs to the physical page: [ 10.996921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100334 [ 10.997292] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 10.997602] flags: 0x200000000000040(head|node=0|zone=2) [ 10.997781] page_type: f5(slab) [ 10.997901] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.998244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.998654] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 10.998879] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.999131] head: 0200000000000001 ffffea000400cd01 00000000ffffffff 00000000ffffffff [ 10.999538] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 10.999864] page dumped because: kasan: bad access detected [ 11.000102] [ 11.000177] Memory state around the buggy address: [ 11.000329] ffff888100335180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.000660] ffff888100335200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.000975] >ffff888100335280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.001438] ^ [ 11.001715] ffff888100335300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.001998] ffff888100335380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.002327] ================================================================== [ 11.204678] ================================================================== [ 11.204983] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.205301] Write of size 1 at addr ffff888102a8a0f0 by task kunit_try_catch/185 [ 11.205915] [ 11.206478] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 11.206530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.206555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.206573] Call Trace: [ 11.206590] <TASK> [ 11.206637] dump_stack_lvl+0x73/0xb0 [ 11.206669] print_report+0xd1/0x650 [ 11.206691] ? __virt_addr_valid+0x1db/0x2d0 [ 11.206716] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.206738] ? kasan_addr_to_slab+0x11/0xa0 [ 11.206758] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.206781] kasan_report+0x141/0x180 [ 11.206801] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.206828] __asan_report_store1_noabort+0x1b/0x30 [ 11.206851] krealloc_more_oob_helper+0x7eb/0x930 [ 11.206872] ? __schedule+0x10cc/0x2b60 [ 11.206893] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.206916] ? finish_task_switch.isra.0+0x153/0x700 [ 11.206948] ? __switch_to+0x47/0xf50 [ 11.206973] ? __schedule+0x10cc/0x2b60 [ 11.206994] ? __pfx_read_tsc+0x10/0x10 [ 11.207018] krealloc_large_more_oob+0x1c/0x30 [ 11.207039] kunit_try_run_case+0x1a5/0x480 [ 11.207062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.207083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.207104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.207125] ? __kthread_parkme+0x82/0x180 [ 11.207145] ? preempt_count_sub+0x50/0x80 [ 11.207166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.207188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.207210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.207231] kthread+0x337/0x6f0 [ 11.207250] ? trace_preempt_on+0x20/0xc0 [ 11.207273] ? __pfx_kthread+0x10/0x10 [ 11.207293] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.207312] ? calculate_sigpending+0x7b/0xa0 [ 11.207336] ? __pfx_kthread+0x10/0x10 [ 11.207356] ret_from_fork+0x116/0x1d0 [ 11.207374] ? __pfx_kthread+0x10/0x10 [ 11.207406] ret_from_fork_asm+0x1a/0x30 [ 11.207436] </TASK> [ 11.207447] [ 11.219695] The buggy address belongs to the physical page: [ 11.220053] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a88 [ 11.220355] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.221036] flags: 0x200000000000040(head|node=0|zone=2) [ 11.221509] page_type: f8(unknown) [ 11.221724] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.222045] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.222348] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.222945] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.223544] head: 0200000000000002 ffffea00040aa201 00000000ffffffff 00000000ffffffff [ 11.223989] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.224292] page dumped because: kasan: bad access detected [ 11.224914] [ 11.225180] Memory state around the buggy address: [ 11.225520] ffff888102a89f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.226160] ffff888102a8a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.226645] >ffff888102a8a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 11.227071] ^ [ 11.227345] ffff888102a8a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.227857] ffff888102a8a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 11.228156] ================================================================== [ 11.004734] ================================================================== [ 11.005059] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 11.005963] Write of size 1 at addr ffff8881003352f0 by task kunit_try_catch/181 [ 11.006405] [ 11.006749] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 11.006800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.006811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.006829] Call Trace: [ 11.006840] <TASK> [ 11.006855] dump_stack_lvl+0x73/0xb0 [ 11.006885] print_report+0xd1/0x650 [ 11.006906] ? __virt_addr_valid+0x1db/0x2d0 [ 11.006928] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.006962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.006982] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.007004] kasan_report+0x141/0x180 [ 11.007026] ? krealloc_more_oob_helper+0x7eb/0x930 [ 11.007052] __asan_report_store1_noabort+0x1b/0x30 [ 11.007075] krealloc_more_oob_helper+0x7eb/0x930 [ 11.007096] ? __schedule+0x10cc/0x2b60 [ 11.007116] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 11.007139] ? finish_task_switch.isra.0+0x153/0x700 [ 11.007160] ? __switch_to+0x47/0xf50 [ 11.007185] ? __schedule+0x10cc/0x2b60 [ 11.007204] ? __pfx_read_tsc+0x10/0x10 [ 11.007228] krealloc_more_oob+0x1c/0x30 [ 11.007247] kunit_try_run_case+0x1a5/0x480 [ 11.007269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.007289] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.007310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.007332] ? __kthread_parkme+0x82/0x180 [ 11.007351] ? preempt_count_sub+0x50/0x80 [ 11.007372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.007405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.007427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.007448] kthread+0x337/0x6f0 [ 11.007466] ? trace_preempt_on+0x20/0xc0 [ 11.007488] ? __pfx_kthread+0x10/0x10 [ 11.007508] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.007528] ? calculate_sigpending+0x7b/0xa0 [ 11.007550] ? __pfx_kthread+0x10/0x10 [ 11.007570] ret_from_fork+0x116/0x1d0 [ 11.007587] ? __pfx_kthread+0x10/0x10 [ 11.007607] ret_from_fork_asm+0x1a/0x30 [ 11.007636] </TASK> [ 11.007647] [ 11.018253] Allocated by task 181: [ 11.018809] kasan_save_stack+0x45/0x70 [ 11.019026] kasan_save_track+0x18/0x40 [ 11.019335] kasan_save_alloc_info+0x3b/0x50 [ 11.019913] __kasan_krealloc+0x190/0x1f0 [ 11.020208] krealloc_noprof+0xf3/0x340 [ 11.020374] krealloc_more_oob_helper+0x1a9/0x930 [ 11.020869] krealloc_more_oob+0x1c/0x30 [ 11.021192] kunit_try_run_case+0x1a5/0x480 [ 11.021573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.021831] kthread+0x337/0x6f0 [ 11.021997] ret_from_fork+0x116/0x1d0 [ 11.022166] ret_from_fork_asm+0x1a/0x30 [ 11.022342] [ 11.022809] The buggy address belongs to the object at ffff888100335200 [ 11.022809] which belongs to the cache kmalloc-256 of size 256 [ 11.023386] The buggy address is located 5 bytes to the right of [ 11.023386] allocated 235-byte region [ffff888100335200, ffff8881003352eb) [ 11.024151] [ 11.024235] The buggy address belongs to the physical page: [ 11.024866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100334 [ 11.025350] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.025886] flags: 0x200000000000040(head|node=0|zone=2) [ 11.026137] page_type: f5(slab) [ 11.026288] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.027285] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.028024] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.028585] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.028894] head: 0200000000000001 ffffea000400cd01 00000000ffffffff 00000000ffffffff [ 11.029205] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.029855] page dumped because: kasan: bad access detected [ 11.030335] [ 11.030672] Memory state around the buggy address: [ 11.031137] ffff888100335180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.031747] ffff888100335200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.032048] >ffff888100335280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 11.032332] ^ [ 11.032899] ffff888100335300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.033530] ffff888100335380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.033833] ==================================================================