Date
June 19, 2025, 12:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.048908] ================================================================== [ 30.049150] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.049305] Write of size 1 at addr fff00000c46d0eeb by task kunit_try_catch/167 [ 30.049474] [ 30.049566] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.049794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.049864] Hardware name: linux,dummy-virt (DT) [ 30.049974] Call trace: [ 30.050039] show_stack+0x20/0x38 (C) [ 30.050183] dump_stack_lvl+0x8c/0xd0 [ 30.050305] print_report+0x118/0x608 [ 30.050418] kasan_report+0xdc/0x128 [ 30.050548] __asan_report_store1_noabort+0x20/0x30 [ 30.050677] krealloc_more_oob_helper+0x60c/0x678 [ 30.050796] krealloc_more_oob+0x20/0x38 [ 30.050933] kunit_try_run_case+0x170/0x3f0 [ 30.051078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.051218] kthread+0x328/0x630 [ 30.051359] ret_from_fork+0x10/0x20 [ 30.051493] [ 30.051541] Allocated by task 167: [ 30.051638] kasan_save_stack+0x3c/0x68 [ 30.051733] kasan_save_track+0x20/0x40 [ 30.051805] kasan_save_alloc_info+0x40/0x58 [ 30.051888] __kasan_krealloc+0x118/0x178 [ 30.051993] krealloc_noprof+0x128/0x360 [ 30.052076] krealloc_more_oob_helper+0x168/0x678 [ 30.052165] krealloc_more_oob+0x20/0x38 [ 30.052248] kunit_try_run_case+0x170/0x3f0 [ 30.052358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.052507] kthread+0x328/0x630 [ 30.052619] ret_from_fork+0x10/0x20 [ 30.052739] [ 30.052807] The buggy address belongs to the object at fff00000c46d0e00 [ 30.052807] which belongs to the cache kmalloc-256 of size 256 [ 30.053033] The buggy address is located 0 bytes to the right of [ 30.053033] allocated 235-byte region [fff00000c46d0e00, fff00000c46d0eeb) [ 30.053263] [ 30.053314] The buggy address belongs to the physical page: [ 30.053395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.053546] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.053680] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.053807] page_type: f5(slab) [ 30.053913] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.054026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.054162] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.054230] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.054290] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.054349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.054397] page dumped because: kasan: bad access detected [ 30.054436] [ 30.054460] Memory state around the buggy address: [ 30.054507] fff00000c46d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.054557] fff00000c46d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.054604] >fff00000c46d0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.054645] ^ [ 30.054687] fff00000c46d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.054734] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.054775] ================================================================== [ 30.055736] ================================================================== [ 30.055856] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.056252] Write of size 1 at addr fff00000c46d0ef0 by task kunit_try_catch/167 [ 30.056374] [ 30.056542] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.056760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.056832] Hardware name: linux,dummy-virt (DT) [ 30.056942] Call trace: [ 30.056998] show_stack+0x20/0x38 (C) [ 30.057120] dump_stack_lvl+0x8c/0xd0 [ 30.057238] print_report+0x118/0x608 [ 30.057351] kasan_report+0xdc/0x128 [ 30.057472] __asan_report_store1_noabort+0x20/0x30 [ 30.057618] krealloc_more_oob_helper+0x5c0/0x678 [ 30.057742] krealloc_more_oob+0x20/0x38 [ 30.057865] kunit_try_run_case+0x170/0x3f0 [ 30.058010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.058141] kthread+0x328/0x630 [ 30.058234] ret_from_fork+0x10/0x20 [ 30.058346] [ 30.058429] Allocated by task 167: [ 30.058685] kasan_save_stack+0x3c/0x68 [ 30.058839] kasan_save_track+0x20/0x40 [ 30.059078] kasan_save_alloc_info+0x40/0x58 [ 30.059257] __kasan_krealloc+0x118/0x178 [ 30.059419] krealloc_noprof+0x128/0x360 [ 30.059568] krealloc_more_oob_helper+0x168/0x678 [ 30.059897] krealloc_more_oob+0x20/0x38 [ 30.060134] kunit_try_run_case+0x170/0x3f0 [ 30.060224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.060386] kthread+0x328/0x630 [ 30.060468] ret_from_fork+0x10/0x20 [ 30.060845] [ 30.061001] The buggy address belongs to the object at fff00000c46d0e00 [ 30.061001] which belongs to the cache kmalloc-256 of size 256 [ 30.061223] The buggy address is located 5 bytes to the right of [ 30.061223] allocated 235-byte region [fff00000c46d0e00, fff00000c46d0eeb) [ 30.061664] [ 30.061727] The buggy address belongs to the physical page: [ 30.061818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.062248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.062394] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.062537] page_type: f5(slab) [ 30.062638] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.062765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.062898] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.063024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.063151] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.063276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.063366] page dumped because: kasan: bad access detected [ 30.063424] [ 30.063458] Memory state around the buggy address: [ 30.063524] fff00000c46d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.063622] fff00000c46d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.063726] >fff00000c46d0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.063822] ^ [ 30.065317] fff00000c46d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065474] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065567] ================================================================== [ 30.195237] ================================================================== [ 30.195691] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.195831] Write of size 1 at addr fff00000c77020f0 by task kunit_try_catch/171 [ 30.195983] [ 30.196336] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.196898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.196981] Hardware name: linux,dummy-virt (DT) [ 30.197074] Call trace: [ 30.197135] show_stack+0x20/0x38 (C) [ 30.197257] dump_stack_lvl+0x8c/0xd0 [ 30.197383] print_report+0x118/0x608 [ 30.197493] kasan_report+0xdc/0x128 [ 30.198126] __asan_report_store1_noabort+0x20/0x30 [ 30.198347] krealloc_more_oob_helper+0x5c0/0x678 [ 30.199044] krealloc_large_more_oob+0x20/0x38 [ 30.199278] kunit_try_run_case+0x170/0x3f0 [ 30.199430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.199567] kthread+0x328/0x630 [ 30.199679] ret_from_fork+0x10/0x20 [ 30.200086] [ 30.200413] The buggy address belongs to the physical page: [ 30.200494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700 [ 30.201093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.201229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.201369] page_type: f8(unknown) [ 30.201627] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.201762] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.201902] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.202383] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.202804] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff [ 30.202957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.203402] page dumped because: kasan: bad access detected [ 30.203509] [ 30.203559] Memory state around the buggy address: [ 30.203697] fff00000c7701f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.203910] fff00000c7702000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.204138] >fff00000c7702080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.204234] ^ [ 30.204672] fff00000c7702100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.204793] fff00000c7702180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.204905] ================================================================== [ 30.182713] ================================================================== [ 30.182907] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.183077] Write of size 1 at addr fff00000c77020eb by task kunit_try_catch/171 [ 30.183193] [ 30.183286] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.183504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.183569] Hardware name: linux,dummy-virt (DT) [ 30.183647] Call trace: [ 30.183702] show_stack+0x20/0x38 (C) [ 30.183827] dump_stack_lvl+0x8c/0xd0 [ 30.184393] print_report+0x118/0x608 [ 30.184585] kasan_report+0xdc/0x128 [ 30.184842] __asan_report_store1_noabort+0x20/0x30 [ 30.185372] krealloc_more_oob_helper+0x60c/0x678 [ 30.185724] krealloc_large_more_oob+0x20/0x38 [ 30.186146] kunit_try_run_case+0x170/0x3f0 [ 30.186225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.186286] kthread+0x328/0x630 [ 30.186335] ret_from_fork+0x10/0x20 [ 30.186391] [ 30.186418] The buggy address belongs to the physical page: [ 30.186457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700 [ 30.186519] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.186571] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.186634] page_type: f8(unknown) [ 30.186684] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.186739] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.186792] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.186843] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.186935] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff [ 30.187130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.187344] page dumped because: kasan: bad access detected [ 30.187456] [ 30.187584] Memory state around the buggy address: [ 30.187957] fff00000c7701f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.189920] fff00000c7702000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.190054] >fff00000c7702080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.190152] ^ [ 30.190254] fff00000c7702100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.191045] fff00000c7702180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.191736] ==================================================================
[ 26.275385] ================================================================== [ 26.276117] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 26.276513] Write of size 1 at addr ffff8881003742f0 by task kunit_try_catch/185 [ 26.277089] [ 26.277279] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 26.277386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.277413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.277460] Call Trace: [ 26.277492] <TASK> [ 26.277531] dump_stack_lvl+0x73/0xb0 [ 26.277602] print_report+0xd1/0x650 [ 26.277652] ? __virt_addr_valid+0x1db/0x2d0 [ 26.277698] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.277744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.277796] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.277845] kasan_report+0x141/0x180 [ 26.277892] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.277942] __asan_report_store1_noabort+0x1b/0x30 [ 26.277987] krealloc_more_oob_helper+0x7eb/0x930 [ 26.278029] ? __schedule+0x10cc/0x2b60 [ 26.278075] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.278138] ? finish_task_switch.isra.0+0x153/0x700 [ 26.278184] ? __switch_to+0x47/0xf50 [ 26.278237] ? __schedule+0x10cc/0x2b60 [ 26.278280] ? __pfx_read_tsc+0x10/0x10 [ 26.278331] krealloc_more_oob+0x1c/0x30 [ 26.278379] kunit_try_run_case+0x1a5/0x480 [ 26.278432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.278479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.278526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.278576] ? __kthread_parkme+0x82/0x180 [ 26.278619] ? preempt_count_sub+0x50/0x80 [ 26.278664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.278696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.278722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.278747] kthread+0x337/0x6f0 [ 26.278770] ? trace_preempt_on+0x20/0xc0 [ 26.278810] ? __pfx_kthread+0x10/0x10 [ 26.278846] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.278890] ? calculate_sigpending+0x7b/0xa0 [ 26.278965] ? __pfx_kthread+0x10/0x10 [ 26.279006] ret_from_fork+0x116/0x1d0 [ 26.279045] ? __pfx_kthread+0x10/0x10 [ 26.279083] ret_from_fork_asm+0x1a/0x30 [ 26.279157] </TASK> [ 26.279185] [ 26.288897] Allocated by task 185: [ 26.289292] kasan_save_stack+0x45/0x70 [ 26.289700] kasan_save_track+0x18/0x40 [ 26.290150] kasan_save_alloc_info+0x3b/0x50 [ 26.290513] __kasan_krealloc+0x190/0x1f0 [ 26.290871] krealloc_noprof+0xf3/0x340 [ 26.291229] krealloc_more_oob_helper+0x1a9/0x930 [ 26.291594] krealloc_more_oob+0x1c/0x30 [ 26.291802] kunit_try_run_case+0x1a5/0x480 [ 26.292259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.292501] kthread+0x337/0x6f0 [ 26.292674] ret_from_fork+0x116/0x1d0 [ 26.292999] ret_from_fork_asm+0x1a/0x30 [ 26.293361] [ 26.293527] The buggy address belongs to the object at ffff888100374200 [ 26.293527] which belongs to the cache kmalloc-256 of size 256 [ 26.294307] The buggy address is located 5 bytes to the right of [ 26.294307] allocated 235-byte region [ffff888100374200, ffff8881003742eb) [ 26.295082] [ 26.295274] The buggy address belongs to the physical page: [ 26.295637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100374 [ 26.296053] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.296352] flags: 0x200000000000040(head|node=0|zone=2) [ 26.296603] page_type: f5(slab) [ 26.296785] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.297082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.297384] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.297913] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.298522] head: 0200000000000001 ffffea000400dd01 00000000ffffffff 00000000ffffffff [ 26.299302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.299935] page dumped because: kasan: bad access detected [ 26.300356] [ 26.300529] Memory state around the buggy address: [ 26.300965] ffff888100374180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.301546] ffff888100374200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.301938] >ffff888100374280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.302395] ^ [ 26.302675] ffff888100374300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.302955] ffff888100374380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.303564] ================================================================== [ 26.520899] ================================================================== [ 26.521509] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 26.522378] Write of size 1 at addr ffff888102aea0eb by task kunit_try_catch/189 [ 26.522743] [ 26.522886] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 26.522965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.522980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.523006] Call Trace: [ 26.523025] <TASK> [ 26.523050] dump_stack_lvl+0x73/0xb0 [ 26.523094] print_report+0xd1/0x650 [ 26.523141] ? __virt_addr_valid+0x1db/0x2d0 [ 26.523169] ? krealloc_more_oob_helper+0x821/0x930 [ 26.523193] ? kasan_addr_to_slab+0x11/0xa0 [ 26.523215] ? krealloc_more_oob_helper+0x821/0x930 [ 26.523239] kasan_report+0x141/0x180 [ 26.523262] ? krealloc_more_oob_helper+0x821/0x930 [ 26.523291] __asan_report_store1_noabort+0x1b/0x30 [ 26.523317] krealloc_more_oob_helper+0x821/0x930 [ 26.523340] ? __schedule+0x10cc/0x2b60 [ 26.523364] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.523388] ? finish_task_switch.isra.0+0x153/0x700 [ 26.523413] ? __switch_to+0x47/0xf50 [ 26.523440] ? __schedule+0x10cc/0x2b60 [ 26.523463] ? __pfx_read_tsc+0x10/0x10 [ 26.523489] krealloc_large_more_oob+0x1c/0x30 [ 26.523512] kunit_try_run_case+0x1a5/0x480 [ 26.523540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.523562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.523586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.523610] ? __kthread_parkme+0x82/0x180 [ 26.523632] ? preempt_count_sub+0x50/0x80 [ 26.523656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.523680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.523704] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.523727] kthread+0x337/0x6f0 [ 26.523748] ? trace_preempt_on+0x20/0xc0 [ 26.523774] ? __pfx_kthread+0x10/0x10 [ 26.523796] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.523819] ? calculate_sigpending+0x7b/0xa0 [ 26.523844] ? __pfx_kthread+0x10/0x10 [ 26.523867] ret_from_fork+0x116/0x1d0 [ 26.523887] ? __pfx_kthread+0x10/0x10 [ 26.523917] ret_from_fork_asm+0x1a/0x30 [ 26.523957] </TASK> [ 26.523970] [ 26.536756] The buggy address belongs to the physical page: [ 26.537465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae8 [ 26.537893] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.538176] flags: 0x200000000000040(head|node=0|zone=2) [ 26.538466] page_type: f8(unknown) [ 26.538677] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.540212] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.540476] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.541727] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.542161] head: 0200000000000002 ffffea00040aba01 00000000ffffffff 00000000ffffffff [ 26.542673] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.543280] page dumped because: kasan: bad access detected [ 26.543749] [ 26.544130] Memory state around the buggy address: [ 26.544377] ffff888102ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.544829] ffff888102aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.545280] >ffff888102aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.545648] ^ [ 26.546616] ffff888102aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.546982] ffff888102aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.547333] ================================================================== [ 26.549374] ================================================================== [ 26.549862] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 26.550443] Write of size 1 at addr ffff888102aea0f0 by task kunit_try_catch/189 [ 26.550745] [ 26.551187] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 26.551285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.551305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.551341] Call Trace: [ 26.551380] <TASK> [ 26.551415] dump_stack_lvl+0x73/0xb0 [ 26.551475] print_report+0xd1/0x650 [ 26.551512] ? __virt_addr_valid+0x1db/0x2d0 [ 26.551547] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.551583] ? kasan_addr_to_slab+0x11/0xa0 [ 26.551615] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.551650] kasan_report+0x141/0x180 [ 26.551684] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.551724] __asan_report_store1_noabort+0x1b/0x30 [ 26.551760] krealloc_more_oob_helper+0x7eb/0x930 [ 26.551794] ? __schedule+0x10cc/0x2b60 [ 26.551829] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.551865] ? finish_task_switch.isra.0+0x153/0x700 [ 26.551901] ? __switch_to+0x47/0xf50 [ 26.551973] ? __schedule+0x10cc/0x2b60 [ 26.552017] ? __pfx_read_tsc+0x10/0x10 [ 26.552061] krealloc_large_more_oob+0x1c/0x30 [ 26.552346] kunit_try_run_case+0x1a5/0x480 [ 26.552400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.552440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.552467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.552490] ? __kthread_parkme+0x82/0x180 [ 26.552523] ? preempt_count_sub+0x50/0x80 [ 26.552565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.552609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.552654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.552702] kthread+0x337/0x6f0 [ 26.552743] ? trace_preempt_on+0x20/0xc0 [ 26.552792] ? __pfx_kthread+0x10/0x10 [ 26.552836] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.552881] ? calculate_sigpending+0x7b/0xa0 [ 26.552923] ? __pfx_kthread+0x10/0x10 [ 26.552960] ret_from_fork+0x116/0x1d0 [ 26.552996] ? __pfx_kthread+0x10/0x10 [ 26.553032] ret_from_fork_asm+0x1a/0x30 [ 26.553071] </TASK> [ 26.553090] [ 26.561920] The buggy address belongs to the physical page: [ 26.562381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae8 [ 26.563238] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.563537] flags: 0x200000000000040(head|node=0|zone=2) [ 26.563776] page_type: f8(unknown) [ 26.563950] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.564638] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.566584] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.567312] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.567750] head: 0200000000000002 ffffea00040aba01 00000000ffffffff 00000000ffffffff [ 26.568295] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.568622] page dumped because: kasan: bad access detected [ 26.568833] [ 26.568930] Memory state around the buggy address: [ 26.569142] ffff888102ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.569635] ffff888102aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.570083] >ffff888102aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.570738] ^ [ 26.571333] ffff888102aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.571733] ffff888102aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.572172] ================================================================== [ 26.240670] ================================================================== [ 26.241332] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 26.242283] Write of size 1 at addr ffff8881003742eb by task kunit_try_catch/185 [ 26.242976] [ 26.243147] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 26.243254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.243293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.243335] Call Trace: [ 26.243375] <TASK> [ 26.243411] dump_stack_lvl+0x73/0xb0 [ 26.243482] print_report+0xd1/0x650 [ 26.243520] ? __virt_addr_valid+0x1db/0x2d0 [ 26.243556] ? krealloc_more_oob_helper+0x821/0x930 [ 26.243596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.243642] ? krealloc_more_oob_helper+0x821/0x930 [ 26.243689] kasan_report+0x141/0x180 [ 26.243737] ? krealloc_more_oob_helper+0x821/0x930 [ 26.243797] __asan_report_store1_noabort+0x1b/0x30 [ 26.243847] krealloc_more_oob_helper+0x821/0x930 [ 26.243885] ? __schedule+0x10cc/0x2b60 [ 26.243924] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.243969] ? finish_task_switch.isra.0+0x153/0x700 [ 26.244012] ? __switch_to+0x47/0xf50 [ 26.244061] ? __schedule+0x10cc/0x2b60 [ 26.244144] ? __pfx_read_tsc+0x10/0x10 [ 26.244195] krealloc_more_oob+0x1c/0x30 [ 26.244232] kunit_try_run_case+0x1a5/0x480 [ 26.244280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.244322] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.244364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.244410] ? __kthread_parkme+0x82/0x180 [ 26.244451] ? preempt_count_sub+0x50/0x80 [ 26.244505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.244556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.244623] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.244668] kthread+0x337/0x6f0 [ 26.244704] ? trace_preempt_on+0x20/0xc0 [ 26.244734] ? __pfx_kthread+0x10/0x10 [ 26.244757] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.244780] ? calculate_sigpending+0x7b/0xa0 [ 26.244807] ? __pfx_kthread+0x10/0x10 [ 26.244831] ret_from_fork+0x116/0x1d0 [ 26.244852] ? __pfx_kthread+0x10/0x10 [ 26.244874] ret_from_fork_asm+0x1a/0x30 [ 26.244917] </TASK> [ 26.244937] [ 26.255953] Allocated by task 185: [ 26.256344] kasan_save_stack+0x45/0x70 [ 26.256649] kasan_save_track+0x18/0x40 [ 26.256846] kasan_save_alloc_info+0x3b/0x50 [ 26.257045] __kasan_krealloc+0x190/0x1f0 [ 26.257437] krealloc_noprof+0xf3/0x340 [ 26.257836] krealloc_more_oob_helper+0x1a9/0x930 [ 26.258280] krealloc_more_oob+0x1c/0x30 [ 26.258658] kunit_try_run_case+0x1a5/0x480 [ 26.259083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.259358] kthread+0x337/0x6f0 [ 26.259532] ret_from_fork+0x116/0x1d0 [ 26.259884] ret_from_fork_asm+0x1a/0x30 [ 26.260298] [ 26.260511] The buggy address belongs to the object at ffff888100374200 [ 26.260511] which belongs to the cache kmalloc-256 of size 256 [ 26.261305] The buggy address is located 0 bytes to the right of [ 26.261305] allocated 235-byte region [ffff888100374200, ffff8881003742eb) [ 26.262049] [ 26.262272] The buggy address belongs to the physical page: [ 26.262668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100374 [ 26.263155] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.263650] flags: 0x200000000000040(head|node=0|zone=2) [ 26.264080] page_type: f5(slab) [ 26.264308] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.264598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.264894] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 26.265610] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.266526] head: 0200000000000001 ffffea000400dd01 00000000ffffffff 00000000ffffffff [ 26.267394] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.267922] page dumped because: kasan: bad access detected [ 26.268267] [ 26.268379] Memory state around the buggy address: [ 26.268800] ffff888100374180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.269347] ffff888100374200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.269797] >ffff888100374280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.270267] ^ [ 26.270722] ffff888100374300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.271250] ffff888100374380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.271750] ==================================================================