Date
June 23, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.486682] ================================================================== [ 32.486853] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.486990] Write of size 1 at addr fff00000c45110eb by task kunit_try_catch/168 [ 32.487123] [ 32.490405] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.490532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.490680] Hardware name: linux,dummy-virt (DT) [ 32.490894] Call trace: [ 32.490960] show_stack+0x20/0x38 (C) [ 32.491116] dump_stack_lvl+0x8c/0xd0 [ 32.491779] print_report+0x118/0x608 [ 32.492218] kasan_report+0xdc/0x128 [ 32.492453] __asan_report_store1_noabort+0x20/0x30 [ 32.492838] krealloc_more_oob_helper+0x60c/0x678 [ 32.493097] krealloc_more_oob+0x20/0x38 [ 32.493226] kunit_try_run_case+0x170/0x3f0 [ 32.493459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.493657] kthread+0x328/0x630 [ 32.493826] ret_from_fork+0x10/0x20 [ 32.494042] [ 32.494368] Allocated by task 168: [ 32.494448] kasan_save_stack+0x3c/0x68 [ 32.496209] kasan_save_track+0x20/0x40 [ 32.496320] kasan_save_alloc_info+0x40/0x58 [ 32.496487] __kasan_krealloc+0x118/0x178 [ 32.496617] krealloc_noprof+0x128/0x360 [ 32.497111] krealloc_more_oob_helper+0x168/0x678 [ 32.497211] krealloc_more_oob+0x20/0x38 [ 32.497300] kunit_try_run_case+0x170/0x3f0 [ 32.498094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.499527] kthread+0x328/0x630 [ 32.500373] ret_from_fork+0x10/0x20 [ 32.500863] [ 32.500945] The buggy address belongs to the object at fff00000c4511000 [ 32.500945] which belongs to the cache kmalloc-256 of size 256 [ 32.501459] The buggy address is located 0 bytes to the right of [ 32.501459] allocated 235-byte region [fff00000c4511000, fff00000c45110eb) [ 32.501608] [ 32.501660] The buggy address belongs to the physical page: [ 32.501737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.501856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.504423] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.505460] page_type: f5(slab) [ 32.505563] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.506575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.507524] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.507656] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.507787] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.507907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.508118] page dumped because: kasan: bad access detected [ 32.509016] [ 32.509573] Memory state around the buggy address: [ 32.509660] fff00000c4510f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.509763] fff00000c4511000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.509859] >fff00000c4511080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.510511] ^ [ 32.510652] fff00000c4511100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.510784] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.511184] ================================================================== [ 32.653188] ================================================================== [ 32.653457] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.654345] Write of size 1 at addr fff00000c577e0eb by task kunit_try_catch/172 [ 32.655116] [ 32.655372] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.655957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.656053] Hardware name: linux,dummy-virt (DT) [ 32.656355] Call trace: [ 32.656654] show_stack+0x20/0x38 (C) [ 32.657306] dump_stack_lvl+0x8c/0xd0 [ 32.657700] print_report+0x118/0x608 [ 32.657818] kasan_report+0xdc/0x128 [ 32.658600] __asan_report_store1_noabort+0x20/0x30 [ 32.658741] krealloc_more_oob_helper+0x60c/0x678 [ 32.658886] krealloc_large_more_oob+0x20/0x38 [ 32.659018] kunit_try_run_case+0x170/0x3f0 [ 32.659164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.659291] kthread+0x328/0x630 [ 32.660287] ret_from_fork+0x10/0x20 [ 32.660444] [ 32.660832] The buggy address belongs to the physical page: [ 32.661380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.661890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.662678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.663220] page_type: f8(unknown) [ 32.663319] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.663744] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.664159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.664629] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.664749] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.665625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.665925] page dumped because: kasan: bad access detected [ 32.666003] [ 32.666063] Memory state around the buggy address: [ 32.666148] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.666255] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.666358] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.666448] ^ [ 32.666541] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.666655] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.666880] ================================================================== [ 32.514647] ================================================================== [ 32.514762] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.514954] Write of size 1 at addr fff00000c45110f0 by task kunit_try_catch/168 [ 32.515088] [ 32.515165] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.515398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.515474] Hardware name: linux,dummy-virt (DT) [ 32.515750] Call trace: [ 32.515810] show_stack+0x20/0x38 (C) [ 32.515968] dump_stack_lvl+0x8c/0xd0 [ 32.516210] print_report+0x118/0x608 [ 32.516387] kasan_report+0xdc/0x128 [ 32.516512] __asan_report_store1_noabort+0x20/0x30 [ 32.516649] krealloc_more_oob_helper+0x5c0/0x678 [ 32.516773] krealloc_more_oob+0x20/0x38 [ 32.516896] kunit_try_run_case+0x170/0x3f0 [ 32.517010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.517156] kthread+0x328/0x630 [ 32.517265] ret_from_fork+0x10/0x20 [ 32.517413] [ 32.517477] Allocated by task 168: [ 32.517548] kasan_save_stack+0x3c/0x68 [ 32.517653] kasan_save_track+0x20/0x40 [ 32.517764] kasan_save_alloc_info+0x40/0x58 [ 32.517850] __kasan_krealloc+0x118/0x178 [ 32.517948] krealloc_noprof+0x128/0x360 [ 32.518060] krealloc_more_oob_helper+0x168/0x678 [ 32.518172] krealloc_more_oob+0x20/0x38 [ 32.518344] kunit_try_run_case+0x170/0x3f0 [ 32.518483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.519013] kthread+0x328/0x630 [ 32.519147] ret_from_fork+0x10/0x20 [ 32.519241] [ 32.519289] The buggy address belongs to the object at fff00000c4511000 [ 32.519289] which belongs to the cache kmalloc-256 of size 256 [ 32.519438] The buggy address is located 5 bytes to the right of [ 32.519438] allocated 235-byte region [fff00000c4511000, fff00000c45110eb) [ 32.519690] [ 32.519871] The buggy address belongs to the physical page: [ 32.519962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.520115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.520339] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.520560] page_type: f5(slab) [ 32.520707] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.520960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.521112] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.521230] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.521399] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.522648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.522711] page dumped because: kasan: bad access detected [ 32.522758] [ 32.522780] Memory state around the buggy address: [ 32.522844] fff00000c4510f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.522921] fff00000c4511000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.522972] >fff00000c4511080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.523015] ^ [ 32.523187] fff00000c4511100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.523481] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.524007] ================================================================== [ 32.668599] ================================================================== [ 32.668719] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.668955] Write of size 1 at addr fff00000c577e0f0 by task kunit_try_catch/172 [ 32.669184] [ 32.669363] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.669871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.670049] Hardware name: linux,dummy-virt (DT) [ 32.670140] Call trace: [ 32.670256] show_stack+0x20/0x38 (C) [ 32.670382] dump_stack_lvl+0x8c/0xd0 [ 32.670642] print_report+0x118/0x608 [ 32.670777] kasan_report+0xdc/0x128 [ 32.670931] __asan_report_store1_noabort+0x20/0x30 [ 32.671080] krealloc_more_oob_helper+0x5c0/0x678 [ 32.671241] krealloc_large_more_oob+0x20/0x38 [ 32.671473] kunit_try_run_case+0x170/0x3f0 [ 32.671695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.671830] kthread+0x328/0x630 [ 32.671961] ret_from_fork+0x10/0x20 [ 32.672242] [ 32.672340] The buggy address belongs to the physical page: [ 32.672415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.672682] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.672792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.672941] page_type: f8(unknown) [ 32.673207] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.673484] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.673685] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.673796] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.673907] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.674018] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.674131] page dumped because: kasan: bad access detected [ 32.674210] [ 32.674328] Memory state around the buggy address: [ 32.674530] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.674693] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.674987] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.675126] ^ [ 32.675235] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.675380] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.675547] ==================================================================
[ 21.493273] ================================================================== [ 21.493698] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 21.494171] Write of size 1 at addr ffff8881029920eb by task kunit_try_catch/189 [ 21.494674] [ 21.494792] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 21.494902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.494925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.494960] Call Trace: [ 21.494986] <TASK> [ 21.495014] dump_stack_lvl+0x73/0xb0 [ 21.495066] print_report+0xd1/0x650 [ 21.495097] ? __virt_addr_valid+0x1db/0x2d0 [ 21.495132] ? krealloc_more_oob_helper+0x821/0x930 [ 21.495168] ? kasan_addr_to_slab+0x11/0xa0 [ 21.495202] ? krealloc_more_oob_helper+0x821/0x930 [ 21.495239] kasan_report+0x141/0x180 [ 21.495278] ? krealloc_more_oob_helper+0x821/0x930 [ 21.495323] __asan_report_store1_noabort+0x1b/0x30 [ 21.495360] krealloc_more_oob_helper+0x821/0x930 [ 21.495411] ? __schedule+0x10cc/0x2b60 [ 21.495448] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 21.495487] ? finish_task_switch.isra.0+0x153/0x700 [ 21.495522] ? __switch_to+0x47/0xf50 [ 21.495560] ? __schedule+0x10cc/0x2b60 [ 21.495578] ? __pfx_read_tsc+0x10/0x10 [ 21.495599] krealloc_large_more_oob+0x1c/0x30 [ 21.495617] kunit_try_run_case+0x1a5/0x480 [ 21.495637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.495655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.495673] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.495692] ? __kthread_parkme+0x82/0x180 [ 21.495708] ? preempt_count_sub+0x50/0x80 [ 21.495727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.495746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.495764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.495783] kthread+0x337/0x6f0 [ 21.495799] ? trace_preempt_on+0x20/0xc0 [ 21.495817] ? __pfx_kthread+0x10/0x10 [ 21.495839] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.495891] ? calculate_sigpending+0x7b/0xa0 [ 21.495922] ? __pfx_kthread+0x10/0x10 [ 21.495955] ret_from_fork+0x116/0x1d0 [ 21.495984] ? __pfx_kthread+0x10/0x10 [ 21.496015] ret_from_fork_asm+0x1a/0x30 [ 21.496067] </TASK> [ 21.496089] [ 21.507289] The buggy address belongs to the physical page: [ 21.507614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102990 [ 21.508418] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.508709] flags: 0x200000000000040(head|node=0|zone=2) [ 21.509051] page_type: f8(unknown) [ 21.509259] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.509537] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 21.509952] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.510301] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 21.510702] head: 0200000000000002 ffffea00040a6401 00000000ffffffff 00000000ffffffff [ 21.510984] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.511428] page dumped because: kasan: bad access detected [ 21.511920] [ 21.512052] Memory state around the buggy address: [ 21.512367] ffff888102991f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.512825] ffff888102992000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.513253] >ffff888102992080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.513666] ^ [ 21.514070] ffff888102992100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.514508] ffff888102992180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.515022] ================================================================== [ 21.282823] ================================================================== [ 21.283215] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 21.283771] Write of size 1 at addr ffff888100ab9eeb by task kunit_try_catch/185 [ 21.284696] [ 21.285174] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 21.285257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.285276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.285307] Call Trace: [ 21.285327] <TASK> [ 21.285352] dump_stack_lvl+0x73/0xb0 [ 21.285590] print_report+0xd1/0x650 [ 21.285635] ? __virt_addr_valid+0x1db/0x2d0 [ 21.285670] ? krealloc_more_oob_helper+0x821/0x930 [ 21.285706] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.285744] ? krealloc_more_oob_helper+0x821/0x930 [ 21.285957] kasan_report+0x141/0x180 [ 21.285984] ? krealloc_more_oob_helper+0x821/0x930 [ 21.286020] __asan_report_store1_noabort+0x1b/0x30 [ 21.286045] krealloc_more_oob_helper+0x821/0x930 [ 21.286065] ? __schedule+0x10cc/0x2b60 [ 21.286096] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 21.286128] ? finish_task_switch.isra.0+0x153/0x700 [ 21.286158] ? __switch_to+0x47/0xf50 [ 21.286194] ? __schedule+0x10cc/0x2b60 [ 21.286213] ? __pfx_read_tsc+0x10/0x10 [ 21.286236] krealloc_more_oob+0x1c/0x30 [ 21.286255] kunit_try_run_case+0x1a5/0x480 [ 21.286277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.286296] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.286316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.286335] ? __kthread_parkme+0x82/0x180 [ 21.286353] ? preempt_count_sub+0x50/0x80 [ 21.286372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.286421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.286459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.286496] kthread+0x337/0x6f0 [ 21.286529] ? trace_preempt_on+0x20/0xc0 [ 21.286566] ? __pfx_kthread+0x10/0x10 [ 21.286585] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.286604] ? calculate_sigpending+0x7b/0xa0 [ 21.286625] ? __pfx_kthread+0x10/0x10 [ 21.286644] ret_from_fork+0x116/0x1d0 [ 21.286661] ? __pfx_kthread+0x10/0x10 [ 21.286679] ret_from_fork_asm+0x1a/0x30 [ 21.286708] </TASK> [ 21.286720] [ 21.297605] Allocated by task 185: [ 21.297916] kasan_save_stack+0x45/0x70 [ 21.298355] kasan_save_track+0x18/0x40 [ 21.298622] kasan_save_alloc_info+0x3b/0x50 [ 21.298800] __kasan_krealloc+0x190/0x1f0 [ 21.298991] krealloc_noprof+0xf3/0x340 [ 21.299260] krealloc_more_oob_helper+0x1a9/0x930 [ 21.299508] krealloc_more_oob+0x1c/0x30 [ 21.299783] kunit_try_run_case+0x1a5/0x480 [ 21.300048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.300549] kthread+0x337/0x6f0 [ 21.300802] ret_from_fork+0x116/0x1d0 [ 21.301589] ret_from_fork_asm+0x1a/0x30 [ 21.301938] [ 21.302226] The buggy address belongs to the object at ffff888100ab9e00 [ 21.302226] which belongs to the cache kmalloc-256 of size 256 [ 21.302819] The buggy address is located 0 bytes to the right of [ 21.302819] allocated 235-byte region [ffff888100ab9e00, ffff888100ab9eeb) [ 21.303671] [ 21.303836] The buggy address belongs to the physical page: [ 21.304320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8 [ 21.304682] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.304917] flags: 0x200000000000040(head|node=0|zone=2) [ 21.305107] page_type: f5(slab) [ 21.305514] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 21.306047] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.307013] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 21.307678] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.308207] head: 0200000000000001 ffffea000402ae01 00000000ffffffff 00000000ffffffff [ 21.308434] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.308871] page dumped because: kasan: bad access detected [ 21.309352] [ 21.309518] Memory state around the buggy address: [ 21.309798] ffff888100ab9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.310240] ffff888100ab9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.310771] >ffff888100ab9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 21.311064] ^ [ 21.311916] ffff888100ab9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.312127] ffff888100ab9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.312744] ================================================================== [ 21.314754] ================================================================== [ 21.315128] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 21.315369] Write of size 1 at addr ffff888100ab9ef0 by task kunit_try_catch/185 [ 21.315888] [ 21.315999] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 21.316081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.316103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.316134] Call Trace: [ 21.316159] <TASK> [ 21.316184] dump_stack_lvl+0x73/0xb0 [ 21.316235] print_report+0xd1/0x650 [ 21.316272] ? __virt_addr_valid+0x1db/0x2d0 [ 21.316312] ? krealloc_more_oob_helper+0x7eb/0x930 [ 21.316351] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.316402] ? krealloc_more_oob_helper+0x7eb/0x930 [ 21.316442] kasan_report+0x141/0x180 [ 21.316478] ? krealloc_more_oob_helper+0x7eb/0x930 [ 21.316522] __asan_report_store1_noabort+0x1b/0x30 [ 21.316563] krealloc_more_oob_helper+0x7eb/0x930 [ 21.316623] ? __schedule+0x10cc/0x2b60 [ 21.316663] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 21.316704] ? finish_task_switch.isra.0+0x153/0x700 [ 21.316743] ? __switch_to+0x47/0xf50 [ 21.316788] ? __schedule+0x10cc/0x2b60 [ 21.316827] ? __pfx_read_tsc+0x10/0x10 [ 21.316870] krealloc_more_oob+0x1c/0x30 [ 21.316908] kunit_try_run_case+0x1a5/0x480 [ 21.316949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.316978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.316998] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.317017] ? __kthread_parkme+0x82/0x180 [ 21.317034] ? preempt_count_sub+0x50/0x80 [ 21.317052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.317071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.317090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.317109] kthread+0x337/0x6f0 [ 21.317125] ? trace_preempt_on+0x20/0xc0 [ 21.317143] ? __pfx_kthread+0x10/0x10 [ 21.317160] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.317177] ? calculate_sigpending+0x7b/0xa0 [ 21.317196] ? __pfx_kthread+0x10/0x10 [ 21.317214] ret_from_fork+0x116/0x1d0 [ 21.317229] ? __pfx_kthread+0x10/0x10 [ 21.317245] ret_from_fork_asm+0x1a/0x30 [ 21.317272] </TASK> [ 21.317283] [ 21.328326] Allocated by task 185: [ 21.328485] kasan_save_stack+0x45/0x70 [ 21.328641] kasan_save_track+0x18/0x40 [ 21.328795] kasan_save_alloc_info+0x3b/0x50 [ 21.329261] __kasan_krealloc+0x190/0x1f0 [ 21.329560] krealloc_noprof+0xf3/0x340 [ 21.329820] krealloc_more_oob_helper+0x1a9/0x930 [ 21.330029] krealloc_more_oob+0x1c/0x30 [ 21.330481] kunit_try_run_case+0x1a5/0x480 [ 21.330811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.331518] kthread+0x337/0x6f0 [ 21.331795] ret_from_fork+0x116/0x1d0 [ 21.332217] ret_from_fork_asm+0x1a/0x30 [ 21.332450] [ 21.332603] The buggy address belongs to the object at ffff888100ab9e00 [ 21.332603] which belongs to the cache kmalloc-256 of size 256 [ 21.333462] The buggy address is located 5 bytes to the right of [ 21.333462] allocated 235-byte region [ffff888100ab9e00, ffff888100ab9eeb) [ 21.334030] [ 21.334311] The buggy address belongs to the physical page: [ 21.334680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8 [ 21.335056] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.335604] flags: 0x200000000000040(head|node=0|zone=2) [ 21.336009] page_type: f5(slab) [ 21.336697] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 21.337050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.337730] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 21.338319] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.338665] head: 0200000000000001 ffffea000402ae01 00000000ffffffff 00000000ffffffff [ 21.339276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.339702] page dumped because: kasan: bad access detected [ 21.339879] [ 21.340034] Memory state around the buggy address: [ 21.340469] ffff888100ab9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.340757] ffff888100ab9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.341131] >ffff888100ab9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 21.341657] ^ [ 21.341993] ffff888100ab9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.342418] ffff888100ab9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.342778] ================================================================== [ 21.516899] ================================================================== [ 21.517248] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 21.517555] Write of size 1 at addr ffff8881029920f0 by task kunit_try_catch/189 [ 21.518002] [ 21.518139] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 21.518221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.518244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.518284] Call Trace: [ 21.518309] <TASK> [ 21.518338] dump_stack_lvl+0x73/0xb0 [ 21.518423] print_report+0xd1/0x650 [ 21.518464] ? __virt_addr_valid+0x1db/0x2d0 [ 21.518508] ? krealloc_more_oob_helper+0x7eb/0x930 [ 21.518548] ? kasan_addr_to_slab+0x11/0xa0 [ 21.518593] ? krealloc_more_oob_helper+0x7eb/0x930 [ 21.518650] kasan_report+0x141/0x180 [ 21.518690] ? krealloc_more_oob_helper+0x7eb/0x930 [ 21.518738] __asan_report_store1_noabort+0x1b/0x30 [ 21.518779] krealloc_more_oob_helper+0x7eb/0x930 [ 21.518825] ? __schedule+0x10cc/0x2b60 [ 21.518865] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 21.518922] ? finish_task_switch.isra.0+0x153/0x700 [ 21.518968] ? __switch_to+0x47/0xf50 [ 21.519030] ? __schedule+0x10cc/0x2b60 [ 21.519074] ? __pfx_read_tsc+0x10/0x10 [ 21.519118] krealloc_large_more_oob+0x1c/0x30 [ 21.519163] kunit_try_run_case+0x1a5/0x480 [ 21.519200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.519225] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.519250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.519272] ? __kthread_parkme+0x82/0x180 [ 21.519289] ? preempt_count_sub+0x50/0x80 [ 21.519308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.519327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.519346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.519365] kthread+0x337/0x6f0 [ 21.519399] ? trace_preempt_on+0x20/0xc0 [ 21.519427] ? __pfx_kthread+0x10/0x10 [ 21.519449] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.519470] ? calculate_sigpending+0x7b/0xa0 [ 21.519490] ? __pfx_kthread+0x10/0x10 [ 21.519507] ret_from_fork+0x116/0x1d0 [ 21.519522] ? __pfx_kthread+0x10/0x10 [ 21.519538] ret_from_fork_asm+0x1a/0x30 [ 21.519564] </TASK> [ 21.519575] [ 21.528162] The buggy address belongs to the physical page: [ 21.528443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102990 [ 21.528692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.529013] flags: 0x200000000000040(head|node=0|zone=2) [ 21.529429] page_type: f8(unknown) [ 21.529697] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.530363] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 21.530622] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.531019] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 21.531526] head: 0200000000000002 ffffea00040a6401 00000000ffffffff 00000000ffffffff [ 21.531826] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.532244] page dumped because: kasan: bad access detected [ 21.532560] [ 21.532702] Memory state around the buggy address: [ 21.532952] ffff888102991f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.533332] ffff888102992000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.533731] >ffff888102992080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.534210] ^ [ 21.534566] ffff888102992100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.534857] ffff888102992180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.535257] ==================================================================