Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
juno-r2 | |
qemu-arm64 | |
qemu-x86_64 |
[ 35.780770] ================================================================== [ 35.792501] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 35.800175] Write of size 1 at addr ffff0000953620c9 by task kunit_try_catch/248 [ 35.807667] [ 35.809206] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 35.809234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.809242] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.809253] Call trace: [ 35.809260] show_stack+0x20/0x38 (C) [ 35.809278] dump_stack_lvl+0x8c/0xd0 [ 35.809297] print_report+0x118/0x608 [ 35.809315] kasan_report+0xdc/0x128 [ 35.809334] __asan_report_store1_noabort+0x20/0x30 [ 35.809352] krealloc_less_oob_helper+0xa48/0xc50 [ 35.809370] krealloc_large_less_oob+0x20/0x38 [ 35.809389] kunit_try_run_case+0x170/0x3f0 [ 35.809409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.809429] kthread+0x328/0x630 [ 35.809443] ret_from_fork+0x10/0x20 [ 35.809459] [ 35.880274] The buggy address belongs to the physical page: [ 35.885922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115360 [ 35.894034] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.901788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.908843] page_type: f8(unknown) [ 35.912307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.920151] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.927996] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.935926] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.943856] head: 0bfffe0000000002 fffffdffc254d801 00000000ffffffff 00000000ffffffff [ 35.951785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.959710] page dumped because: kasan: bad access detected [ 35.965353] [ 35.966883] Memory state around the buggy address: [ 35.971743] ffff000095361f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.979055] ffff000095362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.986378] >ffff000095362080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 35.993697] ^ [ 35.999348] ffff000095362100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.006670] ffff000095362180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.013990] ================================================================== [ 33.719133] ================================================================== [ 33.730345] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 33.738021] Write of size 1 at addr ffff00008036eec9 by task kunit_try_catch/244 [ 33.745521] [ 33.747053] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 33.747081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.747090] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.747102] Call trace: [ 33.747109] show_stack+0x20/0x38 (C) [ 33.747129] dump_stack_lvl+0x8c/0xd0 [ 33.747147] print_report+0x118/0x608 [ 33.747165] kasan_report+0xdc/0x128 [ 33.747185] __asan_report_store1_noabort+0x20/0x30 [ 33.747203] krealloc_less_oob_helper+0xa48/0xc50 [ 33.747223] krealloc_less_oob+0x20/0x38 [ 33.747240] kunit_try_run_case+0x170/0x3f0 [ 33.747260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.747283] kthread+0x328/0x630 [ 33.747298] ret_from_fork+0x10/0x20 [ 33.747316] [ 33.817595] Allocated by task 244: [ 33.821053] kasan_save_stack+0x3c/0x68 [ 33.824964] kasan_save_track+0x20/0x40 [ 33.828872] kasan_save_alloc_info+0x40/0x58 [ 33.833210] __kasan_krealloc+0x118/0x178 [ 33.837294] krealloc_noprof+0x128/0x360 [ 33.841290] krealloc_less_oob_helper+0x168/0xc50 [ 33.846073] krealloc_less_oob+0x20/0x38 [ 33.850067] kunit_try_run_case+0x170/0x3f0 [ 33.854319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.859887] kthread+0x328/0x630 [ 33.863179] ret_from_fork+0x10/0x20 [ 33.866815] [ 33.868351] The buggy address belongs to the object at ffff00008036ee00 [ 33.868351] which belongs to the cache kmalloc-256 of size 256 [ 33.881015] The buggy address is located 0 bytes to the right of [ 33.881015] allocated 201-byte region [ffff00008036ee00, ffff00008036eec9) [ 33.894114] [ 33.895643] The buggy address belongs to the physical page: [ 33.901288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10036c [ 33.909391] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.917147] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.924204] page_type: f5(slab) [ 33.927412] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.935257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.943102] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.951033] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.958967] head: 0bfffe0000000002 fffffdffc200db01 00000000ffffffff 00000000ffffffff [ 33.966898] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.974823] page dumped because: kasan: bad access detected [ 33.980475] [ 33.982006] Memory state around the buggy address: [ 33.986868] ffff00008036ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.994180] ffff00008036ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.001494] >ffff00008036ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 34.008815] ^ [ 34.014467] ffff00008036ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.021780] ffff00008036ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.029091] ================================================================== [ 36.021411] ================================================================== [ 36.028733] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 36.036406] Write of size 1 at addr ffff0000953620d0 by task kunit_try_catch/248 [ 36.043907] [ 36.045436] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 36.045464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.045472] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.045484] Call trace: [ 36.045490] show_stack+0x20/0x38 (C) [ 36.045509] dump_stack_lvl+0x8c/0xd0 [ 36.045527] print_report+0x118/0x608 [ 36.045545] kasan_report+0xdc/0x128 [ 36.045563] __asan_report_store1_noabort+0x20/0x30 [ 36.045581] krealloc_less_oob_helper+0xb9c/0xc50 [ 36.045599] krealloc_large_less_oob+0x20/0x38 [ 36.045620] kunit_try_run_case+0x170/0x3f0 [ 36.045639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.045660] kthread+0x328/0x630 [ 36.045674] ret_from_fork+0x10/0x20 [ 36.045691] [ 36.116497] The buggy address belongs to the physical page: [ 36.122146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115360 [ 36.130259] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.138014] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.145069] page_type: f8(unknown) [ 36.148532] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.156375] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.164220] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.172149] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.180078] head: 0bfffe0000000002 fffffdffc254d801 00000000ffffffff 00000000ffffffff [ 36.188008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.195934] page dumped because: kasan: bad access detected [ 36.201579] [ 36.203107] Memory state around the buggy address: [ 36.207965] ffff000095361f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.215280] ffff000095362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.222602] >ffff000095362080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.229922] ^ [ 36.235832] ffff000095362100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.243145] ffff000095362180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.250465] ================================================================== [ 34.351107] ================================================================== [ 34.358426] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 34.366101] Write of size 1 at addr ffff00008036eeda by task kunit_try_catch/244 [ 34.373595] [ 34.375124] CPU: 6 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 34.375154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.375162] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.375172] Call trace: [ 34.375177] show_stack+0x20/0x38 (C) [ 34.375195] dump_stack_lvl+0x8c/0xd0 [ 34.375213] print_report+0x118/0x608 [ 34.375231] kasan_report+0xdc/0x128 [ 34.375247] __asan_report_store1_noabort+0x20/0x30 [ 34.375263] krealloc_less_oob_helper+0xa80/0xc50 [ 34.375280] krealloc_less_oob+0x20/0x38 [ 34.375296] kunit_try_run_case+0x170/0x3f0 [ 34.375312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.375332] kthread+0x328/0x630 [ 34.375344] ret_from_fork+0x10/0x20 [ 34.375361] [ 34.445554] Allocated by task 244: [ 34.449006] kasan_save_stack+0x3c/0x68 [ 34.452913] kasan_save_track+0x20/0x40 [ 34.456816] kasan_save_alloc_info+0x40/0x58 [ 34.461150] __kasan_krealloc+0x118/0x178 [ 34.465227] krealloc_noprof+0x128/0x360 [ 34.469215] krealloc_less_oob_helper+0x168/0xc50 [ 34.473986] krealloc_less_oob+0x20/0x38 [ 34.477975] kunit_try_run_case+0x170/0x3f0 [ 34.482224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.487785] kthread+0x328/0x630 [ 34.491071] ret_from_fork+0x10/0x20 [ 34.494702] [ 34.496231] The buggy address belongs to the object at ffff00008036ee00 [ 34.496231] which belongs to the cache kmalloc-256 of size 256 [ 34.508885] The buggy address is located 17 bytes to the right of [ 34.508885] allocated 201-byte region [ffff00008036ee00, ffff00008036eec9) [ 34.522063] [ 34.523594] The buggy address belongs to the physical page: [ 34.529235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10036c [ 34.537337] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.545090] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.552138] page_type: f5(slab) [ 34.555337] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.563178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.571017] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.578944] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.586869] head: 0bfffe0000000002 fffffdffc200db01 00000000ffffffff 00000000ffffffff [ 34.594793] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.602716] page dumped because: kasan: bad access detected [ 34.608352] [ 34.609874] Memory state around the buggy address: [ 34.614725] ffff00008036ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.622029] ffff00008036ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.629333] >ffff00008036ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 34.636637] ^ [ 34.642803] ffff00008036ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.650116] ffff00008036ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.657418] ================================================================== [ 36.495194] ================================================================== [ 36.502511] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 36.510180] Write of size 1 at addr ffff0000953620ea by task kunit_try_catch/248 [ 36.517673] [ 36.519208] CPU: 5 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 36.519236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.519243] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.519252] Call trace: [ 36.519258] show_stack+0x20/0x38 (C) [ 36.519274] dump_stack_lvl+0x8c/0xd0 [ 36.519291] print_report+0x118/0x608 [ 36.519308] kasan_report+0xdc/0x128 [ 36.519325] __asan_report_store1_noabort+0x20/0x30 [ 36.519340] krealloc_less_oob_helper+0xae4/0xc50 [ 36.519357] krealloc_large_less_oob+0x20/0x38 [ 36.519373] kunit_try_run_case+0x170/0x3f0 [ 36.519389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.519408] kthread+0x328/0x630 [ 36.519420] ret_from_fork+0x10/0x20 [ 36.519436] [ 36.590199] The buggy address belongs to the physical page: [ 36.595846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115360 [ 36.603944] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.611691] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.618740] page_type: f8(unknown) [ 36.622195] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.630032] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.637870] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.645793] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.653717] head: 0bfffe0000000002 fffffdffc254d801 00000000ffffffff 00000000ffffffff [ 36.661640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.669560] page dumped because: kasan: bad access detected [ 36.675200] [ 36.676729] Memory state around the buggy address: [ 36.681580] ffff000095361f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.688894] ffff000095362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.696208] >ffff000095362080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.703521] ^ [ 36.710217] ffff000095362100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.717530] ffff000095362180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.724841] ================================================================== [ 34.664854] ================================================================== [ 34.672174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 34.679846] Write of size 1 at addr ffff00008036eeea by task kunit_try_catch/244 [ 34.687330] [ 34.688864] CPU: 6 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 34.688892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.688899] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.688908] Call trace: [ 34.688913] show_stack+0x20/0x38 (C) [ 34.688929] dump_stack_lvl+0x8c/0xd0 [ 34.688947] print_report+0x118/0x608 [ 34.688965] kasan_report+0xdc/0x128 [ 34.688982] __asan_report_store1_noabort+0x20/0x30 [ 34.688998] krealloc_less_oob_helper+0xae4/0xc50 [ 34.689017] krealloc_less_oob+0x20/0x38 [ 34.689033] kunit_try_run_case+0x170/0x3f0 [ 34.689050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.689069] kthread+0x328/0x630 [ 34.689082] ret_from_fork+0x10/0x20 [ 34.689097] [ 34.759333] Allocated by task 244: [ 34.762788] kasan_save_stack+0x3c/0x68 [ 34.766693] kasan_save_track+0x20/0x40 [ 34.770596] kasan_save_alloc_info+0x40/0x58 [ 34.774930] __kasan_krealloc+0x118/0x178 [ 34.779008] krealloc_noprof+0x128/0x360 [ 34.782998] krealloc_less_oob_helper+0x168/0xc50 [ 34.787775] krealloc_less_oob+0x20/0x38 [ 34.791764] kunit_try_run_case+0x170/0x3f0 [ 34.796014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.801580] kthread+0x328/0x630 [ 34.804861] ret_from_fork+0x10/0x20 [ 34.808490] [ 34.810013] The buggy address belongs to the object at ffff00008036ee00 [ 34.810013] which belongs to the cache kmalloc-256 of size 256 [ 34.822666] The buggy address is located 33 bytes to the right of [ 34.822666] allocated 201-byte region [ffff00008036ee00, ffff00008036eec9) [ 34.835849] [ 34.837370] The buggy address belongs to the physical page: [ 34.843012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10036c [ 34.851113] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.858864] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.865911] page_type: f5(slab) [ 34.869104] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.876943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.884782] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.892707] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.900632] head: 0bfffe0000000002 fffffdffc200db01 00000000ffffffff 00000000ffffffff [ 34.908555] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.916476] page dumped because: kasan: bad access detected [ 34.922118] [ 34.923647] Memory state around the buggy address: [ 34.928497] ffff00008036ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.935811] ffff00008036ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.943119] >ffff00008036ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 34.950421] ^ [ 34.957114] ffff00008036ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.964418] ffff00008036ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.971733] ================================================================== [ 36.258667] ================================================================== [ 36.265994] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 36.273664] Write of size 1 at addr ffff0000953620da by task kunit_try_catch/248 [ 36.281157] [ 36.282685] CPU: 5 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 36.282714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.282723] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.282734] Call trace: [ 36.282741] show_stack+0x20/0x38 (C) [ 36.282758] dump_stack_lvl+0x8c/0xd0 [ 36.282775] print_report+0x118/0x608 [ 36.282793] kasan_report+0xdc/0x128 [ 36.282809] __asan_report_store1_noabort+0x20/0x30 [ 36.282826] krealloc_less_oob_helper+0xa80/0xc50 [ 36.282844] krealloc_large_less_oob+0x20/0x38 [ 36.282861] kunit_try_run_case+0x170/0x3f0 [ 36.282877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.282896] kthread+0x328/0x630 [ 36.282908] ret_from_fork+0x10/0x20 [ 36.282924] [ 36.353703] The buggy address belongs to the physical page: [ 36.359351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115360 [ 36.367449] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.375197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.382251] page_type: f8(unknown) [ 36.385712] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.393547] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.401383] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.409305] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.417228] head: 0bfffe0000000002 fffffdffc254d801 00000000ffffffff 00000000ffffffff [ 36.425150] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.433069] page dumped because: kasan: bad access detected [ 36.438714] [ 36.440236] Memory state around the buggy address: [ 36.445090] ffff000095361f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.452402] ffff000095362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.459715] >ffff000095362080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.467025] ^ [ 36.473196] ffff000095362100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.480508] ffff000095362180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.487818] ================================================================== [ 36.732248] ================================================================== [ 36.739564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 36.747234] Write of size 1 at addr ffff0000953620eb by task kunit_try_catch/248 [ 36.754727] [ 36.756260] CPU: 5 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 36.756287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.756294] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.756303] Call trace: [ 36.756308] show_stack+0x20/0x38 (C) [ 36.756324] dump_stack_lvl+0x8c/0xd0 [ 36.756341] print_report+0x118/0x608 [ 36.756360] kasan_report+0xdc/0x128 [ 36.756377] __asan_report_store1_noabort+0x20/0x30 [ 36.756392] krealloc_less_oob_helper+0xa58/0xc50 [ 36.756408] krealloc_large_less_oob+0x20/0x38 [ 36.756425] kunit_try_run_case+0x170/0x3f0 [ 36.756441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.756461] kthread+0x328/0x630 [ 36.756473] ret_from_fork+0x10/0x20 [ 36.756490] [ 36.827249] The buggy address belongs to the physical page: [ 36.832888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115360 [ 36.840986] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.848734] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.855779] page_type: f8(unknown) [ 36.859237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.867076] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.874912] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.882835] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.890758] head: 0bfffe0000000002 fffffdffc254d801 00000000ffffffff 00000000ffffffff [ 36.898681] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.906601] page dumped because: kasan: bad access detected [ 36.912238] [ 36.913760] Memory state around the buggy address: [ 36.918609] ffff000095361f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.925923] ffff000095362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.933238] >ffff000095362080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.940549] ^ [ 36.947245] ffff000095362100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.954550] ffff000095362180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.961861] ================================================================== [ 34.979515] ================================================================== [ 34.986832] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 34.994505] Write of size 1 at addr ffff00008036eeeb by task kunit_try_catch/244 [ 35.001999] [ 35.003535] CPU: 4 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 35.003566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.003574] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.003585] Call trace: [ 35.003590] show_stack+0x20/0x38 (C) [ 35.003608] dump_stack_lvl+0x8c/0xd0 [ 35.003625] print_report+0x118/0x608 [ 35.003643] kasan_report+0xdc/0x128 [ 35.003660] __asan_report_store1_noabort+0x20/0x30 [ 35.003677] krealloc_less_oob_helper+0xa58/0xc50 [ 35.003695] krealloc_less_oob+0x20/0x38 [ 35.003710] kunit_try_run_case+0x170/0x3f0 [ 35.003727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.003747] kthread+0x328/0x630 [ 35.003759] ret_from_fork+0x10/0x20 [ 35.003775] [ 35.073982] Allocated by task 244: [ 35.077437] kasan_save_stack+0x3c/0x68 [ 35.081332] kasan_save_track+0x20/0x40 [ 35.085238] kasan_save_alloc_info+0x40/0x58 [ 35.089574] __kasan_krealloc+0x118/0x178 [ 35.093652] krealloc_noprof+0x128/0x360 [ 35.097642] krealloc_less_oob_helper+0x168/0xc50 [ 35.102413] krealloc_less_oob+0x20/0x38 [ 35.106404] kunit_try_run_case+0x170/0x3f0 [ 35.110655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.116217] kthread+0x328/0x630 [ 35.119499] ret_from_fork+0x10/0x20 [ 35.123132] [ 35.124662] The buggy address belongs to the object at ffff00008036ee00 [ 35.124662] which belongs to the cache kmalloc-256 of size 256 [ 35.137318] The buggy address is located 34 bytes to the right of [ 35.137318] allocated 201-byte region [ffff00008036ee00, ffff00008036eec9) [ 35.150498] [ 35.152029] The buggy address belongs to the physical page: [ 35.157673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10036c [ 35.165775] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.173527] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.180576] page_type: f5(slab) [ 35.183773] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.191614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.199455] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.207382] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.215309] head: 0bfffe0000000002 fffffdffc200db01 00000000ffffffff 00000000ffffffff [ 35.223235] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.231155] page dumped because: kasan: bad access detected [ 35.236795] [ 35.238316] Memory state around the buggy address: [ 35.243167] ffff00008036ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.250474] ffff00008036ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.257782] >ffff00008036ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 35.265086] ^ [ 35.271781] ffff00008036ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.279089] ffff00008036ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.286393] ================================================================== [ 34.036575] ================================================================== [ 34.043891] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 34.051568] Write of size 1 at addr ffff00008036eed0 by task kunit_try_catch/244 [ 34.059068] [ 34.060604] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 34.060632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.060641] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.060652] Call trace: [ 34.060660] show_stack+0x20/0x38 (C) [ 34.060678] dump_stack_lvl+0x8c/0xd0 [ 34.060697] print_report+0x118/0x608 [ 34.060716] kasan_report+0xdc/0x128 [ 34.060733] __asan_report_store1_noabort+0x20/0x30 [ 34.060752] krealloc_less_oob_helper+0xb9c/0xc50 [ 34.060770] krealloc_less_oob+0x20/0x38 [ 34.060788] kunit_try_run_case+0x170/0x3f0 [ 34.060808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.060830] kthread+0x328/0x630 [ 34.060844] ret_from_fork+0x10/0x20 [ 34.060863] [ 34.131151] Allocated by task 244: [ 34.134612] kasan_save_stack+0x3c/0x68 [ 34.138522] kasan_save_track+0x20/0x40 [ 34.142431] kasan_save_alloc_info+0x40/0x58 [ 34.146771] __kasan_krealloc+0x118/0x178 [ 34.150854] krealloc_noprof+0x128/0x360 [ 34.154851] krealloc_less_oob_helper+0x168/0xc50 [ 34.159633] krealloc_less_oob+0x20/0x38 [ 34.163628] kunit_try_run_case+0x170/0x3f0 [ 34.167879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.173448] kthread+0x328/0x630 [ 34.176740] ret_from_fork+0x10/0x20 [ 34.180379] [ 34.181908] The buggy address belongs to the object at ffff00008036ee00 [ 34.181908] which belongs to the cache kmalloc-256 of size 256 [ 34.194571] The buggy address is located 7 bytes to the right of [ 34.194571] allocated 201-byte region [ffff00008036ee00, ffff00008036eec9) [ 34.207667] [ 34.209204] The buggy address belongs to the physical page: [ 34.214853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10036c [ 34.222965] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.230719] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.237775] page_type: f5(slab) [ 34.240979] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.248824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.256669] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.264599] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.272529] head: 0bfffe0000000002 fffffdffc200db01 00000000ffffffff 00000000ffffffff [ 34.280460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.288386] page dumped because: kasan: bad access detected [ 34.294037] [ 34.295564] Memory state around the buggy address: [ 34.300421] ffff00008036ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.307738] ffff00008036ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.315053] >ffff00008036ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 34.322362] ^ [ 34.328278] ffff00008036ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.335595] ffff00008036ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.342907] ==================================================================
[ 1523.222402] ================================================================== [ 1523.222430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 1523.222466] Write of size 1 at addr ffff000800d210c9 by task kunit_try_catch/229 [ 1523.222499] [ 1523.222513] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.222571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.222589] Hardware name: ARM Juno development board (r2) (DT) [ 1523.222610] Call trace: [ 1523.222621] show_stack+0x20/0x38 (C) [ 1523.222657] dump_stack_lvl+0x8c/0xd0 [ 1523.222695] print_report+0x118/0x608 [ 1523.222734] kasan_report+0xdc/0x128 [ 1523.222773] __asan_report_store1_noabort+0x20/0x30 [ 1523.222809] krealloc_less_oob_helper+0xa48/0xc50 [ 1523.222848] krealloc_less_oob+0x20/0x38 [ 1523.222884] kunit_try_run_case+0x170/0x3f0 [ 1523.222921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.222965] kthread+0x328/0x630 [ 1523.222995] ret_from_fork+0x10/0x20 [ 1523.223031] [ 1523.223040] Allocated by task 229: [ 1523.223056] kasan_save_stack+0x3c/0x68 [ 1523.223088] kasan_save_track+0x20/0x40 [ 1523.223120] kasan_save_alloc_info+0x40/0x58 [ 1523.223146] __kasan_krealloc+0x118/0x178 [ 1523.223178] krealloc_noprof+0x128/0x360 [ 1523.223209] krealloc_less_oob_helper+0x168/0xc50 [ 1523.223242] krealloc_less_oob+0x20/0x38 [ 1523.223271] kunit_try_run_case+0x170/0x3f0 [ 1523.223302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.223339] kthread+0x328/0x630 [ 1523.223362] ret_from_fork+0x10/0x20 [ 1523.223390] [ 1523.223400] The buggy address belongs to the object at ffff000800d21000 [ 1523.223400] which belongs to the cache kmalloc-256 of size 256 [ 1523.223437] The buggy address is located 0 bytes to the right of [ 1523.223437] allocated 201-byte region [ffff000800d21000, ffff000800d210c9) [ 1523.223480] [ 1523.223489] The buggy address belongs to the physical page: [ 1523.223506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.223539] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.223569] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.223601] page_type: f5(slab) [ 1523.223627] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.223661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.223697] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.223731] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.223766] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff [ 1523.223800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 1523.223825] page dumped because: kasan: bad access detected [ 1523.223843] [ 1523.223852] Memory state around the buggy address: [ 1523.223871] ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.223900] ffff000800d21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1523.223929] >ffff000800d21080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 1523.223952] ^ [ 1523.223974] ffff000800d21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.224003] ffff000800d21180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.224027] ================================================================== [ 1523.224083] ================================================================== [ 1523.224106] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 1523.224141] Write of size 1 at addr ffff000800d210d0 by task kunit_try_catch/229 [ 1523.224173] [ 1523.224187] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.224245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.224263] Hardware name: ARM Juno development board (r2) (DT) [ 1523.224283] Call trace: [ 1523.224295] show_stack+0x20/0x38 (C) [ 1523.224330] dump_stack_lvl+0x8c/0xd0 [ 1523.224368] print_report+0x118/0x608 [ 1523.224407] kasan_report+0xdc/0x128 [ 1523.224445] __asan_report_store1_noabort+0x20/0x30 [ 1523.224481] krealloc_less_oob_helper+0xb9c/0xc50 [ 1523.224520] krealloc_less_oob+0x20/0x38 [ 1523.224557] kunit_try_run_case+0x170/0x3f0 [ 1523.224594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.224639] kthread+0x328/0x630 [ 1523.224669] ret_from_fork+0x10/0x20 [ 1523.224704] [ 1523.224713] Allocated by task 229: [ 1523.224729] kasan_save_stack+0x3c/0x68 [ 1523.224762] kasan_save_track+0x20/0x40 [ 1523.224793] kasan_save_alloc_info+0x40/0x58 [ 1523.224820] __kasan_krealloc+0x118/0x178 [ 1523.224852] krealloc_noprof+0x128/0x360 [ 1523.224883] krealloc_less_oob_helper+0x168/0xc50 [ 1523.224915] krealloc_less_oob+0x20/0x38 [ 1523.224945] kunit_try_run_case+0x170/0x3f0 [ 1523.224975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.225012] kthread+0x328/0x630 [ 1523.225035] ret_from_fork+0x10/0x20 [ 1523.225064] [ 1523.225073] The buggy address belongs to the object at ffff000800d21000 [ 1523.225073] which belongs to the cache kmalloc-256 of size 256 [ 1523.225110] The buggy address is located 7 bytes to the right of [ 1523.225110] allocated 201-byte region [ffff000800d21000, ffff000800d210c9) [ 1523.225153] [ 1523.225162] The buggy address belongs to the physical page: [ 1523.225180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.225212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.225242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.225274] page_type: f5(slab) [ 1523.225299] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.225333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.225369] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.225403] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.225438] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff [ 1523.225472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 1523.225498] page dumped because: kasan: bad access detected [ 1523.225516] [ 1523.225524] Memory state around the buggy address: [ 1523.225543] ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.225572] ffff000800d21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1523.225601] >ffff000800d21080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 1523.225625] ^ [ 1523.225647] ffff000800d21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.225676] ffff000800d21180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.225700] ================================================================== [ 1523.225726] ================================================================== [ 1523.225747] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 1523.225781] Write of size 1 at addr ffff000800d210da by task kunit_try_catch/229 [ 1523.225813] [ 1523.225827] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.225884] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.225902] Hardware name: ARM Juno development board (r2) (DT) [ 1523.225922] Call trace: [ 1523.225933] show_stack+0x20/0x38 (C) [ 1523.225968] dump_stack_lvl+0x8c/0xd0 [ 1523.226006] print_report+0x118/0x608 [ 1523.226045] kasan_report+0xdc/0x128 [ 1523.226084] __asan_report_store1_noabort+0x20/0x30 [ 1523.226120] krealloc_less_oob_helper+0xa80/0xc50 [ 1523.226159] krealloc_less_oob+0x20/0x38 [ 1523.226195] kunit_try_run_case+0x170/0x3f0 [ 1523.226232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.226276] kthread+0x328/0x630 [ 1523.226306] ret_from_fork+0x10/0x20 [ 1523.226342] [ 1523.226351] Allocated by task 229: [ 1523.226367] kasan_save_stack+0x3c/0x68 [ 1523.226399] kasan_save_track+0x20/0x40 [ 1523.226430] kasan_save_alloc_info+0x40/0x58 [ 1523.226457] __kasan_krealloc+0x118/0x178 [ 1523.226489] krealloc_noprof+0x128/0x360 [ 1523.226520] krealloc_less_oob_helper+0x168/0xc50 [ 1523.226553] krealloc_less_oob+0x20/0x38 [ 1523.226582] kunit_try_run_case+0x170/0x3f0 [ 1523.226613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.226650] kthread+0x328/0x630 [ 1523.226673] ret_from_fork+0x10/0x20 [ 1523.226702] [ 1523.226711] The buggy address belongs to the object at ffff000800d21000 [ 1523.226711] which belongs to the cache kmalloc-256 of size 256 [ 1523.226748] The buggy address is located 17 bytes to the right of [ 1523.226748] allocated 201-byte region [ffff000800d21000, ffff000800d210c9) [ 1523.226792] [ 1523.226801] The buggy address belongs to the physical page: [ 1523.226818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.226851] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.226881] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.226913] page_type: f5(slab) [ 1523.227419] Write of size 1 at addr ffff000800d210ea by task kunit_try_catch/229 [ 1523.229260] show_stack+0x20/0x38 (C) [ 1523.233303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.234288] ffff000827892180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1523.240058] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 1523.246582] [ 1523.251060] kunit_try_run_case+0x170/0x3f0 [ 1523.257650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.273799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1523.289321] kunit_try_run_case+0x170/0x3f0 [ 1523.297919] The buggy address belongs to the object at ffff000827f2f300 [ 1523.297919] which belongs to the cache kmalloc-128 of size 128 [ 1525.271958] The buggy address belongs to the object at ffff000800c03c00 [ 1525.271958] which belongs to the cache kmalloc-128 of size 128 [ 1525.315974] The buggy address is located 1 bytes inside of [ 1525.315974] 128-byte region [ffff000827998100, ffff000827998180) [ 1525.341573] Read of size 1 at addr ffff000827f466d0 by task kunit_try_catch/330 [ 1525.361931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 1525.391784] ==================================================================
[ 26.649709] ================================================================== [ 26.649914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 26.649974] Write of size 1 at addr fff00000c1c40cd0 by task kunit_try_catch/170 [ 26.650021] [ 26.650048] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.650322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.650356] Hardware name: linux,dummy-virt (DT) [ 26.650384] Call trace: [ 26.650404] show_stack+0x20/0x38 (C) [ 26.650453] dump_stack_lvl+0x8c/0xd0 [ 26.650499] print_report+0x118/0x608 [ 26.650546] kasan_report+0xdc/0x128 [ 26.651071] __asan_report_store1_noabort+0x20/0x30 [ 26.651201] krealloc_less_oob_helper+0xb9c/0xc50 [ 26.651252] krealloc_less_oob+0x20/0x38 [ 26.651307] kunit_try_run_case+0x170/0x3f0 [ 26.651516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.651569] kthread+0x328/0x630 [ 26.651609] ret_from_fork+0x10/0x20 [ 26.651655] [ 26.651673] Allocated by task 170: [ 26.651698] kasan_save_stack+0x3c/0x68 [ 26.651744] kasan_save_track+0x20/0x40 [ 26.651898] kasan_save_alloc_info+0x40/0x58 [ 26.652091] __kasan_krealloc+0x118/0x178 [ 26.652279] krealloc_noprof+0x128/0x360 [ 26.652316] krealloc_less_oob_helper+0x168/0xc50 [ 26.652460] krealloc_less_oob+0x20/0x38 [ 26.652562] kunit_try_run_case+0x170/0x3f0 [ 26.652598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.652639] kthread+0x328/0x630 [ 26.652669] ret_from_fork+0x10/0x20 [ 26.652709] [ 26.652795] The buggy address belongs to the object at fff00000c1c40c00 [ 26.652795] which belongs to the cache kmalloc-256 of size 256 [ 26.652899] The buggy address is located 7 bytes to the right of [ 26.652899] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.652960] [ 26.652979] The buggy address belongs to the physical page: [ 26.653010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.653069] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.653113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.653163] page_type: f5(slab) [ 26.653626] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.653679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.654076] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.654508] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.654689] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.655117] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.655186] page dumped because: kasan: bad access detected [ 26.655217] [ 26.655234] Memory state around the buggy address: [ 26.655264] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.655305] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.655345] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.655381] ^ [ 26.655880] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.656033] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.656081] ================================================================== [ 26.768025] ================================================================== [ 26.768160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 26.768285] Write of size 1 at addr fff00000c649e0da by task kunit_try_catch/174 [ 26.768335] [ 26.768362] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.768446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.768471] Hardware name: linux,dummy-virt (DT) [ 26.768500] Call trace: [ 26.768520] show_stack+0x20/0x38 (C) [ 26.768568] dump_stack_lvl+0x8c/0xd0 [ 26.768614] print_report+0x118/0x608 [ 26.768782] kasan_report+0xdc/0x128 [ 26.769273] __asan_report_store1_noabort+0x20/0x30 [ 26.769679] krealloc_less_oob_helper+0xa80/0xc50 [ 26.769732] krealloc_large_less_oob+0x20/0x38 [ 26.769791] kunit_try_run_case+0x170/0x3f0 [ 26.769841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.769893] kthread+0x328/0x630 [ 26.769937] ret_from_fork+0x10/0x20 [ 26.769984] [ 26.770003] The buggy address belongs to the physical page: [ 26.770032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.770091] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.770136] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.770191] page_type: f8(unknown) [ 26.770229] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.770276] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.770324] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.770371] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.770418] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.770464] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.770502] page dumped because: kasan: bad access detected [ 26.770531] [ 26.770548] Memory state around the buggy address: [ 26.770577] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.770616] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.770656] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.770691] ^ [ 26.770726] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.770765] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.770801] ================================================================== [ 26.641459] ================================================================== [ 26.641515] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 26.641644] Write of size 1 at addr fff00000c1c40cc9 by task kunit_try_catch/170 [ 26.641696] [ 26.641726] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.641809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.641835] Hardware name: linux,dummy-virt (DT) [ 26.641871] Call trace: [ 26.641958] show_stack+0x20/0x38 (C) [ 26.642179] dump_stack_lvl+0x8c/0xd0 [ 26.642227] print_report+0x118/0x608 [ 26.642334] kasan_report+0xdc/0x128 [ 26.642379] __asan_report_store1_noabort+0x20/0x30 [ 26.642426] krealloc_less_oob_helper+0xa48/0xc50 [ 26.642474] krealloc_less_oob+0x20/0x38 [ 26.642524] kunit_try_run_case+0x170/0x3f0 [ 26.642762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.642857] kthread+0x328/0x630 [ 26.643472] ret_from_fork+0x10/0x20 [ 26.643626] [ 26.643866] Allocated by task 170: [ 26.644155] kasan_save_stack+0x3c/0x68 [ 26.644206] kasan_save_track+0x20/0x40 [ 26.644242] kasan_save_alloc_info+0x40/0x58 [ 26.644277] __kasan_krealloc+0x118/0x178 [ 26.644314] krealloc_noprof+0x128/0x360 [ 26.644349] krealloc_less_oob_helper+0x168/0xc50 [ 26.644626] krealloc_less_oob+0x20/0x38 [ 26.644702] kunit_try_run_case+0x170/0x3f0 [ 26.644741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.644783] kthread+0x328/0x630 [ 26.644825] ret_from_fork+0x10/0x20 [ 26.645092] [ 26.645159] The buggy address belongs to the object at fff00000c1c40c00 [ 26.645159] which belongs to the cache kmalloc-256 of size 256 [ 26.645225] The buggy address is located 0 bytes to the right of [ 26.645225] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.645370] [ 26.645389] The buggy address belongs to the physical page: [ 26.645419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.645470] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.645797] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.645885] page_type: f5(slab) [ 26.645922] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.645970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.646074] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.646275] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.646364] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.646749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.646793] page dumped because: kasan: bad access detected [ 26.646824] [ 26.646842] Memory state around the buggy address: [ 26.646872] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.646996] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.647154] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.647202] ^ [ 26.647298] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.647428] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.647464] ================================================================== [ 26.753337] ================================================================== [ 26.753389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 26.753437] Write of size 1 at addr fff00000c649e0d0 by task kunit_try_catch/174 [ 26.754685] [ 26.754821] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.755644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.755850] Hardware name: linux,dummy-virt (DT) [ 26.756016] Call trace: [ 26.756045] show_stack+0x20/0x38 (C) [ 26.756600] dump_stack_lvl+0x8c/0xd0 [ 26.756884] print_report+0x118/0x608 [ 26.757015] kasan_report+0xdc/0x128 [ 26.757248] __asan_report_store1_noabort+0x20/0x30 [ 26.757302] krealloc_less_oob_helper+0xb9c/0xc50 [ 26.757571] krealloc_large_less_oob+0x20/0x38 [ 26.757650] kunit_try_run_case+0x170/0x3f0 [ 26.757697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.758299] kthread+0x328/0x630 [ 26.758399] ret_from_fork+0x10/0x20 [ 26.758558] [ 26.759331] The buggy address belongs to the physical page: [ 26.759758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.760100] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.760149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.760292] page_type: f8(unknown) [ 26.760533] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.760588] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.760957] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.761504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.761749] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.761798] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.761836] page dumped because: kasan: bad access detected [ 26.763019] [ 26.763043] Memory state around the buggy address: [ 26.763478] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.763795] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.764231] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.764278] ^ [ 26.764841] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.765006] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.765275] ================================================================== [ 26.657872] ================================================================== [ 26.658008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 26.658207] Write of size 1 at addr fff00000c1c40cda by task kunit_try_catch/170 [ 26.658261] [ 26.658289] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.658823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.658963] Hardware name: linux,dummy-virt (DT) [ 26.658998] Call trace: [ 26.659084] show_stack+0x20/0x38 (C) [ 26.659133] dump_stack_lvl+0x8c/0xd0 [ 26.659185] print_report+0x118/0x608 [ 26.659370] kasan_report+0xdc/0x128 [ 26.659489] __asan_report_store1_noabort+0x20/0x30 [ 26.659582] krealloc_less_oob_helper+0xa80/0xc50 [ 26.659713] krealloc_less_oob+0x20/0x38 [ 26.659763] kunit_try_run_case+0x170/0x3f0 [ 26.659818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.659871] kthread+0x328/0x630 [ 26.659911] ret_from_fork+0x10/0x20 [ 26.659957] [ 26.659974] Allocated by task 170: [ 26.660000] kasan_save_stack+0x3c/0x68 [ 26.660480] kasan_save_track+0x20/0x40 [ 26.660544] kasan_save_alloc_info+0x40/0x58 [ 26.660832] __kasan_krealloc+0x118/0x178 [ 26.660958] krealloc_noprof+0x128/0x360 [ 26.660994] krealloc_less_oob_helper+0x168/0xc50 [ 26.661035] krealloc_less_oob+0x20/0x38 [ 26.661363] kunit_try_run_case+0x170/0x3f0 [ 26.661434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.661476] kthread+0x328/0x630 [ 26.661513] ret_from_fork+0x10/0x20 [ 26.661805] [ 26.661824] The buggy address belongs to the object at fff00000c1c40c00 [ 26.661824] which belongs to the cache kmalloc-256 of size 256 [ 26.662078] The buggy address is located 17 bytes to the right of [ 26.662078] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.662456] [ 26.662481] The buggy address belongs to the physical page: [ 26.662623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.662679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.663113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.663175] page_type: f5(slab) [ 26.663212] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.663269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.663317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.663589] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.663897] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.663975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.664030] page dumped because: kasan: bad access detected [ 26.664075] [ 26.664092] Memory state around the buggy address: [ 26.664125] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.664413] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.664477] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.664513] ^ [ 26.664610] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.664780] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.664815] ================================================================== [ 26.771360] ================================================================== [ 26.771402] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 26.771448] Write of size 1 at addr fff00000c649e0ea by task kunit_try_catch/174 [ 26.771495] [ 26.771523] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.771603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.771627] Hardware name: linux,dummy-virt (DT) [ 26.771655] Call trace: [ 26.771675] show_stack+0x20/0x38 (C) [ 26.771720] dump_stack_lvl+0x8c/0xd0 [ 26.771765] print_report+0x118/0x608 [ 26.771817] kasan_report+0xdc/0x128 [ 26.771862] __asan_report_store1_noabort+0x20/0x30 [ 26.771909] krealloc_less_oob_helper+0xae4/0xc50 [ 26.771957] krealloc_large_less_oob+0x20/0x38 [ 26.772004] kunit_try_run_case+0x170/0x3f0 [ 26.772050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.772447] kthread+0x328/0x630 [ 26.772502] ret_from_fork+0x10/0x20 [ 26.772548] [ 26.772567] The buggy address belongs to the physical page: [ 26.772596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.772646] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.772690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.772741] page_type: f8(unknown) [ 26.772779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.772827] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.772875] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.772921] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.772967] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.773014] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.773051] page dumped because: kasan: bad access detected [ 26.773093] [ 26.773110] Memory state around the buggy address: [ 26.773138] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.773177] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.773256] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.773314] ^ [ 26.773352] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.773422] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.773459] ================================================================== [ 26.774020] ================================================================== [ 26.774115] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 26.774169] Write of size 1 at addr fff00000c649e0eb by task kunit_try_catch/174 [ 26.774250] [ 26.774297] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.774395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.774447] Hardware name: linux,dummy-virt (DT) [ 26.774504] Call trace: [ 26.774542] show_stack+0x20/0x38 (C) [ 26.774589] dump_stack_lvl+0x8c/0xd0 [ 26.774634] print_report+0x118/0x608 [ 26.774759] kasan_report+0xdc/0x128 [ 26.775012] __asan_report_store1_noabort+0x20/0x30 [ 26.775093] krealloc_less_oob_helper+0xa58/0xc50 [ 26.775195] krealloc_large_less_oob+0x20/0x38 [ 26.775271] kunit_try_run_case+0x170/0x3f0 [ 26.775350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.775404] kthread+0x328/0x630 [ 26.775517] ret_from_fork+0x10/0x20 [ 26.775699] [ 26.775718] The buggy address belongs to the physical page: [ 26.775755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.775805] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.775861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.775910] page_type: f8(unknown) [ 26.775975] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.776029] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.776319] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.776403] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.776487] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.776552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.776590] page dumped because: kasan: bad access detected [ 26.776620] [ 26.776637] Memory state around the buggy address: [ 26.776665] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.776876] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.777182] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.777301] ^ [ 26.777366] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.777406] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.777616] ================================================================== [ 26.665806] ================================================================== [ 26.665962] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 26.666293] Write of size 1 at addr fff00000c1c40cea by task kunit_try_catch/170 [ 26.666859] [ 26.666900] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.666994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.667099] Hardware name: linux,dummy-virt (DT) [ 26.667136] Call trace: [ 26.667159] show_stack+0x20/0x38 (C) [ 26.667210] dump_stack_lvl+0x8c/0xd0 [ 26.667578] print_report+0x118/0x608 [ 26.667647] kasan_report+0xdc/0x128 [ 26.667695] __asan_report_store1_noabort+0x20/0x30 [ 26.667938] krealloc_less_oob_helper+0xae4/0xc50 [ 26.668288] krealloc_less_oob+0x20/0x38 [ 26.668335] kunit_try_run_case+0x170/0x3f0 [ 26.668381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.668564] kthread+0x328/0x630 [ 26.668610] ret_from_fork+0x10/0x20 [ 26.668681] [ 26.668699] Allocated by task 170: [ 26.668967] kasan_save_stack+0x3c/0x68 [ 26.669013] kasan_save_track+0x20/0x40 [ 26.669049] kasan_save_alloc_info+0x40/0x58 [ 26.669095] __kasan_krealloc+0x118/0x178 [ 26.669131] krealloc_noprof+0x128/0x360 [ 26.669169] krealloc_less_oob_helper+0x168/0xc50 [ 26.669207] krealloc_less_oob+0x20/0x38 [ 26.669399] kunit_try_run_case+0x170/0x3f0 [ 26.669439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.669643] kthread+0x328/0x630 [ 26.669794] ret_from_fork+0x10/0x20 [ 26.669828] [ 26.669846] The buggy address belongs to the object at fff00000c1c40c00 [ 26.669846] which belongs to the cache kmalloc-256 of size 256 [ 26.669900] The buggy address is located 33 bytes to the right of [ 26.669900] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.669983] [ 26.670040] The buggy address belongs to the physical page: [ 26.670078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.670126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.670174] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.670222] page_type: f5(slab) [ 26.670258] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.670306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.671258] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.671388] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.671785] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.671926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.671965] page dumped because: kasan: bad access detected [ 26.672017] [ 26.672035] Memory state around the buggy address: [ 26.672074] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672114] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.672154] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.672242] ^ [ 26.672402] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672526] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672581] ================================================================== [ 26.736712] ================================================================== [ 26.736768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 26.736827] Write of size 1 at addr fff00000c649e0c9 by task kunit_try_catch/174 [ 26.736876] [ 26.736911] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.736997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.737023] Hardware name: linux,dummy-virt (DT) [ 26.737066] Call trace: [ 26.737088] show_stack+0x20/0x38 (C) [ 26.738676] dump_stack_lvl+0x8c/0xd0 [ 26.739267] print_report+0x118/0x608 [ 26.739351] kasan_report+0xdc/0x128 [ 26.739397] __asan_report_store1_noabort+0x20/0x30 [ 26.739936] krealloc_less_oob_helper+0xa48/0xc50 [ 26.740464] krealloc_large_less_oob+0x20/0x38 [ 26.741035] kunit_try_run_case+0x170/0x3f0 [ 26.741097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.741864] kthread+0x328/0x630 [ 26.742339] ret_from_fork+0x10/0x20 [ 26.742714] [ 26.742745] The buggy address belongs to the physical page: [ 26.743086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.743350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.743842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.744260] page_type: f8(unknown) [ 26.745261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.745440] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.745744] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.746373] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.746487] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.746534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.746572] page dumped because: kasan: bad access detected [ 26.746602] [ 26.746619] Memory state around the buggy address: [ 26.747829] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.747932] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.747974] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.748011] ^ [ 26.748188] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.748479] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.749001] ================================================================== [ 26.674110] ================================================================== [ 26.674270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 26.674355] Write of size 1 at addr fff00000c1c40ceb by task kunit_try_catch/170 [ 26.674403] [ 26.674430] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.674511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.674536] Hardware name: linux,dummy-virt (DT) [ 26.674564] Call trace: [ 26.674584] show_stack+0x20/0x38 (C) [ 26.674630] dump_stack_lvl+0x8c/0xd0 [ 26.674675] print_report+0x118/0x608 [ 26.674720] kasan_report+0xdc/0x128 [ 26.674775] __asan_report_store1_noabort+0x20/0x30 [ 26.674823] krealloc_less_oob_helper+0xa58/0xc50 [ 26.675001] krealloc_less_oob+0x20/0x38 [ 26.675045] kunit_try_run_case+0x170/0x3f0 [ 26.675100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.675291] kthread+0x328/0x630 [ 26.675335] ret_from_fork+0x10/0x20 [ 26.675582] [ 26.675668] Allocated by task 170: [ 26.676089] kasan_save_stack+0x3c/0x68 [ 26.676697] kasan_save_track+0x20/0x40 [ 26.676748] kasan_save_alloc_info+0x40/0x58 [ 26.676784] __kasan_krealloc+0x118/0x178 [ 26.677462] krealloc_noprof+0x128/0x360 [ 26.677517] krealloc_less_oob_helper+0x168/0xc50 [ 26.678048] krealloc_less_oob+0x20/0x38 [ 26.678108] kunit_try_run_case+0x170/0x3f0 [ 26.678145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.678939] kthread+0x328/0x630 [ 26.679405] ret_from_fork+0x10/0x20 [ 26.679902] [ 26.679942] The buggy address belongs to the object at fff00000c1c40c00 [ 26.679942] which belongs to the cache kmalloc-256 of size 256 [ 26.680008] The buggy address is located 34 bytes to the right of [ 26.680008] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.681040] [ 26.681091] The buggy address belongs to the physical page: [ 26.681121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.681264] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.681489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.681863] page_type: f5(slab) [ 26.681932] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.682039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.682171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.682332] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.682380] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.682506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.682656] page dumped because: kasan: bad access detected [ 26.682705] [ 26.682792] Memory state around the buggy address: [ 26.682864] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.682906] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.682965] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.683016] ^ [ 26.683752] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.683837] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.683885] ==================================================================
[ 21.872562] ================================================================== [ 21.873319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 21.873887] Write of size 1 at addr ffff888103aaa8da by task kunit_try_catch/187 [ 21.874236] [ 21.874335] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 21.874383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.874405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.874428] Call Trace: [ 21.874441] <TASK> [ 21.874460] dump_stack_lvl+0x73/0xb0 [ 21.874501] print_report+0xd1/0x650 [ 21.874525] ? __virt_addr_valid+0x1db/0x2d0 [ 21.874548] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.874571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.874605] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.874627] kasan_report+0x141/0x180 [ 21.874648] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.874684] __asan_report_store1_noabort+0x1b/0x30 [ 21.874707] krealloc_less_oob_helper+0xec6/0x11d0 [ 21.874731] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.874755] ? __kasan_check_write+0x18/0x20 [ 21.874834] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.874862] ? irqentry_exit+0x2a/0x60 [ 21.874881] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 21.874902] ? trace_hardirqs_on+0x37/0xe0 [ 21.874924] ? __pfx_read_tsc+0x10/0x10 [ 21.874949] krealloc_less_oob+0x1c/0x30 [ 21.874969] kunit_try_run_case+0x1a5/0x480 [ 21.874993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.875040] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.875064] ? __kthread_parkme+0x82/0x180 [ 21.875084] ? preempt_count_sub+0x50/0x80 [ 21.875106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.875130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.875152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.875175] kthread+0x337/0x6f0 [ 21.875194] ? trace_preempt_on+0x20/0xc0 [ 21.875215] ? __pfx_kthread+0x10/0x10 [ 21.875243] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.875266] ? calculate_sigpending+0x7b/0xa0 [ 21.875290] ? __pfx_kthread+0x10/0x10 [ 21.875310] ret_from_fork+0x116/0x1d0 [ 21.875328] ? __pfx_kthread+0x10/0x10 [ 21.875348] ret_from_fork_asm+0x1a/0x30 [ 21.875378] </TASK> [ 21.875389] [ 21.883591] Allocated by task 187: [ 21.883863] kasan_save_stack+0x45/0x70 [ 21.884082] kasan_save_track+0x18/0x40 [ 21.884276] kasan_save_alloc_info+0x3b/0x50 [ 21.884475] __kasan_krealloc+0x190/0x1f0 [ 21.884661] krealloc_noprof+0xf3/0x340 [ 21.884914] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.885178] krealloc_less_oob+0x1c/0x30 [ 21.885326] kunit_try_run_case+0x1a5/0x480 [ 21.885552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.885741] kthread+0x337/0x6f0 [ 21.885864] ret_from_fork+0x116/0x1d0 [ 21.885990] ret_from_fork_asm+0x1a/0x30 [ 21.886131] [ 21.886321] The buggy address belongs to the object at ffff888103aaa800 [ 21.886321] which belongs to the cache kmalloc-256 of size 256 [ 21.886900] The buggy address is located 17 bytes to the right of [ 21.886900] allocated 201-byte region [ffff888103aaa800, ffff888103aaa8c9) [ 21.887473] [ 21.887541] The buggy address belongs to the physical page: [ 21.887742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaa [ 21.888345] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.888667] flags: 0x200000000000040(head|node=0|zone=2) [ 21.888983] page_type: f5(slab) [ 21.889183] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.889502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.889887] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.890240] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.890576] head: 0200000000000001 ffffea00040eaa81 00000000ffffffff 00000000ffffffff [ 21.890951] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.891232] page dumped because: kasan: bad access detected [ 21.891481] [ 21.891571] Memory state around the buggy address: [ 21.891827] ffff888103aaa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.892069] ffff888103aaa800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.892417] >ffff888103aaa880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.892734] ^ [ 21.893191] ffff888103aaa900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.893476] ffff888103aaa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.893865] ================================================================== [ 21.894411] ================================================================== [ 21.894838] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 21.895211] Write of size 1 at addr ffff888103aaa8ea by task kunit_try_catch/187 [ 21.895515] [ 21.895636] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 21.895692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.895704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.895725] Call Trace: [ 21.895743] <TASK> [ 21.895767] dump_stack_lvl+0x73/0xb0 [ 21.895869] print_report+0xd1/0x650 [ 21.895890] ? __virt_addr_valid+0x1db/0x2d0 [ 21.895913] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 21.895935] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.895960] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 21.895990] kasan_report+0x141/0x180 [ 21.896011] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 21.896037] __asan_report_store1_noabort+0x1b/0x30 [ 21.896081] krealloc_less_oob_helper+0xe90/0x11d0 [ 21.896107] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.896132] ? __kasan_check_write+0x18/0x20 [ 21.896154] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.896178] ? irqentry_exit+0x2a/0x60 [ 21.896198] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 21.896227] ? trace_hardirqs_on+0x37/0xe0 [ 21.896249] ? __pfx_read_tsc+0x10/0x10 [ 21.896273] krealloc_less_oob+0x1c/0x30 [ 21.896302] kunit_try_run_case+0x1a5/0x480 [ 21.896327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.896350] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.896384] ? __kthread_parkme+0x82/0x180 [ 21.896404] ? preempt_count_sub+0x50/0x80 [ 21.896427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.896449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.896471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.896503] kthread+0x337/0x6f0 [ 21.896521] ? trace_preempt_on+0x20/0xc0 [ 21.896542] ? __pfx_kthread+0x10/0x10 [ 21.896562] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.896595] ? calculate_sigpending+0x7b/0xa0 [ 21.896618] ? __pfx_kthread+0x10/0x10 [ 21.896639] ret_from_fork+0x116/0x1d0 [ 21.896656] ? __pfx_kthread+0x10/0x10 [ 21.896684] ret_from_fork_asm+0x1a/0x30 [ 21.896714] </TASK> [ 21.896725] [ 21.904746] Allocated by task 187: [ 21.905202] kasan_save_stack+0x45/0x70 [ 21.905423] kasan_save_track+0x18/0x40 [ 21.905608] kasan_save_alloc_info+0x3b/0x50 [ 21.905899] __kasan_krealloc+0x190/0x1f0 [ 21.906086] krealloc_noprof+0xf3/0x340 [ 21.906281] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.906495] krealloc_less_oob+0x1c/0x30 [ 21.906680] kunit_try_run_case+0x1a5/0x480 [ 21.906941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.907206] kthread+0x337/0x6f0 [ 21.907382] ret_from_fork+0x116/0x1d0 [ 21.907554] ret_from_fork_asm+0x1a/0x30 [ 21.907734] [ 21.907868] The buggy address belongs to the object at ffff888103aaa800 [ 21.907868] which belongs to the cache kmalloc-256 of size 256 [ 21.908309] The buggy address is located 33 bytes to the right of [ 21.908309] allocated 201-byte region [ffff888103aaa800, ffff888103aaa8c9) [ 21.908937] [ 21.909033] The buggy address belongs to the physical page: [ 21.909337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaa [ 21.909672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.910177] flags: 0x200000000000040(head|node=0|zone=2) [ 21.910509] page_type: f5(slab) [ 21.910699] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.911198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.911581] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.911994] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.912281] head: 0200000000000001 ffffea00040eaa81 00000000ffffffff 00000000ffffffff [ 21.912650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.913025] page dumped because: kasan: bad access detected [ 21.913275] [ 21.913375] Memory state around the buggy address: [ 21.913595] ffff888103aaa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.913875] ffff888103aaa800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.914280] >ffff888103aaa880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.914587] ^ [ 21.914981] ffff888103aaa900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.915353] ffff888103aaa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.915671] ================================================================== [ 21.916130] ================================================================== [ 21.916481] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 21.916800] Write of size 1 at addr ffff888103aaa8eb by task kunit_try_catch/187 [ 21.917111] [ 21.917196] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 21.917493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.917509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.917531] Call Trace: [ 21.917551] <TASK> [ 21.917582] dump_stack_lvl+0x73/0xb0 [ 21.917611] print_report+0xd1/0x650 [ 21.917633] ? __virt_addr_valid+0x1db/0x2d0 [ 21.917655] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 21.917678] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.917713] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 21.917735] kasan_report+0x141/0x180 [ 21.917755] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 21.917839] __asan_report_store1_noabort+0x1b/0x30 [ 21.917865] krealloc_less_oob_helper+0xd47/0x11d0 [ 21.917889] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.917913] ? __kasan_check_write+0x18/0x20 [ 21.917935] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.917959] ? irqentry_exit+0x2a/0x60 [ 21.917978] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 21.917999] ? trace_hardirqs_on+0x37/0xe0 [ 21.918038] ? __pfx_read_tsc+0x10/0x10 [ 21.918063] krealloc_less_oob+0x1c/0x30 [ 21.918083] kunit_try_run_case+0x1a5/0x480 [ 21.918106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.918130] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.918154] ? __kthread_parkme+0x82/0x180 [ 21.918174] ? preempt_count_sub+0x50/0x80 [ 21.918196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.918228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.918250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.918273] kthread+0x337/0x6f0 [ 21.918291] ? trace_preempt_on+0x20/0xc0 [ 21.918322] ? __pfx_kthread+0x10/0x10 [ 21.918341] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.918364] ? calculate_sigpending+0x7b/0xa0 [ 21.918398] ? __pfx_kthread+0x10/0x10 [ 21.918418] ret_from_fork+0x116/0x1d0 [ 21.918436] ? __pfx_kthread+0x10/0x10 [ 21.918456] ret_from_fork_asm+0x1a/0x30 [ 21.918487] </TASK> [ 21.918498] [ 21.926612] Allocated by task 187: [ 21.926749] kasan_save_stack+0x45/0x70 [ 21.927269] kasan_save_track+0x18/0x40 [ 21.927460] kasan_save_alloc_info+0x3b/0x50 [ 21.927665] __kasan_krealloc+0x190/0x1f0 [ 21.927859] krealloc_noprof+0xf3/0x340 [ 21.928171] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.928408] krealloc_less_oob+0x1c/0x30 [ 21.928602] kunit_try_run_case+0x1a5/0x480 [ 21.928860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.929148] kthread+0x337/0x6f0 [ 21.929319] ret_from_fork+0x116/0x1d0 [ 21.929445] ret_from_fork_asm+0x1a/0x30 [ 21.929576] [ 21.929641] The buggy address belongs to the object at ffff888103aaa800 [ 21.929641] which belongs to the cache kmalloc-256 of size 256 [ 21.930267] The buggy address is located 34 bytes to the right of [ 21.930267] allocated 201-byte region [ffff888103aaa800, ffff888103aaa8c9) [ 21.930757] [ 21.930832] The buggy address belongs to the physical page: [ 21.931013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaa [ 21.931488] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.932062] flags: 0x200000000000040(head|node=0|zone=2) [ 21.932342] page_type: f5(slab) [ 21.932517] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.932915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.933276] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.933522] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.933887] head: 0200000000000001 ffffea00040eaa81 00000000ffffffff 00000000ffffffff [ 21.934261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.934573] page dumped because: kasan: bad access detected [ 21.934763] [ 21.934942] Memory state around the buggy address: [ 21.935217] ffff888103aaa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.935495] ffff888103aaa800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.935800] >ffff888103aaa880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.936171] ^ [ 21.936381] ffff888103aaa900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.936719] ffff888103aaa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.937228] ================================================================== [ 21.849632] ================================================================== [ 21.850285] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 21.850534] Write of size 1 at addr ffff888103aaa8d0 by task kunit_try_catch/187 [ 21.851035] [ 21.851149] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 21.851198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.851210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.851241] Call Trace: [ 21.851260] <TASK> [ 21.851279] dump_stack_lvl+0x73/0xb0 [ 21.851307] print_report+0xd1/0x650 [ 21.851328] ? __virt_addr_valid+0x1db/0x2d0 [ 21.851351] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.851374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.851398] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.851420] kasan_report+0x141/0x180 [ 21.851441] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.851467] __asan_report_store1_noabort+0x1b/0x30 [ 21.851490] krealloc_less_oob_helper+0xe23/0x11d0 [ 21.851514] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.851538] ? __kasan_check_write+0x18/0x20 [ 21.851560] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.851595] ? irqentry_exit+0x2a/0x60 [ 21.851614] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 21.851635] ? trace_hardirqs_on+0x37/0xe0 [ 21.851669] ? __pfx_read_tsc+0x10/0x10 [ 21.851693] krealloc_less_oob+0x1c/0x30 [ 21.851713] kunit_try_run_case+0x1a5/0x480 [ 21.851746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.851769] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.851843] ? __kthread_parkme+0x82/0x180 [ 21.851867] ? preempt_count_sub+0x50/0x80 [ 21.851891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.851914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.851937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.851959] kthread+0x337/0x6f0 [ 21.851979] ? trace_preempt_on+0x20/0xc0 [ 21.852000] ? __pfx_kthread+0x10/0x10 [ 21.852020] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.852042] ? calculate_sigpending+0x7b/0xa0 [ 21.852066] ? __pfx_kthread+0x10/0x10 [ 21.852086] ret_from_fork+0x116/0x1d0 [ 21.852105] ? __pfx_kthread+0x10/0x10 [ 21.852124] ret_from_fork_asm+0x1a/0x30 [ 21.852155] </TASK> [ 21.852166] [ 21.860173] Allocated by task 187: [ 21.860379] kasan_save_stack+0x45/0x70 [ 21.860584] kasan_save_track+0x18/0x40 [ 21.860713] kasan_save_alloc_info+0x3b/0x50 [ 21.861244] __kasan_krealloc+0x190/0x1f0 [ 21.861457] krealloc_noprof+0xf3/0x340 [ 21.861646] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.861959] krealloc_less_oob+0x1c/0x30 [ 21.862172] kunit_try_run_case+0x1a5/0x480 [ 21.862378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.862580] kthread+0x337/0x6f0 [ 21.862704] ret_from_fork+0x116/0x1d0 [ 21.862896] ret_from_fork_asm+0x1a/0x30 [ 21.863138] [ 21.863238] The buggy address belongs to the object at ffff888103aaa800 [ 21.863238] which belongs to the cache kmalloc-256 of size 256 [ 21.863768] The buggy address is located 7 bytes to the right of [ 21.863768] allocated 201-byte region [ffff888103aaa800, ffff888103aaa8c9) [ 21.864362] [ 21.864433] The buggy address belongs to the physical page: [ 21.864604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaa [ 21.864932] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.865331] flags: 0x200000000000040(head|node=0|zone=2) [ 21.865616] page_type: f5(slab) [ 21.866081] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.866504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.866946] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.867302] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.867623] head: 0200000000000001 ffffea00040eaa81 00000000ffffffff 00000000ffffffff [ 21.868009] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.868345] page dumped because: kasan: bad access detected [ 21.868593] [ 21.868683] Memory state around the buggy address: [ 21.868955] ffff888103aaa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.869293] ffff888103aaa800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.869585] >ffff888103aaa880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.869930] ^ [ 21.870241] ffff888103aaa900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.870538] ffff888103aaa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871193] ================================================================== [ 22.001112] ================================================================== [ 22.001717] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 22.002586] Write of size 1 at addr ffff888102bbe0d0 by task kunit_try_catch/191 [ 22.002819] [ 22.002909] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.002954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.002966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.002998] Call Trace: [ 22.003015] <TASK> [ 22.003038] dump_stack_lvl+0x73/0xb0 [ 22.003145] print_report+0xd1/0x650 [ 22.003168] ? __virt_addr_valid+0x1db/0x2d0 [ 22.003191] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 22.003213] ? kasan_addr_to_slab+0x11/0xa0 [ 22.003243] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 22.003265] kasan_report+0x141/0x180 [ 22.003287] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 22.003313] __asan_report_store1_noabort+0x1b/0x30 [ 22.003336] krealloc_less_oob_helper+0xe23/0x11d0 [ 22.003361] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.003384] ? finish_task_switch.isra.0+0x153/0x700 [ 22.003405] ? __switch_to+0x47/0xf50 [ 22.003439] ? __schedule+0x10cc/0x2b60 [ 22.003464] ? __pfx_read_tsc+0x10/0x10 [ 22.003489] krealloc_large_less_oob+0x1c/0x30 [ 22.003521] kunit_try_run_case+0x1a5/0x480 [ 22.003545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.003567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.003600] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.003624] ? __kthread_parkme+0x82/0x180 [ 22.003643] ? preempt_count_sub+0x50/0x80 [ 22.003675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.003698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.003721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.003744] kthread+0x337/0x6f0 [ 22.003772] ? trace_preempt_on+0x20/0xc0 [ 22.003796] ? __pfx_kthread+0x10/0x10 [ 22.003819] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.003863] ? calculate_sigpending+0x7b/0xa0 [ 22.003886] ? __pfx_kthread+0x10/0x10 [ 22.003907] ret_from_fork+0x116/0x1d0 [ 22.003925] ? __pfx_kthread+0x10/0x10 [ 22.003984] ret_from_fork_asm+0x1a/0x30 [ 22.004038] </TASK> [ 22.004049] [ 22.012393] The buggy address belongs to the physical page: [ 22.012758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bbc [ 22.013449] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.013768] flags: 0x200000000000040(head|node=0|zone=2) [ 22.014149] page_type: f8(unknown) [ 22.014327] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.014649] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.015062] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.015407] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.015634] head: 0200000000000002 ffffea00040aef01 00000000ffffffff 00000000ffffffff [ 22.015877] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.016303] page dumped because: kasan: bad access detected [ 22.016749] [ 22.016897] Memory state around the buggy address: [ 22.017245] ffff888102bbdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.017767] ffff888102bbe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.018215] >ffff888102bbe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.018442] ^ [ 22.018737] ffff888102bbe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.019138] ffff888102bbe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.019469] ================================================================== [ 22.038496] ================================================================== [ 22.039000] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 22.039343] Write of size 1 at addr ffff888102bbe0ea by task kunit_try_catch/191 [ 22.039656] [ 22.039766] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.039826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.039838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.039861] Call Trace: [ 22.039966] <TASK> [ 22.039991] dump_stack_lvl+0x73/0xb0 [ 22.040034] print_report+0xd1/0x650 [ 22.040056] ? __virt_addr_valid+0x1db/0x2d0 [ 22.040092] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.040115] ? kasan_addr_to_slab+0x11/0xa0 [ 22.040134] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.040158] kasan_report+0x141/0x180 [ 22.040179] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.040213] __asan_report_store1_noabort+0x1b/0x30 [ 22.040252] krealloc_less_oob_helper+0xe90/0x11d0 [ 22.040276] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.040299] ? finish_task_switch.isra.0+0x153/0x700 [ 22.040321] ? __switch_to+0x47/0xf50 [ 22.040346] ? __schedule+0x10cc/0x2b60 [ 22.040370] ? __pfx_read_tsc+0x10/0x10 [ 22.040404] krealloc_large_less_oob+0x1c/0x30 [ 22.040425] kunit_try_run_case+0x1a5/0x480 [ 22.040450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.040481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.040506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.040530] ? __kthread_parkme+0x82/0x180 [ 22.040551] ? preempt_count_sub+0x50/0x80 [ 22.040574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.040598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.040620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.040643] kthread+0x337/0x6f0 [ 22.040662] ? trace_preempt_on+0x20/0xc0 [ 22.040686] ? __pfx_kthread+0x10/0x10 [ 22.040705] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.040737] ? calculate_sigpending+0x7b/0xa0 [ 22.040761] ? __pfx_kthread+0x10/0x10 [ 22.040781] ret_from_fork+0x116/0x1d0 [ 22.040810] ? __pfx_kthread+0x10/0x10 [ 22.040830] ret_from_fork_asm+0x1a/0x30 [ 22.040862] </TASK> [ 22.040873] [ 22.049414] The buggy address belongs to the physical page: [ 22.049708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bbc [ 22.050156] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.050396] flags: 0x200000000000040(head|node=0|zone=2) [ 22.050609] page_type: f8(unknown) [ 22.050782] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.051071] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.051522] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.051769] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.052366] head: 0200000000000002 ffffea00040aef01 00000000ffffffff 00000000ffffffff [ 22.052646] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.052911] page dumped because: kasan: bad access detected [ 22.053184] [ 22.053298] Memory state around the buggy address: [ 22.053484] ffff888102bbdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.054091] ffff888102bbe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.054437] >ffff888102bbe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.054733] ^ [ 22.055178] ffff888102bbe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.055468] ffff888102bbe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.055747] ================================================================== [ 21.827395] ================================================================== [ 21.827886] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 21.828513] Write of size 1 at addr ffff888103aaa8c9 by task kunit_try_catch/187 [ 21.828820] [ 21.828944] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 21.828998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.829011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.829035] Call Trace: [ 21.829049] <TASK> [ 21.829089] dump_stack_lvl+0x73/0xb0 [ 21.829132] print_report+0xd1/0x650 [ 21.829155] ? __virt_addr_valid+0x1db/0x2d0 [ 21.829180] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.829279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.829304] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.829327] kasan_report+0x141/0x180 [ 21.829347] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.829374] __asan_report_store1_noabort+0x1b/0x30 [ 21.829408] krealloc_less_oob_helper+0xd70/0x11d0 [ 21.829432] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.829456] ? __kasan_check_write+0x18/0x20 [ 21.829490] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.829515] ? irqentry_exit+0x2a/0x60 [ 21.829534] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 21.829555] ? trace_hardirqs_on+0x37/0xe0 [ 21.829587] ? __pfx_read_tsc+0x10/0x10 [ 21.829612] krealloc_less_oob+0x1c/0x30 [ 21.829633] kunit_try_run_case+0x1a5/0x480 [ 21.829668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.829692] ? queued_spin_lock_slowpath+0x116/0xb40 [ 21.829716] ? __kthread_parkme+0x82/0x180 [ 21.829736] ? preempt_count_sub+0x50/0x80 [ 21.829759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.829782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.829851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.829874] kthread+0x337/0x6f0 [ 21.829893] ? trace_preempt_on+0x20/0xc0 [ 21.829915] ? __pfx_kthread+0x10/0x10 [ 21.829934] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.829957] ? calculate_sigpending+0x7b/0xa0 [ 21.829981] ? __pfx_kthread+0x10/0x10 [ 21.830002] ret_from_fork+0x116/0x1d0 [ 21.830020] ? __pfx_kthread+0x10/0x10 [ 21.830040] ret_from_fork_asm+0x1a/0x30 [ 21.830070] </TASK> [ 21.830082] [ 21.838526] Allocated by task 187: [ 21.838732] kasan_save_stack+0x45/0x70 [ 21.839002] kasan_save_track+0x18/0x40 [ 21.839197] kasan_save_alloc_info+0x3b/0x50 [ 21.839383] __kasan_krealloc+0x190/0x1f0 [ 21.839583] krealloc_noprof+0xf3/0x340 [ 21.839768] krealloc_less_oob_helper+0x1aa/0x11d0 [ 21.840067] krealloc_less_oob+0x1c/0x30 [ 21.840232] kunit_try_run_case+0x1a5/0x480 [ 21.840463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.840672] kthread+0x337/0x6f0 [ 21.840851] ret_from_fork+0x116/0x1d0 [ 21.841009] ret_from_fork_asm+0x1a/0x30 [ 21.841413] [ 21.841516] The buggy address belongs to the object at ffff888103aaa800 [ 21.841516] which belongs to the cache kmalloc-256 of size 256 [ 21.842185] The buggy address is located 0 bytes to the right of [ 21.842185] allocated 201-byte region [ffff888103aaa800, ffff888103aaa8c9) [ 21.842617] [ 21.842689] The buggy address belongs to the physical page: [ 21.842901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaa [ 21.843323] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.843574] flags: 0x200000000000040(head|node=0|zone=2) [ 21.843749] page_type: f5(slab) [ 21.843986] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.844375] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.844722] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 21.845107] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.845416] head: 0200000000000001 ffffea00040eaa81 00000000ffffffff 00000000ffffffff [ 21.845760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.846195] page dumped because: kasan: bad access detected [ 21.846419] [ 21.846506] Memory state around the buggy address: [ 21.846686] ffff888103aaa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.847256] ffff888103aaa800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.847579] >ffff888103aaa880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.847881] ^ [ 21.848294] ffff888103aaa900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.848587] ffff888103aaa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.849040] ================================================================== [ 22.056300] ================================================================== [ 22.056619] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 22.057108] Write of size 1 at addr ffff888102bbe0eb by task kunit_try_catch/191 [ 22.057381] [ 22.057491] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.057548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.057561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.057582] Call Trace: [ 22.057612] <TASK> [ 22.057631] dump_stack_lvl+0x73/0xb0 [ 22.057659] print_report+0xd1/0x650 [ 22.057682] ? __virt_addr_valid+0x1db/0x2d0 [ 22.057705] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.057727] ? kasan_addr_to_slab+0x11/0xa0 [ 22.057747] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.057769] kasan_report+0x141/0x180 [ 22.057801] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.057828] __asan_report_store1_noabort+0x1b/0x30 [ 22.057949] krealloc_less_oob_helper+0xd47/0x11d0 [ 22.057976] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.058001] ? finish_task_switch.isra.0+0x153/0x700 [ 22.058023] ? __switch_to+0x47/0xf50 [ 22.058145] ? __schedule+0x10cc/0x2b60 [ 22.058171] ? __pfx_read_tsc+0x10/0x10 [ 22.058196] krealloc_large_less_oob+0x1c/0x30 [ 22.058218] kunit_try_run_case+0x1a5/0x480 [ 22.058253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.058275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.058299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.058322] ? __kthread_parkme+0x82/0x180 [ 22.058342] ? preempt_count_sub+0x50/0x80 [ 22.058364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.058429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.058453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.058487] kthread+0x337/0x6f0 [ 22.058507] ? trace_preempt_on+0x20/0xc0 [ 22.058530] ? __pfx_kthread+0x10/0x10 [ 22.058550] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.058572] ? calculate_sigpending+0x7b/0xa0 [ 22.058595] ? __pfx_kthread+0x10/0x10 [ 22.058616] ret_from_fork+0x116/0x1d0 [ 22.058634] ? __pfx_kthread+0x10/0x10 [ 22.058654] ret_from_fork_asm+0x1a/0x30 [ 22.058685] </TASK> [ 22.058696] [ 22.067037] The buggy address belongs to the physical page: [ 22.067405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bbc [ 22.067770] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.068200] flags: 0x200000000000040(head|node=0|zone=2) [ 22.068460] page_type: f8(unknown) [ 22.068618] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.068928] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.069261] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.069488] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.070143] head: 0200000000000002 ffffea00040aef01 00000000ffffffff 00000000ffffffff [ 22.070564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.070896] page dumped because: kasan: bad access detected [ 22.071307] [ 22.071414] Memory state around the buggy address: [ 22.071600] ffff888102bbdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.071996] ffff888102bbe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.072353] >ffff888102bbe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.072647] ^ [ 22.072961] ffff888102bbe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.073330] ffff888102bbe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.073644] ================================================================== [ 22.019904] ================================================================== [ 22.020320] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 22.020674] Write of size 1 at addr ffff888102bbe0da by task kunit_try_catch/191 [ 22.021237] [ 22.021375] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.021425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.021437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.021460] Call Trace: [ 22.021480] <TASK> [ 22.021501] dump_stack_lvl+0x73/0xb0 [ 22.021543] print_report+0xd1/0x650 [ 22.021566] ? __virt_addr_valid+0x1db/0x2d0 [ 22.021589] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 22.021624] ? kasan_addr_to_slab+0x11/0xa0 [ 22.021643] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 22.021666] kasan_report+0x141/0x180 [ 22.021687] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 22.021713] __asan_report_store1_noabort+0x1b/0x30 [ 22.021737] krealloc_less_oob_helper+0xec6/0x11d0 [ 22.021761] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.021834] ? finish_task_switch.isra.0+0x153/0x700 [ 22.021861] ? __switch_to+0x47/0xf50 [ 22.021887] ? __schedule+0x10cc/0x2b60 [ 22.021967] ? __pfx_read_tsc+0x10/0x10 [ 22.021994] krealloc_large_less_oob+0x1c/0x30 [ 22.022027] kunit_try_run_case+0x1a5/0x480 [ 22.022052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.022085] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.022110] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.022133] ? __kthread_parkme+0x82/0x180 [ 22.022153] ? preempt_count_sub+0x50/0x80 [ 22.022175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.022198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.022238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.022261] kthread+0x337/0x6f0 [ 22.022291] ? trace_preempt_on+0x20/0xc0 [ 22.022314] ? __pfx_kthread+0x10/0x10 [ 22.022334] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.022357] ? calculate_sigpending+0x7b/0xa0 [ 22.022380] ? __pfx_kthread+0x10/0x10 [ 22.022401] ret_from_fork+0x116/0x1d0 [ 22.022419] ? __pfx_kthread+0x10/0x10 [ 22.022439] ret_from_fork_asm+0x1a/0x30 [ 22.022479] </TASK> [ 22.022490] [ 22.031051] The buggy address belongs to the physical page: [ 22.031266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bbc [ 22.031627] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.031963] flags: 0x200000000000040(head|node=0|zone=2) [ 22.032276] page_type: f8(unknown) [ 22.032481] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.033058] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.033426] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.033670] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.033944] head: 0200000000000002 ffffea00040aef01 00000000ffffffff 00000000ffffffff [ 22.034366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.034801] page dumped because: kasan: bad access detected [ 22.034966] [ 22.035035] Memory state around the buggy address: [ 22.035187] ffff888102bbdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.035880] ffff888102bbe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.036366] >ffff888102bbe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.036575] ^ [ 22.037270] ffff888102bbe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.037561] ffff888102bbe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.038058] ================================================================== [ 21.984467] ================================================================== [ 21.984940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 21.985362] Write of size 1 at addr ffff888102bbe0c9 by task kunit_try_catch/191 [ 21.985677] [ 21.985790] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 21.985854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.985867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.985890] Call Trace: [ 21.985916] <TASK> [ 21.985938] dump_stack_lvl+0x73/0xb0 [ 21.985971] print_report+0xd1/0x650 [ 21.985994] ? __virt_addr_valid+0x1db/0x2d0 [ 21.986019] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.986052] ? kasan_addr_to_slab+0x11/0xa0 [ 21.986071] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.986094] kasan_report+0x141/0x180 [ 21.986115] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.986151] __asan_report_store1_noabort+0x1b/0x30 [ 21.986174] krealloc_less_oob_helper+0xd70/0x11d0 [ 21.986198] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.986241] ? finish_task_switch.isra.0+0x153/0x700 [ 21.986264] ? __switch_to+0x47/0xf50 [ 21.986291] ? __schedule+0x10cc/0x2b60 [ 21.986316] ? __pfx_read_tsc+0x10/0x10 [ 21.986341] krealloc_large_less_oob+0x1c/0x30 [ 21.986362] kunit_try_run_case+0x1a5/0x480 [ 21.986388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.986410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.986443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.986467] ? __kthread_parkme+0x82/0x180 [ 21.986488] ? preempt_count_sub+0x50/0x80 [ 21.986521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.986544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.986567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.986590] kthread+0x337/0x6f0 [ 21.986609] ? trace_preempt_on+0x20/0xc0 [ 21.986634] ? __pfx_kthread+0x10/0x10 [ 21.986653] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.986676] ? calculate_sigpending+0x7b/0xa0 [ 21.986700] ? __pfx_kthread+0x10/0x10 [ 21.986720] ret_from_fork+0x116/0x1d0 [ 21.986739] ? __pfx_kthread+0x10/0x10 [ 21.986758] ret_from_fork_asm+0x1a/0x30 [ 21.986800] </TASK> [ 21.986813] [ 21.994625] The buggy address belongs to the physical page: [ 21.994816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bbc [ 21.995180] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.995534] flags: 0x200000000000040(head|node=0|zone=2) [ 21.995711] page_type: f8(unknown) [ 21.996022] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.996574] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 21.996937] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.997413] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 21.997740] head: 0200000000000002 ffffea00040aef01 00000000ffffffff 00000000ffffffff [ 21.998216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.998555] page dumped because: kasan: bad access detected [ 21.998777] [ 21.998944] Memory state around the buggy address: [ 21.999186] ffff888102bbdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.999435] ffff888102bbe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.999646] >ffff888102bbe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.999913] ^ [ 22.000295] ffff888102bbe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.000591] ffff888102bbe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.000795] ==================================================================